Latest Notes

  • in

    Oil, fossil fuels, and petroleum products explained

    We call crude oil and petroleum fossil fuels because they are mixtures of hydrocarbons that formed from the remains of animals and plants that lived millions of years ago in a marine environment before the existence of dinosaurs. Over millions of years, the remains of these animals and plants were covered by layers of sand, silt, and rock. Heat and pressure from these layers turned the remains into what we now call crude oil or petroleum. The word petroleum means rock oil or oil from the earth.

    6700 points
    Upvote Downvote
  • in

    What is combustion?

    Combustion is the scientific word for burning. It is the rapid chemical reaction of a substance (known as fuel) with oxygen which products energy (heat and light) and waste by-products. In a car, combustion occurs within the cylinders of the engine. In the cylinder, gas is mixed with air and then ignited with a […]

    6700 points
    Upvote Downvote
  • in

    Powertrain – Engine to Wheel (Power Transmission System)

    The powertrain (power transmission system) transfers power from the #engine to the wheels. 

    It is comprised of the following components sequenced in the direction that the power flows: 

    1. Engine – Converts combustion energy into rotational movement using pistons
    2. Transmission – The gears for controlling the torque and speed of the driveshaft
    3. Driveshaft
    4. Differentials – Converts the rotation of the driveshaft into rotation of the perpendicular axels
    5. Axels
    6. [Wheels]
    6700 points
    Upvote Downvote
  • in

    What Is the Greenhouse Effect?

    Earth is a comfortable place for living things. It’s just the right temperatures for plants and animals – including humans – to thrive. Why is Earth so special?

    Well, one reason is: the greenhouse effect!

    6700 points
    Upvote Downvote
  • in

    What is a Firewall?

    This is an animated video explaining what a network firewall is. A firewall is a system that is designed to prevent unauthorized access from entering a private network by filtering the information that comes in from the internet. A firewall blocks unwanted traffic and permits wanted traffic.

    6700 points
    Upvote Downvote
  • in

    Threat Vectors and Attack Surfaces explained

    A “Threat Vector” is the path that a hacker or a malware application might take to get past your defenses and compromise your data.

    The 6 main threat vectors (points of entry) include:

    • Network – The perimeter of your network, usually protected by something like a firewall. 
    • User – Attackers often use social engineering and social networking to gather information and trick users into opening a pathway for an attack into a network.
    • Email – Phishing attacks and malicious attachments target the email threat vector.
    • Web Application – SQL Injection and Cross-Site Scripting are just two of the many attacks that take advantage of an inadequately protected Web Application threat vector.
    • Remote Access – A corporate device using an unsecured wireless hotspot can be compromised and passed on to the corporate network.
    • Mobile – Smartphones, tablets, and other mobile devices can be used as devices to pass malware and other attacks on to the corporate network.  Additionally, mobile malware may be used to steal useful data from the mobile device.

    Your “Attack Surface” is all the publicly and privately-exposed nexus points between your company’s data and the human or software-driven interfaces of your company. In essence, it’s all your threat vectors put together.

    6700 points
    Upvote Downvote
  • in

    Cybersecurity

    Cybersecurity, computer security, or IT security, is the protection of computer systems and networks from the damage, theft, or disruption of their hardware, software, or data. More

    6700 points
    Upvote Downvote
  • in

    Git stash

    The git stash command takes your uncommitted changes (both staged and unstaged), saves them away for later use, and then reverts them from your working copy.

    6700 points
    Upvote Downvote
  • in

    Learn Github in 20 Minutes

    Learn how to use Git & Github to share code and collaborate with other developers.  This video covers: creating github repos, pushing & pulling, cloning, forking, making pull requests, and open-source contribution workflows.

    6700 points
    Upvote Downvote
  • in

    Learn Git In 15 Minutes

    In this video, we’ll go over all the important stuff you need to know to get started using Git.  We cover git add, git commit, git branch, git checkout, and git merge!

    6700 points
    Upvote Downvote
  • in

    What is OAuth really all about – OAuth tutorial – Java Brains

    In this tutorial, you’ll understand what OAuth is really all about. You’ll learn why OAuth was created and what problem it solves. We’ll also look at a typical OAuth flow at a very high level so that you have a basic understanding of the interaction.

    Here is part 2 of the video series which goes into more detail on OAuth terminology and program flow: https://www.youtube.com/watch?v=3pZ3Nh8tgTE&t=1192s

    6700 points
    Upvote Downvote
  • in

    What is user provisioning?

    User provisioning is the process of setting up user accounts for access to your different enterprise systems. In this provisioning process, you also allocate privileges and permissions to the users, so as to protect the security of the enterprise systems, while allowing users access to everything they need to do their work, and nothing more.

    Ideally, as with Identity and Access Management (IAM) systems, there is one digital identity (account) per individual, and that one user account is used for accessing the different enterprise systems.

