Thursday, September 1, 2011

Internet could get 100 times faster

Two Nobel Prize winners have come up with a way to use graphene, a form of carbon that's also the thinnest material in the world, to potentially boost net speeds

British scientists have devised a way of using graphene, the thinnest material in the world, to capture and convert more light than previously, paving the way for advances in high-speed Internet and other communications. In a study appearing in Nature Communication, the team which included Nobel Prize winning scientists Andre Geim and Kostya Novoselov found that by combining graphene with metallic nanostructures, there was a 20-fold enhancement in the amount of light the graphene could harvest and convert into electrical power.

Graphene is a form of carbon just one atom thick and yet 100 times stronger than steel. "Many electronics companies consider graphene for their next-gen devices. This work certainly boosts graphene's chances," said Novoselov, a scientist who with Geim won the 2010 Nobel Prize for physics for graphene. Previous research has shown that electrical power can be generated by putting two closely spaced metallic wires on top of graphene and shining light on the whole structure, effectively making a simple solar cell. Due to the high mobility and velocity of the electrons in graphene, such graphene cell devices can be incredibly fast, tens or potentially hundreds of times faster than the rates in the fastest Internet cables in use today.



The main stumbling block to practical applications has so far been the cell devices low efficiency, the researchers said. The problem is that graphene absorbs little light, only around 4 per cent with the rest going through without contributing to the electrical power. In a collaboration between the Universites of Manchester and Cambridge, Novoselov's team found that they could solve this problem by combining graphene with tiny metallic structures known as plasmonic nanostructures, which are specially arranged on the graphene. By using the plasmonic enhancement, the light harvesting performance of graphene was boosted 20 times without sacrificing any of it's speed, they wrote in their study. Future efficiency could be improved even more, they said.

Andrea Ferrari of Cambridge University, who also worked on the team, said the findings show graphene's great potential in photonics and in developing electronic devices that channel and control light. He said the combination of it's special optical and electronic properties could now be fully exploited.




Tuesday, June 21, 2011

A basic guide to Internet

The Internet is a computer network made up of thousands of networks worldwide. No one knows exactly how many computers are connected to the Internet. It is certain, however, that these number in the millions.

No one is in charge of the Internet. There are organizations which develop technical aspects of this network and set standards for creating applications on it, but no governing body is in control. The Internet backbone, through which Internet traffic flows, is owned by private companies.

All computers on the Internet communicate with one another using the Transmission Control Protocol/Internet Protocol suite, abbreviated to TCP/IP. Computers on the Internet use a client/server architecture. This means that the remote server machine provides files and services to the user's local client machine. Software can be installed on a client computer to take advantage of the latest access technology.

An Internet user has access to a wide variety of services: electronic mail, file transfer, vast information resources, interest group membership, interactive collaboration, multimedia displays, real-time broadcasting, shopping opportunities, breaking news, and much more.

The Internet consists primarily of a variety of access protocols. Many of these protocols feature programs that allow users to search for and retrieve material made available by the protocol.


--------------------------------------------------------------------------------

COMPONENTS OF THE INTERNET

--------------------------------------------------------------------------------

WORLD WIDE WEB
The World Wide Web (abbreviated as the Web or WWW) is a system of Internet servers that supports hypertext to access several Internet protocols on a single interface. Almost every protocol type available on the Internet is accessible on the Web. This includes e-mail, FTP, Telnet, and Usenet News. In addition to these, the World Wide Web has its own protocol: HyperText Transfer Protocol, or HTTP. These protocols will be explained later in this document.

The World Wide Web provides a single interface for accessing all these protocols. This creates a convenient and user-friendly environment. It is no longer necessary to be conversant in these protocols within separate, command-level environments. The Web gathers together these protocols into a single system. Because of this feature, and because of the Web's ability to work with multimedia and advanced programming languages, the Web is the fastest-growing component of the Internet.

The operation of the Web relies primarily on hypertext as its means of information retrieval. HyperText is a document containing words that connect to other documents. These words are called links and are selectable by the user. A single hypertext document can contain links to many documents. In the context of the Web, words or graphics may serve as links to other documents, images, video, and sound. Links may or may not follow a logical path, as each connection is programmed by the creator of the source document. Overall, the Web contains a complex virtual web of connections among a vast number of documents, graphics, videos, and sounds.

Producing hypertext for the Web is accomplished by creating documents with a language called HyperText Markup Language, or HTML. With HTML, tags are placed within the text to accomplish document formatting, visual features such as font size, italics and bold, and the creation of hypertext links. Graphics and multimedia may also be incorporated into an HTML document. HTML is an evolving language, with new tags being added as each upgrade of the language is developed and released. The World Wide Web Consortium (W3C), led by Web founder Tim Berners-Lee, coordinates the efforts of standardizing HTML. The W3C now calls the language XHTML and considers it to be an application of the XML language standard.

The World Wide Web consists of files, called pages or home pages, containing links to documents and resources throughout the Internet.

The Web provides a vast array of experiences including multimedia presentations, real-time collaboration, interactive pages, radio and television broadcasts, and the automatic "push" of information to a client computer. Programming languages such as Java, JavaScript, Visual Basic, Cold Fusion and XML are extending the capabilities of the Web. A growing amount of information on the Web is served dynamically from content stored in databases. The Web is therefore not a fixed entity, but one that is in a constant state of development and flux.

For more complete information about the World Wide Web, see Understanding The World Wide Web.

E-MAIL
Electronic mail, or e-mail, allows computer users locally and worldwide to exchange messages. Each user of e-mail has a mailbox address to which messages are sent. Messages sent through e-mail can arrive within a matter of seconds.

A powerful aspect of e-mail is the option to send electronic files to a person's e-mail address. Non-ASCII files, known as binary files, may be attached to e-mail messages. These files are referred to as MIME attachments.MIME stands for Multimedia Internet Mail Extension, and was developed to help e-mail software handle a variety of file types. For example, a document created in Microsoft Word can be attached to an e-mail message and retrieved by the recipient with the appropriate e-mail program. Many e-mail programs, including Eudora, Netscape Messenger, and Microsoft Outlook, offer the ability to read files written in HTML, which is itself a MIME type.

TELNET
Telnet is a program that allows you to log into computers on the Internet and use online databases, library catalogs, chat services, and more. There are no graphics in Telnet sessions, just text. To Telnet to a computer, you must know its address. This can consist of words (locis.loc.gov) or numbers (140.147.254.3). Some services require you to connect to a specific port on the remote computer. In this case, type the port number after the Internet address. Example: telnet nri.reston.va.us 185.

Telnet is available on the World Wide Web. Probably the most common Web-based resources available through Telnet have been library catalogs, though most catalogs have since migrated to the Web. A link to a Telnet resource may look like any other link, but it will launch a Telnet session to make the connection. A Telnet program must be installed on your local computer and configured to your Web browser in order to work.

With the increasing popularity of the Web, Telnet has become less frequently used as a means of access to information on the Internet.

