Articles on Trending Technologies

Technical articles with clear explanations and examples

Tutorix - AI Tutor

How to Format USB Drives in Linux?

Satish Kumar
Satish Kumar
Updated on 17-Mar-2026 4K+ Views

USB drives are portable storage devices that have become essential for data storage and transfer in modern computing. They are small, lightweight, and provide an easy way to move files between different computers or create bootable media for operating system installations. With increasing storage demands, USB drives have evolved to offer larger capacities and faster transfer speeds, making them indispensable tools for both personal and professional use. Understanding File Systems in Linux A file system is responsible for organizing and managing files, directories, and metadata such as permissions, ownership, and timestamps. Linux supports various file systems, each ...

Read More

Create Your Own Linux, Android and iOS Apps Using _LiveCode_ in Linux

Mrudgandha Kulkarni
Mrudgandha Kulkarni
Updated on 17-Mar-2026 502 Views

In today's digital age, the demand for mobile applications has skyrocketed. As a result, there's a growing need for developers to create apps that can run on different platforms. If you're interested in creating your own apps for Linux, Android, and iOS but don't have any programming experience, don't worry. You can use LiveCode, a user-friendly and easy-to-learn programming language, to create your own apps. In this tutorial, we'll show you how to create Linux, Android, and iOS apps using LiveCode in Linux. What is LiveCode? LiveCode is a high-level programming language and development environment that allows you ...

Read More

How to Disconnect Inactive or Idle SSH Connections in Linux?

Satish Kumar
Satish Kumar
Updated on 17-Mar-2026 19K+ Views

Secure Shell (SSH) is a protocol that enables secure communication between two systems. In Linux, SSH is widely used to remotely access and manage servers. However, idle or inactive SSH connections can pose security risks and consume system resources unnecessarily. This article explains how to identify and disconnect such connections to maintain system security and performance. Identifying Inactive or Idle SSH Connections Before disconnecting inactive SSH connections, you must first identify them. Linux provides several commands to list active users, display session information, and monitor connection states. Using the 'who' Command The who command displays currently ...

Read More

How to create a zip file and ignore directory structure in Linux?

Mukul Latiyan
Mukul Latiyan
Updated on 17-Mar-2026 1K+ Views

In order to be able to zip files and ignore directory structure that gets created with them, we first must understand what the zip command on Linux actually means and how we can make use of it. The zip command that Linux provides allows us to specify a compression level with a number prefixed with dash, typically between 0 and 9. It is used to reduce file size through compression and serves as a file packaging facility. The compression process involves taking one or more files and compressing them into a single zip archive, along with metadata about those ...

Read More

How does the operating system act as a resource manager and extended machine?

Bhanu Priya
Bhanu Priya
Updated on 17-Mar-2026 38K+ Views

An operating system is the interface between the user and the machine which controls and coordinates the use of the hardware among the various application programs for the various users. The OS serves two fundamental roles: as an extended machine that provides abstraction, and as a resource manager that efficiently allocates system resources. Operating System as Extended Machine The operating system acts as an extended machine by providing a layer of abstraction that hides the complexity of hardware from programmers and users. Key Features of Extended Machine At the machine level, a computer's structure is ...

Read More

Erasable Programmable Read Only Memory (EPROM)

David Meador
David Meador
Updated on 17-Mar-2026 10K+ Views

Erasable Programmable Read Only Memory (EPROM) is a non-volatile memory chip that retains data even when power is switched off. Each EPROM is individually programmed by an electronic device, and the stored data can be erased by exposing the chip to strong ultraviolet light for reprogramming. An EPROM contains a transparent fused quartz window at the top of the package which allows exposure to ultraviolet light. The silicon chip is visible through this window, making it easily identifiable among other memory types. How EPROM Works Each storage location in EPROM consists of a floating-gate field-effect transistor. This ...

Read More

Process Synchronization in Solaris

Arnab Chakraborty
Arnab Chakraborty
Updated on 17-Mar-2026 2K+ Views

Process Synchronization in Solaris refers to the mechanisms used by the Solaris operating system to coordinate access to shared resources among multiple processes and threads. Solaris implements a variety of sophisticated locking mechanisms to support multitasking, multithreading, and multiprocessing environments while ensuring data consistency and preventing race conditions. Types of Synchronization Mechanisms Solaris provides several synchronization primitives, each optimized for different scenarios and performance requirements. Solaris Synchronization Mechanisms Synchronization Primitives ...

Read More

How to make a USB device multi-touch enabled

Satish Kumar
Satish Kumar
Updated on 17-Mar-2026 1K+ Views

In recent years, touch technology has become increasingly popular, with smartphones, tablets, and laptops offering the capability to interact with devices by simply tapping or swiping the screen. However, what if you could use touch technology on your computer using a USB device? This is where the concept of multi-touch enabled USB devices comes into play. In this article, we will explain what multi-touch enabled USB devices are, how to make a USB device multi-touch enabled, and provide examples of popular multi-touch USB devices in the market. What are Multi-touch Enabled USB Devices? Multi-touch enabled USB devices are ...

Read More

Skip Hidden Files and Directories During Recursive Copy

Kunal Verma
Kunal Verma
Updated on 17-Mar-2026 2K+ Views

Recursive copying is a common task in Linux systems, but sometimes we need to exclude hidden files and directories (dotfiles) during the process. Hidden files in Linux are those that start with a dot (.) and are typically used for configuration files and system data that should remain invisible during normal operations. This tutorial demonstrates various methods to skip hidden files and directories when performing recursive copy operations using different Linux utilities. Note − Linux commands are case-sensitive. Using cp Command with Shell Globbing The standard cp command can be combined with shell globbing patterns to ...

Read More

Concept of Address Split in OS

Arnab Chakraborty
Arnab Chakraborty
Updated on 17-Mar-2026 758 Views

Address splitting is a memory management technique used in operating systems to divide the virtual address space of processes into distinct logical segments. This approach enables efficient memory allocation, enhanced security through access control, and improved system performance by organizing memory into manageable units with specific purposes. Memory Segmentation Memory segmentation divides the process address space into logical segments such as code, data, stack, and heap segments. Each segment serves a specific purpose and can have different access permissions and sizes based on process requirements. Process Address Space Segmentation ...

Read More
Showing 8361–8370 of 61,297 articles
« Prev 1 835 836 837 838 839 6130 Next »
Advertisements