Posts

Latest Posts

Algorithmic Design and Data Structure Techniques

   Applying Algorithmic Design and Data Structure Techniques When creating applications, there are complexities of time and space that must both be considered. Simply speaking, time complexity is the amount of time a computer algorithm takes to run. This time is measured in milliseconds, but when applied to a larger application with a large amount of data, this time becomes much more important. Space complexity considers how much space or memory an algorithm uses to solve a problem. As the algorithm uses more data, space may be freed up with each computer cycle or keep growing. If the space necessary continues to grow, there is a possibility of running out of memory. Using algebraic calculations, more commonly known as “Big O” notation, a software designer can determine if time grows by a number equal to the input or if there is an exponential growth in time as input increases. “Big O” notation can also be used to determine if memory usage remains constant or continues to grow...

Learn to Program in Java

You can start programming in Java today. It's simple, free and there is an abundance of resources. The language has been around for decades and is used by many companies. Because it is so widely used, Java programmers have many job opportunities. There is a very large and active support community on the internet. Computers use a language of 1s and 0s called assembly language. This is not human-readable code and would be extremely difficult and time-consuming to write code for.   There are many Object Oriented Language programming languages that are much easier for a human to understand that will create the computer code for you.   Object Oriented might sound confusing at first, but it simply means that you are programming with items (objects) that have certain known properties called states and behaviors. A state would describe the item, such as name, size, and color, and the behavior is what it can do, such as move, be filled, emptied, and tip over. An everyday object with th...

Modern Operating Systems

Image
Features and structure of contemporary operating systems The fundamental concepts that underlie operating systems are process and resource management, memory management, file management, and I/O management. The operating system provides a setting for applications to control the hardware on which it’s installed. The operating system will have some variation of a user interface to interact with the system. The interface may be a batch system, command line, or graphical user interface. The user interface does not directly control the hardware or system services. The user interface will use pre-defined ‘system calls’ to interact with the system services only in specific allowed methods. The system calls will relay the messages to the system services. Threads and process synchronization Operating systems use inter-process communications to share and exchange information, such as shared memory and message passing. Shared memory is a method that allows multiple processes to access the same ...

Tech Topic Connection - Network Security

Image
                            Network security is fundamentally related to information technology in that security is what keeps your data safe. Without hardened network security, the time and effort you put into creating data using your expensive hardware and software could be wasted. Without properly securing your network with hardware and software, you can lose it all in a simple hack. Network security requires a multi-layered approach to protect your network using hardware and software at many levels.             When computers were created, there was no network to worry about having to secure. Massive original computers were only available to select employees who had physical access to the computers. When network protocols were first invented, they were designed to facilitate data transfer, such as TCP-IP, but not to provide security. As private computers became more po...

Network Security

  Network Security Network security is paramount because it helps keep sensitive data safe and ensures that network data is trusted. Keeping a network secure requires a multi-layered approach which includes software, hardware, and training. Your network can contain sensitive data which could harm or embarrass a company or even an individual. A company could have trade secrets, which, if divulged, may cause them to lose their edge in their field of business. Data may be simple but necessary to carry out daily business. Customer private data needs to be protected. A breach of customer information could open them up to identity theft and financial ruin. As many companies interconnect with other companies using cloud-based products, managing access to needed services and maintaining security becomes even more complex. As an individual, your network should also remain secure. It might seem a mild annoyance if someone gets onto your home network and turns your lights on or off. They may ...

Computers in the Automotive Workplace

Automotive History Before Computers The automotive industry is heavily computerized, but it wasn't always so. Vehicle engines used to be completely mechanical. Gauges were nothing more than sensors or glorified dimmer switches. Some vehicles started adding digital gauges in the mid-1980s, although sensors remained analog for longer. When you would take your vehicle in to get service at a dealership, your service write-up was on carbon paper and handwritten. When parts departments initially started to keep inventory electronically, the paperwork was still handwritten. You used to gather your invoices at the end of the day and enter your sales into a "deck writer." A deck writer was a computer keyboard connected to a line printer. It was still just a dumb terminal connected to an on-site server. After entering your sales for the day, your electronic inventory was updated. To see your inventory, you would need to print it out on paper. Eventually, monitors and additional key...

Traveling Through a Network

Image
  Packet Data D ata is sent through a network in 'packets'. Data is taken and disassembled and placed into smaller chunks called packets. Each packet has a unique identifier added to it in addition to source and destination IP addresses. A packet is sent off to its destination computer. Along the way, each packet can take a different route, hopping from one server to another to find the best route to get to its destination. When the packets reach the recipient, the computer will re-assemble all of the packets into a complete message. Ping is a simple command to see if you can reach an end device. If this times out, the device isn't reachable on the network. This could mean a connection is down or not connected. Ping will also let you know how long a connection takes and if any packets are lost.
Traceroute is a more comprehensive tool that will show you every router along the way. Traceroute can help determine where network congestion and slowdowns occur. A ping or tracerout...