FTP
FTP stands for File Transfer Protocol. This is both a program and the method used to transfer files between computers. Anonymous FTP is an option that allows users to transfer files from thousands of host computers on the Internet to their personal computer account. FTP sites contain books, articles, software, games, images, sounds, multimedia, course work, data sets, and more.

If your computer is directly connected to the Internet via an Ethernet cable, you can use one of several PC software programs, such as WS_FTP for Windows, to conduct a file transfer.

FTP transfers can be performed on the World Wide Web without the need for special software. In this case, the Web browser will suffice. Whenever you download software from a Web site to your local machine, you are using FTP. You can also retrieve FTP files via search engines such as FtpFind. This option is easiest because you do not need to know FTP program commands.

E-MAIL DISCUSSION GROUPS
One of the benefits of the Internet is the opportunity it offers to people worldwide to communicate via e-mail. The Internet is home to a large community of individuals who carry out active discussions organized around topic-oriented forums distributed by e-mail. These are administered by software programs. Probably the most common program is the listserv.

A great variety of topics are covered by listservs, many of them academic in nature. When you subscribe to a listserv, messages from other subscribers are automatically sent to your electronic mailbox. You subscribe to a listserv by sending an e-mail message to a computer program called a listserver. Listservers are located on computer networks throughout the world. This program handles subscription information and distributes messages to and from subscribers. You must have a e-mail account to participate in a listserv discussion group.


Majordomo and Listproc are two other programs that administer e-mail discussion groups. The commands for subscribing to and managing your list memberships are similar to those of listserv.

USENET NEWS
Usenet News is a global electronic bulletin board system in which millions of computer users exchange information on a vast range of topics. The major difference between Usenet News and e-mail discussion groups is the fact that Usenet messages are stored on central computers, and users must connect to these computers to read or download the messages posted to these groups. This is distinct from e-mail distribution, in which messages arrive in the electronic mailboxes of each list member.

Usenet itself is a set of machines that exchanges messages, or articles, from Usenet discussion forums, called newsgroups. Usenet administrators control their own sites, and decide which (if any) newsgroups to sponsor and which remote newsgroups to allow into the system.

There are thousands of Usenet newsgroups in existence. While many are academic in nature, numerous newsgroups are organized around recreational topics. Much serious computer-related work takes place in Usenet discussions. A small number of e-mail discussion groups also exist as Usenet newsgroups.

The Usenet newsfeed can be read by a variety of newsreader software programs. For example, the Netscape suite comes with a newsreader program called Messenger. Newsreaders are also available as standalone products.

FAQ, RFC, FYI
FAQ stands for Frequently Asked Questions. These are periodic postings to Usenet newsgroups that contain a wealth of information related to the topic of the newsgroup. Many FAQs are quite extensive. FAQs are available by subscribing to individual Usenet newsgroups. A Web-based collection of FAQ resources has been collected by The Internet FAQ Consortium and is available at /http://www.faqs.org/.

RFC stands for Request for Comments. These are documents created by and distributed to the Internet community to help define the nuts and bolts of the Internet. They contain both technical specifications and general information.

FYI stands for For Your Information. These notes are a subset of RFCs and contain information of interest to new Internet users.

Links to indexes of all three of these information resources are available on the University Libraries Web site at /http://library.albany.edu/reference/faqs.html.

CHAT & INSTANT MESSENGING
Chat programs allow users on the Internet to communicate with each other by typing in real time. They are sometimes included as a feature of a Web site, where users can log into the "chat room" to exchange comments and information about the topics addressed on the site. Chat may take other, more wide-ranging forms. For example, America Online is well known for sponsoring a number of topical chat rooms.

Internet Relay Chat (IRC) is a service through which participants can communicate to each other on hundreds of channels. These channels are usually based on specific topics. While many topics are frivolous, substantive conversations are also taking place. To access IRC, you must use an IRC software program.

A variation of chat is the phenomenon of instant messenging. With instant messenging, a user on the Web can contact another user currently logged in and type a conversation. Most famous is America Online's Instant Messenger. ICQ, MSN and Yahoo are other commonly-used chat programs.

Other types of real-time communication are addressed in the tutorial Understanding the World Wide Web.

MUD/MUSH/MOO/MUCK/DUM/MUSE
MUD stands for Multi User Dimension. MUDs, and their variations listed above, are multi-user virtual reality games based on simulated worlds. Traditionally text based, graphical MUDs now exist. There are MUDs of all kinds on the Internet, and many can be joined free of charge. For more information, read one of the FAQs devoted to MUDs available at the FAQ site at

Sunday, June 12, 2011

Apple launches iCloud

Apple Inc CEO Steve Jobs has unveiled a new service for people to store their photos, music and other data online. Termed iCloud, the service challenges Google's cloud-based offerings, which already use services like Gmail, Calendar, Picasa, and Google Docs to let users see and edit the same document or photo across multiple devices.


Here's looking into what Apple iCloud is all about




iCloud storage & more

With iCloud, files will be stored by Apple in remote data centers -- known as the “cloud” in technology parlance -- and automatically synchronize. This means the same content is available from any Apple gadget, without it cluttering up users’ hard drives. The feature will include 5GB of free storage for users’ files, plus unlimited room for purchased apps and books, and recent photos. iCloud will be supported by new versions of applications like Calendar, Mail, and Contacts, and if information is changed for one contact, the new data goes to Apple's servers and is then pushed to the other devices.



Replaces MobileMe

Apple iCloud replaces the company's MobileMe service. Unlike MobileMe, iCloud will also allow users to sync their apps, documents, music and photos along with contacts, calendar and mails. This means that users will be able to use apps purchased using iPhone on iPad as well as restore them using the cloud service if something goes wrong. MobileMe allowed users to sync their contacts, calendar, and mail with a virtual harddisk for anywhere, anytime access.



It's free

Unlike MobieMe with iCloud, Apple revamps its approach and is offering the content-syncing service for free. iCloud will be available as a free download when Apple releases iOS5 later this year. MobileMe costs users $99 per year.



Music biggies on board

Ever the showman, the Apple CEO announced that the company has struck licensing agreements with all the major recording labels on the new music synching system. The company has signed deals with Warner Music Group Corp, Universal Music Group, EMI Group and Sony Music Entertainment.



Goes wireless

All future iTunes purchases also will be automatically sent to all the devices. None of the transfers will require devices to be plugged into a single computer. It will automatically happen over wireless connections.



iTunes Match

Apple has also introduced a new service called iTunes Match. The $25-per-year service is meant for music not bought through iTunes. Apple iTunes Match matches music ripped from CDs in a subscriber's personal music collection and makes it available online. The service will scan every song in users' libraries and match it with a copy in the cloud. This way customers don’t require to upload all their music song by song -- a requirement on services introduced by Google and Amazon. The limit of "iTunes Match" is 25,000 songs, and the service will update lesser-quality song files to iTunes standards. Also, iTunes purchases do not count against this limit.



