Latest Notes

  • in

    What is the Hypersonic Air-breathing Weapon Concept (HAWC)?

    The Hypersonic Air-breathing Weapon Concept (HAWC), pronounced HAWK, is a joint program between DARPA and The US Air Force. It is an experimental project for the development and testing of a scramjet powered air-launched hypersonic cruise missile. Here is what all that means: Scramjet – A jet engine in which combustion takes place in supersonic airflow. […] More

    6700 points
    Upvote Downvote
  • in

    What exactly is firmware?

    Firmware is a software program that is hardcoded into the non-volatile memory of a microcontroller. It controls the hardware device that the MCU is attached to and brings it to life. It is the one and only program controlling the hardware device, and it is always running. A Fitbit for example, has firmware on an […] More

    6700 points
    Upvote Downvote
  • in

    How Things Are Made | An Animated Introduction to Manufacturing

    How are things made? In this video I take a look at the different types of manufacturing processes – forming, casting, molding, machining, joining, and additive manufacturing – which are used to create the everyday objects that surround us.

    Using animations, the video explores a number of different specific manufacturing techniques, like rolling, injection molding, investment casting, sand casting, and 3D printing, and gives an overview of the pros and cons of each, to help better understand how to select the correct manufacturing process.

    6700 points
    Upvote Downvote
  • in

    Plastic Injection Molding – How products are made. MUST WATCH!!!

    Bill details the key engineering principles underlying plastic injection molding. He describes its history and, then,  reveals the intricate details of the process. He shows viewers where to found, on any injection molding product, the markings created by injection molding. He closes with a description of one of the finest examples of injection molding: the Lego brick. 

    6700 points
    Upvote Downvote
  • in

    Energy and Power: Simplified

    What is energy? Energy is the ability to move something. Energy has two states Energy can be in two states, potential and kinetic. Potential energy is a motionless state, where a small change in the conditions of the system can cause something to move. Kinetic energy is the state in which something is actually moving. […] More

    6700 points
    Upvote Downvote
  • in

    What does High Definition (HD) mean?

    High Definition (HD) simply means there are more pixels on the screen from top to bottom and the image quality is therefore higher as compared to its Standard Definition (SD) predecessor. Standard Definition starts at 240 and ends at 480 pixels from the bottom to the top of the screen; 720 is semi-HD; 1080 is […] More

    6700 points
    Upvote Downvote
  • in

    What is resolution?

    There are two related, but slightly different definitions of resolution. There is image resolution, which is explained here: https://guides.lib.umich.edu/c.php?g=282942&p=1885350 And there is screen resolution for a tv or monitor. When talking about image resolution, the number is given as PPI, or pixels per inch. The resolution is not connected to the total height and width […] More

    6700 points
    Upvote Downvote
  • in

    What is a SIM card? What is GSM vs CDMA?

    SIM card stands for Subscriber Identification Module. It is a small memory card used in GSM phones that contain unique information that identifies the owner of the phone to the mobile network used by his carrier. The SIM card is provided by the GSM wireless carrier and is needed to be able to make calls, […] More

    6700 points
    Upvote Downvote
  • in

    Difference between MAC address and IP address

    MAC address is a unique identifier that is assigned to a NIC (Network Interface Controller) Card. It consists of a 48 bit or 64-bit address, which is associated with the network adapter. MAC address can be in hexadecimal format. The full form of MAC address is Media Access Control address. The MAC address is provided by the manufacturer of the physical network card when it is created and never changes.

    An IP address is an address that helps you to identify a network connection. It is termed as the ‘Logical Address,’ which is provided to a connection in a network. The IP address is assigned by the ISP and can change when you move your computer from one network to another.

    6700 points
    Upvote Downvote
  • in

    Extranet – Wikipedia

    An extranet is a controlled private network that allows access to partners, vendors, and suppliers or an authorized set of customers – normally to a subset of the information accessible from an organization’s intranet.

    6700 points
    Upvote Downvote
  • in

    Transceiver – Wikipedia

    A transceiver is a component of a wireless device that is able to both transmit and receive information through radio waves. It is a combination of a transmitter and receiver, hence the name transceiver. Transceivers are most commonly used in wireless devices, like cell phones. Other common examples include walkie-talkies and CB radios.

    Despite the widespread use of transceivers, one common device that does not use them is a radio. A radio only has a receiver that receives the radio signal transmitted by radio stations for the listeners to enjoy.

    6700 points
    Upvote Downvote
  • in

    Powertrain – Engine to Wheel (Power Transmission System)

    The powertrain (power transmission system) transfers power from the #engine to the wheels. 

    It is comprised of the following components sequenced in the direction that the power flows: 

    1. Engine – Converts combustion energy into rotational movement using pistons
    2. Transmission – The gears for controlling the torque and speed of the driveshaft
    3. Driveshaft
    4. Differentials – Converts the rotation of the driveshaft into rotation of the perpendicular axels
    5. Axels
    6. [Wheels]
    6700 points
    Upvote Downvote
  • in

    What is a Firewall?

    This is an animated video explaining what a network firewall is. A firewall is a system that is designed to prevent unauthorized access from entering a private network by filtering the information that comes in from the internet. A firewall blocks unwanted traffic and permits wanted traffic.

