Been searching online for blogging tools these are some of the recommended tools by the bloggers out there. Some will have a free option of the apps but most of them come with subscription fees, I think it worth it if you are willing to invest in them. Grammarly Either you’re native or non-native English-speaker, chances are that you may… Read more →
Category: Technology
How does Automatic Display Brightness control work?
The device may automatically control the display brightness using different methods. In one embodiment, the device may measure the ambient light (lux) using a front-facing ambient light sensor (ALS) and a rear-facing ALS. In one embodiment, in addition to the front-facing and rear-facing ALSs and/or front and rear cameras, the device may utilize edge ALSs. In one embodiment, in addition… Read more →
Web Cookies
A web cookie, also known as an internet cookie or a browser cookie, is a text file that contains information that the website needs to store relating to a particular visit or visitor. The file is stored on the user’s machine, can be deleted by the user, and can only be read by the user or the website that created… Read more →
What is Google Street View and How does it Work?
Google Street View is a technology featured in Google Maps that provides panoramic views from various streets of the world. It was launched on May 25, 2007, by Google in several cities in the United States, since then it has expanded to many cities and areas of the world. Till today, Google Street View is launched in about 80 countries… Read more →
Starlink
Starlink is a network of satellites that provide the internet. The constellation will consist of thousands of mass-produced small satellites in low Earth orbit (LEO), working in combination with ground transceivers. It’s being built by SpaceX, Elon Musk’s aerospace company. The satellite network operates at 550km above the Earth’s surface in low Earth orbit, unlike conventional internet satellites that are… Read more →
Penetration Testing
Penetration Testing is a method that many companies follow in order to minimize their security breaches. This is a controlled way of hiring a professional who will try to hack your system and show you the loopholes that you should fix. Before doing a penetration test, it is mandatory to have an agreement that will explicitly mention the following parameters:… Read more →
Increase your Virtual RAM to Make Your System Faster
Steps Press and Hold down the ‘Windows’ Key and Press the ‘Pause/Break’ button at the top right of your keyboard. Or simply Right-Clicking ‘My Computer’ and then select ‘Properties’. Click on the ‘Advanced’ tab. Under ‘Performance’, click ‘Settings’. Then click the ‘Advanced’ tab on the button that pops up. Under ‘Virtual Memory’ at the bottom, click ‘Change’. Click the ‘Custom… Read more →
Data Centre
Data Centres are simply centralised locations where computing and networking equipment is concentrated for the purpose of collecting, storing, processing, distributing, or allowing access to large amounts of data. They have existed in one form or another since the advent of computers. In the days of the room-sized behemoths that were our early computers, a data center might have had… Read more →
Quantum Dot Technology
A Quantum Dot is a human-made nanoparticle that has semiconductor properties. They’re tiny, ranging in size from 2 to 10 nanometers, with the size of the particle dictating the wavelength of light it emits, and therefore the color. When Quantum Dots are hit with a light source, each dot emits a color of a specific bandwidth: Larger dots emit light… Read more →
Zero-Day Attack
A zero-day attack (also referred to as Day Zero) is an attack that exploits a potentially serious software security weakness that the vendor or developer may be unaware of. The software developer must rush to resolve the weakness as soon as it is discovered in order to limit the threat to software users. The solution is called a software patch.… Read more →