Photos

iCloud offers an app called Photo Stream which will keep users' photos synchronized across devices. This means a photo taken on a yser's iPhone will automatically be downloaded to his computer and iPad. The feature also means that users will not have to do anything new to sync their photos.


Two new elements added to the periodic table

They exist for only seconds at most in real life, but they’ve gained immortality in chemistry: Two new elements have been added to the periodic table. The elements were recognised by an international committee of chemists and physicists. They’re called elements 114 and 116 for now permanent names and symbols will be chosen later. You’re not likely to run into any of this stuff. Scientists make them in labs by smashing atoms of other elements together to create the new ones.

“Our experiments last for many weeks, and typically, we make an atom every week or so,” said Ken Moody of the Lawrence Livermore National Laboratory, who’s part of the discovery team. In contrast to more familiar elements like carbon, gold and tin, the new ones are short-lived. Atoms of 114 disintegrate within a few seconds, while 116 disappears in just a fraction of a second, Moody said.

Both elements were discovered by a collaboration of scientists from Livermore and Russia. They made them by smashing calcium ions into atoms of plutonium or another element, curium. In the periodic table, the number of an element refers to the number of protons in the nucleus of an individual atom. Leading the list is hydrogen (H) with one. Sodium (Na) has 11, Iron (Fe) has 26, and silver (Ag) has 47.

In the past 250 years, new elements have been added to the table about once every 2 1/2 years on average, said Paul Karol of Carnegie Mellon University. He chaired the committee that recognised the new elements.


Facebook’s facial recognition tool under privacy lens

Facebook is to be probed by UK authorities, after it came under fire from users for bringing in facial recognition technology by stealth.

The world's leading social network began rolling out new technology earlier this week that automatically identifies and 'tags' people in photos uploaded to the website.


The feature has been expanded from a limited test run in the U.S. to be widened across all of the States and 'most countries', Facebook said on its official blog and, by default, it's turned on. The move has worried European privacy regulators including the UK Information Commissioner's Office.

In a statement, an ICO spokesperson said: 'As with any new technology, we would expect Facebook to be upfront about how people's personal information is being used.

'The privacy issues that this new software might raise are obvious and users should be given as much information as possible to give them the opportunity to make an informed choice about whether they wish to use it.

Caught A Virus?


If you've let your guard down--or even if you haven't--it can be hard to tell if your PC is infected. Here's what to do if you suspect the worst.


Heard this one before? You must run antivirus software and keep it up to date or else your PC will get infected, you'll lose all your data, and you'll incur the wrath of every e-mail buddy you unknowingly infect because of your carelessness.

You know they're right. Yet for one reason or another, you're not running antivirus software, or you are but it's not up to date. Maybe you turned off your virus scanner because it conflicted with another program. Maybe you got tired of upgrading after you bought Norton Antivirus 2001, 2002, and 2003. Or maybe your annual subscription of virus definitions recently expired, and you've put off renewing.

It happens. It's nothing to be ashamed of. But chances are, either you're infected right now, as we speak, or you will be very soon.

For a few days in late January, the Netsky.p worm was infecting about 2,500 PCs a day. Meanwhile the MySQL bot infected approximately 100 systems a minute (albeit not necessarily desktop PCs). As David Perry, global director of education for security software provider Trend Micro, puts it, "an unprotected [Windows] computer will become owned by a bot within 14 minutes."

Today's viruses, worms, and so-called bots--which turn your PC into a zombie that does the hacker's bidding (such as mass-mailing spam)--aren't going to announce their presence. Real viruses aren't like the ones in Hollywood movies that melt down whole networks in seconds and destroy alien spacecraft. They operate in the background, quietly altering data, stealing private operations, or using your PC for their own illegal ends. This makes them hard to spot if you're not well protected.

Is Your PC "Owned?"

I should start by saying that not every system oddity is due to a virus, worm, or bot. Is your system slowing down? Is your hard drive filling up rapidly? Are programs crashing without warning? These symptoms are more likely caused by Windows, or badly written legitimate programs, rather than malware. After all, people who write malware want to hide their program's presence. People who write commercial software put icons all over your desktop. Who's going to work harder to go unnoticed?

Other indicators that may, in fact, indicate that there's nothing that you need to worry about, include:

* An automated e-mail telling you that you're sending out infected mail. E-mail viruses and worms typically come from faked addresses.
* A frantic note from a friend saying they've been infected, and therefore so have you. This is likely a hoax. It's especially suspicious if the note tells you the virus can't be detected but you can get rid of it by deleting one simple file. Don't be fooled--and don't delete that file.

I'm not saying that you should ignore such warnings. Copy the subject line or a snippet from the body of the e-mail and plug it into your favorite search engine to see if other people have received the same note. A security site may have already pegged it as a hoax.

Sniffing Out an Infection

There are signs that indicate that your PC is actually infected. A lot of network activity coming from your system (when you're not actually using Internet) can be a good indicator that something is amiss. A good software firewall, such as ZoneAlarm, will ask your permission before letting anything leave your PC, and will give you enough information to help you judge if the outgoing data is legitimate. By the way, the firewall that comes with Windows, even the improved version in XP Service Pack 2, lacks this capability.

To put a network status light in your system tray, follow these steps: In Windows XP, choose Start, Control Panel, Network Connections, right-click the network connection you want to monitor, choose Properties, check "Show icon in notification area when connected," and click OK.

If you're interested in being a PC detective, you can sniff around further for malware. By hitting Ctrl-Alt-Delete in Windows, you'll bring up the Task Manager, which will show you the various processes your system is running. Most, if not all, are legit, but if you see a file name that looks suspicious, type it into a search engine and find out what it is.

Want another place to look? In Windows XP, click Start, Run, type "services.msc" in the box, and press Enter. You'll see detailed descriptions of the services Windows is running. Something look weird? Check with your search engine.

Finally, you can do more detective work by selecting Start, Run, and typing "msconfig" in the box. With this tool you not only see the services running, but also the programs that your system is launching at startup. Again, check for anything weird.

If any of these tools won't run--or if your security software won't run--that in itself is a good sign your computer is infected. Some viruses intentionally disable such programs as a way to protect themselves.

What to Do Next

Once you're fairly sure your system is infected, don't panic. There are steps you can take to assess the damage, depending on your current level of protection.

* If you don't have any antivirus software on your system (shame on you), or if the software has stopped working, stay online and go for a free scan at one of several Web sites. There's McAfee FreeScan, Symantec Security Check, and Trend Micro's HouseCall. If one doesn't find anything, try two. In fact, running a free online virus scan is a good way to double-check the work of your own local antivirus program. When you're done, buy or download a real antivirus program.
* If you have antivirus software, but it isn't active, get offline, unplug wires-- whatever it takes to stop your computer from communicating via the Internet. Then, promptly perform a scan with the installed software.
* If nothing seems to be working, do more research on the Web. There are several online virus libraries where you can find out about known viruses. These sites often provide instructions for removing viruses--if manual removal is possible--or a free removal tool if it isn't. Check out GriSOFT's Virus Encyclopedia, Eset's Virus Descriptions, McAffee's Virus Glossary, Symantec's Virus Encyclopedia, or Trend Micro's Virus Encyclopedia.

