For the Love of Technology
A Multi Technology Portal for Tech Enthusiasts
Your Company Address
I have taken created a LAN between Windows( Host) and a Ubuntu VM(Guest).The Ip address of VM is 192.168.56.101 and that of host is 192.168.56.1.(Please note that IP’s should be in the same subnet for a LAN connection). Iptables is a user space application program that allows a system administrator to configure the tables providedRead More
There are commercial products like VMWARE available to support virtualization. But there are various Open Source tools available that give similar features to the commercial products.Virtualization has been like a revolution and has reduced the cost of the company greatly and virtualization is a part of cloud technology, that makes it a technology to watch outRead More
In this tutorial we describe various products which are based on the cloud technology. Panda Cloud Antivirus –The first of its kind, Panda has launched an antivirus based on the cloud technology.It is very light weight as the setup file is only about 237 kb odd and during installation only, it downloads other modules which areRead More
The problem with enterprise-class software is that you need an enterprise-class IT department to run it. For small businesses, many useful features of Windows Enterprise edition are too expensive to use. The PC's in the smaller organizations are thus managed inefficiently with inconsistent results and thus the burden on IT-Staff increases to clean up messesRead More
While most of us were still celebrating Sachin’s amazing feat, there was a celebration of a different kind going on at Silicon Valley. eBay’s headquarters played host to the unveiling of energy startup Bloom Energy’s – Bloom Box!.Bloom Box is supposed to be a new type of fuel cell and has been nicknamed -’PowerRead More
XP has tons of services enabled by default. By knowing what these services do , you can really speed up your system by disabling the ones you don’t need.Many services can be modified to increase the speed of your system. If you ever find something not working correctly, you should reset it. However,Read More
The PIC microcontroller family is manufactured by Microchip Technology Inc. Currently
they are one of the most popular microcontrollers, used in many commercial and industrial
applications. Over 120 million devices are sold each year.
The PIC microcontroller architecture is based on a modified Harvard RISC (Reduced Instruction
Set Computer) instruction set with dual-bus architecture, providing fast and fl exible design
with an easy migration path from only 6 pins to 80 pins, and from 384 bytes to 128 kbytes of
PIC microcontrollers are available with many different specifi cations depending on:
• Memory Type
– OTP (One-time-programmable) …… READ MORERead More
Introduction A number of guidelines are available for C code optimization, there is no substitute for having a thorough knowledge of the compiler and machine for which you are programming. Often, speeding up a program can also cause the code's size to increase. This increment in code size can also have an adverse effect onRead More
Vulnerability Assesment and Penetration Testing There are hundreds of free security tools available on internet.Here I will try to give a comprehensive list of set of security tools which can serve the complete puropse of Vulnerability Assesment and Penetration Testing.Vulnerability assesment involves finding the known/unknown vulnerabilities in a computer systems or a network.PenetrationRead More
The PCI-SIG, an industry organization dedicated to developing and enhancing PCI/PCI Express (PCIe) technology, has successfully developed the PCI, PCI-X and PCIe Gen 1 and Gen 2 interconnect protocols and promoted the deployment of these technologies since PCI's inception in 1992.
In early 2008, the PCI-SIG announced the establishment of a workgroup chartered with the development of the next generation of PCIe " the PCI Express Base Specification 3.0, or PCIe Gen 3.
The Gen 3 specification is yet another step forward in enhancing the usefulness of the PCIe protocol by doubling the effective bandwidth and adding protocol enhancements to increase end-system performance.
Leading up to this development, IBM and Intel in 2006 launched an initiative called Geneseo, proposing extensions to the PCIe protocol for high-performance computing and visual processing.
Recommendations from this initiative were provided to the PCI-SIG as potential PCIe protocol enhancements. In addition to the adoption of Geneseo, several other engineering change notices (ECNs) were released by the PCI-SIG, providing enhancements for the efficiency and usefulness of the PCIe protocol.
READ MORE……Read More