SUBSCRIBE FOR DAILY UPDATES

Enter your email address:

Delivered by FeedBurner

LASER TECHNOLOGY

Sunday, February 28, 2010 · 0 comments

Light amplification by stimulated emission of radiation (LASER or laser) is a mechanism for emitting electromagnetic radiation, typically light or visible light, via the process of stimulated emission. The emitted laser light is (usually) a spatially coherent, narrow low-divergence beam, that can be manipulated with lenses. In laser technology, "coherent light" denotes a light source that produces (emits) light of in-step waves of identical frequency and phase. [1] The laser’s beam of coherent light differentiates it from light sources that emit incoherent light beams, of random phase varying with time and position. Laser light is generally a narrow-wavelength electromagnetic spectrum monochromatic light; yet, there are lasers that emit a broad spectrum of light, or emit different wavelengths of light simultaneously.

Terminology

From left to right: gamma rays, X-rays, ultraviolet rays, visible spectrum, infrared, microwaves, radio waves.

The word laser originally was the upper-case LASER, the acronym from Light Amplification by Stimulated Emission of Radiation, wherein light broadly denotes electromagnetic radiation of any frequency, not only the visible spectrum; hence infrared laser, ultraviolet laser, X-ray laser, et cetera. Because the microwave predecessor of the laser, the maser, was developed first, devices that emit microwave and radio frequencies are denoted “masers”. In the early technical literature, especially in that of the Bell Telephone Laboratories researchers, the laser was also called optical maser, a currently uncommon term, moreover, since 1998, Bell Laboratories adopted the laser usage.[2] Linguistically, the back-formation verb to lase means “to produce laser light” and “to apply laser light to”.[3] The word laser sometimes is inaccurately used to describe a non-laser-light technology, e.g. a coherent-state atom source is an atom laser.

Design

Principal components:
1. Gain medium
2. Laser pumping energy
3. High reflector
4. Output coupler
5. Laser beam

A laser consists of a gain medium inside a highly reflective optical cavity, as well as a means to supply energy to the gain medium. The gain medium is a material with properties that allow it to amplify light by stimulated emission. In its simplest form, a cavity consists of two mirrors arranged such that light bounces back and forth, each time passing through the gain medium. Typically one of the two mirrors, the output coupler, is partially transparent. The output laser beam is emitted through this mirror.

Light of a specific wavelength that passes through the gain medium is amplified (increases in power); the surrounding mirrors ensure that most of the light makes many passes through the gain medium, being amplified repeatedly. Part of the light that is between the mirrors (that is, within the cavity) passes through the partially transparent mirror and escapes as a beam of light.

The process of supplying the energy required for the amplification is called pumping. The energy is typically supplied as an electrical current or as light at a different wavelength. Such light may be provided by a flash lamp or perhaps another laser. Most practical lasers contain additional elements that affect properties such as the wavelength of the emitted light and the shape of the beam.

Laser physics

A helium-neon laser demonstration at the Kastler-Brossel Laboratory at Univ. Paris 6. The glowing ray in the middle is an electric discharge producing light in much the same way as a neon light. It is the gain medium through which the laser passes, not the laser beam itself, which is visible there. The laser beam crosses the air and marks a red point on the screen to the right.
Spectrum of a helium neon laser showing the very high spectral purity intrinsic to nearly all lasers. Compare with the relatively broad spectral emittance of a light emitting diode.

The gain medium of a laser is a material of controlled purity, size, concentration, and shape, which amplifies the beam by the process of stimulated emission. It can be of any state: gas, liquid, solid or plasma. The gain medium absorbs pump energy, which raises some electrons into higher-energy ("excited") quantum states. Particles can interact with light both by absorbing photons or by emitting photons. Emission can be spontaneous or stimulated. In the latter case, the photon is emitted in the same direction as the light that is passing by. When the number of particles in one excited state exceeds the number of particles in some lower-energy state, population inversion is achieved and the amount of stimulated emission due to light that passes through is larger than the amount of absorption. Hence, the light is amplified. By itself, this makes an optical amplifier. When an optical amplifier is placed inside a resonant optical cavity, one obtains a laser.

The light generated by stimulated emission is very similar to the input signal in terms of wavelength, phase, and polarization. This gives laser light its characteristic coherence, and allows it to maintain the uniform polarization and often monochromaticity established by the optical cavity design.

The optical cavity, a type of cavity resonator, contains a coherent beam of light between reflective surfaces so that the light passes through the gain medium more than once before it is emitted from the output aperture or lost to diffraction or absorption. As light circulates through the cavity, passing through the gain medium, if the gain (amplification) in the medium is stronger than the resonator losses, the power of the circulating light can rise exponentially. But each stimulated emission event returns a particle from its excited state to the ground state, reducing the capacity of the gain medium for further amplification. When this effect becomes strong, the gain is said to be saturated. The balance of pump power against gain saturation and cavity losses produces an equilibrium value of the laser power inside the cavity; this equilibrium determines the operating point of the laser. If the chosen pump power is too small, the gain is not sufficient to overcome the resonator losses, and the laser will emit only very small light powers. The minimum pump power needed to begin laser action is called the lasing threshold. The gain medium will amplify any photons passing through it, regardless of direction; but only the photons aligned with the cavity manage to pass more than once through the medium and so have significant amplification.

The beam in the cavity and the output beam of the laser, if they occur in free space rather than waveguides (as in an optical fiber laser), are, at best, low order Gaussian beams. However this is rarely the case with powerful lasers. If the beam is not a low-order Gaussian shape, the transverse modes of the beam can be described as a superposition of Hermite-Gaussian or Laguerre-Gaussian beams (for stable-cavity lasers). Unstable laser resonators on the other hand, have been shown to produce fractal shaped beams.[4] The beam may be highly collimated, that is being parallel without diverging. However, a perfectly collimated beam cannot be created, due to diffraction. The beam remains collimated over a distance which varies with the square of the beam diameter, and eventually diverges at an angle which varies inversely with the beam diameter. Thus, a beam generated by a small laboratory laser such as a helium-neon laser spreads to about 1.6 kilometers (1 mile) diameter if shone from the Earth to the Moon. By comparison, the output of a typical semiconductor laser, due to its small diameter, diverges almost as soon as it leaves the aperture, at an angle of anything up to 50°. However, such a divergent beam can be transformed into a collimated beam by means of a lens. In contrast, the light from non-laser light sources cannot be collimated by optics as well.

Although the laser phenomenon was discovered with the help of quantum physics, it is not essentially more quantum mechanical than other light sources. The operation of a free electron laser can be explained without reference to quantum mechanics.

Modes of operation

The output of a laser may be a continuous constant-amplitude output (known as CW or continuous wave); or pulsed, by using the techniques of Q-switching, modelocking, or gain-switching. In pulsed operation, much higher peak powers can be achieved.

Some types of lasers, such as dye lasers and vibronic solid-state lasers can produce light over a broad range of wavelengths; this property makes them suitable for generating extremely short pulses of light, on the order of a few femtoseconds (10-15 s).

Continuous wave operation

In the continuous wave (CW) mode of operation, the output of a laser is relatively constant with respect to time. The population inversion required for lasing is continually maintained by a steady pump source.

Pulsed operation

In the pulsed mode of operation, the output of a laser varies with respect to time, typically taking the form of alternating 'on' and 'off' periods. In many applications one aims to deposit as much energy as possible at a given place in as short time as possible. In laser ablation for example, a small volume of material at the surface of a work piece might evaporate if it gets the energy required to heat it up far enough in very short time. If, however, the same energy is spread over a longer time, the heat may have time to disperse into the bulk of the piece, and less material evaporates. There are a number of methods to achieve this.

Q-switching

In a Q-switched laser, the population inversion (usually produced in the same way as CW operation) is allowed to build up by making the cavity conditions (the 'Q') unfavorable for lasing. Then, when the pump energy stored in the laser medium is at the desired level, the 'Q' is adjusted (electro- or acousto-optically) to favourable conditions, releasing the pulse. This results in high peak powers as the average power of the laser (were it running in CW mode) is packed into a shorter time frame.

Modelocking

A modelocked laser emits extremely short pulses on the order of tens of picoseconds down to less than 10 femtoseconds. These pulses are typically separated by the time that a pulse takes to complete one round trip in the resonator cavity. Due to the Fourier limit (also known as energy-time uncertainty), a pulse of such short temporal length has a spectrum which contains a wide range of wavelengths. Because of this, the laser medium must have a broad enough gain profile to amplify them all. An example of a suitable material is titanium-doped, artificially grown sapphire (Ti:sapphire).

The modelocked laser is a most versatile tool for researching processes happening at extremely fast time scales also known as femtosecond physics, femtosecond chemistry and ultrafast science, for maximizing the effect of nonlinearity in optical materials (e.g. in second-harmonic generation, parametric down-conversion, optical parametric oscillators and the like), and in ablation applications. Again, because of the short timescales involved, these lasers can achieve extremely high powers.

Pulsed pumping

Another method of achieving pulsed laser operation is to pump the laser material with a source that is itself pulsed, either through electronic charging in the case of flashlamps, or another laser which is already pulsed. Pulsed pumping was historically used with dye lasers where the inverted population lifetime of a dye molecule was so short that a high energy, fast pump was needed. The way to overcome this problem was to charge up large capacitors which are then switched to discharge through flashlamps, producing a broad spectrum pump flash. Pulsed pumping is also required for lasers which disrupt the gain medium so much during the laser process that lasing has to cease for a short period. These lasers, such as the excimer laser and the copper vapour laser, can never be operated in CW mode.