A Microgram of Prevention

Assuming your system is now clean, you need to make sure it stays that way. Preventing a breach of your computer's security is far more effective than cleaning up the mess afterwards. Start with a good security program, such Trend Micro's PC-Cillin, which you can buy for $50.

Don't want to shell out any money? You can cobble together security through free downloads, such as AVG Anti-Virus Free Edition, ZoneAlarm (a personal firewall), and Ad-Aware SE (an antispyware tool).

Just make sure you keep all security software up to date. The bad guys constantly try out new ways to fool security programs. Any security tool without regular, easy (if not automatic) updates isn't worth your money or your time.

Speaking of updating, the same goes for Windows. Use Windows Update (it's right there on your Start Menu) to make sure you're getting all of the high priority updates. If you run Windows XP, make sure to get the Service Pack 2 update. To find out if you already have it, right-click My Computer, and select Properties. Under the General tab, under System, it should say "Service Pack 2."

Here are a few more pointers for a virus-free life:


* Be careful with e-mail. Set your e-mail software security settings to high. Don't open messages with generic-sounding subjects that don't apply specifically to you from people you don't know. Don't open an attachment unless you're expecting it.
* If you have broadband Internet access, such as DSL or cable, get a router, even if you only have one PC. A router adds an extra layer of protection because your PC is not connecting directly with the Internet.
* Check your Internet ports. These doorways between your computer and the Internet can be open, in which case your PC is very vulnerable; closed, but still somewhat vulnerable; or stealthed (or hidden), which is safest. Visit Gibson Research's Web site and run the free ShieldsUP test to see your ports' status. If some ports show up as closed--or worse yet, open--check your router's documentation to find out how to hide them.


Bandwidth Explained.

This is well written explanation about bandwidth, very useful info.





Most hosting companies offer a variety of bandwidth options in their plans. So exactly what is bandwidth as it relates to web hosting? Put simply, bandwidth is the amount of traffic that is allowed to occur between your web site and the rest of the internet. The amount of bandwidth a hosting company can provide is determined by their network connections, both internal to their data center and external to the public internet.


Network Connectivity

The internet, in the most simplest of terms, is a group of millions of computers connected by networks. These connections within the internet can be large or small depending upon the cabling and equipment that is used at a particular internet location. It is the size of each network connection that determines how much bandwidth is available. For example, if you use a DSL connection to connect to the internet, you have 1.54 Mega bits (Mb) of bandwidth. Bandwidth therefore is measured in bits (a single 0 or 1). Bits are grouped in bytes which form words, text, and other information that is transferred between your computer and the internet.

If you have a DSL connection to the internet, you have dedicated bandwidth between your computer and your internet provider. But your internet provider may have thousands of DSL connections to their location. All of these connection aggregate at your internet provider who then has their own dedicated connection to the internet (or multiple connections) which is much larger than your single connection. They must have enough bandwidth to serve your computing needs as well as all of their other customers. So while you have a 1.54Mb connection to your internet provider, your internet provider may have a 255Mb connection to the internet so it can accommodate your needs and up to 166 other users (255/1.54).


Traffic

A very simple analogy to use to understand bandwidth and traffic is to think of highways and cars. Bandwidth is the number of lanes on the highway and traffic is the number of cars on the highway. If you are the only car on a highway, you can travel very quickly. If you are stuck in the middle of rush hour, you may travel very slowly since all of the lanes are being used up.

Traffic is simply the number of bits that are transferred on network connections. It is easiest to understand traffic using examples. One Gigabyte is 2 to the 30th power (1,073,741,824) bytes. One gigabyte is equal to 1,024 megabytes. To put this in perspective, it takes one byte to store one character. Imagine 100 file cabinets in a building, each of these cabinets holds 1000 folders. Each folder has 100 papers. Each paper contains 100 characters - A GB is all the characters in the building. An MP3 song is about 4MB, the same song in wav format is about 40MB, a full length movie can be 800MB to 1000MB (1000MB = 1GB).

If you were to transfer this MP3 song from a web site to your computer, you would create 4MB of traffic between the web site you are downloading from and your computer. Depending upon the network connection between the web site and the internet, the transfer may occur very quickly, or it could take time if other people are also downloading files at the same time. If, for example, the web site you download from has a 10MB connection to the internet, and you are the only person accessing that web site to download your MP3, your 4MB file will be the only traffic on that web site. However, if three people are all downloading that same MP at the same time, 12MB (3 x 4MB) of traffic has been created. Because in this example, the host only has 10MB of bandwidth, someone will have to wait. The network equipment at the hosting company will cycle through each person downloading the file and transfer a small portion at a time so each person's file transfer can take place, but the transfer for everyone downloading the file will be slower. If 100 people all came to the site and downloaded the MP3 at the same time, the transfers would be extremely slow. If the host wanted to decrease the time it took to download files simultaneously, it could increase the bandwidth of their internet connection (at a cost due to upgrading equipment).


Hosting Bandwidth

In the example above, we discussed traffic in terms of downloading an MP3 file. However, each time you visit a web site, you are creating traffic, because in order to view that web page on your computer, the web page is first downloaded to your computer (between the web site and you) which is then displayed using your browser software (Internet Explorer, Netscape, etc.) . The page itself is simply a file that creates traffic just like the MP3 file in the example above (however, a web page is usually much smaller than a music file).

A web page may be very small or large depending upon the amount of text and the number and quality of images integrated within the web page. For example, the home page for CNN.com is about 200KB (200 Kilobytes = 200,000 bytes = 1,600,000 bits). This is typically large for a web page. In comparison, Yahoo's home page is about 70KB.


How Much Bandwidth Is Enough?

It depends (don't you hate that answer). But in truth, it does. Since bandwidth is a significant determinant of hosting plan prices, you should take time to determine just how much is right for you. Almost all hosting plans have bandwidth requirements measured in months, so you need to estimate the amount of bandwidth that will be required by your site on a monthly basis

If you do not intend to provide file download capability from your site, the formula for calculating bandwidth is fairly straightforward:

Average Daily Visitors x Average Page Views x Average Page Size x 31 x Fudge Factor

If you intend to allow people to download files from your site, your bandwidth calculation should be:

[(Average Daily Visitors x Average Page Views x Average Page Size) +
(Average Daily File Downloads x Average File Size)] x 31 x Fudge Factor

Let us examine each item in the formula:

Average Daily Visitors - The number of people you expect to visit your site, on average, each day. Depending upon how you market your site, this number could be from 1 to 1,000,000.

Average Page Views - On average, the number of web pages you expect a person to view. If you have 50 web pages in your web site, an average person may only view 5 of those pages each time they visit.

Average Page Size - The average size of your web pages, in Kilobytes (KB). If you have already designed your site, you can calculate this directly.

Average Daily File Downloads - The number of downloads you expect to occur on your site. This is a function of the numbers of visitors and how many times a visitor downloads a file, on average, each day.