    6700 points
    Upvote Downvote
  • in

    Software modernization

    Software modernization, or legacy modernization, refers to the conversion, rewriting, or porting of a legacy system to a modern computer programming language, software libraries, protocols, or hardware platform. Legacy transformation aims to retain and extend the value of the legacy investment through migration to new platforms to benefit from the advantage of the new technologies.

    6700 points
    Upvote Downvote
  • in

    What is Software Migration?

    Software migration is the practice of transferring data and/or functionality from one operating environment to another. It could also refer to times when users are migrating the same software from one piece of computer hardware to another, or changing both software and hardware simultaneously.

    6700 points
    Upvote Downvote
  • in

    What is a Data Center?

    A data center is a facility that houses an organization’s IT equipment, including servers, networking infrastructure, etc., for the purposes of hosting and storing applications and data.

    6700 points
    Upvote Downvote
  • in

    What is an Endpoint?

    The term endpoint is used in two contexts:

    1. Networking – In networking, an endpoint is a remote computing device that communicates back and forth with a network to which it is connected. Examples of endpoints include:
      • Desktops
      • Laptops
      • Smartphones
      • Tablets
      • Servers
      • Workstations
      • Internet-of-things (IoT) devices
    2. APIs – In APIs, an endpoint is any URL that is preconfigured to handle requests. The URL is an access point of the API. An HTTP request can be sent to the URL endpoint by a user. The server receives the request and passes it to the application (API) for processing.
    6700 points
    Upvote Downvote
  • in

    Data visualization

    Data visualization is the graphical representation of information and data. By using visual elements like charts, graphs, and maps, data visualization tools provide an accessible way to see and understand trends, outliers, and patterns in data.

    6700 points
    Upvote Downvote
  • in

    💻 – See How 🅻🅲🅳 Pixels Work

    Liquid Crystal Displays use an amazing array of technologies to display pictures and text. See how they work!

    Important background information: Read this post on color space to understand how the RGB color system in LCD displays work.

    6700 points
    Upvote Downvote
  • in

    Liquid Crystals – Chalk Talk

    They aren’t quite liquids or solids, but they’ll definitely be a force for the future. This animated series of short videos acts as a video glossary to defin…

    6700 points
    Upvote Downvote
  • in

    Thermochromatic technology

    Thermochromic (TC) products change color in response to temperature fluctuations. The most famous TC application ever was the “mood” ring of the 1970s. More

    6700 points
    Upvote Downvote
  • in

    Thermal mapping

    Thermal mapping, or temperature mapping, establishes the temperature distribution, or profile, within the zone being mapped. There are different technologies for producing a thermal map. Perhaps the most recognized way of thermal mapping is through the use of thermal imaging. Thermal imaging is the process of converting infrared (IR) radiation (heat) into visible images that […] More

    6700 points
    Upvote Downvote
  • in

    Velocimetry – Wikipedia

    Velocimetry is the measurement of the velocity of fluids. The fluids can be either liquid or gas. This is a task often taken for granted and involves far more complex processes than one might expect. It is often used to solve fluid dynamics problems, study fluid networks, in industrial and process control applications, as well as in the creation of new kinds of fluid flow sensors. Methods of velocimetry include particle image velocimetry and particle tracking velocimetryMolecular tagging velocimetry, laser-based interferometry, ultrasonic Doppler methods, Doppler sensors, and new signal processing methodologies.

    As an illustration of how velocimetry can be done, let’s take the method of particle image velocimetry (PIV). In PIV, the fluid is seeded with tracer particles which, for sufficiently small particles, are assumed to faithfully follow the flow dynamics. The fluid with entrained particles is illuminated so that particles are visible. The motion of the seeding particles is used to calculate the speed and direction (the velocity field) of the flow being studied.

    Here is a brief video explaining Particle Image Velocimetry (PIV): https://www.youtube.com/watch?v=JbuuhpQCWz8

    6700 points
    Upvote Downvote
  • in

    Introduction to Nondestructive Testing

    Nondestructive testing (NDT) is the process of inspecting, testing, or evaluating materials, components, or physical systems for unexpected irregularities, without destroying the serviceability of the part or system. In other words, when the inspection or test is completed the part can still be used.

    In contrast to NDT, other tests are destructive in nature and are therefore done on a limited number of samples (“lot sampling”), rather than on the materials, components, or systems actually being put into service.

    6700 points
    Upvote Downvote
  • in

    What does tethering your mobile phone mean?

    Tethering is the practice of using your smartphone as a hotspot, or wireless network. You can then connect other devices, like your laptop or tablet, to the Internet through your smartphone. To do so, your phone must have mobile data enabled. More

    6700 points
    Upvote Downvote
Load More
Congratulations. You've reached the end of the internet.