User contributions for Philip
13 October 2024
- 20:5920:59, 13 October 2024 diff hist +5‎ Fixing Laptop Hinges ‎ →‎Case Study
- 20:5620:56, 13 October 2024 diff hist +17‎ Fixing Laptop Hinges ‎ →‎Sourcing Replacement Parts
- 20:4920:49, 13 October 2024 diff hist −61‎ Fixing Laptop Hinges ‎ →‎Assessing the problem
- 20:4320:43, 13 October 2024 diff hist +146‎ Fixing Laptop Hinges ‎ →‎Fixing the problem
- 20:2420:24, 13 October 2024 diff hist +313‎ Fixing Laptop Hinges ‎ →‎Screen Removal
- 20:0520:05, 13 October 2024 diff hist 0‎ Fixing Laptop Hinges ‎ →‎Disassembly
- 20:0120:01, 13 October 2024 diff hist +16‎ Fixing Laptop Hinges ‎ →‎Disassembly
- 07:3907:39, 13 October 2024 diff hist −2‎ m Connectors (External) ‎ →‎Thunderbolt current
12 October 2024
- 21:0321:03, 12 October 2024 diff hist +147‎ Fixing Laptop Hinges ‎ →‎Disassembly
- 20:4820:48, 12 October 2024 diff hist +24‎ m Fixing Laptop Hinges ‎ →‎Summary
- 20:0620:06, 12 October 2024 diff hist +7‎ m Fixing Laptop Hinges ‎ →‎Safety
- 19:5819:58, 12 October 2024 diff hist +24‎ Fixing Laptop Hinges ‎No edit summary
8 October 2024
- 21:2421:24, 8 October 2024 diff hist +134‎ Glossary ‎ →‎Glossary of Terms
- 08:2608:26, 8 October 2024 diff hist 0‎ m Glossary:Razor-and-blades business model ‎ Philip moved page Glossary:Razor-ans-blades business model to Glossary:Razor-and-blades business model without leaving a redirect current
- 08:2608:26, 8 October 2024 diff hist +427‎ N Glossary:Razor-and-blades business model ‎ Created page with "The razor-and-blades business model is the pricing strategy in which a basic commodity is sold cheaply but then needs to be serviced by expensive consumables. Current examples include printers and printer ink, coffee machines and coffee pods, games consoles and games, and mobile phones and usage contracts. The model is often attributed to Gillette, inventor of the safety razor, but was in fact introduced by his competitors."
7 October 2024
- 16:3416:34, 7 October 2024 diff hist 0‎ Fixing Laptop Hinges ‎ →‎Hinge Maintenance
- 16:3216:32, 7 October 2024 diff hist 0‎ File:Image-of-a-screw-being-measured-with-digital-calipers.jpg ‎ Philip uploaded a new version of File:Image-of-a-screw-being-measured-with-digital-calipers.jpg current
- 16:2816:28, 7 October 2024 diff hist +5‎ Fixing Laptop Hinges ‎ →‎Hinge Maintenance
- 16:2716:27, 7 October 2024 diff hist +39‎ Fixing Laptop Hinges ‎ →‎Assessing the problem
- 16:2316:23, 7 October 2024 diff hist +5‎ Fixing Laptop Hinges ‎ →‎Fixing the problem
6 October 2024
- 20:4420:44, 6 October 2024 diff hist +308‎ Fixing Laptop Hinges ‎ →‎Assessing the problem
- 20:1820:18, 6 October 2024 diff hist +5‎ Fixing Laptop Hinges ‎ →‎Summary
- 20:1520:15, 6 October 2024 diff hist +33‎ Fixing Laptop Hinges ‎ →‎Safety
5 October 2024
- 16:5716:57, 5 October 2024 diff hist +1‎ m Glossary:Quantum Computer ‎No edit summary current
- 16:4416:44, 5 October 2024 diff hist +65‎ Glossary ‎ →‎Glossary of Terms
- 16:4216:42, 5 October 2024 diff hist +578‎ N Glossary:Q factor ‎ Created page with "The Q (or quality) factor of a resonant system, such as a tuned circuit, a quartz crystal, a guitar string or a pendulam, is a measure of how free it is to resonate at its natural frequency. It can be defined in terms of the sharpness of the resonant frequency, or as the number of times greater the stored energy of the resonator is than the energy lost per vibration or cycle. For example, a tu..." current
- 16:0416:04, 5 October 2024 diff hist +252‎ Glossary ‎ →‎Glossary of Terms
4 October 2024
- 06:3706:37, 4 October 2024 diff hist −1‎ Glossary:SMR ‎No edit summary current
- 06:3706:37, 4 October 2024 diff hist +10‎ Glossary:SMR ‎No edit summary
3 October 2024
- 21:1821:18, 3 October 2024 diff hist +879‎ N Glossary:SMR ‎ Created page with "SMR or Shingled Magnetic Recording (as used in an SMR drive) is a method of increasing the recording density on a hard drive by writing each track so as to partially overlap the previous one, in the manner of roofing tiles (or shingles). This means that previously written data cannot be overwritten as it would partially overwrite both the previous and following data tracks. If data is updated it must be appended to the existing data, and either the disk controller or the..."