Average File Size - Average file size of files that are downloadable from your site. Similar to your web pages, if you already know which files can be downloaded, you can calculate this directly.

Fudge Factor - A number greater than 1. Using 1.5 would be safe, which assumes that your estimate is off by 50%. However, if you were very unsure, you could use 2 or 3 to ensure that your bandwidth requirements are more than met.

Usually, hosting plans offer bandwidth in terms of Gigabytes (GB) per month. This is why our formula takes daily averages and multiplies them by 31.


Summary

Most personal or small business sites will not need more than 1GB of bandwidth per month. If you have a web site that is composed of static web pages and you expect little traffic to your site on a daily basis, go with a low bandwidth plan. If you go over the amount of bandwidth allocated in your plan, your hosting company could charge you over usage fees, so if you think the traffic to your site will be significant, you may want to go through the calculations above to estimate the amount of bandwidth required in a hosting plan.

All mIRC Commands

/ Recalls the previous command entered in the current window.
/! Recalls the last command typed in any window.
/action {action text} Sends the specifed action to the active channel or query window.
/add [-apuce] {filename.ini} Loads aliases, popups, users, commands, and events.
/ame {action text} Sends the specifed action to all channels which you are currently on.
/amsg {text} Sends the specifed message to all channels which you are currently on.
/auser {level} {nick|address} Adds a user with the specified access level to the remote users
list.
/auto [on|off|nickname|address] Toggles auto-opping of a nick or address or sets it on or off
totally.
/away {away message} Sets you away leave a message explaining that you are not currently paying
attention to IRC.
/away Sets you being back.
/ban [#channel] {nickname} [type] Bans the specified nick from the curent or given channel.
/beep {number} {delay} Locally beeps 'number' times with 'delay' in between the beeps. /channel
Pops up the channel central window (only works in a channel).
/clear Clears the entire scrollback buffer of the current window.
/ctcp {nickname} {ping|finger|version|time|userinfo|clientinfo} Does the given ctcp request on
nickname.
/closemsg {nickname} Closes the query window you have open to the specified nick.
/creq [ask | auto | ignore] Sets your DCC 'On Chat request' settings in DCC/Options.
/dcc send {nickname} {file1} {file2} {file3} ... {fileN} Sends the specified files to nick.
/dcc chat {nickname} Opens a dcc window and sends a dcc chat request to nickname.
/describe {#channel} {action text} Sends the specifed action to the specified channel window.
/dde [-r] {service} {topic} {item} [data] Allows DDE control between mIRC and other
applications.
/ddeserver [on [service name] | off] To turn on the DDE server mode, eventually with a given
service name.
/disable {#groupname} De-activates a group of commands or events.
/disconnect Forces a hard and immediate disconnect from your IRC server. Use it with care.
/dlevel {level} Changes the default user level in the remote section.
/dns {nickname | IP address | IP name} Uses your providers DNS to resolve an IP address.
/echo [nickname|#channel|status] {text} Displays the given text only to YOU on the given place
in color N.
/enable {#groupname} Activates a group of commands or events.
/events [on|off] Shows the remote events status or sets it to listening or not.
/exit Forces mIRC to closedown and exit.
/finger Does a finger on a users address.
/flood [{numberoflines} {seconds} {pausetime}] Sets a crude flood control method.
/fsend [on|off] Shows fsends status and allows you to turn dcc fast send on or off.
/fserve {nickname} {maxgets} {homedirectory} [welcome text file] Opens a fileserver.
/guser {level} {nick} [type] Adds the user to the user list with the specified level and
address type.
/help {keyword} Brings up the Basic IRC Commands section in the mIRC help file.
/ignore [on|off|nickname|address] Toggles ignoring of a nick or address or sets it on or off
totally.
/invite {nickname} {#channel} Invites another user to a channel.
/join {#channel} Makes you join the specified channel.
/kick {#channel} {nickname} Kicks nickname off a given channel.
/list [#string] [-min #] [-max #] Lists all currently available channels, evt. filtering for
parameters.
/log [on|off] Shows the logging status or sets it on or off for the current window.
/me {action text} Sends the specifed action to the active channel or query window.
/mode {#channel|nickname} [[+|-]modechars [parameters]] Sets channel or user modes.
/msg {nickname} {message} Send a private message to this user without opening a query window.
/names {#channel} Shows the nicks of all people on the given channel.
/nick {new nickname} Changes your nickname to whatever you like.
/notice {nick} {message} Send the specified notice message to the nick.
/notify [on|off|nickname] Toggles notifying you of a nick on IRC or sets it on or off totally.
/onotice [#channel] {message} Send the specified notice message to all channel ops.
/omsg [#channel] {message} Send the specified message to all ops on a channel.
/part {#channel} Makes you leave the specified channel.
/partall Makes you leave all channels you are on.
/ping {server address} Pings the given server. NOT a nickname.
/play [-c] {filename} [delay] Allows you to send text files to a window.
/pop {delay} [#channel] {nickname} Performs a randomly delayed +o on a not already opped nick.
/protect [on|off|nickname|address] Toggles protection of a nick or address or sets it on or off
totally.
/query {nickname} {message} Open a query window to this user and send them the private message.
/quit [reason] Disconnect you from IRC with the optional byebye message.
/raw {raw command} Sends any raw command you supply directly to the server. Use it with care!!
/remote [on|off] Shows the remote commands status or sets it to listening or not.
/rlevel {access level} Removes all users from the remote users list with the specified access
level.
/run {c:\path\program.exe} [parameters] Runs the specified program, evt. with parameters.
/ruser {nick[!]|address} [type] Removes the user from the remote users list.
/save {filename.ini} Saves remote sections into a specified INI file.
/say {text} Says whatever you want to the active window.
/server [server address [port] [password]] Reconnects to the previous server or a newly
specified one.
/sound [nickname|#channel] {filename.wav} {action text} Sends an action and a fitting sound.
/speak {text} Uses the external text to speech program Monologue to speak up the text.
/sreq [ask | auto | ignore] Sets your DCC 'On Send request' settings in DCC/Options.
/time Tells you the time on the server you use.
/timer[N] {repetitions} {interval in seconds} {command} [| {more commands}] Activates a timer.
/topic {#channel} {newtopic} Changes the topic for the specified channel.
/ulist [{|}]{level} Lists all users in the remote list with the specified access levels.
/url [-d] Opens the URL windows that allows you to surf the www parallel to IRC.
/uwho [nick] Pops up the user central with information about the specified user.
/who {#channel} Shows the nicks of all people on the given channel.
/who {*address.string*} Shows all people on IRC with a matching address.
/whois {nickname} Shows information about someone in the status window.
/whowas {nickname} Shows information about someone who -just- left IRC.
/wavplay {c:\path\sound.wav} Locally plays the specified wave file.
/write [-cidl] {filename} [text] To write the specified text to a .txt file.




All about movie tags. (What is a DVDRip,CAM,etc.)