History

Foundations

In 1917, Albert Einstein established the theoretic foundations for the LASER and the MASER in the paper Zur Quantentheorie der Strahlung (On the Quantum Theory of Radiation); via a re-derivation of Max Planck’s law of radiation, conceptually based upon probability coefficients (Einstein coefficients) for the absorption, spontaneous emission, and stimulated emission of electromagnetic radiation; in 1928, Rudolf W. Ladenburg confirmed the existences of the phenomena of stimulated emission and negative absorption;[5] in 1939, Valentin A. Fabrikant predicted the use of stimulated emission to amplify “short” waves;[6] in 1947, Willis E. Lamb and R. C. Retherford found apparent stimulated emission in hydrogen spectra and effected the first demonstration of stimulated emission;[7]in 1950, Alfred Kastler (Nobel Prize for Physics 1966) proposed the method of optical pumping, experimentally confirmed, two years later, by Brossel, Kastler, and Winter.[8] On 16 May 1960, Theodore Maiman demonstrated the first functional laser at the Hughes Research Laboratories,[9] introducing a technology applied mostly used for data storage, via optical storage devices, such as the compact disk player and the DVD player, wherein a semiconductor laser, less than a millimeter wide, scans the disc’s surface; the second-most application is fiber-optic communication, and related devices, e.g. bar code reader, laser printer, laser pointer.[citation needed]

Maser

In 1953, Charles H. Townes and graduate students James P. Gordon and Herbert J. Zeiger produced the first microwave amplifier, a device operating on similar principles to the laser — but amplifying microwave radiation, rather than infrared or visible radiations; yet, Townes's maser was incapable of continuous output. Meantime, in the Soviet Union, Nikolay Basov and Aleksandr Prokhorov were independently working on the quantum oscillator, and produced the first MASER when they solved the problem of continuous-output systems, by using more than two energy levels. These MASER systems could release stimulated emissions without falling to the ground state, thus maintaining a population inversion. In 1955, Prokhorov and Basov suggested an optical pumping of a multi-level system, as a method for obtaining the population inversion, later a main method of laser pumping.

Townes reports that he was opposed by several academically eminent colleagues — among them Niels Bohr, John von Neumann, Isidor Rabi, Polykarp Kusch, and Llewellyn H. Thomas — arguing that the MASER was theoretically impossible.[1] In 1964, Charles H. Townes, Nikolay Basov, and Aleksandr Prokhorov shared the Nobel Prize in Physics, “for fundamental work in the field of quantum electronics, which has led to the construction of oscillators and amplifiers based on the maser–laser principle”.

PayPal By Using Without Creditcard

Saturday, February 27, 2010 · 0 comments

But, there is a problem and misconception with PayPal. Many users think that a credit card is required to use this service. OK. This is true, but not 100% correct. You can use PayPal without any credit card! Although, if you don’t register a credit card with your PayPal account – your account will be marked as “unverified” account and hence, you can’t shop at certain websites. Another drawback of unverified PayPal account is limitations on withdraw and receiving money. As an “unverified account” you can send / receive just $500.00 USD per month. To increase this limit, you must add and verify a credit card to your account.

If you don’t have a credit card, try Virtual credit cards (VCC). VCC are getting popular these days. Many banks offer VCC without any restriction as in case of credit card.

Withdraw Money Directly To Your Bank Account In India

WithDraw Money from Paypal to Indian Bank

Indian PayPal users can withdraw money to their bank account directly. This money is sent via Electronic Fund Transfer (EFT) and takes just one week to arrive. If you requested a sum below Rs. 7000/- PayPal will charge Rs 50/-, else the transaction will be free. Though, PayPal generally offers low rates for USD.

HOW LAPTOPS BECOMING FUTURE

Friday, February 26, 2010 · 0 comments

Future Laptop Computer with Flexible Screen

You may not need a briefcase to carry your laptop in the near feature. Just roll the computer and wear it like a shoulder handbag.

Orkin Design, a design firm in Germany, has created a amazing concept computer that can be used both as a laptop and a tablet (slate). It features a large multitouch screen, USB ports, webcam, stylus and everything that you probably look for in a computer.

COMPUTER SYSTEM

· 0 comments

A computer is a programmable machine that receives input, stores and manipulates data, and provides output in a useful format.

Although mechanical examples of computers have existed through much of recorded human history, the first electronic computers were developed in the mid-20th century (1940–1945). These were the size of a large room, consuming as much power as several hundred modern personal computers (PCs).[1] Modern computers based on integrated circuits are millions to billions of times more capable than the early machines, and occupy a fraction of the space.[2] Simple computers are small enough to fit into small pocket devices, and can be powered by a small battery. Personal computers in their various forms are icons of the Information Age and are what most people think of as "computers". The embedded computers found in many devices from MP3 players to fighter aircraft and from toys to industrial robots are however the most numerous.

The ability to store and execute lists of instructions called programs makes computers extremely versatile, distinguishing them from calculators. The Church–Turing thesis is a mathematical statement of this versatility: any computer with a certain minimum capability is, in principle, capable of performing the same tasks that any other computer can perform. Therefore computers ranging from a netbook to a supercomputer are all able to perform the same computational tasks, given enough time and storage capacity.

Contents

[hide]
  • 1 History of computing
  • 2 Stored program architecture
    • 2.1 Programs
    • 2.2 Example
  • 3 Function
    • 3.1 Control unit
    • 3.2 Arithmetic/logic unit (ALU)
    • 3.3 Memory
    • 3.4 Input/output (I/O)
    • 3.5 Multitasking
    • 3.6 Multiprocessing
    • 3.7 Networking and the Internet
  • 4 Further topics
    • 4.1 Hardware
    • 4.2 Software
    • 4.3 Programming languages
    • 4.4 Professions and organizations
  • 5 See also
  • 6 Notes
  • 7 References
  • 8 External links

History of computing

The Jacquard loom, on display at the Museum of Science and Industry in Manchester, England, was one of the first programmable devices.

The first use of the word "computer" was recorded in 1613, referring to a person who carried out calculations, or computations, and the word continued to be used in that sense until the middle of the 20th century. From the end of the 19th century onwards though, the word began to take on its more familiar meaning, describing a machine that carries out computations.[3]

The history of the modern computer begins with two separate technologies—automated calculation and programmability—but no single device can be identified as the earliest computer, partly because of the inconsistent application of that term. Examples of early mechanical calculating devices include the abacus, the slide rule and arguably the astrolabe and the Antikythera mechanism (which dates from about 150–100 BC). Hero of Alexandria (c. 10–70 AD) built a mechanical theater which performed a play lasting 10 minutes and was operated by a complex system of ropes and drums that might be considered to be a means of deciding which parts of the mechanism performed which actions and when.[4] This is the essence of programmability.

The "castle clock", an astronomical clock invented by Al-Jazari in 1206, is considered to be the earliest programmable analog computer.[5] It displayed the zodiac, the solar and lunar orbits, a crescent moon-shaped pointer travelling across a gateway causing automatic doors to open every hour,[6][7] and five robotic musicians who played music when struck by levers operated by a camshaft attached to a water wheel. The length of day and night could be re-programmed to compensate for the changing lengths of day and night throughout the year.[5]

The Renaissance saw a re-invigoration of European mathematics and engineering. Wilhelm Schickard's 1623 device was the first of a number of mechanical calculators constructed by European engineers, but none fit the modern definition of a computer, because they could not be programmed.

In 1801, Joseph Marie Jacquard made an improvement to the textile loom by introducing a series of punched paper cards as a template which allowed his loom to weave intricate patterns automatically. The resulting Jacquard loom was an important step in the development of computers because the use of punched cards to define woven patterns can be viewed as an early, albeit limited, form of programmability.

It was the fusion of automatic calculation with programmability that produced the first recognizable computers. In 1837, Charles Babbage was the first to conceptualize and design a fully programmable mechanical computer, his analytical engine.[8] Limited finances and Babbage's inability to resist tinkering with the design meant that the device was never completed.

In the late 1880s, Herman Hollerith invented the recording of data on a machine readable medium. Prior uses of machine readable media, above, had been for control, not data. "After some initial trials with paper tape, he settled on punched cards ..."[9] To process these punched cards he invented the tabulator, and the keypunch machines. These three inventions were the foundation of the modern information processing industry. Large-scale automated data processing of punched cards was performed for the 1890 United States Census by Hollerith's company, which later became the core of IBM. By the end of the 19th century a number of technologies that would later prove useful in the realization of practical computers had begun to appear: the punched card, Boolean algebra, the vacuum tube (thermionic valve) and the teleprinter.

During the first half of the 20th century, many scientific computing needs were met by increasingly sophisticated analog computers, which used a direct mechanical or electrical model of the problem as a basis for computation. However, these were not programmable and generally lacked the versatility and accuracy of modern digital computers.

