A computer virus is a program code that, when executed, replicates itself by inserting copies of itself ( modified copies which can harm the actual program) into other places in computer’s h... Read more
In B2C e-commerce, businesses sell directly a diverse group of products and services to customers. In addition to pure B2C e-commerce players such as Amazon.com, and hepsiburada.com other tr... Read more
Indexes are special lookup tables that the database search engine can use to speed up data retrieval. Simply put, an index is a pointer to data in a table. An index in a database is very sim... Read more
A honey pot is a computer system on the Internet that is expressly set up to attract and “trap” people who attempt to penetrate other people’s computer systems. Generally,... Read more
Soft Computing differs from conventional (hard) computing in that, unlike hard computing, it is tolerant of imprecision, uncertainty, partial truth, and approximation. In effect, the role mo... Read more
Abstract of Bluejacking Bluejacking is the sending of unsolicited messages over Bluetooth to Bluetooth-enabled devices such as mobile phones, PDAs or laptop computers, sending a vCard which... Read more
What if you could operate a device with your thoughts? What if you had to simply imagine movements to see them completed by a robot? Once the stuff of science fiction, brain-computer interfa... Read more
A mobile laboratory is a laboratory that is either fully housed within or transported by a vehicle such as a converted bus, RV, or tractor-trailer. Such vehicles can serve a variety of funct... Read more
Doing more with less by employing ‘lean thinking.’ Lean manufacturing involves never ending efforts to eliminate or reduce waste or any activity that consumes resources without a... Read more
Mobile TV is the wireless transmission and reception of television content – video and voice – to platforms that are either moving or capable of moving. Mobile TV allows viewers... Read more