Author: Diyana Weerasuriya

What is spanning Tree Protocol (STP)? The companies and organisations are connected through networking. There should be a proper networking architecture for redundancy. Redundancy means providing multiple paths to keep the flow of data without traffic. All switches use Spanning Tree Protocol. Spanning Tree Protocol is a layer two protocol used to prevent loops created when exchanging data on Local Area Networks (LAN), which contain redundant paths. This technique ensures that there is only one logical path between all the destinations on the network by blocking the redundant paths that might cause a loop. This also allows the inclusion of…

Read More

What is Free-space laser communication? Free-space laser communication is a wireless communication technology that sends data across the atmosphere using lasers. This technology has several advantages over traditional wireless communication methods, including higher data rates, increased security, and improved resistance to interference. While fibre optic cables function similarly in laser communications systems, the beam is sent over space. Laser communication systems do not require concealed wires or broadcast rights, although the line of sight between the transmitter and receiver is required. Since laser communications systems are low-cost, portable, and don’t need to be studied for radio interference, they can be…

Read More

What is the Internet of Things? The IoT is a network of connected computing devices, mechanical and digital machinery, items, animals, or people that may exchange data across a network without requiring interaction between people or computers. Things include individuals with implanted heart monitors, farm animals with biochip transponders, cars with built-in tire pressure monitors, and other instances that can be given an Internet Protocol (IP) address and communicate data via a network. Organisations across a range of industries are increasingly utilising IoT to run more smoothly, better understand their consumers provide better customer service, boost decision-making, and raise the…

Read More

What is Virtual Assistant Technology? Virtual Assistant Technology is an impact of Artificial Intelligence(AI). It is also known as an AI assistant or Digital Assistant. This application program recognises natural language, such as voice commands, and implements the tasks according to the order. As this is a cloud-based program, a device or application connected to the internet is required. Nowadays, these programs are used by enterprises to make their tasks reliable and convenient. Virtual assistants (VAs) assist consumers or businesses with tasks previously only possible for humans to complete. To help individuals or automate processes, VAs use semantic and deep…

Read More

What is Artificial Neural Network? or What is AI Neural Network? Neural networks, known as artificial neural networks (ANN) or simulated neural networks (SNN), are a subset of machine learning and are at the core of deep learning algorithms. Their name and structure are enlightened by the human brain, imitating how biological neurons signal to one another. Figure 1: Artificial Neural Network Tutorial – Javatpoint Creating an Artificial Neural Network or What is Neural Network in AI? Imagine using pipes of various sizes and shapes to build a sizable, three-dimensional building. Each line includes a valve that can be opened…

Read More

The finest keyboard for you will rely on your needs and intended uses among the many different models on the market. Additionally, your decision may be influenced by the keyboard layout you select, such as QWERTY or AZERTY. Using the countless alt code key keyboard shortcuts for creating symbols also benefits from having a more extended keyboard with a separate number pad. QWERTY Keyboards You will notice the keys need to be positioned in alphabetical order. The letters Q, W, E, R, T, and Y are on the top row of keys. The QWERTY keyboard is so named because those…

Read More

What is Airborne Internet? Airborne Internet is a planned Internet connection that would offer an integrated digital data network between aircraft and the ground, in contrast to regular broadband and wireless access. Aircraft would serve as nodes or points of entry for Internet data transmission. It might modify how air traffic control systems keep track of and monitor aircraft and how they communicate with and exchange data concerning other aircraft (peer-to-peer). The airborne internet emerged because the aviation sector is not an exception. The use of computer network theory principles and concepts in the industry of transportation is made more…

Read More

“Prevention is better than the cure.” We will face many risks and uncertainties in this highly globalised and modern technological world. Among them, technological threats play a prominent place. This article will discuss how to secure your Laptop in six easy and essential ways to ensure all your data and privacy in the long run. The six tips are as follows. Add a password-protected screen saver screensaver is a program that displays a moving image or pattern on the monitor screen after the user has been inactive on the PC for a specific period. The goal was to protect the…

Read More

What are wifi attacks? We can conduct our company operations online without being constrained by cables and wires thanks to the widespread use of the internet. One of the relatively recent technologies that the internet has introduced into our lives is wireless networks. They make our business operations more accessible, mobile, and straightforward. The drawback of wireless networks is that they are significantly more open to intrusion and attacks. Penetration and intrusion attempts that target wireless networks, also known as wireless network assaults, offer significant risks. Attacks on wireless networks try to intercept information delivered across the network or interfere…

Read More

What is containerisation? Containerisation is an application’s code, and all the files and libraries required to function on any infrastructure are packaged together as part of the software deployment process. For instance, you needed to install a software package’s Windows version on a Windows computer. Containerisation enables you to build a single software package or container that is compatible with all hardware and operating systems. Since containers share the machine’s kernel and do not need to associate an operating system with each program, they are frequently referred to as “lightweight” software. Numerous containers can run on the same amount of…

Read More