Alan Turing is widely regarded to be the father of modern computer science. In 1936 Turing provided an influential formalisation of the concept of the algorithm and computation with the Turing machine. Of his role in the modern computer, Time magazine in naming Turing one of the 100 most influential people of the 20th century, states: "The fact remains that everyone who taps at a keyboard, opening a spreadsheet or a word-processing program, is working on an incarnation of a Turing machine".[10]

The inventor of the program-controlled computer was Konrad Zuse, who built the first working computer in 1941 and later in 1955 the first computer based on magnetic storage.[11]

George Stibitz is internationally recognized as a father of the modern digital computer. While working at Bell Labs in November 1937, Stibitz invented and built a relay-based calculator he dubbed the "Model K" (for "kitchen table", on which he had assembled it), which was the first to use binary circuits to perform an arithmetic operation. Later models added greater sophistication including complex arithmetic and programmability.[12]

Defining characteristics of some early digital computers of the 1940s (In the history of computing hardware)
Name First operational Numeral system Computing mechanism Programming Turing complete
Zuse Z3 (Germany) May 1941 Binary Electro-mechanical Program-controlled by punched film stock (but no conditional branch) Yes (1998)
Atanasoff–Berry Computer (US) 1942 Binary Electronic Not programmable—single purpose No
Colossus Mark 1 (UK) February 1944 Binary Electronic Program-controlled by patch cables and switches No
Harvard Mark I – IBM ASCC (US) May 1944 Decimal Electro-mechanical Program-controlled by 24-channel punched paper tape (but no conditional branch) No
Colossus Mark 2 (UK) June 1944 Binary Electronic Program-controlled by patch cables and switches No
ENIAC (US) July 1946 Decimal Electronic Program-controlled by patch cables and switches Yes
Manchester Small-Scale Experimental Machine (Baby) (UK) June 1948 Binary Electronic Stored-program in Williams cathode ray tube memory Yes
Modified ENIAC (US) September 1948 Decimal Electronic Program-controlled by patch cables and switches plus a primitive read-only stored programming mechanism using the Function Tables as program ROM Yes
EDSAC (UK) May 1949 Binary Electronic Stored-program in mercury delay line memory Yes
Manchester Mark 1 (UK) October 1949 Binary Electronic Stored-program in Williams cathode ray tube memory and magnetic drum memory Yes
CSIRAC (Australia) November 1949 Binary Electronic Stored-program in mercury delay line memory Yes

A succession of steadily more powerful and flexible computing devices were constructed in the 1930s and 1940s, gradually adding the key features that are seen in modern computers. The use of digital electronics (largely invented by Claude Shannon in 1937) and more flexible programmability were vitally important steps, but defining one point along this road as "the first digital electronic computer" is difficult.Shannon 1940 Notable achievements include:

EDSAC was one of the first computers to implement the stored program (von Neumann) architecture.
Die of an Intel 80486DX2 microprocessor (actual size: 12×6.75 mm) in its packaging.
  • Konrad Zuse's electromechanical "Z machines". The Z3 (1941) was the first working machine featuring binary arithmetic, including floating point arithmetic and a measure of programmability. In 1998 the Z3 was proved to be Turing complete, therefore being the world's first operational computer.[13]
  • The non-programmable Atanasoff–Berry Computer (1941) which used vacuum tube based computation, binary numbers, and regenerative capacitor memory. The use of regenerative memory allowed it to be much more compact then its peers (being approximately the size of a large desk or workbench), since intermediate results could be stored and then fed back into the same set of computation elements.
  • The secret British Colossus computers (1943),[14] which had limited programmability but demonstrated that a device using thousands of tubes could be reasonably reliable and electronically reprogrammable. It was used for breaking German wartime codes.
  • The Harvard Mark I (1944), a large-scale electromechanical computer with limited programmability.
  • The U.S. Army's Ballistic Research Laboratory ENIAC (1946), which used decimal arithmetic and is sometimes called the first general purpose electronic computer (since Konrad Zuse's Z3 of 1941 used electromagnets instead of electronics). Initially, however, ENIAC had an inflexible architecture which essentially required rewiring to change its programming.

Several developers of ENIAC, recognizing its flaws, came up with a far more flexible and elegant design, which came to be known as the "stored program architecture" or von Neumann architecture. This design was first formally described by John von Neumann in the paper First Draft of a Report on the EDVAC, distributed in 1945. A number of projects to develop computers based on the stored-program architecture commenced around this time, the first of these being completed in Great Britain. The first to be demonstrated working was the Manchester Small-Scale Experimental Machine (SSEM or "Baby"), while the EDSAC, completed a year after SSEM, was the first practical implementation of the stored program design. Shortly thereafter, the machine originally described by von Neumann's paper—EDVAC—was completed but did not see full-time use for an additional two years.

Nearly all modern computers implement some form of the stored-program architecture, making it the single trait by which the word "computer" is now defined. While the technologies used in computers have changed dramatically since the first electronic, general-purpose computers of the 1940s, most still use the von Neumann architecture.

Computers using vacuum tubes as their electronic elements were in use throughout the 1950s, but by the 1960s had been largely replaced by transistor-based machines, which were smaller, faster, cheaper to produce, required less power, and were more reliable. The first transistorised computer was demonstrated at the University of Manchester in 1953.[15] In the 1970s, integrated circuit technology and the subsequent creation of microprocessors, such as the Intel 4004, further decreased size and cost and further increased speed and reliability of computers. By the late 1970s, many products such as video recorders contained dedicated computers called microcontrollers, and they started to appear as a replacement to mechanical controls in domestic appliances such as washing machines. The 1980s witnessed home computers and the now ubiquitous personal computer. With the evolution of the Internet, personal computers are becoming as common as the television and the telephone in the household[citation needed].

Modern smartphones are fully-programmable computers in their own right, and as of 2009 may well be the most common form of such computers in existence[citation needed].

Stored program architecture

The defining feature of modern computers which distinguishes them from all other machines is that they can be programmed. That is to say that a list of instructions (the program) can be given to the computer and it will store them and carry them out at some time in the future.

In most cases, computer instructions are simple: add one number to another, move some data from one location to another, send a message to some external device, etc. These instructions are read from the computer's memory and are generally carried out (executed) in the order they were given. However, there are usually specialized instructions to tell the computer to jump ahead or backwards to some other place in the program and to carry on executing from there. These are called "jump" instructions (or branches). Furthermore, jump instructions may be made to happen conditionally so that different sequences of instructions may be used depending on the result of some previous calculation or some external event. Many computers directly support subroutines by providing a type of jump that "remembers" the location it jumped from and another instruction to return to the instruction following that jump instruction.

Program execution might be likened to reading a book. While a person will normally read each word and line in sequence, they may at times jump back to an earlier place in the text or skip sections that are not of interest. Similarly, a computer may sometimes go back and repeat the instructions in some section of the program over and over again until some internal condition is met. This is called the flow of control within the program and it is what allows the computer to perform tasks repeatedly without human intervention.

Comparatively, a person using a pocket calculator can perform a basic arithmetic operation such as adding two numbers with just a few button presses. But to add together all of the numbers from 1 to 1,000 would take thousands of button presses and a lot of time—with a near certainty of making a mistake. On the other hand, a computer may be programmed to do this with just a few simple instructions. For example:

mov #0,sum ; set sum to 0
mov #1,num ; set num to 1
loop: add num,sum ; add num to sum
add #1,num ; add 1 to num
cmp num,#1000 ; compare num to 1000
ble loop ; if num <= 1000, go back to 'loop'
halt ; end of program. stop running

Once told to run this program, the computer will perform the repetitive addition task without further human intervention. It will almost never make a mistake and a modern PC can complete the task in about a millionth of a second.[16]

However, computers cannot "think" for themselves in the sense that they only solve problems in exactly the way they are programmed to. An intelligent human faced with the above addition task might soon realize that instead of actually adding up all the numbers one can simply use the equation

1+2+3+...+n = {{n(n+1)} \over 2}

and arrive at the correct answer (500,500) with little work.[17] In other words, a computer programmed to add up the numbers one by one as in the example above would do exactly that without regard to efficiency or alternative solutions.

Programs

A 1970s punched card containing one line from a FORTRAN program. The card reads: "Z(1) = Y + W(1)" and is labelled "PROJ039" for identification purposes.

In practical terms, a computer program may run from just a few instructions to many millions of instructions, as in a program for a word processor or a web browser. A typical modern computer can execute billions of instructions per second (gigahertz or GHz) and rarely make a mistake over many years of operation. Large computer programs consisting of several million instructions may take teams of programmers years to write, and due to the complexity of the task almost certainly contain errors.

Errors in computer programs are called "bugs". Bugs may be benign and not affect the usefulness of the program, or have only subtle effects. But in some cases they may cause the program to "hang"—become unresponsive to input such as mouse clicks or keystrokes, or to completely fail or "crash". Otherwise benign bugs may sometimes may be harnessed for malicious intent by an unscrupulous user writing an "exploit"—code designed to take advantage of a bug and disrupt a program's proper execution. Bugs are usually not the fault of the computer. Since computers merely execute the instructions they are given, bugs are nearly always the result of programmer error or an oversight made in the program's design.[18]

In most computers, individual instructions are stored as machine code with each instruction being given a unique number (its operation code or opcode for short). The command to add two numbers together would have one opcode, the command to multiply them would have a different opcode and so on. The simplest computers are able to perform any of a handful of different instructions; the more complex computers have several hundred to choose from—each with a unique numerical code. Since the computer's memory is able to store numbers, it can also store the instruction codes. This leads to the important fact that entire programs (which are just lists of instructions) can be represented as lists of numbers and can themselves be manipulated inside the computer just as if they were numeric data. The fundamental concept of storing programs in the computer's memory alongside the data they operate on is the crux of the von Neumann, or stored program, architecture. In some cases, a computer might store some or all of its program in memory that is kept separate from the data it operates on. This is called the Harvard architecture after the Harvard Mark I computer. Modern von Neumann computers display some traits of the Harvard architecture in their designs, such as in CPU caches.

