An Insight Into Virtual Reality
.... an on screen image of the hand that follows the
operator's hand movements. The glove also has miniature vibrators in the finger
tips to provide feedback to the operator from grasped virtual objects.
Therefore, driven by the proper software, the system allows the operator to
interact by grabbing and moving a virtual object within a simulated room, while
experiencing the "feel" of the object.
The virtual reality line includes the Datasuit and the Eyephone. The
Datasuit is an instrumented full-body garment that enables full-body interaction
with a computer constructed virtual world. In one use, this product is worn by .....
|
|
What Is ISDN?
.... through the public phone network.
However, there is a limit to the amount of information that a common analog
telephone line can hold. Currently, it is about 28.8 kbit/s. [Hopkins] ISDN
allows multiple digital channels to be operated simultaneously through the same
regular phone jack in a home or office. The change comes about when the
telephone company's switches are upgraded to handle digital calls. Therefore,
the same wiring can be used, but a different signal is transmitted across the
line. [Hopkins] Previously, it was necessary to have a phone line for each
device you wished to use simultaneously. For example, one line each fo .....
|
|
What Really Is A Hacker?
.... up trade secrets as well. A deep mistrust
of authority, some hackers consider authority to be a constriction force. Not
all hackers believe in this ethic, but generally authority represents something
that would keep people from being able to have full access and/or free
information.
Along with the "ethical code" of hackers there are a few basic "hacking
rules" that are followed, sometimes even more closely then there own code. Keep
a low profile, no one ever suspects the quite guy in the corner. If suspected,
keep a lower profile. If accused, simply ignore. If caught, plead the 5th.
Hackers consider a computer to .....
|
|
What Should And Shouldn't Computer Be Allowed To Run
.... a judge and jury? Could a computer replace them? Is it
right for a computer to pronounce sentence on an individual?
Because computers don't have any kind of actual thought or will, some
jobs would be perfect for computers. Security would be a good job for a
computer to handle. People like their privacy and don't want to be watched over
by someone all the time. If computers could tell if a crime is happening
without a human to point it out, it might be alright to install these systems
everywhere to detect crimes taking place without interfering with someone's
privacy. I'm not talking about "Big Brother" from 1984, but someth .....
|
|
Why We Should Stick To Qwerty
.... thinking takes time. In other words, faster keyboards are
irrelevant for them because they are not continuously typing. They need to
think what they are going to write, one sentence one after another.
On the other hand, the typists whose job is simply to type, do so continuously.
They also happen to be the major victims of repetitive Strain Injury (RSI) which
is in large part caused by continuously stroking the keyboards. In an article
about RSI, Huff explains the changes that the companies are undergoing to become
more productive: Many work practices are changing with automation to increase
productivity. These include fewer s .....
|
|
Why You Should Purchase A PC
.... All computers perform the four basic operations of the information
processing cycle: input, process, output, and storage. Data, any kind of raw
facts, is required for the processing cycle to occur. Data is processed into
useful information by the computer hardware. Most computer systems consist of a
monitor, a system unit which contains the Central Processing Unit (CPU), a
floppy-disk drive, a CD-ROM drive, speakers, a keyboard, a mouse, and a printer.
Each component takes a part in one of the four operations.
The keyboard and mouse are input devices that a person uses to enter data
into the computer. From there the data goe .....
|
|
Will Computers Control Humans In The Future?
.... take
less time than reading books and memorizing something that would take almost no
time using a computer in the futuristic world that Asimov describes. Humans
might began to rely on computers and allow them to control themselves by letting
computers educate people. Computers would start teaching humans what computers
tell them without having any choice of creativity. Computers would start to
control humans' lives and make humans become too dependent on the computers.
Another point that is criticized by Asimov is the fact that people might
take their knowledge for granted allowing computers to take over and control
their .....
|
|
William Gibson And The Internet
.... and trends of the
current moment, from this perpscetive, cyberpunk can be read as a sort of social
theory.
Chapter 1
Internet history
The Internet is a network of computer networks, the most important of
which was called ARPANET(Advanced Research Projects Agency NETwork), a wide area
experimental network connecting hosts and terminal servers together. Rules were
set up to supervise the allocation of addresses and to create voluntary
standards for the network. The ARPANET was built between October and December
1969 by a US company called Bolt, Beranak and Newman (BBN), which is still big
in the Internet world. It had won a co .....
|
|
Windows 95 The O/S Of The Future
.... their
computer. The desktop is designed so the user has point and click access to all
their open and closed programs. Utilizing the 32 bit programing it was written
with, users are able to work with more than one program at a time and move
information between programs. This gives the user the freedom they need to
begin to explore the world of computing without having to learn all the “
computer stuff”.
Today everyone wants the fastest computer with the best monitor and fastest
modem this was an interrupt address nightmare until Windows 95 was developed.
People didn't know what jumpers needed to go where to make their hardware .....
|
|
Windows 95
.... in
plain English" (29-30). Traditionally, users had to think of file names that
summed up their work in eight letters or less. This was a constant problem
because frequently a user would look at a list of files to retrieve and think
"now what did I save that as?". Those days are over. Windows 95 will let the
user save his or her work with names like "New Speech" or "Inventory Spreadsheet
No. 1", making the contents of those files obvious. Much to the annoyance of
software developers, Windows 95 incorporates many features that previously
required add-on software. One such feature is the Briefcase- a program for
synchronizing th .....
|
|
Windows NT Vs Unix As An Operating System
.... was later
changed to UNIX. Soon Thompson was joined on the project by Dennis Richie and
later by his entire department.
UNIX was moved from the now obsolete PDP-7 to the much more modern PDP-11/20 and
then later to the PDP-11/45 and PDP-11/70. These two latter computers had large
memories as well as memory protection hardware, making it possible to support
multiple users at the same time. Thompson then decided to rewrite UNIX in a
high-level language called B. Unfortunately this attempt was not successful and
Richie designed a successor to B called C. Together, Thompson and Richie rewrote
UNIX in C and subsequently C has dom .....
|
|
Windows NT
.... 'Routers' which are boxes of circuit boards and microchips,
which do the essential task of directing and redirecting packets along the
network. Much smaller boxes of circuit boards and microchips called 'modems'
do the task of interpreting between the phone lines and the computer. The
packets are all switched into a destination and reassembled by the destination
computer. Today's Internet contains enough repetitious and interconnected
circuits simply to reroute the data if any portion of the network goes down or
gets overloaded.
The packet-switching nature of the Internet gives it sufficient speed and
flexibility to suppo .....
|
|
|