Original Sources

CAM -
A cam is a theater rip usually done with a digital video camera. A mini tripod is sometimes used, but a lot of the time this wont be possible, so the camera make shake. Also seating placement isn't always idle, and it might be filmed from an angle. If cropped properly, this is hard to tell unless there's text on the screen, but a lot of times these are left with triangular borders on the top and bottom of the screen. Sound is taken from the onboard microphone of the camera, and especially in comedies, laughter can often be heard during the film. Due to these factors picture and sound quality are usually quite poor, but sometimes we're lucky, and the theater will be fairly empty and a fairly clear signal will be heard.



TELESYNC (TS) - A telesync is the same spec as a CAM except it uses an external audio source (most likely an audio jack in the chair for hard of hearing people). A direct audio source does not ensure a good quality audio source, as a lot of background noise can interfere. A lot of the times a telesync is filmed in an empty cinema or from the projection booth with a professional camera, giving a better picture quality. Quality ranges drastically, check the sample before downloading the full release. A high percentage of Telesyncs are CAMs that have been mislabeled.



TELECINE (TC) -
A telecine machine copies the film digitally from the reels. Sound and picture should be very good, but due to the equipment involved and cost telecines are fairly uncommon. Generally the film will be in correct aspect ratio, although 4:3 telecines have existed. A great example is the JURASSIC PARK 3 TC done last year. TC should not be confused with TimeCode , which is a visible counter on screen throughout the film.



SCREENER (SCR) -
A pre VHS tape, sent to rental stores, and various other places for promotional use. A screener is supplied on a VHS tape, and is usually in a 4:3 (full screen) a/r, although letterboxed screeners are sometimes found. The main draw back is a "ticker" (a message that scrolls past at the bottom of the screen, with the copyright and anti-copy telephone number). Also, if the tape contains any serial numbers, or any other markings that could lead to the source of the tape, these will have to be blocked, usually with a black mark over the section. This is sometimes only for a few seconds, but unfortunately on some copies this will last for the entire film, and some can be quite big. Depending on the equipment used, screener quality can range from excellent if done from a MASTER copy, to very poor if done on an old VHS recorder thru poor capture equipment on a copied tape. Most screeners are transferred to VCD, but a few attempts at SVCD have occurred, some looking better than others.



DVD-SCREENER (DVDscr) -Same premise as a screener, but transferred off a DVD. Usually letterbox , but without the extras that a DVD retail would contain. The ticker is not usually in the black bars, and will disrupt the viewing. If the ripper has any skill, a DVDscr should be very good. Usually transferred to SVCD or DivX/XviD.



DVDRip - A copy of the final released DVD. If possible this is released PRE retail (for example, Star Wars episode 2) again, should be excellent quality. DVDrips are released in SVCD and DivX/XviD.



VHSRip -Transferred off a retail VHS, mainly skating/sports videos and XXX releases.



TVRip -TV episode that is either from Network (capped using digital cable/satellite boxes are preferable) or PRE-AIR from satellite feeds sending the program around to networks a few days earlier (do not contain "dogs" but sometimes have flickers etc) Some programs such as WWF Raw Is War contain extra parts, and the "dark matches" and camera/commentary tests are included on the rips. PDTV is capped from a digital TV PCI card, generally giving the best results, and groups tend to release in SVCD for these. VCD/SVCD/DivX/XviD rips are all supported by the TV scene.



WORKPRINT (WP) -A workprint is a copy of the film that has not been finished. It can be missing scenes, music, and quality can range from excellent to very poor. Some WPs are very different from the final print (Men In Black is missing all the aliens, and has actors in their places) and others can contain extra scenes (Jay and Silent Bob) . WPs can be nice additions to the collection once a good quality final has been obtained.



DivX Re-Enc -A DivX re-enc is a film that has been taken from its original VCD source, and re-encoded into a small DivX file. Most commonly found on file sharers, these are usually labeled something like Film.Name.Group(1of2) etc. Common groups are SMR and TND. These aren't really worth downloading, unless you're that unsure about a film u only want a 200mb copy of it. Generally avoid.



Watermarks -
A lot of films come from Asian Silvers/PDVD (see below) and these are tagged by the people responsible. Usually with a letter/initials or a little logo, generally in one of the corners. Most famous are the "Z" "A" and "Globe" watermarks.



Asian Silvers / PDVD -
These are films put out by eastern bootleggers, and these are usually bought by some groups to put out as their own. Silvers are very cheap and easily available in a lot of countries, and its easy to put out a release, which is why there are so many in the scene at the moment, mainly from smaller groups who don't last more than a few releases. PDVDs are the same thing pressed onto a DVD. They have removable subtitles, and the quality is usually better than the silvers. These are ripped like a normal DVD, but usually released as VCD.






Formats

VCD -
VCD is an mpeg1 based format, with a constant bitrate of 1150kbit at a resolution of 352x240 (NTCS). VCDs are generally used for lower quality transfers (CAM/TS/TC/Screener(VHS)/TVrip(analogue) in order to make smaller file sizes, and fit as much on a single disc as possible. Both VCDs and SVCDs are timed in minutes, rather than MB, so when looking at an mpeg, it may appear larger than the disc capacity, and in reality u can fit 74min on a CDR74.



SVCD -
SVCD is an mpeg2 based (same as DVD) which allows variable bit-rates of up to 2500kbits at a resolution of 480x480 (NTSC) which is then decompressed into a 4:3 aspect ratio when played back. Due to the variable bit-rate, the length you can fit on a single CDR is not fixed, but generally between 35-60 Mins are the most common. To get a better SVCD encode using variable bit-rates, it is important to use multiple "passes". this takes a lot longer, but the results are far clearer.



XVCD/XSVCD -
These are basically VCD/SVCD that don't obey the "rules". They are both capable of much higher resolutions and bit-rates, but it all depends on the player to whether the disc can be played. X(S)VCD are total non-standards, and are usually for home-ripping by people who don't intend to release them.



KVCD Thanks for lardo4life for the info
KVCD is a modification to the standard MPEG-1 and MPEG-2 GOP structure and Quantization Matrix. It enables you to create over 120 minutes of near DVD quality video, depending on your material, on a single 80 minute CD-R/CD-RW. We have published these specifications as KVCDx3, our official resolution, which produce 528x480 (NTSC) and 528x576 (PAL) MPEG-1 variable bit rate video, from 64Kbps to 3,000Kbps. Using a resolution of 352x240 (NTSC) or 352x288 (PAL), it's possible to encode video up to ~360 minutes of near VCD quality on a single 80 minute CD-R. The mpeg files created will play back in most modern standalone DVD players. You must burn the KVCD MPEG files as non-standard VCD or non-standard SVCD (depends on your player) with Nero or VCDEasy.