While it is possible to write computer programs as long lists of numbers (machine language) and this technique was used with many early computers,[19] it is extremely tedious to do so in practice, especially for complicated programs. Instead, each basic instruction can be given a short name that is indicative of its function and easy to remember—a mnemonic such as ADD, SUB, MULT or JUMP. These mnemonics are collectively known as a computer's assembly language. Converting programs written in assembly language into something the computer can actually understand (machine language) is usually done by a computer program called an assembler. Machine languages and the assembly languages that represent them (collectively termed low-level programming languages) tend to be unique to a particular type of computer. For instance, an ARM architecture computer (such as may be found in a PDA or a hand-held videogame) cannot understand the machine language of an Intel Pentium or the AMD Athlon 64 computer that might be in a PC.[20]

Though considerably easier than in machine language, writing long programs in assembly language is often difficult and error prone. Therefore, most complicated programs are written in more abstract high-level programming languages that are able to express the needs of the programmer more conveniently (and thereby help reduce programmer error). High level languages are usually "compiled" into machine language (or sometimes into assembly language and then into machine language) using another computer program called a compiler.[21] Since high level languages are more abstract than assembly language, it is possible to use different compilers to translate the same high level language program into the machine language of many different types of computer. This is part of the means by which software like video games may be made available for different computer architectures such as personal computers and various video game consoles.

The task of developing large software systems presents a significant intellectual challenge. Producing software with an acceptably high reliability within a predictable schedule and budget has historically been difficult; the academic and professional discipline of software engineering concentrates specifically on this challenge.

Example

A traffic light showing red

Suppose a computer is being employed to operate a traffic light at an intersection between two streets. The computer has the following three basic instructions.

  1. ON(Streetname, Color) Turns the light on Streetname with a specified Color on.
  2. OFF(Streetname, Color) Turns the light on Streetname with a specified Color off.
  3. WAIT(Seconds) Waits a specifed number of seconds.
  4. START Starts the program
  5. REPEAT Tells the computer to repeat a specified part of the program in a loop.

Comments are marked with a // on the left margin. Comments in a computer program do not affect the operation of the program. They are not evaluated by the computer. Assume the streetnames are Broadway and Main.

START
//Let Broadway traffic go
OFF(Broadway, Red)
ON(Broadway, Green)
WAIT(60 seconds)
//Stop Broadway traffic
OFF(Broadway, Green)
ON(Broadway, Yellow)
WAIT(3 seconds)
OFF(Broadway, Yellow)
ON(Broadway, Red)
//Let Main traffic go
OFF(Main, Red)
ON(Main, Green)
WAIT(60 seconds)
//Stop Main traffic
OFF(Main, Green)
ON(Main, Yellow)
WAIT(3 seconds)
OFF(Main, Yellow)
ON(Main, Red)
//Tell computer to continuously repeat the program.
REPEAT ALL

With this set of instructions, the computer would cycle the light continually through red, green, yellow and back to red again on both streets.

However, suppose there is a simple on/off switch connected to the computer that is intended to be used to make the light flash red while some maintenance operation is being performed. The program might then instruct the computer to:

START
IF Switch == OFF then: //Normal traffic signal operation
{
//Let Broadway traffic go
OFF(Broadway, Red)
ON(Broadway, Green)
WAIT(60 seconds)
//Stop Broadway traffic
OFF(Broadway, Green)
ON(Broadway, Yellow)
WAIT(3 seconds)
OFF(Broadway, Yellow)
ON(Broadway, Red)
//Let Main traffic go
OFF(Main, Red)
ON(Main, Green)
WAIT(60 seconds)
//Stop Main traffic
OFF(Main, Green)
ON(Main, Yellow)
WAIT(3 seconds)
OFF(Main, Yellow)
ON(Main, Red)
//Tell the computer to repeat this section continuously.
REPEAT THIS SECTION
}
IF Switch == ON THEN: //Maintenance Mode
{
//Turn the red lights on and wait 1 second.
ON(Broadway, Red)
ON(Main, Red)
WAIT(1 second)
//Turn the red lights off and wait 1 second.
OFF(Broadway, Red)
OFF(Main, Red)
WAIT(1 second)
//Tell the computer to repeat the statements in this section.
REPEAT THIS SECTION
}

In this manner, the traffic signal will run a flash-red program when the switch is on, and will run the normal program when the switch is off. Both of these program examples show the basic layout of a computer program in a simple, familiar context of a traffic signal. Any experienced programmer can spot many software bugs in the program, for instance, not making sure that the green light is off when the switch is set to flash red. However, to remove all possible bugs would make this program much longer and more complicated, and would be confusing to nontechnical readers: the aim of this example is a simple demonstration of how computer instructions are laid out.

Function

A general purpose computer has four main components: the arithmetic logic unit (ALU), the control unit, the memory, and the input and output devices (collectively termed I/O). These parts are interconnected by busses, often made of groups of wires.

Inside each of these parts are thousands to trillions of small electrical circuits which can be turned off or on by means of an electronic switch. Each circuit represents a bit (binary digit) of information so that when the circuit is on it represents a "1", and when off it represents a "0" (in positive logic representation). The circuits are arranged in logic gates so that one or more of the circuits may control the state of one or more of the other circuits.

The control unit, ALU, registers, and basic I/O (and often other hardware closely linked with these) are collectively known as a central processing unit (CPU). Early CPUs were composed of many separate components but since the mid-1970s CPUs have typically been constructed on a single integrated circuit called a microprocessor.

Control unit

Diagram showing how a particular MIPS architecture instruction would be decoded by the control system.

The control unit (often called a control system or central controller) manages the computer's various components; it reads and interprets (decodes) the program instructions, transforming them into a series of control signals which activate other parts of the computer.[22] Control systems in advanced computers may change the order of some instructions so as to improve performance.

A key component common to all CPUs is the program counter, a special memory cell (a register) that keeps track of which location in memory the next instruction is to be read from.[23]

The control system's function is as follows—note that this is a simplified description, and some of these steps may be performed concurrently or in a different order depending on the type of CPU:

  1. Read the code for the next instruction from the cell indicated by the program counter.
  2. Decode the numerical code for the instruction into a set of commands or signals for each of the other systems.
  3. Increment the program counter so it points to the next instruction.
  4. Read whatever data the instruction requires from cells in memory (or perhaps from an input device). The location of this required data is typically stored within the instruction code.
  5. Provide the necessary data to an ALU or register.
  6. If the instruction requires an ALU or specialized hardware to complete, instruct the hardware to perform the requested operation.
  7. Write the result from the ALU back to a memory location or to a register or perhaps an output device.
  8. Jump back to step (1).

Since the program counter is (conceptually) just another set of memory cells, it can be changed by calculations done in the ALU. Adding 100 to the program counter would cause the next instruction to be read from a place 100 locations further down the program. Instructions that modify the program counter are often known as "jumps" and allow for loops (instructions that are repeated by the computer) and often conditional instruction execution (both examples of control flow).

It is noticeable that the sequence of operations that the control unit goes through to process an instruction is in itself like a short computer program—and indeed, in some more complex CPU designs, there is another yet smaller computer called a microsequencer that runs a microcode program that causes all of these events to happen.

Arithmetic/logic unit (ALU)

The ALU is capable of performing two classes of operations: arithmetic and logic.[24]

The set of arithmetic operations that a particular ALU supports may be limited to adding and subtracting or might include multiplying or dividing, trigonometry functions (sine, cosine, etc) and square roots. Some can only operate on whole numbers (integers) whilst others use floating point to represent real numbers—albeit with limited precision. However, any computer that is capable of performing just the simplest operations can be programmed to break down the more complex operations into simple steps that it can perform. Therefore, any computer can be programmed to perform any arithmetic operation—although it will take more time to do so if its ALU does not directly support the operation. An ALU may also compare numbers and return boolean truth values (true or false) depending on whether one is equal to, greater than or less than the other ("is 64 greater than 65?").

Logic operations involve Boolean logic: AND, OR, XOR and NOT. These can be useful both for creating complicated conditional statements and processing boolean logic.

Superscalar computers may contain multiple ALUs so that they can process several instructions at the same time.[25] Graphics processors and computers with SIMD and MIMD features often provide ALUs that can perform arithmetic on vectors and matrices.

Memory

Magnetic core memory was the computer memory of choice throughout the 1960s, until it was replaced by semiconductor memory.

A computer's memory can be viewed as a list of cells into which numbers can be placed or read. Each cell has a numbered "address" and can store a single number. The computer can be instructed to "put the number 123 into the cell numbered 1357" or to "add the number that is in cell 1357 to the number that is in cell 2468 and put the answer into cell 1595". The information stored in memory may represent practically anything. Letters, numbers, even computer instructions can be placed into memory with equal ease. Since the CPU does not differentiate between different types of information, it is the software's responsibility to give significance to what the memory sees as nothing but a series of numbers.

In almost all modern computers, each memory cell is set up to store binary numbers in groups of eight bits (called a byte). Each byte is able to represent 256 different numbers (2^8 = 256); either from 0 to 255 or -128 to +127. To store larger numbers, several consecutive bytes may be used (typically, two, four or eight). When negative numbers are required, they are usually stored in two's complement notation. Other arrangements are possible, but are usually not seen outside of specialized applications or historical contexts. A computer can store any kind of information in memory if it can be represented numerically. Modern computers have billions or even trillions of bytes of memory.

The CPU contains a special set of memory cells called registers that can be read and written to much more rapidly than the main memory area. There are typically between two and one hundred registers depending on the type of CPU. Registers are used for the most frequently needed data items to avoid having to access main memory every time data is needed. As data is constantly being worked on, reducing the need to access main memory (which is often slow compared to the ALU and control units) greatly increases the computer's speed.

