Open in app
Home
Notifications
Lists
Stories

Write
JAYESH KAMANE
JAYESH KAMANE

Home

Jun 12

Network Security

Network Security refers to the measures taken by any enterprise or organisation to secure its computer network and data using both hardware and software systems. This aims at securing the confidentiality and accessibility of the data and network. …

Network Security

3 min read


Jun 12

Concurrency in DBMS

Concurrency control concept comes under the Transaction in database management system (DBMS). It is a procedure in DBMS which helps us for the management of two simultaneous processes to execute without conflicts between each other, these conflicts occur in multi user systems. Concurrency can simply be said to be executing…

Concurrency

4 min read

Concurrency in DBMS
Concurrency in DBMS

Jun 12

Process connection types and its details

You have noticed the available process connection thread types when choosing a pressure sensor. Choices include NPT, BSP and UNF to name a few. Which is the proper one to use? The answer usually comes down to where you live. In the 1800’s there were many types of screw threads…

Process Connection

4 min read

Process connection types and its details
Process connection types and its details

Jun 12

Heat detector and Smoke Detectors used in Fire and Alarm System

Do you know how many businesses or households are affected by fires? Each year, more than 355,200 places are turned to ashes due to fires. Heat and smoke detectors are your solution to avoid any loss or damage. Installing a fire detector in your home or business could help in…

Heat Detector

6 min read

Heat detector and Smoke Detectors used in Fire and Alarm System
Heat detector and Smoke Detectors used in Fire and Alarm System

Dec 29, 2021

Cryptographic Algorithms

Encryption is crucial because it protects data and information from unauthorized access and so ensures secrecy. Here’s a blog entry that explains “what is cryptography” and how it may be used to protect corporate secrets, secure classified information, and personal data from things like identity theft.. Cryptography is the practice…

Cybersecurity

7 min read

Cryptographic Algorithms
Cryptographic Algorithms

Jun 4, 2021

Introduction:

Introduction: The Central Processing Unit (CPU) is the “brains” of your device, but it’s not exactly smart. A CPU only works when given very specific instructions — suitably called the instruction set — which tells the processor to move data between registers and memory or to perform a calculation using…

Processors

7 min read

Introduction:
Introduction:
JAYESH KAMANE

JAYESH KAMANE

student at VIT, Pune

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Knowable