Read More
February 11, 2017

machine learning

Machine learning is the science of teaching machines to make decisions on their own based on data presented without being explicitly programmed to do so.
 
Read More
February 16, 2017

CSV

Comma-Separated Values
 
Read More
February 21, 2017

malware

Malicious Software
 
Read More
July 20, 2017

RPM

1. Revolutions Per Minute 2. Red Hat Package Manager
 
Read More
July 26, 2017

Bitlocker

Bitlocker is an encryption feature in Microsoft Windows operating systems which allows full disk encryption of the operating system’s drive as well as device encryption for attached devices using industry standard AES 128-bit or 256-bit encryption.

The feature was first rolled out in Microsoft Windows Vista for customers who purchased the Ultimate or Enterprise versions of the operating system and is currently available for customers of the Windows 10 Pro, Enterprise and Education versions of the operating system.

 
Read More
August 8, 2017

garbage collection

Definition:

1. Garbage Collection in software development simply means reclaiming resources used by data objects that can no longer be accessed. For example, if pointer A points to the address of an array and then points to another location without first deleting the array, then the array will forever take up a chunk of memory until the system is shut down. Garbage collection deletes such objects to reduce memory leaks.

2. Garbage collection in Solid State Drives (SSD) is the consolidation of useful data and separating it from garbage data. The operation is carried out by the SSD controller when the SSD is either active or idle depending on the implementation. By [...]

 
Read More
August 27, 2017

PuTTY

PuTTY is a free and open source terminal emulator application developed by Simon Tatham. It’s the most popular terminal emulator on the internet supporting protocols such as SSH, Telnet, SCP, SFTP, serial, rlogin, and raw socket. Given its open source nature, there are forked versions of PuTTY that provide additional features and functionality.

The most common usage of PuTTY is for terminal emulation using the SSH or Telnet protocols. These protocols allow remote terminal access for administration of servers or devices running SSH or Telnet servers.

 
Read More
August 29, 2018

Supermicro IPMI Username / Password

In order to login to Supermicro’s IPMI (Intelligent Platform Management Interface), the server you wish to connect must be connected via a network connection. The Supermicro server’s IPMI interface can then be accessed using Supermicro’s IPMIView software.

When logging into the Supermicro IPMI interface to manage a Supermicro server, the default username and password is as follows:

Username: ADMIN Password: ADMIN

More information on Supermicro’s IPMI system can be found on Supermicro’s website here.

Featured Articles
 
SanDisk Extreme Portable SSD Review
 
Samsung 970 EVO Review (500GB)
 
OnePlus 5T Review
 
AVADirect X370 Quiet Gaming PC Review
 
Beyerdynamic Custom Game Review
Latest Guides
 
 
 
 
 
Join us on Discord