Computer main memory comes in two principal varieties: random-access memory or RAM and read-only memory or ROM. RAM can be read and written to anytime the CPU commands it, but ROM is pre-loaded with data and software that never changes, so the CPU can only read from it. ROM is typically used to store the computer's initial start-up instructions. In general, the contents of RAM are erased when the power to the computer is turned off, but ROM retains its data indefinitely. In a PC, the ROM contains a specialized program called the BIOS that orchestrates loading the computer's operating system from the hard disk drive into RAM whenever the computer is turned on or reset. In embedded computers, which frequently do not have disk drives, all of the required software may be stored in ROM. Software stored in ROM is often called firmware, because it is notionally more like hardware than software. Flash memory blurs the distinction between ROM and RAM, as it retains its data when turned off but is also rewritable. It is typically much slower than conventional ROM and RAM however, so its use is restricted to applications where high speed is unnecessary.[26]

In more sophisticated computers there may be one or more RAM cache memories which are slower than registers but faster than main memory. Generally computers with this sort of cache are designed to move frequently needed data into the cache automatically, often without the need for any intervention on the programmer's part.

Input/output (I/O)

Hard disk drives are common storage devices used with computers.

I/O is the means by which a computer exchanges information with the outside world.[27] Devices that provide input or output to the computer are called peripherals.[28] On a typical personal computer, peripherals include input devices like the keyboard and mouse, and output devices such as the display and printer. Hard disk drives, floppy disk drives and optical disc drives serve as both input and output devices. Computer networking is another form of I/O.

Often, I/O devices are complex computers in their own right with their own CPU and memory. A graphics processing unit might contain fifty or more tiny computers that perform the calculations necessary to display 3D graphics[citation needed]. Modern desktop computers contain many smaller computers that assist the main CPU in performing I/O.

Multitasking

While a computer may be viewed as running one gigantic program stored in its main memory, in some systems it is necessary to give the appearance of running several programs simultaneously. This is achieved by multitasking i.e. having the computer switch rapidly between running each program in turn.[29]

One means by which this is done is with a special signal called an interrupt which can periodically cause the computer to stop executing instructions where it was and do something else instead. By remembering where it was executing prior to the interrupt, the computer can return to that task later. If several programs are running "at the same time", then the interrupt generator might be causing several hundred interrupts per second, causing a program switch each time. Since modern computers typically execute instructions several orders of magnitude faster than human perception, it may appear that many programs are running at the same time even though only one is ever executing in any given instant. This method of multitasking is sometimes termed "time-sharing" since each program is allocated a "slice" of time in turn.[30]

Before the era of cheap computers, the principle use for multitasking was to allow many people to share the same computer.

Seemingly, multitasking would cause a computer that is switching between several programs to run more slowly — in direct proportion to the number of programs it is running. However, most programs spend much of their time waiting for slow input/output devices to complete their tasks. If a program is waiting for the user to click on the mouse or press a key on the keyboard, then it will not take a "time slice" until the event it is waiting for has occurred. This frees up time for other programs to execute so that many programs may be run at the same time without unacceptable speed loss.

Multiprocessing

Cray designed many supercomputers that used multiprocessing heavily.

Some computers are designed to distribute their work across several CPUs in a multiprocessing configuration, a technique once employed only in large and powerful machines such as supercomputers, mainframe computers and servers. Multiprocessor and multi-core (multiple CPUs on a single integrated circuit) personal and laptop computers are now widely available, and are being increasingly used in lower-end markets as a result.

Supercomputers in particular often have highly unique architectures that differ significantly from the basic stored-program architecture and from general purpose computers.[31] They often feature thousands of CPUs, customized high-speed interconnects, and specialized computing hardware. Such designs tend to be useful only for specialized tasks due to the large scale of program organization required to successfully utilize most of the available resources at once. Supercomputers usually see usage in large-scale simulation, graphics rendering, and cryptography applications, as well as with other so-called "embarrassingly parallel" tasks.

Networking and the Internet

Visualization of a portion of the routes on the Internet.

Computers have been used to coordinate information between multiple locations since the 1950s. The U.S. military's SAGE system was the first large-scale example of such a system, which led to a number of special-purpose commercial systems like Sabre.[32]

In the 1970s, computer engineers at research institutions throughout the United States began to link their computers together using telecommunications technology. This effort was funded by ARPA (now DARPA), and the computer network that it produced was called the ARPANET.[33] The technologies that made the Arpanet possible spread and evolved.

In time, the network spread beyond academic and military institutions and became known as the Internet. The emergence of networking involved a redefinition of the nature and boundaries of the computer. Computer operating systems and applications were modified to include the ability to define and access the resources of other computers on the network, such as peripheral devices, stored information, and the like, as extensions of the resources of an individual computer. Initially these facilities were available primarily to people working in high-tech environments, but in the 1990s the spread of applications like e-mail and the World Wide Web, combined with the development of cheap, fast networking technologies like Ethernet and ADSL saw computer networking become almost ubiquitous. In fact, the number of computers that are networked is growing phenomenally. A very large proportion of personal computers regularly connect to the Internet to communicate and receive information. "Wireless" networking, often utilizing mobile phone networks, has meant networking is becoming increasingly ubiquitous even in mobile computing environments.

ENGINEERING DESIGN PROCESS

Thursday, February 25, 2010 · 0 comments

An engineering design process is a process used by engineers to help develop products. The engineering design is defined as

… the process of servicing a system, component or process to meet desired deeds. It is a decision-making process (often iterative), in which the basic sciences, mathematics, and engineering sciences are applied to convert resources optimally to meet a stated objective. Among the fundamental elements of the design process are the establishment of objectives and criteria, synthesis, analysis, construction, testing, and evaluation.

This process can be divided up into a ten-step process, which includes identifying a need, defining the problem, conducting research, narrowing the research, analyzing set criteria, finding alternative solutions, analyzing possible solutions, making a decision, presenting the product, and communicating and selling the product. This process is not universal for all engineers or all processes. Individuals utilize their personal knowledge and experiences to follow the path to design success.

Contents

[hide]
  • 1 Defining the problem
  • 2 Conducting research
  • 3 Narrowing the research
  • 4 Analyzing set criteria
  • 5 Finding alternative solutions
  • 6 Analyzing possible solutions
  • 7 Making a decision
  • 8 Presenting the product
  • 9 Communicating and selling the product
  • 10 See also
  • 11 References

[edit] Defining the problem

Engineers must appropriately define the problem first in order to improve it. Solving an insignificant problem can cost a firm millions in funding and precious time.

[edit] Conducting research

Most of a productive engineer’s time will be spent on research, locating, applying, and transferring information (Eide). They first must be well acquainted with as much information possible, which in turn produce a better solution. Here the engineer asks many questions, such as, “What has been written about it? Is something already on the market that may solve the problem? What is wrong with the way it is being done? What is right with the way it is being done? Who manufactures the current ‘solution’? How much does it cost? Will people pay for a better one if it cost more? How much will they pay (or how bad is the problem)?” (Eide). All these questions will help the engineer get a better grasp on the problem at hand.

Another major part of this research step is determining the source of information. It is the engineers’ job to sift through all of the gathered research and decide what is relevant. One sources available is an already existing solution. Reverse engineering is an effective learning technique if other “solutions” are available on the market (Eide). Other effective sources of information include the Internet, local libraries, available government documents, personal organizations, trade journals, vendor catalogs and individual experts available (Eide). It is very important to record these findings in a bibliography that way it is easy to find the information at a later date.

[edit] Narrowing the research

Up until now, the problem research and definition has been kept broad to allow for a large amount of possible solutions. Constraints are necessary because they eliminate any extreme solutions that would be inefficient, costly, and physically impossible to create.

[edit] Analyzing set criteria

Criteria, or “characteristics have to be established from experience, research, market studies, and customer preferences” (Eide) that are desired by the consumer. In this step, solutions are compared on a qualitative basis such as appearance, durability and cost. The importance of each characteristic must be agreed upon the team of engineers in order to find the top reasonable solutions to the problem.

[edit] Finding alternative solutions

In this step, a list of the possible solutions is made and the pros and cons of each solution are discussed. Engineers will sometimes create a checklist of characteristics of the possible solutions and decided what could be changed to better the final result. “Brainstorming” is a great way to decide what is good about the solution and what could be changed to better the solution.

[edit] Analyzing possible solutions

All possible alternative solutions have to be analyzed to determine their potential. At this point the engineer will again condense the possible solutions. Using mathematical and key engineering principles, the engineer analyzes the potential performance of the solution to determine if the solution is physically possible. During this analyzing process engineers review the laws of nature and determine whether the product is economically practical by using common sense (Eide).

[edit] Making a decision

Some decisions are easily made through analyzing and constraining from the previous steps, but at other times the decision on which solution to choose can be close to impossible. What makes decision making so tough is the trade offs of choosing one solution over the other. Often engineers can come up with impeccable solutions, detailing the strengths and weaknesses of all solutions, but in the end cannot make the decision of which is better on their own. One tool that can be helpful in the decision making process is to be organized. Having as much information possible about all the alternative solutions will make it easier to evaluate the product efficiently. Another crucial tool is to have the objective for the problem and important criteria clear in mind. Frequently when working on a problem, an engineer may get side tracked, so it’s important to remember the purpose of the solution.

