Topic Review
NASA Robots
NASA (National Aeronautics and Space Administration) robots are robotic devices used to aid, augment, or substitute for astronauts in order to do difficult or rote tasks such as repairs in dangerous environments (such as those with radiation or micrometeorite risks), routine procedures (video capture), etc.
  • 609
  • 20 Oct 2022
Topic Review
SoundCloud
SoundCloud is an online audio distribution platform and music sharing website based in Berlin, Germany that enables its users to upload, promote, and share audio.
  • 3.8K
  • 20 Oct 2022
Topic Review
Force4
Force4 is a development system and framework for the rapid development of rich Internet applications for the connection of databases to different presentation technologies. It integrates the creation and reverse engineering of database models, the creation of the necessary objects and access classes and the composing of Rich Internet Applications.
  • 475
  • 20 Oct 2022
Topic Review
Microsoft Dynamics NAV
Microsoft Dynamics NAV is an enterprise resource planning (ERP) app from Microsoft. The product is part of the Microsoft Dynamics family, and intended to assist with finance, manufacturing, customer relationship management, supply chains, analytics and electronic commerce for small and medium-sized companies and local subsidiaries of large international groups. For modifications of the system, the proprietary programming language C/AL is used. Microsoft Dynamics NAV has been superseded by Microsoft Dynamics 365 Business Central.
  • 488
  • 20 Oct 2022
Topic Review
Internet Television in Australia
{{Multiple issues| Internet television in Australia is the digital distribution of movies and television content via the Internet. In Australia , internet television is provided by a number of generalist, subscription-based streaming service providers, in addition to several niche providers that focus on specific genres. Australia's five major free-to-air television networks also all offer catch up TV of previously broadcast content to watch via their webpages and apps, and a number of ISPs and other companies offer IPTV – the live streaming of television channels sourced from Australia and elsewhere. A feature of Internet television is that a user can view live television or video on demand. Some distributors provide content as downloads, while other only allow streaming; the main difference being that with downloads the end-user must have storage capacity for the content on their device and must wait for the download to be completed before the content can be viewed, whereas streamed content can be viewed almost immediately, but is not stored for a later viewing. Whether downloaded or streamed, video files over the Internet are sometimes metered in Australia, with ISPs setting download quotas which can limit the downloads that a subscriber can make without incurring additional costs. Many ISPs now also provide plans with unlimited downloads. Some ISPs offer downloads on a quota-free basis for partnered television services, which is also known as "unmetered" content.
  • 576
  • 20 Oct 2022
Topic Review
COM Port Redirector
A COM port redirector (tty port redirector under Unix/Linux) is specialized software (often including device driver and user application) that includes the underlying network software necessary to access networked device servers that provide remote serial devices or modems.
  • 324
  • 20 Oct 2022
Topic Review
Social Hacking
Social hacking describes the act of attempting to manipulate outcomes of social behaviour through orchestrated actions. The general function of social hacking is to gain access to restricted information or to a physical space without proper permission. Most often, social hacking attacks are achieved by impersonating an individual or group who is directly or indirectly known to the victims or by representing an individual or group in a position of authority. This is done through pre-meditated research and planning to gain victims’ confidence. Social hackers take great measures to present overtones of familiarity and trustworthiness to elicit confidential or personal information. Social hacking is most commonly associated as a component of “social engineering”. Although the practice involves exercising control over human behaviour rather than computers, the term "social hacking" is also used in reference to online behaviour and increasingly, social media activity. The technique can be used in multiple ways that affect public perception and conversely, increase public awareness of social hacking activity. However, while awareness helps reduce the volume of hacks being carried out, technology has allowed for attack tools to become more sophisticated.
  • 2.6K
  • 20 Oct 2022
Topic Review
Single-Speed Bicycle
A single-speed bicycle is a type of bicycle with a single gear ratio. These bicycles are without derailleur gears, hub gearing or other methods for varying the gear ratio of the bicycle. There are many types of modern single speed bicycles; BMX bicycles, most bicycles designed for children, cruiser type bicycles, classic commuter bicycles, unicycles, bicycles designed for track racing, fixed-gear road bicycles, and single-speed mountain and cyclocross bikes. Although most fixed-gear bicycles (fixies) are technically single speed, the term single-speed generally refers to a single gear ratio bicycle with a freewheel mechanism to allow it to coast.
  • 2.6K
  • 20 Oct 2022
Topic Review
OS-Level Virtualisation
OS-level virtualization refers to an operating system paradigm in which the kernel allows the existence of multiple isolated user-space instances. Such instances, called containers (Solaris, Docker), Zones (Solaris), virtual private servers (OpenVZ), partitions, virtual environments (VEs), virtual kernel (DragonFly BSD) or jails (FreeBSD jail or chroot jail), may look like real computers from the point of view of programs running in them. A computer program running on an ordinary operating system can see all resources (connected devices, files and folders, network shares, CPU power, quantifiable hardware capabilities) of that computer. However, programs running inside of a container can only see the container's contents and devices assigned to the container. On Unix-like operating systems, this feature can be seen as an advanced implementation of the standard chroot mechanism, which changes the apparent root folder for the current running process and its children. In addition to isolation mechanisms, the kernel often provides resource-management features to limit the impact of one container's activities on other containers. The term "container," while most popularly referring to OS-level virtualization systems, is sometimes ambiguously used to refer to fuller virtual machine environments operating in varying degrees of concert with the host OS, e.g. Microsoft's "Hyper-V Containers."
  • 617
  • 20 Oct 2022
Topic Review
Provisioning (Telecommunications)
In telecommunication, provisioning involves the process of preparing and equipping a network to allow it to provide new services to its users. In National Security/Emergency Preparedness telecommunications services, "provisioning" equates to "initiation" and includes altering the state of an existing priority service or capability. The concept of network provisioning or service mediation, mostly used in the telecommunication industry, refers to the provisioning of the customer's services to the network elements, which are various equipment connected in that network communication system. Generally in telephony provisioning this is accomplished with network management database table mappings. It requires the existence of networking equipment and depends on network planning and design. In a modern signal infrastructure employing information technology (IT) at all levels, there is no possible distinction between telecommunications services and "higher level" infrastructure. Accordingly, provisioning configures any required systems, provides users with access to data and technology resources, and refers to all enterprise-level information-resource management involved. Organizationally, a CIO typically manages provisioning, necessarily involving human resources and IT departments cooperating to: As its core, the provisioning process monitors access rights and privileges to ensure the security of an enterprise's resources and user privacy. As a secondary responsibility, it ensures compliance and minimizes the vulnerability of systems to penetration and abuse. As a tertiary responsibility, it tries to reduce the amount of custom configuration using boot image control and other methods that radically reduce the number of different configurations involved. Discussion of provisioning often appears in the context of virtualization, orchestration, utility computing, cloud computing, and open-configuration concepts and projects. For instance, the OASIS Provisioning Services Technical Committee (PSTC) defines an XML-based framework for exchanging user, resource, and service-provisioning information - SPML (Service Provisioning Markup Language) for "managing the provisioning and allocation of identity information and system resources within and between organizations". Once provisioning has taken place, the process of SysOpping ensures the maintenance of services to the expected standards. Provisioning thus refers only to the setup or startup part of the service operation, and SysOpping to the ongoing support.
  • 232
  • 20 Oct 2022
  • Page
  • of
  • 371
Video Production Service