Picture of admin

admin

Administrator

Articles by this author

Interpolation

What is data interpolation? Data interpolation is a mathematical and statistical method used to estimate unknown values within a range of known data. In other words, interpolation allows for the calculation of an intermediate value between two points or between

Sprite

Would you like to become a video game programmer? Then you probably know the term sprite. No, we're not talking about any refreshment, but about a fundamental and essential element in the first versions of Super Mario Bros or Prince of Persia, among others. At the end,

Partition

Hard disk partitioning is an important concept in computing, as it allows you to organise the storage of a disk or solid state drive (SSD). The process, in general terms, is fairly straightforward, as it consists of dividing the physical space on the

Decoherence

Quantum decoherence is a fundamental phenomenon that occurs at the intersection of quantum mechanics and classical physics. This process describes how a quantum system loses its quantum characteristics when interacting with its environment, becoming a system that behaves classically. The

Cryptography

Cryptography is a discipline that has become essential in the digital age, where information security has become a priority. Derived from the Greek word kryptos, meaning «hidden», cryptography is concerned with protecting data by means of techniques that ensure that

Tor

You've probably heard about the dark web, the darkness it inhabits and how dangerous it can be to surf this network. You've probably also felt a curiosity that's hard to contain, so you've probably asked yourself: “How can I connect to the dark web?

Hyper-automation

What is hyper-automation and how is anything beyond automation possible? Throughout history, the steam engine was the significant change in the First Industrial Revolution, electricity in the Second, and digitalisation in the Third. And

End-to-end encryption

End-to-end encryption (E2EE) is a secure communication method that protects the confidentiality and integrity of data transmitted between two points (endpoints) of a network. In end-to-end encryption, the data is encrypted at

Scroll to Top