    6700 points
    Upvote Downvote
  • in

    Threat Vectors and Attack Surfaces explained

    A “Threat Vector” is the path that a hacker or a malware application might take to get past your defenses and compromise your data.

    The 6 main threat vectors (points of entry) include:

    • Network – The perimeter of your network, usually protected by something like a firewall. 
    • User – Attackers often use social engineering and social networking to gather information and trick users into opening a pathway for an attack into a network.
    • Email – Phishing attacks and malicious attachments target the email threat vector.
    • Web Application – SQL Injection and Cross-Site Scripting are just two of the many attacks that take advantage of an inadequately protected Web Application threat vector.
    • Remote Access – A corporate device using an unsecured wireless hotspot can be compromised and passed on to the corporate network.
    • Mobile – Smartphones, tablets, and other mobile devices can be used as devices to pass malware and other attacks on to the corporate network.  Additionally, mobile malware may be used to steal useful data from the mobile device.

    Your “Attack Surface” is all the publicly and privately-exposed nexus points between your company’s data and the human or software-driven interfaces of your company. In essence, it’s all your threat vectors put together.

    6700 points
    Upvote Downvote
  • in

    What is a Data Center?

    A data center is a facility that houses an organization’s IT equipment, including servers, networking infrastructure, etc., for the purposes of hosting and storing applications and data.

    6700 points
    Upvote Downvote
  • in

    What is an Endpoint?

    The term endpoint is used in two contexts:

    1. Networking – In networking, an endpoint is a remote computing device that communicates back and forth with a network to which it is connected. Examples of endpoints include:
      • Desktops
      • Laptops
      • Smartphones
      • Tablets
      • Servers
      • Workstations
      • Internet-of-things (IoT) devices
    2. APIs – In APIs, an endpoint is any URL that is preconfigured to handle requests. The URL is an access point of the API. An HTTP request can be sent to the URL endpoint by a user. The server receives the request and passes it to the application (API) for processing.
    6700 points
    Upvote Downvote
  • in

    💻 – See How 🅻🅲🅳 Pixels Work

    Liquid Crystal Displays use an amazing array of technologies to display pictures and text. See how they work!

    Important background information: Read this post on color space to understand how the RGB color system in LCD displays work.

    6700 points
    Upvote Downvote
  • in

    Thermochromatic technology

    Thermochromic (TC) products change color in response to temperature fluctuations. The most famous TC application ever was the “mood” ring of the 1970s. More

    6700 points
    Upvote Downvote
  • in

    Thermal mapping

    Thermal mapping, or temperature mapping, establishes the temperature distribution, or profile, within the zone being mapped. There are different technologies for producing a thermal map. Perhaps the most recognized way of thermal mapping is through the use of thermal imaging. Thermal imaging is the process of converting infrared (IR) radiation (heat) into visible images that […] More

    6700 points
    Upvote Downvote
  • in

    Velocimetry – Wikipedia

    Velocimetry is the measurement of the velocity of fluids. The fluids can be either liquid or gas. This is a task often taken for granted and involves far more complex processes than one might expect. It is often used to solve fluid dynamics problems, study fluid networks, in industrial and process control applications, as well as in the creation of new kinds of fluid flow sensors. Methods of velocimetry include particle image velocimetry and particle tracking velocimetryMolecular tagging velocimetry, laser-based interferometry, ultrasonic Doppler methods, Doppler sensors, and new signal processing methodologies.

    As an illustration of how velocimetry can be done, let’s take the method of particle image velocimetry (PIV). In PIV, the fluid is seeded with tracer particles which, for sufficiently small particles, are assumed to faithfully follow the flow dynamics. The fluid with entrained particles is illuminated so that particles are visible. The motion of the seeding particles is used to calculate the speed and direction (the velocity field) of the flow being studied.

    Here is a brief video explaining Particle Image Velocimetry (PIV): https://www.youtube.com/watch?v=JbuuhpQCWz8

    6700 points
    Upvote Downvote
  • in

    Introduction to Nondestructive Testing

    Nondestructive testing (NDT) is the process of inspecting, testing, or evaluating materials, components, or physical systems for unexpected irregularities, without destroying the serviceability of the part or system. In other words, when the inspection or test is completed the part can still be used.

    In contrast to NDT, other tests are destructive in nature and are therefore done on a limited number of samples (“lot sampling”), rather than on the materials, components, or systems actually being put into service.

    6700 points
    Upvote Downvote
  • in

    What does tethering your mobile phone mean?

    Tethering is the practice of using your smartphone as a hotspot, or wireless network. You can then connect other devices, like your laptop or tablet, to the Internet through your smartphone. To do so, your phone must have mobile data enabled. More

    6700 points
    Upvote Downvote
  • in

    What is throttling?

    Internet throttling is when your ISP intentionally slows down your internet speed. Providers temporarily do this to regulate network traffic. Throttling usually results in longer response times, slower download speeds, and buffering. The term throttling originated in the context of engines. Throttling an engine means controlling the amount of gasoline flowing into it.  More

    6700 points
    Upvote Downvote
Load More
Congratulations. You've reached the end of the internet.