[edit] Presenting the product

Details about the product can be given visually through sketches. It’s important to have accurate sketches in order to describe your ideas to technicians and drafters. Successful engineers will have to communicate accurately through “written, spoken and graphical languages in order to develop and interpret specifications” (Eide).

[edit] Communicating and selling the product

Here the engineer has to sell and explain the product in a persuading manner. Selling the product takes place all along the design process. Another way of communication is the written report, which may be read by both management and clients. These written reports can vary in formality, but usually contain an appropriate cover page, abstract, table of contents, body, conclusion and recommendation, and an appendix. Another common way of communicating the new product is through an oral presentation which presents the information convincingly to the listener. The key to a good oral presentation is to be prepared, have good posture, good eye contact and project your voice loud and clearly. It’s important that the oral presentation gives enough information to get the idea across to the desired audience but not too much information to become overwhelming, and confusing.

“Design is the essencial of engineers.” (Eide) The purpose of engineering design revolves around our natural instincts as human beings to always strive for more, and that is why engineering is one of the fastest growing careers. Society will always strive for more than what is available, pushing engineers, designers, and inventors to continuously produce more innovative ideas. Through the engineering design process, engineers are given the tools and guidelines needed to successfully create these innovative ideas.

[edit] See also

  • Design review
  • Engineering analysis
  • Axiomatic product development lifecycle APDL
  • Applied science
  • Blueprint
  • Design
  • Design engineer
  • Engineering
  • Engineering design management
  • Ideal final result
  • Marketing
  • New product development
  • Traditional engineering
  • Systems engineering process

ETHICAL HACKING

Wednesday, February 24, 2010 · 0 comments

This article is part of the series:
Computer Hacking
Computer-eat.svg
Hobbyist hacker
Technology hacker
Hacker programmer
Hacking in computer security
Computer security
Computer insecurity
Network security
History
Phreaking
Cryptovirology
Hacker ethic
Black hat, Grey hat, White hat
Hacker Manifesto
Black Hat Briefings, DEF CON
Cybercrime
Computer crime, Crimeware
List of convicted computer criminals
Script kiddie
Hacking tools
Vulnerability
Exploit
Payload
Software
Malware
Rootkit, Backdoor
Trojan horse, Virus, Worm
Spyware, Botnet, Keystroke logging
Antivirus software, Firewall, HIDS

A white hat is the hero or good guy, especially in computing slang, where it refers to an ethical hacker or penetration tester who focuses on securing and protecting IT systems.[1]

Contents

[hide]
  • 1 White hat hacker
  • 2 Search engine optimization
  • 3 In movies
  • 4 In Freemasonry
  • 5 References
  • 6 See also

[edit] White hat hacker

White hat hackers, also known as ethical hackers, or white knights, are computer security experts, who specialize in penetration testing, and other testing methodologies, to ensure that a company's information systems are secure. Such people are employed by companies where these professionals are sometimes called "sneakers."[2] Groups of these people are often called tiger teams[3] or red teams. These security experts may utilize a variety of methods to carry out their tests, including social engineering tactics, use of hacking tools, and attempts to evade security to gain entry into secured areas.

The National Security Agency offers certifications such as the CNSS 4011. Such a certification covers orderly, ethical hacking techniques and team management. Aggressor teams are called "red" teams. Defender teams are called "blue" teams.

[edit] Search engine optimization

In recent years, the terms white hat and black hat have been applied to the Search Engine Optimization (SEO) industry. Black hat SEO tactics such as spamdexing, attempt to redirect search results to particular target pages in a fashion that is against the search engines' terms of service, whereas white hat methods are generally approved by the search engines.[4] White hats tend to produce results that last a long time, whereas black hats anticipate that their sites may eventually be banned either temporarily or permanently once the search engines discover what they are doing.[5]

[edit] In movies

In the movie industry, a white hat was someone in a western movie in which such a character would wear a white hat in contrast to the villain's black hat. Examples of such characters are Red Ryder, Tom Mix, and The Lone Ranger.

Rob Brydon riffed on this iconic use of the white hat in the TV series Director's Commentary when his character, talentless director Peter De Lane, discussed making a 'good' character in a Western wear a black hat: "Can a good guy wear a black hat? Can a bad guy wear a white hat?"

[edit] In Freemasonry

In the Scottish Rite of Freemasonry, a white hat signifies an honorable degree which has been bestowed upon a member. It is also known as the 33rd degree. A 33° mason is a master mason who has exhibited knowledge, passion and sacrifice to his craft. It is awarded by the Supreme Council. Members selected for inclusion are elected at the Council's annual session. Members unanimously elected become honorary members of the Supreme Council. The cap for an Inspector General Honorary is white with a white band edged in gold, featuring the symbol for this honorary Degree, a red slanting Patriarchal Cross.[6].

MICROWOVEN

Thursday, February 18, 2010 · 0 comments

Jump to: navigation, search
A microwave oven
Various microwave ovens; many from the 1980s

A microwave oven, or a microwave, is a kitchen appliance that cooks or heats food by dielectric heating. This is accomplished by using microwave radiation to heat water and other polarized molecules within the food. This excitation is fairly uniform, leading to food being more evenly heated throughout (except in thick objects) than generally occurs in other cooking techniques.

Basic microwave ovens heat food quickly and efficiently, but do not brown or bake food in the way conventional ovens do. This makes them unsuitable for cooking certain foods, or to achieve certain culinary effects. Additional kinds of heat sources can be added to microwave packaging, or into combination microwave ovens, to add these additional effects.

Contents

[hide]
  • 1 History
  • 2 Principles
  • 3 Design
    • 3.1 Variants and accessories
    • 3.2 Sizes
  • 4 Uses
  • 5 Efficiency
  • 6 Benefits and safety features
    • 6.1 Heating characteristics
  • 7 Effects on food and nutrients
  • 8 Hazards
    • 8.1 Microwave radiation
  • 9 Cultural references
  • 10 See also
  • 11 References
  • 12 External links

[edit] History

The heating effect of microwaves was discovered accidentally in 1945. Percy Spencer, an American self-taught engineer from Howland, Maine, was building magnetrons for radar sets with the American company Raytheon. He was working on an active radar set when he noticed that a peanut chocolate bar he had in his pocket started to melt. The radar had melted his chocolate bar with microwaves. The first food to be deliberately cooked with Spencer's microwave was popcorn, and the second was an egg, which exploded in the face of one of the experimenters.[1][2] To verify his finding, Spencer created a high density electromagnetic field by feeding microwave power into a metal box from which it had no way to escape. When food was placed in the box with the microwave energy, the temperature of the food rose rapidly.

On October 8, 1945 Raytheon filed a U.S. patent for Spencer's microwave cooking process and an oven that heated food using microwave energy was placed in a Boston restaurant for testing. In 1947, the company built the Radarange, the first microwave oven in the world.[3] It was almost 1.8 metres (5.9 ft) tall, weighed 340 kilograms (750 lb) and cost about US$5000 each. It consumed 3 kilowatts, about three times as much as today's microwave ovens, and was water-cooled. An early commercial model introduced in 1954 consumed 1.6 kilowatts and sold for US$2000 to US$3000. Raytheon licensed its technology to the Tappan Stove company in 1952. They tried to market a large, 220 volt, wall unit as a home microwave oven in 1955 for a price of US$1295, but it did not sell well. In 1965 Raytheon acquired Amana, which introduced the first popular home model, the countertop Radarange, in 1967 at a price of US$495.

In the 1960s, Litton bought Studebaker's Franklin Manufacturing assets, which had been manufacturing magnetrons and building and selling microwave ovens similar to the Radarange. Litton then developed a new configuration of the microwave, the short, wide shape that is now common. The magnetron feed was also unique. This resulted in an oven that could survive a no-load condition indefinitely.[clarification needed] The new oven was shown at a trade show in Chicago, and helped begin a rapid growth of the market for home microwave ovens. Sales volume of 40,000 units for the US industry in 1970 grew to one million by 1975. Market penetration in Japan, which had learned to build less expensive units by re-engineering a cheaper magnetron, was faster.[clarification needed]

Several other companies joined in the market, and for a time most systems were built by defense contractors, who were most familiar with the magnetron. Litton was particularly well known in the restaurant business. By the late 1970s the technology had improved to the point where prices were falling rapidly. Often called "electronic ovens" in the 1960s, the name "microwave ovens" later became standardized, often now referred to informally as simply "microwaves." Formerly found only in large industrial applications, microwave ovens were increasingly becoming a standard fixture of most kitchens. The rapidly falling price of microprocessors also helped by adding electronic controls to make the ovens easier to use.[citation needed] By 1986, roughly 25% of households in the U.S. owned a microwave oven, up from only about 1% in 1971 [4]. Current estimates hold that over 90% of American households own a microwave oven.[5]

[edit] Principles

A microwave oven works by passing non-ionizing microwave radiation, usually at a frequency of 2.45 gigahertz (GHz)—a wavelength of 122 millimetres (4.80 in)—through the food. Microwave radiation is between common radio and infrared frequencies. Water, fat, and other substances in the food absorb energy from the microwaves in a process called dielectric heating. Many molecules (such as those of water) are electric dipoles, meaning that they have a positive charge at one end and a negative charge at the other, and therefore rotate as they try to align themselves with the alternating electric field of the microwaves. This molecular movement represents heat which is then dispersed as the rotating molecules hit other molecules and put them into motion.

