Holographic storage is a mass storage technology that uses three-dimensional holographic images to enable more information to be stored in a much smaller space. The technology uses holograms which are created when a light from a single laser beam is split into two beams; the signal beam (which carries the data) and the reference beam. In holographic storage, at the point where the reference beam and the data carrying signal beam intersect, the hologram is recorded in the light sensitive storage medium.
When you create a variance in the reference beam angle or media position then hundreds of unique holograms can be recorded in the same volume of material. To read the stored holographic data, the reference beam is deflected off the hologram reconstructing the stored information. This hologram is then projected onto a detector that reads the entire data page of over one million bits at once. [Adapted from InPhase Technologies]
- home computer
A personal computer specially configured for use in a home rather than an office. Typically, home computers have only medium -power microprocessors, but are equipped with a full complement of multimedia devices. In addition, manufacturers often bundle recreational and educational software with home computers.
- home page
The main page of a Web site. Typically, the home page serves as an index or table of contents to other documents stored at the site.
- homogeneous register architecture
In homogeneous register architectures, the selection of an instruction has no connection whatsoever with the types of registers that the instruction uses. Selecting instructions for non-homogeneous register architectures usually requires allocating register types for the operands and resulting data. As a consequence, the IR patterns associated with instructions in this kind of processor should carry […]
A network of honeypots.
An Internet-attached server that acts as a decoy, luring in potential hackers in order to study their activities and monitor how they are able to break into a system. Honeypots are designed to mimic systems that an intruder would like to break into but limit the intruder from having access to an entire network. If […]