DivX / XviD -
DivX is a format designed for multimedia platforms. It uses two codecs, one low motion, one high motion. most older films were encoded in low motion only, and they have problems with high motion too. A method known as SBC (Smart Bit-rate Control) was developed which switches codecs at the encoding stage, making a much better print. The format is Ana orphic and the bit-rate/resolution are interchangeable. Due to the higher processing power required, and the different codecs for playback, its unlikely we'll see a DVD player capable of play DivX for quite a while, if at all. There have been players in development which are supposedly capable, but nothing has ever arisen. The majority of PROPER DivX rips (not Re-Encs) are taken from DVDs, and generally up to 2hours in good quality is possible per disc. Various codecs exist, most popular being the original Divx3.11a and the new XviD codecs.



CVD -
CVD is a combination of VCD and SVCD formats, and is generally supported by a majority of DVD players. It supports MPEG2 bit-rates of SVCD, but uses a resolution of 352x480(ntsc) as the horizontal resolution is generally less important. Currently no groups release in CVD.



DVD-R -
Is the recordable DVD solution that seems to be the most popular (out of DVD-RAM, DVD-R and DVD+R). it holds 4.7gb of data per side, and double sided discs are available, so discs can hold nearly 10gb in some circumstances. SVCD mpeg2 images must be converted before they can be burnt to DVD-R and played successfully. DVD>DVDR copies are possible, but sometimes extras/languages have to be removed to stick within the available 4.7gb.



MiniDVD -
MiniDVD/cDVD is the same format as DVD but on a standard CDR/CDRW. Because of the high resolution/bit-rates, its only possible to fit about 18-21 mins of footage per disc, and the format is only compatible with a few players.






Misc Info

Regional Coding -
This was designed to stop people buying American DVDs and watching them earlier in other countries, or for older films where world distribution is handled by different companies. A lot of players can either be hacked with a chip, or via a remote to disable this.



RCE -
RCE (Regional Coding Enhancement) was designed to overcome "Multiregion" players, but it had a lot of faults and was overcome. Very few titles are RCE encoded now, and it was very unpopular.



Macrovision -
Macrovision is the copy protection employed on most commercial DVDs. Its a system that will display lines and darken the images of copies that are made by sending the VHS signals it can't understand. Certain DVD players (for example the Dansai 852 from Tescos) have a secret menu where you can disable the macrovision, or a "video stabaliser" costs about 30UKP from Maplin (www.maplin.co.uk)



NTSC/PAL -
NTSC and PAL are the two main standards used across the world. NTSC has a higher frame rate than pal (29fps compared to 25fps) but PAL has an increased resolution, and gives off a generally sharper picture. Playing NTSC discs on PAL systems seems a lot easier than vice-versa, which is good news for the Brits An RGB enabled scart lead will play an NTSC picture in full colour on most modern tv sets, but to record this to a VHS tape, you will need to convert it to PAL50 (not PAL60 as the majority of DVD players do.) This is either achieved by an expensive converter box (in the regions of £200+) an onboard converter (such as the Dansai 852 / certain Daewoos / Samsung 709 ) or using a World Standards VCR which can record in any format.



News Sites -
There are generally 2 news sites for film release for p2p and they are:

nforce - VCD Help
Code:
http://www.vcdhelp.com/

Code:
http://www.nforce.nl.




About Release Files

RARset -
The movies are all supplied in RAR form, whether its v2 (rar>.rxx) or v3 (part01.rar > partxx.rar) form.



BIN/CUE -
VCD and SVCD films will extract to give a BIN/CUE. Load the .CUE into notepad and make sure the first line contains only a filename, and no path information. Then load the cue into Nero/CDRWin etc and this will burn the VCD/SVCD correctly. TV rips are released as MPEG. DivX files are just the plain DivX - .AVI



NFO -
An NFO file is supplied with each movie to promote the group, and give general iNFOrmation about the release, such as format, source, size, and any notes that may be of use. They are also used to recruit members and acquire hardware for the group.

SFV -
Also supplied for each disc is an SFV file. These are mainly used on site level to check each file has been uploaded correctly, but are also handy for people downloading to check they have all the files, and the CRC is correct. A program such as pdSFV or hkSFV is required to use these files.






Usenet Information

Access -
To get onto newsgroups, you will need a news server. Most ISPs supply one, but this is usually of poor retention (the amount of time the files are on server for) and poor completition (the amount of files that make it there). For the best service, a premium news server should be paid for, and these will often have bandwidth restrictions in place.



Software -
You will need a newsreader to access the files in the binary newsgroups. There are many different readers, and its usually down to personal opinion which is best. Xnews / Forte Agent / BNR 1 / BNR 2 are amongst the popular choices. Outlook has the ability to read newsgroups, but its recommended to not use that.



Format -
Usenet posts are often the same as those listed on VCDQUALiTY (i.e., untouched group releases) but you have to check the filenames and the description to make sure you get what you think you are getting. Generally releases should come down in .RAR sets. Posts will usually take more than one day to be uploaded, and can be spread out as far as a week.



PAR files -
As well as the .rxx files, you will also see files listed as .pxx/.par . These are PARITY files. Parity files are common in usenet posts, as a lot of times, there will be at least one or two damaged files on some servers. A parity file can be used to replace ANY ONE file that is missing from the rar set. The more PAR files you have, the more files you can replace. You will need a program called SMARTPAR for this.






Scene Tags

PROPER -
Due to scene rules, whoever releases the first Telesync has won that race (for example). But if the quality of that release is fairly poor, if another group has another telesync (or the same source in higher quality) then the tag PROPER is added to the folder to avoid being duped. PROPER is the most subjective tag in the scene, and a lot of people will generally argue whether the PROPER is better than the original release. A lot of groups release PROPERS just out of desperation due to losing the race. A reason for the PROPER should always be included in the NFO.



SUBBED -
In the case of a VCD, if a release is subbed, it usually means it has hard encoded subtitles burnt throughout the movie. These are generally in malaysian/chinese/thai etc, and sometimes there are two different languages, which can take up quite a large amount of the screen. SVCD supports switch able subtitles, so some DVDRips are released with switch able subs. This will be mentioned in the NFO file if included.



UNSUBBED -
When a film has had a subbed release in the past, an Unsubbed release may be released

LIMITED -
A limited movie means it has had a limited theater run, generally opening in less than 250 theaters, generally smaller films (such as art house films) are released as limited.



INTERNAL -
An internal release is done for several reasons. Classic DVD groups do a lot of .INTERNAL. releases, as they wont be dupe'd on it. Also lower quality theater rips are done INTERNAL so not to lower the reputation of the group, or due to the amount of rips done already. An INTERNAL release is available as normal on the groups affiliate sites, but they can't be traded to other sites without request from the site ops. Some INTERNAL releases still trickle down to IRC/Newsgroups, it usually depends on the title and the popularity. Earlier in the year people referred to Centropy going "internal". This meant the group were only releasing the movies to their members and site ops. This is in a different context to the usual definition.



STV -
Straight To Video. Was never released in theaters, and therefore a lot of sites do not allow these.



OTHER TAGS -

*WS* for widescreen (letterbox)
*FS* for Fullscreen.