Microwave heating is more efficient on liquid water than on fats and sugars (which have a smaller molecular dipole moment), and also more efficient than on frozen water (where the molecules are not free to rotate).[6] Microwave heating is sometimes explained as a resonance of water molecules, but this is incorrect: such resonance only occurs in water vapor at much higher frequencies, at about 20 GHz.[7] Moreover, large industrial/commercial microwave ovens operating at the common large industrial-oven microwave heating frequency of 915 MHz—wavelength 328 millimetres (12.9 in)—also heat water and food perfectly well.[8]

A common misconception is that microwave ovens cook food "from the inside out". In reality, microwaves are absorbed in the outer layers of food in a manner somewhat similar to heat from other methods. The misconception arises because microwaves penetrate dry non-conductive substances at the surfaces of many common foods, and thus often induce initial heat more deeply than other methods. Depending on water content, the depth of initial heat deposition may be several centimetres or more with microwave ovens, in contrast to broiling (infrared) or convection heating, which deposit heat thinly at the food surface. Penetration depth of microwaves is dependent on food composition and the frequency, with lower microwave frequencies (longer wavelengths) penetrating better.

[edit] Design

A magnetron with section removed (magnet is not shown)

A microwave oven consists of:

  • a high voltage power source, commonly a simple transformer or an electronic power converter, which passes energy to the magnetron
  • a cavity magnetron, which converts high-voltage electric energy to microwave radiation
  • a magnetron control circuit (usually with a microcontroller)
  • a waveguide (to control the direction of the microwaves)
  • a cooking chamber

The frequencies used in microwave ovens were chosen based on two constraints. The first is that they should be in one of the industrial, scientific, and medical (ISM) frequency bands set aside for non-communication purposes. Three additional ISM bands exist in the microwave frequencies, but are not used for microwave cooking. Two of them are centered on 5.8 GHz and 24.125 GHz, but are not used for microwave cooking because of the very high cost of power generation at these frequencies. The third, centered on 433.92 MHz, is a narrow band that would require expensive equipment to generate sufficient power without creating interference outside the band, and is only available in some countries. For household purposes, 2.45 GHz has the advantage over 915 MHz in that 915 MHz is only an ISM band in the ITU Region 2 while 2.45 GHz is available worldwide.

Most microwave ovens allow users to choose between several power levels. In most ovens, however, there is no change in the intensity of the microwave radiation; instead, the magnetron is turned on and off in duty cycles of several seconds at a time. This can actually be heard (a change in the humming sound from the oven), or observed when microwaving airy foods which may inflate during heating phases and deflate when the magnetron is turned off. For such an oven, the magnetron is driven by a linear transformer which can only feasibly be switched completely on or off. Newer models have inverter power supplies which use pulse width modulation to provide effectively-continuous heating at reduced power so that foods are heated more evenly at a given power level and can be heated more quickly without being damaged by uneven heating.

The cooking chamber itself is a Faraday cage which prevents the microwaves from escaping. The oven door usually has a window for easy viewing, but the window has a layer of conductive mesh some distance from the outer panel to maintain the shielding. Because the size of the perforations in the mesh are much less than the microwaves' wavelength, most of the microwave radiation cannot pass through the door, while visible light (with a much shorter wavelength) can.

[edit] Variants and accessories

A variant of the conventional microwave is the convection microwave. A convection microwave oven is a combination of a standard microwave and a convection oven. It allows food to be cooked quickly, yet come out browned or crisped, as from a convection oven. Convection microwaves are more expensive than conventional microwave ovens. Some convection microwaves—those with exposed heating elements—can produce smoke and burning odors as food spatter from previous microwave-only use is burned off the heating elements.

More recently, some manufacturers have added high power quartz halogen bulbs to their convection microwave models, marketing them under names such as "Speedcook", "Advantium" and "Optimawave" to emphasize their ability to cook food rapidly and with good browning. The bulbs heat the food's surface with infrared (IR) radiation, browning surfaces as in a conventional oven. The food browns while also being heated by the microwave radiation and heated through conduction through contact with heated air. The IR energy which is delivered to the outer surface of food by the lamps is sufficient to initiate browning caramelization in foods primarily made up of carbohydrates and Maillard reactions in foods primarily made up of protein. These reactions in food produce a texture and taste similar to that typically expected of conventional oven cooking rather than the bland boiled and steamed taste that microwave-only cooking tends to create.

In order to aid browning, sometimes an accessory browning tray is used, usually composed of glass or porcelain. It makes food crisp by oxidising the top layer until it turns brown. Ordinary plastic cookware is unsuitable for this purpose since it could melt.

Frozen dinners, pies, and microwave popcorn bags often contain a thin susceptor made from aluminium film in the packaging or included on a small paper tray. The metal film absorbs microwave energy efficiently and consequently becomes extremely hot and radiates in the infrared, concentrating the heating of oil for popcorn or even browning surfaces of frozen foods. Heating packages or trays containing susceptors are designed for single use and are discarded as waste.

[edit] Sizes

Portable or Desktop
This is the smallest size of microwave oven in the market. The common models measure around 28 centimetres (11 in) tall, 38 centimetres (15 in) wide and 25 centimetres (9.8 in) deep. Some of the experimental models on trial are as small as 19 centimetres (7.5 in) tall, 6 centimetres (2.4 in) wide and 15 centimetres (5.9 in) deep. Some of these use 12 V DC power supplies.
Compact
A compact microwave oven, also called small, is the smallest type typically available. Compacts are the most popular size of microwave oven, dominating the market. A typical model is no more than 50 centimetres (20 in) wide, 35 centimetres (14 in) deep and 30 centimetres (12 in) tall. These ovens are rated between 500 and 1000 watts and have less than 28 litres (0.99 cu ft) in capacity. These ovens are primarily used for reheating food and making microwave meals and popcorn. The largest models can accommodate 2 litres (1.8 imp qt) round casserole dishes and are suitable for light cooking. These ovens are not made to cook large amounts of food. Typically these models cost less than USD$100 (around £50).
Medium-capacity
These models' heights and depths are only marginally larger than compacts, but they are typically more than 50 centimetres (20 in) wide. Their interiors are typically between 30 and 45 litres (1.1 and 1.6 cu ft), and power ratings are 1000–1500 W. These are the common "family sized" microwave ovens. They tend to have a few more "auto-cook" features, and some incorporate grills or even conventional-oven heating elements.
Large-capacity
These are designed for cooking large meals. Large-capacity ovens can handle 25 by 35 centimetres (9.8 by 14 in) casserole dishes and cook tall items like roasts or turkey breasts, with a large number of "auto-cook" and precise temperature control measures. Large-capacity ovens normally use over 2000 W and have over 60 litres (2.1 cu ft) of capacity. These ovens are normally well over 50 centimetres (20 in) wide, as much as 50 centimetres (20 in) deep, and at least 30 centimetres (12 in) high.
Built-in
These are built into cabinetry and are typically more expensive than similar sized countertop models. Some models include exhaust fans to allow installation above cooktops.

[edit] Uses

Microwave ovens are generally used for time efficiency in both industrial applications such as restaurants and at home, rather than for cooking quality, although some modern recipes using microwave ovens rival recipes using traditional ovens and stoves. Professional chefs generally find microwave ovens to be of limited usefulness because browning, caramelization, and other flavour-enhancing reactions cannot occur due to the temperature range.[9] On the other hand, people who want fast cooking times can use microwave ovens to prepare food or to reheat stored food (including commercially available pre-cooked frozen dishes) in only a few minutes. Microwave Ovens can also be used to defrost items that will later be cooked by traditional methods, cutting the time it takes to defrost foods naturally. Microwave ovens are also useful for the ease in which they can perform some traditionally cumbersome kitchen tasks, such as softening butter or melting chocolate. Popcorn is an item popular with microwave oven users.

[edit] Efficiency

A microwave oven converts only part of its electrical input into microwave energy. A typical consumer microwave oven consumes 1100 W of electricity in producing 700 W of microwave power, an efficiency of 64%. The other 400 W are dissipated as heat, mostly in the magnetron tube. Additional power is used to operate the lamps, AC power transformer, magnetron cooling fan, food turntable motor and the control circuits. This waste heat, along with heat from the food, is exhausted as warm air through cooling vents.

A consideration for rating the efficiency of a microwave oven is to assess how much energy is wasted by using other forms of cooking. For example, when heating water for a coffee, a microwave oven heats just the mugful of water itself. When using a kettle, an element heats the kettle itself plus the water plus any extra water which is then left unused in the kettle, although electric kettles automatically shut off as soon as the water is boiled. Depending upon the size of the kettle and the amount of excess water, the efficiency of microwave ovens can be comparable, though if only the required amount of water is used electric kettles are generally more efficient.[10]

Cooking in conventional ovens entails heating the internal structure of the oven and the air it contains to cooking temperature and, additionally, it involves maintaining that temperature against convective and radiative losses of heat for a longer time than is usual with a microwave oven. The efficiencies of conventional cooking methods can be difficult to quantify but tend to be lower.

[edit] Benefits and safety features

Commercial microwave ovens all use a timer in their standard operating mode; when the timer runs out, the oven turns itself off.

Microwave ovens heat food without getting hot themselves. Taking a pot off a stove, with the exception of an induction cooktop, leaves a potentially dangerous heating element or trivet that will stay hot for some time. Likewise, when taking a casserole out of a conventional oven, one's arms are exposed to the very hot walls of the oven. A microwave oven does not pose this problem.

