Karchworld Identity

Adventures in identity management, federation, directory services, software engineering, computer science...

Browse by Tags

Tagged Content List
  • Blog Post: The Software Crisis: A Brief Look at How Rework Shaped the Evolution of Software Methodolgies

    Introduction Software development, for all the contributions it has made to society in terms of information availability and improved efficiency; it is a high risk venture. Reportedly, 70% of software projects either fail to achieve their full purpose or fail entirely. The reasons for this high...
  • Blog Post: CPU Parallelism: Techinques of Processor Optimization

    There are two forms of parallelism that serve to improve the performance of processors: the first is Instructional Level Parallelism (ILP). ILP consist of applying the techniques of superscalar processing and pipelining to overlap as the execution of as many instructions as possible (DeMone, 2000). Superscalar...
  • Blog Post: More on Cores: Single Core? Dual Core? Quad Core? What's the Difference?

    The core of a processor refers its components, along with system memory, that facilitate the fetch-execute cycle by which computers read (fetch) and process (execute) the instructions of programs. Although the physical implementation of a chip depends upon its architecture, all CPUs consist of two logical...
  • Blog Post: CPU Core Symmetry: Asymmetrical versus Symmetrical

    The symmetry of a multi-core processor refers to whether the cores are of a homogenous or heterogeneous design. A processor with asymmetrical cores is one in which the design of the cores is heterogeneous. Typically this means that, in relation to one another, each of the cores can be designed to operate...
  • Blog Post: Computer Memory: A Brief Survey of Technologies

    Below is a (very) brief cheat-sheet of descriptions of the most commonly used memory technology and specifications today: Dual In-line Memory Modules (DIMM) -- A Dual In-line Memory Module (DIMM) is actually not a type of memory; but rather, simply a number of memory components placed onto a circuit...
  • Blog Post: What is Steganography? A Quick Primer

    Since the beginning of the War on Terrorism, there has been much fear and suspicion that terrorists may be using steganography to communicate covertly over the Internet. In October 2001, the New York Times publish an article claiming that al-Qaeda has used steganography to covertly coordinate the execution...
Page 1 of 1 (6 items)