User contributions for Philip
8 October 2024
- 21:2421:24, 8 October 2024 diff hist +134 Glossary →Glossary of Terms current
- 08:2608:26, 8 October 2024 diff hist 0 m Glossary:Razor-and-blades business model Philip moved page Glossary:Razor-ans-blades business model to Glossary:Razor-and-blades business model without leaving a redirect current
- 08:2608:26, 8 October 2024 diff hist +427 N Glossary:Razor-and-blades business model Created page with "The razor-and-blades business model is the pricing strategy in which a basic commodity is sold cheaply but then needs to be serviced by expensive consumables. Current examples include printers and printer ink, coffee machines and coffee pods, games consoles and games, and mobile phones and usage contracts. The model is often attributed to Gillette, inventor of the safety razor, but was in fact introduced by his competitors."
7 October 2024
- 16:3416:34, 7 October 2024 diff hist 0 Fixing Laptop Hinges →Hinge Maintenance current
- 16:3216:32, 7 October 2024 diff hist 0 File:Image-of-a-screw-being-measured-with-digital-calipers.jpg Philip uploaded a new version of File:Image-of-a-screw-being-measured-with-digital-calipers.jpg current
- 16:2816:28, 7 October 2024 diff hist +5 Fixing Laptop Hinges →Hinge Maintenance
- 16:2716:27, 7 October 2024 diff hist +39 Fixing Laptop Hinges →Assessing the problem
- 16:2316:23, 7 October 2024 diff hist +5 Fixing Laptop Hinges →Fixing the problem
6 October 2024
- 20:4420:44, 6 October 2024 diff hist +308 Fixing Laptop Hinges →Assessing the problem
- 20:1820:18, 6 October 2024 diff hist +5 Fixing Laptop Hinges →Summary
- 20:1520:15, 6 October 2024 diff hist +33 Fixing Laptop Hinges →Safety
5 October 2024
- 16:5716:57, 5 October 2024 diff hist +1 m Glossary:Quantum Computer No edit summary current
- 16:4416:44, 5 October 2024 diff hist +65 Glossary →Glossary of Terms
- 16:4216:42, 5 October 2024 diff hist +578 N Glossary:Q factor Created page with "The Q (or quality) factor of a resonant system, such as a tuned circuit, a quartz crystal, a guitar string or a pendulam, is a measure of how free it is to resonate at its natural frequency. It can be defined in terms of the sharpness of the resonant frequency, or as the number of times greater the stored energy of the resonator is than the energy lost per vibration or cycle. For example, a tu..." current
- 16:0416:04, 5 October 2024 diff hist +252 Glossary →Glossary of Terms
4 October 2024
- 06:3706:37, 4 October 2024 diff hist −1 Glossary:SMR No edit summary current
- 06:3706:37, 4 October 2024 diff hist +10 Glossary:SMR No edit summary
3 October 2024
- 21:1821:18, 3 October 2024 diff hist +879 N Glossary:SMR Created page with "SMR or Shingled Magnetic Recording (as used in an SMR drive) is a method of increasing the recording density on a hard drive by writing each track so as to partially overlap the previous one, in the manner of roofing tiles (or shingles). This means that previously written data cannot be overwritten as it would partially overwrite both the previous and following data tracks. If data is updated it must be appended to the existing data, and either the disk controller or the..."
- 09:2109:21, 3 October 2024 diff hist +73 PAT testing →Visual Inspection: Aproval marks added current
- 09:1709:17, 3 October 2024 diff hist +92 N File:BSI-ASTA-NEMKO.png Bsi Kitemark, ASTA diamond mark and Nemko N mark current
- 08:4308:43, 3 October 2024 diff hist +478 PAT testing →Plug: Updated compliance checks
1 October 2024
- 09:3509:35, 1 October 2024 diff hist +482 N Glossary:Buffer overflow vulnerability Created page with "A buffer overflow happens when a program is given more data (whether direct user input or from a network source) than will fit in the memory space that has been allocated for it. The extra may then overwrite nearby data causing unexpected behaviour, which may include an attacker being able to take over control of the program. Buffer overflows can be avoided by strict adherence to a cardinal rule of secure coding: thoroughly validate all input from potentially untrusted s..." current
30 September 2024
- 16:2716:27, 30 September 2024 diff hist +433 N Glossary:Memory leak Created page with "Sophisticated software such as a browser performs much of its work using small chunks of memory for temporary storage, borrowed from a pool. Sometimes, due to a bug, it may fail to return it to the pool when it's finished with it. This is known as a memory leak, and can result in the memory pool becoming depleted to the extent that the software can no longer operate. The only solution is to close and relaunch it." current
24 September 2024
- 10:4710:47, 24 September 2024 diff hist +399 Glossary →Glossary of Terms
23 September 2024
- 15:5615:56, 23 September 2024 diff hist +556 N Glossary:Supply chain attack Created page with "Modern hardware and software is generally composed of many different (hardware and software) components, some of these themselves composed of multiple sub-components. Keeping track of the provenance and trustworthiness of all of these can be an extremely difficult problem. Any of them might be compromised in a "supply chain" attack to compromise the integrity of a finished product. A classic example was the introduction of explosives into pagers and walkie-talkies suppli..." current
- 15:4115:41, 23 September 2024 diff hist 0 m Glossary:Watering hole attack Philip moved page Watering hole attack to Glossary:Watering hole attack without leaving a redirect current
- 15:4015:40, 23 September 2024 diff hist +9 Glossary:Watering hole attack No edit summary
- 15:3815:38, 23 September 2024 diff hist +147 Glossary:Side channel attack No edit summary current
- 14:0014:00, 23 September 2024 diff hist +344 N Glossary:Watering hole attack Created page with "A watering hole attack is an attempt to compromise a target organisation or individual by first compromising a website or online resource that they are known or suspected to use (their "watering hole"). In this way, for example, the attacker may hope to gain access to a well defended defence contractor though one of its less secure suppliers."
