Computable Minds
Blog of popular science about the more exiting branches of computer science.
Loading searcher...
Sorted by "More votes"

visits

990

votes

323

Posted on: Dec, 14th 2010
Robot con Kinect
In one of the posts where I explained the how Kinect works, I said that wouldn't be strange that it will be use to build robots. Now are emerging the first robotic machines that someday will rebel and will begin to kill humans. Here I talk about some of them. Follow discovering "Robots, Kinect and the SLAM problem"

visits

302

votes

314

Posted on: Jul, 5th 2011
RAM memory
In this post I'm going to explain a way of waste the RAM memory instaled in the computer, which affects to a lot of users.
Since some years ago, are being sold computers with 4 or more GB of RAM, but if we use an operating system of 32 bits, it will indicate us that we are using a little less of those 4 GB. Why occurs this? Deep in "RAM memory: Why if I have 4GB or more the OS detect less?"

visits

2462

votes

103

Posted on: Nov, 23rd 2010
Kinect
Microsoft wants that we can play with the Xbox 360 moving us in front of the screen. For that have spend hundreds of millions of dollars in develop a device to realize the recognition and the tracking, not only of a complete person but several ones, including also 3D information, its name is Kinect. In this post you will discover how works the hardware and the artificial intelligence algorithms that uses. Surprise yourself with the rest of "Kinect: How works its 3D body tracking"

visits

4028

votes

69

Posted on: Nov, 26th 2010
Kinect
The new Xbox 360 peripheral has a multiarray microphone that is capable of separate the voices that there are in front of the device from the others sounds of the enviroment to chat and use voice commands. Here you will learn how is done this difficult task. Finish reading "Kinect: How works its multiarray microphone "

visits

1164

votes

34

Posted on: Nov, 19th 2011
embedded cpu
Although your car doesn't have onboard computer, probably it has more than 40 embedded processors. These are less powerful than the PC processors, but enough to perform the work that must accomplish to safeguard our security, improve the efficiency of the vehicle and reduce the pollution that generates. Deep in "Your car is full of processors"

visits

220

votes

34

Posted on: Dec, 28th 2010
Printed cookie
An investigation team of the laboratory of computational synthesis of the University of Cornell have developed a food printer. They want that one day, will be something common in the kitchen of any person. Follow discovering "The food printer"

visits

628

votes

33

Posted on: Jun, 8th 2011
We can classify the ways that hard disk can breakdown in two: software and hardware. With the first I'm talking about the lost of data due to virus or accidental erasure. In these cases, if it's possible retrieve the information, it is often so cheap because only we have to use the appropriate software. Instead, the errors of hardware or physics are very expensive of repair, because are needed tools and specialized installations and only if the information that contains is enough valuable, can worth pay for it. Don't left of read the rest of "Repair the hardware of a hard disk"

visits

480

votes

31

Posted on: Jul, 13th 2010
Processor
In this post I'm going to do predictions about how will be the hardware of the future, but not guiding me neither by the movement of the stars nor the Tarot cards, instead I'm going to base my predictions in the market evolution and some trends.
Since the years 40, the computers are being build following the John von Neumann architecture, with one processor, a memory and a controller of input/output. This will change sometime? I think so. Continue discovering "Four predictions about the hardware of the future"

visits

922

votes

30

Posted on: Aug, 17th 2011
Tshirt I steal your neighbour WiFi
There are a lot of people that kindly shares their connection with the neighbours, but there are a lot of more that do it without knowing it. In both cases this supposes a security risk. Follow discovering "How to stop WiFi hackers?"
1 2 3 4 5 Old >
Daiatron on Google+