Computable Minds

Blog of popular science about the more exiting branches of computer science.

Loading searcher...
Sorted by "More positive votes"

visits

348

votes

20

Posted on: Nov, 19th 2010
Cube of a multidimensional query
The data warehouses or multidimensional databases, are a kind of technology that has constant grow of use in the enterprises in the last years. This isn't strange, because with the techniques of data mining, the enterprises can predict the future, something very important to take decision. Do you want to know how? Finish reading "Data Warehouses and data mining to predict the future"

visits

160

votes

13

Posted on: Nov, 16th 2010
Laptop battery with flames
The Lithium-Ion of the batteries of the laptops, lost duration with the use, it can pass from a duration of several hour to a few minutes in a couple of years. In this post I'm going to explain some tricks to avoid it. Surprise yourself with the rest of "Prolongs the life of the battery of your laptop"

visits

628

votes

33

Posted on: Jun, 8th 2011
We can classify the ways that hard disk can breakdown in two: software and hardware. With the first I'm talking about the lost of data due to virus or accidental erasure. In these cases, if it's possible retrieve the information, it is often so cheap because only we have to use the appropriate software. Instead, the errors of hardware or physics are very expensive of repair, because are needed tools and specialized installations and only if the information that contains is enough valuable, can worth pay for it. Don't stop reading the rest of "Repair the hardware of a hard disk"

visits

312

votes

25

Posted on: Feb, 15th 2011
RSA
The RSA is an encription algorithm of public key more used in the world. Its security increases exponentially with every bit that we add to the encription key, hence nobody have achieved break its security and maybe nobody do it never. If you want know how are posible the secure bank transactions over Internet, or how can be signed digitally e-mails and documents, besides of other things, follow reading. Fill your mind with "RSA: the security of your money depends of it"

visits

194

votes

17

Posted on: Jan, 25th 2011
Apocalipsis 2038
A lot of programs wrote in C, Unix operating systems and others based in this, use a date format that consist in count the seconds that have passed from the midnight of the January 1, 1960, without counting leap seconds. This format is called POSIX and when arrives the moment 19/01/2038 03:14:07, the counter will show incorrectly the date 1901/12/13 20:46:52, causing errors in a lot of programs. Finish reading "The effect 2038"

visits

878

votes

24

Posted on: Sep, 24th 2010
crane
Internet allows that any computer cans communicate with any other computer independently of the distance. This is not magic but is thanks to large cables buried in the seabed that ply the seas and oceans around the world. ¿Do you want know the technology of these cables? Follow discovering "The impressive submarine cables (first part)"
Daiatron on Google+