Food and cookware taken out of a microwave oven are rarely much hotter than 100 °C (212 °F). Cookware used in a microwave oven is often much cooler than the food because the cookware is transparent to microwaves; the microwaves heat the food directly and the cookware is indirectly heated by the food. Food and cookware from a conventional oven, on the other hand, are the same temperature as the rest of the oven; a typical cooking temperature is 180 °C (356 °F). That means that conventional stoves and ovens can cause more serious burns.

The lower temperature of cooking (the boiling point of water) is a significant safety benefit compared to baking in the oven or frying, because it eliminates the formation of tars and char, which are carcinogenic.[11] Microwave radiation also penetrates deeper than direct heat, so that the food is heated by its own internal water content. In contrast, direct heat can fry the surface while the inside is still cold. Pre-heating the food in a microwave oven before putting it into the grill or pan reduces the time needed to heat up the food and reduces the formation of carcinogenic char.

[edit] Heating characteristics

In a microwave oven, food may be heated for so short a time that it is cooked unevenly, since heat requires time to diffuse through food, and microwaves only penetrate to a limited depth. Microwave ovens are frequently used for reheating previously cooked food, and bacterial contamination may not be killed if the safe temperature is not reached, resulting in foodborne illness, as with all inadequate reheating methods.

Uneven heating in microwaved food can be partly due to the uneven distribution of microwave energy inside the oven, and partly due to the different rates of energy absorption in different parts of the food. The first problem is reduced by a stirrer, a type of fan that reflects microwave energy to different parts of the oven as it rotates, or by a turntable or carousel that turns the food; turntables, however, may still leave spots, such as the center of the oven, which receive uneven energy distribution. The location of dead spots and hot spots in a microwave can be mapped out by placing a damp piece of thermal paper in the oven. When the water saturated paper is subjected to the microwave radiation it becomes hot enough to cause the dye to be released which will provide a visual representation of the microwaves. If multiple layers of paper are constructed in the oven with a sufficient distance between them a three dimensional map can be created. Many store receipts are printed on thermal paper which allows this to be easily done at home.[12]

The second problem is due to food composition and geometry, and must be addressed by the cook by arranging the food so that it absorbs energy evenly, and periodically testing and shielding any parts of the food that overheat. In some materials with low thermal conductivity, where dielectric constant increases with temperature, microwave heating can cause localized thermal runaway. Under certain conditions, glass can exhibit thermal runaway in a microwave to the point of melting. Video

Due to this phenomenon, microwave ovens set at too-high power levels may even start to cook the edges of the frozen food, while the inside of the food remains frozen. Another case of uneven heating can be observed in baked goods containing berries. In these items, the berries absorb more energy than the drier surrounding bread and also cannot dissipate the heat due to the low thermal conductivity of the bread. The result is frequently the overheating of the berries relative to the rest of the food. The low power levels which mark the "defrost" oven setting are designed to allow time for heat to be conducted from areas which absorb heat more readily to those which heat more slowly. More even heating will take place by placing food off-centre on the turntable tray instead of exactly in the centre.

Microwave heating can be deliberately uneven by design. Some microwavable packages (notably pies) may contain ceramic or aluminum-flake containing materials which are designed to absorb microwaves and heat up (thereby converting microwaves to less penetrating infrared) which aids in baking or crust preparation by depositing more energy shallowly in these areas. Such ceramic patches affixed to cardboard are positioned next to the food, and are typically smokey blue or gray in colour, usually making them easily identifiable. Microwavable cardboard packaging may also contain overhead ceramic patches which function in the same way. The technical term for such a microwave-absorbing patch is a susceptor.

[edit] Effects on food and nutrients

Any form of cooking will destroy some nutrients in food, but the key variables are how much water is used in the cooking, how long the food is cooked, and at what temperature.[13] Microwave ovens do convert vitamin B12 from the active to inactive form, making approximately 30-40% of the B12 contained in foods unusable by mammals.[14]

Spinach retains nearly all its folate when cooked in a microwave[13]; in comparison, it loses about 77 percent when cooked on a stove, because food on a stove is typically boiled, leaching out nutrients.[13] Steamed vegetables tend to maintain more nutrients when cooked on a stovetop than in a microwave. Bacon cooked by microwave has significantly lower levels of carcinogenic nitrosamines than conventionally cooked bacon.[13][15][16][17][18][19]

[edit] Hazards

A microwaved DVD-R showing the effects of electrical discharge through its metal film

Liquids can superheat[20][21] when heated in a microwave oven in a container with a smooth surface. That is, the liquid reaches a temperature slightly above its normal boiling point without bubbles of vapour forming inside the liquid. The boiling process can start explosively when the liquid is disturbed, such as when the user takes hold of the container to remove it from the oven or while adding solid ingredients such as powdered creamer or sugar. This can result in spontaneous boiling (nucleation) which may be violent enough to eject the boiling liquid from the container and produce severe scalding. It is commonly, but wrongly, thought that only distilled water exhibits this behaviour.[22]

Closed containers and eggs can explode when heated in a microwave oven due to the increasing pressure of steam. Products that are heated too long can catch fire. Though this is inherent to any form of cooking, the rapid cooking and unattended nature of microwave oven use results in additional hazard. Microwave oven manuals frequently warn of such hazards. Because the microwave oven's cavity is enclosed and metal, fires are generally well contained. Simply switching off the oven and allowing the fire to consume available oxygen with the door closed will typically contain damage to the oven itself.

Any metal or conductive object placed into the microwave will act as an antenna to some degree, resulting in an electric current. This causes the object to act as a heating element. This effect varies with the object's shape and composition, and is sometimes utilized for cooking.

Any object containing pointed metal can create an electric arc (sparks) when microwaved. This includes cutlery, aluminum foil, ceramics decorated with metal, twist-ties containing metal wire, the metal wire carry-handles in paper Chinese take-out food containers, or almost any metal formed into a poorly conductive foil or thin wire; or into a pointed shape.[23] Forks are a good example: This is because the tines of the fork resonate with the microwave radiation and produce high voltage at the tips. This has the effect of exceeding the dielectric breakdown of air, about 3 megavolts per meter (3×106 V/m). The air forms a conductive plasma, which is visible as a spark. The plasma and the tines may then form a conductive loop, which may be a more effective antenna, resulting in a longer lived spark. When dielectric breakdown occurs in air, some ozone and nitrogen oxides are formed, both of which are unhealthy in large quantities.

A microwave oven with a metal shelf

It is possible for metal objects to be microwave-oven compatible, although experimentation by users is not encouraged. Microwaving an individual smooth metal object without pointed ends, for example, a spoon or shallow metal pan, usually does not produce sparking. Thick metal wire racks can be part of the interior design in microwave ovens (see illustration). In a similar way, the interior wall plates with perforating holes which allow light and air into the oven, and allow interior-viewing through the oven door, are all made of conductive metal formed in a safe shape.

The effect of microwaving thin metal films can be seen clearly on a Compact Disc or DVD (particularly the factory pressed type). The microwaves induce electric currents in the metal film, which heats up, melting the plastic in the disc and leaving a visible pattern of concentric and radial scars. It can also be illustrated by placing a radiometer inside the cooking chamber, creating plasma inside the vacuum chamber.

Another hazard is the resonance of the magnetron tube itself. If the microwave is run without an object to absorb the radiation, a standing wave will form. The energy is reflected back and forth between the tube and the cooking chamber. This may cause the tube to 'cook' itself and burn out. Thus dehydrated food, or food wrapped in metal which does not arc, is problematic without being an obvious fire hazard.

Some magnetrons have ceramic insulators with a piece of beryllium oxide (beryllia) added—these ceramics often appear somewhat pink or purple-colored. The beryllium in such oxides is a serious chemical hazard if crushed and ingested, e.g., inhaling dust. In addition, beryllia is listed as a confirmed human carcinogen by the IARC; therefore, broken ceramic insulators or magnetrons should not be handled. This is obviously only a danger if the microwave oven becomes physically damaged, i.e., cracked ceramics, or upon opening and handling the magnetron directly, and as such should not occur during normal usage.

Certain foods, such as grapes, if carefully arranged, can also produce arcing.[24] A naked flame, being made of conductive plasma, will do the same, so burning candles, matches, paper, etc should not be put in a microwave oven.

[edit] Microwave radiation

The microwaves emitted by the source in a microwave oven are confined in the oven by the material out of which microwave oven is constructed. Tests have shown confinement of the microwaves in commercially available ovens to be so nearly universal as to make routine testing unnecessary.[25] According to the United States Food and Drug Administration's Center for Devices and Radiological Health, a U.S. Federal Standard limits the amount of microwaves that can leak from an oven throughout its lifetime to 5 milliwatts of microwave radiation per square centimeter at approximately 2 inches from the surface of the oven.[26] This is far below the exposure level currently considered to be harmful to human health.

The radiation produced by a microwave oven is non-ionizing. It therefore does not have the cancer risks associated with ionizing radiation such as X-rays, ultraviolet light, and high-energy particles. Long-term rodent studies to assess cancer risk have so far failed to identify any carcinogenicity from 2.45 GHz microwave radiation even with chronic exposure levels, i.e., large fraction of one's life span, far larger than humans are likely to encounter from any leaking ovens.[27][28] However, with the oven door open, the radiation may cause damage by heating; as with any cooking device. Every microwave oven sold has a protective interlock so that it cannot be run when the door is open or improperly latched.

Pages

About this blog

This is the Blog for the all people who are interested in the technology and wants to test their IQ with respect to the technical knowledge.

Juicy Checks


WWF Wild Kids Checks
Spring Garden Checks


Frogs Checks
Destination ChecksRydell Forever ChecksMotley Crue ChecksGarden of Faith