The Software Crisis: A Brief Look at How Rework Shaped the Evolution of Software Methodolgies

Introduction Software development, for all the contributions it has made to society in terms of information availability and improved efficiency; it is a high risk venture. Reportedly, 70% of software projects either fail to achieve their full purpose or fail entirely. The reasons for this high failure rate are varied and numerous; however, they are…

2

CPU Parallelism: Techinques of Processor Optimization

There are two forms of parallelism that serve to improve the performance of processors: the first is Instructional Level Parallelism (ILP). ILP consist of applying the techniques of superscalar processing and pipelining to overlap as the execution of as many instructions as possible (DeMone, 2000). Superscalar and Pipelining are two ILP techniques of improving the…

0

More on Cores: Single Core? Dual Core? Quad Core? What’s the Difference?

The core of a processor refers its components, along with system memory, that facilitate the fetch-execute cycle by which computers read (fetch) and process (execute) the instructions of programs. Although the physical implementation of a chip depends upon its architecture, all CPUs consist of two logical components: the arithmetic/logic unit (ALU) and the control unit…

2

CPU Core Symmetry: Asymmetrical versus Symmetrical

The symmetry of a multi-core processor refers to whether the cores are of a homogenous or heterogeneous design. A processor with asymmetrical cores is one in which the design of the cores is heterogeneous. Typically this means that, in relation to one another, each of the cores can be designed to operate with different instruction…

0

Computer Memory: A Brief Survey of Technologies

Below is a (very) brief cheat-sheet of descriptions of the most commonly used memory technology and specifications today:Dual In-line Memory Modules (DIMM) — A Dual In-line Memory Module (DIMM) is actually not a type of memory; but rather, simply a number of memory components placed onto a circuit board with 240 pins which provide an…

1

What is Steganography? A Quick Primer

Since the beginning of the War on Terrorism, there has been much fear and suspicion that terrorists may be using steganography to communicate covertly over the Internet. In October 2001, the New York Times publish an article claiming that al-Qaeda has used steganography to covertly coordinate the execution of the September 11th terrorist attack on…

0