Technology Navigator
Saturday, October 15, 2011
Secure Sockets Layer (SSL)
HTTP Secure
Sunday, September 25, 2011
Parallel Programming in the .NET Framework

Many personal computers and workstations have two or four cores (that is, CPUs) that enable multiple threads to be executed simultaneously. Computers in the near future are expected to have significantly more cores. To take advantage of the hardware of today and tomorrow, you can parallelize your code to distribute work across multiple processors. In the past, parallelization required low-level manipulation of threads and locks. Visual Studio 2010 and the .NET Framework 4 enhance support for parallel programming by providing a new runtime, new class library types, and new diagnostic tools. These features simplify parallel development so that you can write efficient, fine-grained, and scalable parallel code in a natural idiom without having to work directly with threads or the thread pool.
Sunday, August 28, 2011
Task Manager

-
MEM Usage—This bar graph shows the amount of virtual memory your computer is using.
-
Memory Usage History—This line graph tracks the size of your virtual memory over time. It only displays the results; it doesn't actually record them anywhere.
-
Physical Memory Total—This number represents the total amount of RAM installed on your computer.
-
Physical Memory Available—This number shows the amount of RAM available for CPU processes. This number will never go to zero because the operating system will swap data to the hard disk as the memory fills.
-
Physical Memory System Cache—This is the amount of RAM being used by the file cache.
-
Commit Charge Total—This number shows the size of virtual memory in use. You'll notice that this number matches the number shown in MEM Usage.
-
Commit Charge Limit—This shows the size of your paging limit. The paging limit is the maximum size your virtual memory can be without making changes to its configuration.
-
Commit Charge Peak—This number shows the highest amount of virtual memory used since you began tracking usage.
-
Kernel Memory Total—This number shows the amount of paged and nonpaged memory used by the operating system's kernel. The kernel is the central core of the operating system that does most of the background work.
-
Kernel Memory Paged—This number shows the amount of virtual memory set aside for the kernel.
- Kernel Memory Nonpaged—This is the amount of RAM dedicated to the operating system's kernel.
- CPU Time—The total processor time, in seconds, used by the process since it was started.
- CPU Usage—The percentage of time the threads of the process used the processor since the last update.
- Memory Usage—The amount of main memory, in kilobytes, used by the process.
Windows Task Manager

*(A task manager is a program used to provide information about the processes and programs running on a computer, as well as the general status of the computer. It can also be used to terminate processes and programs, as well as change the processes priority).
Wireless-N
- Wireless-N The 802.11n standard will be the next generation of high-speed Wi-Fi, capable of delivering the range and capacity to support today's most bandwidth-hungry applications, like streaming HD (High Definition) video, voice and music.
- Wireless-N uses multiple technologies such as MIMO (Multiple Input, Multiple Output), which utilizes multiple radios to transmit and receive at the same time to maximize wireless networking performance. While MIMO itself is not a standard, it is the underlying technology behind the throughput increase in 802.11n. These multiple radios transmit multiple streams of data called "spatial streams." The higher the number of spatial streams, the higher the throughput.
- The Wireless-N gigabit router (WRT310N) and Wireless-N broadband router (WRT160N) delivers enough speed, range and reliability to support streaming HD video while simultaneously listening to your digital music collection, making Internet VoIP (Voice over IP) phone calls, and playing multiplayer online games when used with the Linksys Wireless-N laptop adapter (WPC300N). Wireless network performance can reach speeds faster than wired Ethernet speeds.*
* Actual data throughput will vary. Network conditions and environmental factors lower actual data throughput rate
- Wireless-N is secure as Linksys Wireless-N products use today's most robust security methods like WPA (Wi-Fi Protected Access) encryption along with SPI/NAT firewalls to keep your network safe and data protected from unauthorized access.
Sunday, August 21, 2011
Command Interpreter
The part of an Operating System that interprets commands and carries them out.
A command interpreter is the part of a computer operating system that understands and executes commands that are entered interactively by a human being or from a program. In some operating systems, the command interpreter is called the shell.
The BIOS is looking for the files needed to load in case of Windows is the Command.com. The required files are Command.com, IO.sys, and Msdos.sys to get Windows started. They reside in the Root of the C Drive.
Is a program which reads the instructions given by the user. It then translates these instructions into the context of the operating system followed by the execution. Command interpreter is also known as ‘shell’