- 08:4408:44, 23 September 2024 diff hist +357 N Glossary:Side channel attack Created page with "A side channel or covert channel attack is one which exploits some side-effect of the processing, transmission or storage of data to draw inferences about the data itself. For example, unless carefully designed, observing how the power consumed by a processor while encrypting data can leak informaion, ultimately leading to discovery of the encryption key."
20 September 2024
- 21:0021:00, 20 September 2024 diff hist +411 Fixing Laptop Hinges No edit summary
- 20:5620:56, 20 September 2024 diff hist +2,508 N Fixing Laptop Hinges Created page with "When a laptop screen comes off in your hand (or feels like it might), this page will help... <div class="showtoc"> __TOC__ </div> ==Summary== All pages should start with a summary, to enable the reader to see at a glance what the page is about and whether it is likely to give the information required. This is subtly different from the description of the page's purpose, given above. Retaining the basic structure, replace all the text of this page with your own content...."
17 September 2024
- 15:0915:09, 17 September 2024 diff hist +1 m Clocks - Basic Principles →Atomic clocks
- 15:0815:08, 17 September 2024 diff hist +2,263 Clocks - Basic Principles →Atomic clocks
4 September 2024
- 20:0920:09, 4 September 2024 diff hist +103 Glossary:Gnats whisker No edit summary current
30 August 2024
- 10:0610:06, 30 August 2024 diff hist +160 Glossary →Glossary of Terms
- 09:5609:56, 30 August 2024 diff hist +426 N Glossary:Speculative execution Created page with "High performance CPUs use multiple logic blocks in order to perform as much work as possible in parallel. So for example, if a CPU is required to process a list of ten items it might start to "speculatively execute" the processing of an 11th before it has been able to determine that it has completed the list. Even though this wasted effort has to be discarded, a net performance improvement can be achieved." current
- 09:1609:16, 30 August 2024 diff hist +141 N Glossary:Cache Created page with "A cache is a small and very fast block of memory used to hold immediate working data or frequently used instructions from a computer program." current Tag: Visual edit: Switched
29 August 2024
- 11:2611:26, 29 August 2024 diff hist +113 m Glossary:RTFM No edit summary current Tag: Visual edit
- 11:2311:23, 29 August 2024 diff hist +59 Glossary →Glossary of Terms
- 11:2011:20, 29 August 2024 diff hist +36 Glossary:PEBKAC No edit summary current Tag: Visual edit
- 11:1911:19, 29 August 2024 diff hist +414 N Glossary:PEBKAC Created page with "Problem Exists Between Keyboard And Chair (or a variant) is an expression sometimes used by computer experts and support staff to indicate that a problem lies with a user rather than the computer system. It should be used sparingly and with caution as it can cause offence, also bearing in mind that the real source of the problem might often be shortcomings in the usability of the system or opaque documentation."
- 08:3808:38, 29 August 2024 diff hist +197 How to use a multimeter →Choosing a multimeter current
28 August 2024
- 11:0911:09, 28 August 2024 diff hist +505 Glossary →Glossary of Terms
- 10:2110:21, 28 August 2024 diff hist +515 N Glossary:Floating Point Created page with "Many of the numbers a computer deals with are whole numbers (integers) which can be easiy represented in binary, but real world numbers can span a huge range of sizes. Floating point is a method of representing such numbers in two parts: a mantissa represents the significant digits and an exponent tells you where the decimal point comes (or the binary point for binary numbers). This is similar to the scientific notation in which one and a half million..." current
- 10:0610:06, 28 August 2024 diff hist +386 N Glossary:RISC-V Created page with "RISC-V (pronounced Risk Five) is a RISC computer architecture with its roots in an academic design at Berkley. There are 32 and 64 bit variants of the basic design and numerous optional extensions giving additional instructions for different data types and types of operation. Unlike ARM, the design is completely open source." current
- 09:4109:41, 28 August 2024 diff hist +522 N Glossary:ARM Created page with "ARM, or Advanced RISC Machines is a computer architeture designed for low cost and low power consumption. It is used in huge numbers of smartphones but equally, supercomputers have been built using large swarms of them. It was first introduced in 1985 by Acorn Computers (also known for their BBC Micro) but it has since gone through several generations. The design is owned by Arm Ltd who licence it to..." current
- 09:0309:03, 28 August 2024 diff hist +80 Glossary:CISC No edit summary current
- 09:0109:01, 28 August 2024 diff hist +493 N Glossary:RISC Created page with "RISC or Reduced Instruction Set Computer is a computer architecture in which the basic machine instructions are very simple and so can be implemented cheaply. Although more instructions may be needed for a given task, they can be made to run very fast and the silicon saved can be used for other optimisations such as large cache memories to speed up execution. The result can be a significant net gain in performance. ARM is the most widely used example of..." current
- 08:4308:43, 28 August 2024 diff hist +370 N Glossary:CISC Created page with "CISC or Complex Instruction Set Computer is a computer architecture in which the basic machine instructions are generally fairly complex and highly functional, however, this means that they are relatively expensive to implement. By comtrast, the RISC or Reduced Instruction Set Computer architecture was developed to optimise performance in other ways."