14.2 C
Munich
Sunday, September 19, 2021
- Advertisement -
- Advertisement -spot_img

AUTHOR NAME

Asyraf Adnil

9 POSTS
0 COMMENTS
PKS'15 NCI'17

AES

Definition and Working System of Advanced Encryption Standard (AES)Advance Encryption Standard (AES)Advanced Encryption Standard (AES) is a cryptographic algorithm that can be used to...

Arduino Uno

Arduino Uno is a board that uses the ATmega328 microcontroller. Arduino Uno has 14 digital pins (6 pins can be used as PWM outputs),...

Introduction to Radio Frequency Identification (RFID)

Radio Frequency Identification (RFID) has been widely used in factories which is very useful to support supply chain management and control. RFID can identify...

Advanced Technology Sources of Laziness Today’s Students

Globalization is something that cannot be avoided and is bound to happen. Globalization does not only have implications in the economic aspects, but in all aspects,...

Cache Memory

Cache or cache memory in information technology is a mechanism for high-speed secondary data storage that is used to store data / instructions are...

What Cyber Espionage Is

Cyber Spying, or cyber espionage, are actions to obtain confidential information without the knowledge of information holders, whether from individuals, groups, governments and enemies for personal, economic,...

Routing and Switching

Networks have grown and developed over the past few decades with the aim of meeting increasingly complex human needs. Through technological sophistication the need for network resources...

Virtual Private Network, Why Should We Use It?

VPN or virtual private network is a relationship between one network to another network using a private network through a private network. This connection occurs virtually...

AGAINTS THE hOAX

In the modern era now, the dissemination of information can quickly be conveyed, even from the farthest ends of the world. The acceleration of the movement...

Latest news

- Advertisement -spot_img