- 09:2109:21, 3 October 2024 diff hist +73‎ PAT testing ‎ →‎Visual Inspection: Aproval marks added current
- 09:1709:17, 3 October 2024 diff hist +92‎ N File:BSI-ASTA-NEMKO.png ‎ Bsi Kitemark, ASTA diamond mark and Nemko N mark current
- 08:4308:43, 3 October 2024 diff hist +478‎ PAT testing ‎ →‎Plug: Updated compliance checks
1 October 2024
- 09:3509:35, 1 October 2024 diff hist +482‎ N Glossary:Buffer overflow vulnerability ‎ Created page with "A buffer overflow happens when a program is given more data (whether direct user input or from a network source) than will fit in the memory space that has been allocated for it. The extra may then overwrite nearby data causing unexpected behaviour, which may include an attacker being able to take over control of the program. Buffer overflows can be avoided by strict adherence to a cardinal rule of secure coding: thoroughly validate all input from potentially untrusted s..." current
30 September 2024
- 16:2716:27, 30 September 2024 diff hist +433‎ N Glossary:Memory leak ‎ Created page with "Sophisticated software such as a browser performs much of its work using small chunks of memory for temporary storage, borrowed from a pool. Sometimes, due to a bug, it may fail to return it to the pool when it's finished with it. This is known as a memory leak, and can result in the memory pool becoming depleted to the extent that the software can no longer operate. The only solution is to close and relaunch it." current
24 September 2024
- 10:4710:47, 24 September 2024 diff hist +399‎ Glossary ‎ →‎Glossary of Terms
23 September 2024
- 15:5615:56, 23 September 2024 diff hist +556‎ N Glossary:Supply chain attack ‎ Created page with "Modern hardware and software is generally composed of many different (hardware and software) components, some of these themselves composed of multiple sub-components. Keeping track of the provenance and trustworthiness of all of these can be an extremely difficult problem. Any of them might be compromised in a "supply chain" attack to compromise the integrity of a finished product. A classic example was the introduction of explosives into pagers and walkie-talkies suppli..." current
- 15:4115:41, 23 September 2024 diff hist 0‎ m Glossary:Watering hole attack ‎ Philip moved page Watering hole attack to Glossary:Watering hole attack without leaving a redirect current
- 15:4015:40, 23 September 2024 diff hist +9‎ Glossary:Watering hole attack ‎No edit summary
- 15:3815:38, 23 September 2024 diff hist +147‎ Glossary:Side channel attack ‎No edit summary current
- 14:0014:00, 23 September 2024 diff hist +344‎ N Glossary:Watering hole attack ‎ Created page with "A watering hole attack is an attempt to compromise a target organisation or individual by first compromising a website or online resource that they are known or suspected to use (their "watering hole"). In this way, for example, the attacker may hope to gain access to a well defended defence contractor though one of its less secure suppliers."
- 08:4408:44, 23 September 2024 diff hist +357‎ N Glossary:Side channel attack ‎ Created page with "A side channel or covert channel attack is one which exploits some side-effect of the processing, transmission or storage of data to draw inferences about the data itself. For example, unless carefully designed, observing how the power consumed by a processor while encrypting data can leak informaion, ultimately leading to discovery of the encryption key."
20 September 2024
- 21:0021:00, 20 September 2024 diff hist +411‎ Fixing Laptop Hinges ‎No edit summary
- 20:5620:56, 20 September 2024 diff hist +2,508‎ N Fixing Laptop Hinges ‎ Created page with "When a laptop screen comes off in your hand (or feels like it might), this page will help... <div class="showtoc"> __TOC__ </div> ==Summary== All pages should start with a summary, to enable the reader to see at a glance what the page is about and whether it is likely to give the information required. This is subtly different from the description of the page's purpose, given above. Retaining the basic structure, replace all the text of this page with your own content...."
17 September 2024
- 15:0915:09, 17 September 2024 diff hist +1‎ m Clocks - Basic Principles ‎ →‎Atomic clocks
- 15:0815:08, 17 September 2024 diff hist +2,263‎ Clocks - Basic Principles ‎ →‎Atomic clocks
4 September 2024
- 20:0920:09, 4 September 2024 diff hist +103‎ Glossary:Gnats whisker ‎No edit summary current
30 August 2024
- 10:0610:06, 30 August 2024 diff hist +160‎ Glossary ‎ →‎Glossary of Terms
- 09:5609:56, 30 August 2024 diff hist +426‎ N Glossary:Speculative execution ‎ Created page with "High performance CPUs use multiple logic blocks in order to perform as much work as possible in parallel. So for example, if a CPU is required to process a list of ten items it might start to "speculatively execute" the processing of an 11th before it has been able to determine that it has completed the list. Even though this wasted effort has to be discarded, a net performance improvement can be achieved." current
- 09:1609:16, 30 August 2024 diff hist +141‎ N Glossary:Cache ‎ Created page with "A cache is a small and very fast block of memory used to hold immediate working data or frequently used instructions from a computer program." current Tag: Visual edit: Switched