Skip to main content

What is Rendering?


You would have come across this word many times but know why the meaning and the use of rendering in the computer. If answer No, then this blog is for you.


Rendering just means “To Draw”.

In computer point of view, its process in which code data is processed by the computer processor or the graphic card and converted into image which can be display on the screen.

In technical term :Rendering or image synthesis is the automatic process of generating a photo realistic or non-photo realistic image from a 2D or 3D model by means of computer programs.

Rendering technique are of two type:
1.Real-Time Rendering
2. Pre-Rendering

1.Real-Time Rending: You would have experience this rendering process if you have played a high graphic game which require graphic processing unit. In this process the rendering is done on the go, where image must be created at rapid pace. Because user interaction is high in such environment, real time image creation is required.

2. Pre-Rendering: This technique is used where we are not concern about the speed. Image calculation are performed by multi core central processing unit instead of dedicated graphic card. This rendering is done is animation and visual effect.

Whatever a computer displays on the screen is rendered in real time: The computer is computing all the coded data fast enough to display and update images with no perceivable lag. However, the computer can only render so much content complexity at once to continue the real-time rendering perception. The term rendering is used in video editing and processing to describe the computer taking extra time to render graphics and generate a full-motion-video playback version that works in real time.

Why is GPU used in rendering?


Processor is design to handle huge task very quickly one at a time. And rendering is processor in which multiple small task to be done. Here come the part of GPU who can handle small task simultaneously because GPU are design to handle thousand of small task which make it better suit for rendering.

Comments

Popular posts from this blog

Secure Network(Week 4)

Network hardening is the process of securing a network by reducing its potential vulnerabilities through configuration changes and taking specific steps.   Implicit deny is a network security concept where anything not explicitly permitted or allowed should be denied. Analyzing logs is the practice of collecting logs from different networks and sometimes client devices on your network, then performing an automated analysis on them. Correlation analysis is the process of taking log data from different systems and matching events across the systems. Flood guards provide protection against Dos or denial of service attacks. EAP-TLS is an authentication type supported by EAP that uses TLS to provide mutual authentication of both the client and the authenticating server.   if you really want to lock down your network, you can implement 802.1x . DHCP Snooping Attack Why WEP Encryption fall apart? A general concept in security and encryption is to never send the plain ...

Troubleshooting and debugging

Troubleshooting is the process of identifying, analyzing, and solving problems.  Debugging is the process of identifying, analyzing, and removing bugs in a system. We sometimes use troubleshooting and debugging interchangeably.  But generally, we say troubleshooting when we're fixing problems in the system running the application, and debugging when we're fixing the bugs in the actual code of the application. Debuggers let us follow the code line by line, inspect changes in variable assignments, interrupt the program when a specific condition is met, and more. System calls are the calls that the programs running on our computer make to the running kernel.   A reproduction case is a way to verify if the problem is present or not. Where to check for log file in OS? On Linux , you'd read system logs like /var/log/syslog and user-specific logs like the .xsession-errors file located in the user's home directory. On MacOs , on top of the system logs, you'd go through...

Authentication Authorization Accounting(week 3)

Identification is the idea of describing an entity uniquely. Biometric authentication is the process of using unique physiological characteristics of an individual to identify them. C.R.L(Certificate revocation list) :This is a signed list published by the CA which defines certificates that have been explicitly revoked. Lightweight Directory Access Protocol(LDAP): LDAP is an open industry-standard protocol for accessing and maintaining directory services. Authentication is related to verifying the identity a user, authorization pertains to describing what the user account has access to or doesn't have access to. An access control list or ACL , is a way of defining permissions or authorizations for objects.  RADIUS or Remote Authentication Dial-In User Service , is a protocol that provides AAA services for users on a network.It's a very common protocol used to manage access to internal networks, WiFi networks, email services and VPN services. when a client wants to access a r...