Signal processing

Gating (telecommunication)

In telecommunication, the term gating has the following meanings: 1. * The process of selecting only those portions of a wave between specified time intervals or between specified amplitude limits. 2. * The controlling of signals by means of combinational logic elements. 3. * A process in which a predetermined set of conditions, when established, permits a second process to occur. This article incorporates public domain material from Federal Standard 1037C. General Services Administration. (in support of MIL-STD-188). * v * t * e (Wikipedia).

Video thumbnail

GPS, How does it work? | ICT #12

GPS has already become an integral part of our lives, and you can see a few useful applications from these examples. GPS is really an interesting technology. It uses a system of 24 satellites continuously orbiting the earth, and requires at least four satellites to track your location; it

From playlist Internet & Telecommunication Technology

Video thumbnail

How does your mobile phone work? | ICT #1

For most of us, a mobile phone is a part of our lives, but I am sure your curious minds have always been struck by such questions as to how a mobile phone makes a call, and why there are different generations of mobile communications. Let’s explore the technology behind mobile communicatio

From playlist Internet & Telecommunication Technology

Video thumbnail

GSM Network Elements - Part 1

GSM Network Elements - Part 1

From playlist Mobile Wireless Networks

Video thumbnail

Stanford Seminar - Saving energy and increasing density in information processing using photonics

David Miller Stanford University Wednesday, April 3, 2019 Information processing is increasingly limited by the energy required for interconnections and by the need for greater density of communications. Unfortunately, wires cannot scale to solve these problems. Optics and photonics allo

From playlist Stanford EE380-Colloquium on Computer Systems - Seminar Series

Video thumbnail

Net Neutrality in the US: Now What?

Comprehensive info. From 2014 when we narrowly avoided losing net neutrality, but they just keep trying, don't they? 2017 version of this video would be almost identical. Much links and fun times below: We've stopped things like this before! You have power if you bother to take it. Vide

From playlist Other cool videos

Video thumbnail

Top 10 Richest People In The World 2023 | World's Richest Billionaires | Simplilearn

This video on, "Top 10 Richest People In The World 2023," covers the world's top ten richest people as well as their net worth according to the current economy. Also it gives you an idea of how these people have utilized their marketing skills to enhance their empires from scratch. By the

From playlist Study Abroad

Video thumbnail

1982 "Telephone Exchange" Origins of Electronic Switching Technology (telecom; central office)

Vintage 1982: This Excellent Telephone History documentary describes the development of telephone switching technology and the evolution of the "Telephone Exchange." A British Telecom educational film. (Slightly edited from the original, run time 17 mins.) A “TELEPHONE EXCHANGE” is a te

From playlist Vintage Telephone; AT&T; Bell Labs; Telecommunications; Satellites:

Video thumbnail

Communication

If you are interested in learning more about this topic, please visit http://www.gcflearnfree.org/ to view the entire tutorial on our website. It includes instructional text, informational graphics, examples, and even interactives for you to practice and apply what you've learned.

From playlist Communicating Effectively

Video thumbnail

How does wiretapping work?

It’s surprisingly easy to listen to private conversations if you know how to hack satellites, bug devices or tap a phone line. Learn more at HowStuffWorks.com: http://people.howstuffworks.com/wiretapping.htm Share on Facebook: Share on Twitter: Subscribe: http://goo.gl/ZYI7Gt Visit our

From playlist Stuff About Technology

Video thumbnail

The Computer Chronicles - Careers in Computing (1986)

Special thanks to archive.org for hosting these episodes. Downloads of all these episodes and more can be found at: http://archive.org/details/computerchronicles

From playlist The Computer Chronicles 1986 Episodes

Video thumbnail

Products of random matrices: new results for finite and infinite size - Gernot Akemann

Gernot Akemann Universität Bielefeld March 19, 2014 For more videos, visit http://video.ias.edu

From playlist Mathematics

Video thumbnail

27c3: Terrorists Win - Exploiting Telecommunications Data Retention? (en)

Speakers: Kay Hamacher, Stefan Katzenbeisser Telecommunications data retention (TDR) has become a reality in most Western countries. Protagonists claim that the collection of massive amounts of data on the communication behavior of all individuals within a country would enable law enforce

From playlist 27C3: We come in peace

Video thumbnail

1996 Vintage UNISYS marketing film Computing in Society & Business - History

Rescued and restored from an old VHS tape, this 1996 UNISYS marketing video has some interesting bits of history. The film's creators used an odd way of slanting the still and video images, but it is presented here in its original format, unedited, for its historical and educational valu

From playlist Computer History: UNIVAC, Remington Rand, Sperry Rand

Video thumbnail

Everyday Engineering | Engineering and Technology in Your World | The Great Courses

https://wondrium.com/youtube/lp/t2/generic?utm_source=Video&utm_medium=Youtube&utm_campaign=145594 In 36 half-hour lectures, richly illustrated with instructive physical models, computer animations, and graphics designed by Professor Ressler himself, you start by learning how a house is p

From playlist Math and Statistics

Video thumbnail

How the US Government took control of the Internet | The Hacker Crackdown

The Hacker Crackdown - an 18-month long collaborative effort of the United States Secret Service and broken-up AT&T to take control of the Internet in the early 1990s. They stroke right at the heart of what makes the Internet such a powerful tool - the hacker culture. Hackers were people w

From playlist Decrypted Lies

Video thumbnail

the Internet (part 2)

An intro to the core protocols of the Internet, including IPv4, TCP, UDP, and HTTP. Part of a larger series teaching programming. See codeschool.org

From playlist The Internet

Video thumbnail

The Computer Chronicles - ETRE Monte Carlo Part 2 (1999)

Special thanks to archive.org for hosting these episodes. Downloads of all these episodes and more can be found at: http://archive.org/details/computerchronicles

From playlist The Computer Chronicles 1999 Episodes

Video thumbnail

1956 Western Union Telegraph: Telegram, Telex, Data Communication, Telephone (vintage film)

The following is a partially restored a vintage film (1956) about WESTERN UNION TELEGRAPH CO.: Vintage Electronic Communications: TELEGRAMS, Data Communications: More than 100 years before the Internet, Western Union was a world leader in data communication for millions of people. This

From playlist Vintage Telephone; AT&T; Bell Labs; Telecommunications; Satellites:

Related pages

Time | Set (mathematics)