Schematic Capture

What does Schematic Capture mean?

Schematic capture is the process of creating a schematic diagram for an electronic circuit using various tools designed for the job. This can be done from as simple as using a pen and paper to using schematic capture software, including highly expensive electronic design automation suites or packages that can do everything from schematic capture, layout and simulation.

Schematic capture is part of circuit analysis and design; it is the process of “taking” the schematic design from an engineer’s head and entering it into a computer or putting it into a piece of paper. In simpler terms, it means that an engineer is designing a circuit that will serve a specific purpose by making use of industry standards and conventions to put the design into a visual state, either via hand drawing or by entering it into a software made for the purpose. It can be seen in the same manner as a digital artist might draw using a tool like Photoshop or a writer using a word processor.

The result of schematic capture is a schematic design or layout that can be used for the following purposes:

Continue reading



What does Subtyping mean?

Subtyping is a notion in programming language theory where a subtype, which is a data type, is related to a supertype based on the notion of substitutability, where program elements such as functions and subroutines that are written for the supertype will still operate if given the subtype instead. Subtypes are an essential concept in object-oriented programming and are substitutable to supertypes and sometimes even have more stringent specifications than the supertype.

Subtyping is a method for substitution and code reuse used in object-oriented programming languages to prevent unnecessary copying of largely similar code and promote code readability and prevent bugs. A subtype is basically a substitute for a supertype that can fulfill all of the latter’s specifications, and then some. So if B is a subtype of A, then B can always be used to substitute for an A and any property that is guaranteed by A must also be guaranteed by B.

Continue reading

Internet of Things

What is Internet of Things ?

The “Internet of things” (IoT) is becoming an increasingly growing topic of conversation both in the workplace and outside of it. So what is Internet of Things. It is also known as Internet of Everything. The future of the ever growing Internet Technology that features an IP Address for every physical object to enable connectivity between these objects and other Internet-enabled devices and system.

The Internet of Things extends internet connectivity beyond traditional devices like desktop and laptop computers, smartphones and tablets to a diverse range of devices and everyday things that utilize embedded technology to communicate and interact with the external environment, all via the Internet.

The Internet of Things (IoT) is a computing concept that describes a future where everyday physical objects will be connected to the Internet and be able to identify themselves to other devices. The term is closely identified with RFID as the method of communication, although it also may include other sensor technologies, wireless technologies or QR codes.

Continue reading

Data Smog

What does Data Smog mean?

Data smog refers to an overwhelming amount of data and information – often obtained through an Internet search – whose volume serves more to confuse the user than illuminate a topic. Data smog is a term coined from a book written by the journalist David Shenk, which deals with the influence of the information technology revolution and how the vast amount of information available online make it increasingly difficult to separate facts from fiction.

The amount of data available on nearly any topic today is overwhelming, and while it can be advantageous, this constant bombardment can also have side effects that are not unlike air pollution in that they are gradual, insidious and largely invisible. These include impaired performance and increased stress. Experts have provided tips on how to avoid the effects of data smog. These include:

  • Spend some time away from communication devices, the Internet and the television
  • Try going on “data fasts”
  • Browse through newspapers and magazines and cut out the articles that you want to read and learn about
  • Make use of filtering for unwanted emails
  • Do not send or forward urban legends, chain letters or any useless information to others
  • Write concisely and briefly
  • Systematize your Web bookmarks or folders


What does Docker mean?

Docker is an open platform that helps with the universal distribution of applications. It has become a standard for certain types of container virtualization systems and has been adopted by various companies as a software container strategy.

IT experts describe Docker as a tool that helps to ship code to servers in efficient ways. Docker deals with complex software stacks and distributed hardware infrastructure, helping IT people to avoid difficulties in bridging development, Q&A and production, as well as to avoid what Docker founder Solomon Hykes calls the “matrix from hell” – a situation where developers have to look closely at every type of distribution over every type of hardware and software scenario. The philosophy behind Docker is to help provide universal execution, using inherent Linux kernel properties that offer support for easier application handling. For example, instead of utilizing methods that would allow for library interdependency or other difficulties, Docker provides a smooth separation or “sandboxing,” where a given library is installed multiple times in different containers so that each individual library instance is not interdependent with any other.

Continue reading

Virtual Shredder

What does Virtual Shredder mean?

A virtual shredder is a computer program designed to destroy a file completely so that it is no longer recoverable. This is done by deleting and inserting random bits of data into the structure of the file, corrupting it entirely, and then overwriting the storage space where the file was located with random bits of data; with no clear way for a program to know which have been deleted and which bits have been inserted, there is a very low likelihood that the file can be read again in its entirety.

Continue reading