RECODE -
A recode is a previously released version, usually filtered through TMPGenc to remove subtitles, fix color etc. Whilst they can look better, its not looked upon highly as groups are expected to obtain their own sources.



REPACK -
If a group releases a bad rip, they will release a Repack which will fix the problems.



NUKED -
A film can be nuked for various reasons. Individual sites will nuke for breaking their rules (such as "No Telesyncs") but if the film has something extremely wrong with it (no soundtrack for 20mins, CD2 is incorrect film/game etc) then a global nuke will occur, and people trading it across sites will lose their credits. Nuked films can still reach other sources such as p2p/usenet, but its a good idea to check why it was nuked first in case. If a group realise there is something wrong, they can request a nuke.

NUKE REASONS :: this is a list of common reasons a film can be nuked for (generally DVDRip)

** BAD A/R ** :: bad aspect ratio, ie people appear too fat/thin
** BAD IVTC ** :: bad inverse telecine. process of converting framerates was incorrect.
** INTERLACED ** :: black lines on movement as the field order is incorrect.



DUPE -
Dupe is quite simply, if something exists already, then theres no reason for it to exist again without proper reason.

Monday, June 6, 2011

Some LAZY RULES we have adapted in our lives

1.If you Spill Water,
It will Eventually Dry

2.Don't Charge your Cell Phone;
Until It Says:"5% Charge" Remaining

3.If Its Not on the first;
Search Page of Google, It doesn't Exist

4.Why Make your Bed When;
you're just gonna get Back in It again?

5.If you're Late, don't Go.

6.If you Drop the Ice Cube,
Just Kick It Under the fridge.

Which one is your favorite ?

Saturday, June 4, 2011

Ajinomoto linked to weight gain

The flavour enhancer monosodium glutamate (MSG), most often associated with Chinese food and after-dinner headaches, may also be enhancing waistlines, a new study finds. Researchers found that people who eat more MSG popularly known as Ajinomoto in India are more likely to be overweight or obese. And the increased risk wasn’t simply because people were stuffing themselves with MSG-rich foods. The link between high MSG intake and being overweight held even after accounting for the number of calories people ate. MSG is one of the world’s most widely used food additives. MSG is considered safe, but some people complain of headaches, nausea and other reactions.

Scientists have speculated that people may eat larger helpings of food with MSG because it just tastes better. Other evidence suggests that MSG might interfere with signalling systems that regulate appetite. In the latest research, published in the American Journal of Clinical Nutrition, He and his colleagues followed more than 10,000 adults in China for about 5.5 years on average.  The researchers measured MSG intake directly by before-and-after weighing of products, such as bottles of soy sauce, to see how much people ate. They also asked people to estimate their intake over three 24-hour periods.

Men and women who ate the most MSG (a median of 5 grams a day) were about 30 per cent more likely to become overweight by the end of the study than those who ate the least amount of the flavouring (less than a half-gram a day), the researchers found. After excluding people who were overweight at the start of the study, the risk rose to 33 per cent.

Mosquitoes suckered in new malaria research

In the biggest lab breakthrough against malaria in years, scientists said they had identified odour molecules that baffle blood-thirsty mosquitoes. The molecules disrupt carbon-dioxide sensors that alert mosquitoes to exhaled breath, which signals the presence of a human nearby, the team reported. The work could lead to revolutionary but low-cost chemicals to confuse, deter or trap mosquitoes, it said. They could be invaluable in poor tropical countries, providing an alternative to DEET, a skin repellent that is expensive, needs repeat applications and is showing worrying signs of resistance.

“These chemicals offer powerful advantages as potential tools for reducing mosquito-human contact and can lead to the development of new insect repellents and lures,” said Anandasankar Ray, of the University of California, who led the study. Traps for mosquitoes already exist, in the form of dry ice, gas cylinders of carbon dioxide or propane combustion. But these gadgets are too bulky and far too expensive to be used for mosquito control. Future traps could be convenient and easily replenishable.

The odour molecules that they identified disrupt receptor cells for carbon dioxide located in tiny, antennae-like appendages close to the mosquito’s mouth. These receptors are activated by a whiff of carbon dioxide, triggering a signal in the brain that prompts the insect to fly upwind, following the puffs of CO2 until they reach its source. Mosquito also use heat sensors and sight to home in on their meal.

GoFlex Slim portable HDD

The GoFlex Slim portable hard drive from Seagate reduces the thickness of the drive to just 9mm. The drive features a 7200RPM 2.5mm hard drive enclosed in a anodised aluminium casing. The drive is also USB 3.0 compatible for optimum speeds.

The device retails at Rs 4,500. For more details, visit the Web site at www.seagate.com


Friday, June 3, 2011

Microsoft previews new Windows 8 OS

The new system seems to have moved away from a window-based layout to a more touch-friendly, tile based system which will be the same for both PCs and tablets.


Microsoft gave a sneak preview of Windows 8, a next generation operating system designed to work on both personal computers and touchscreen tablets. Steven Sinofsky, president of Microsoft's Windows Division, demonstrated some of the features of the operating system code named "Windows 8" at the D9 technology conference hosted by All Things Digital.

"Laptops, slates, desktops - all can run on one operating system," Sinofsky said.
"Things that people see work on an iPad, I think we can do that and then bring with it all of the benefits that you have with Windows," he said.

"We have an approach that is different but builds on the value of an operating system that sells 400 million or so units a year. Windows 8 builds upon many of the features in Microsoft's latest mobile operating system for smartphones, Windows Phone 7, including the use of touch tiles instead of icons to launch and navigate between applications," he said.

In a blog post, Julie Larson-Green, corporate vice president of Windows Experience, said Windows 8 is a "re-imagining of Windows, from the chip to the interface. "A Windows 8 based PC is really new kind of device, one that scales from touch only small screens through to large screens, with or without a keyboard and mouse," Larson-Green said. "Although the new user interface is designed and optimized for touch, it works equally well with a mouse and keyboard," she added. Larson-Green said Microsoft would reveal more features of Windows 8, which uses Internet Explorer 10 as a Web browser, at its developers conference in Anaheim, California, opening on September 13, 2011.

Steven Sinofsky
Windows powers most of the world's personal computers but the Redmond, Washington based software giant has been slow to enter a fast growing tablet market dominated for the moment by Apple's iPad. Many other tablet makers have opted to Google's Android software and Forrester Research analyst Sarah Rotman Epps said a "well-formed Windows 8 will pose serious problems to Android." The iPad was expected to remain the tablet market leader but "Microsoft will be a contender," she said. "What's more, they'll have a product that can compete across devices, and a foothold in the post-PC future."

Microsoft typically aims for 24 to 36 months between major Windows versions, suggesting a launch date for the next OS between October 2011 and October 2012. Sinofsky said Microsoft is working to integrate Internet telephone service Skype into the new system, following its agreement to purchase the company last month.







Sunday, May 29, 2011

What your name says

Does your name begin with: A -
You are not particularly romantic, but you are interested in action. You mean business. With you, what you see is what you get. You have no patience for flirting and can't be bothered with someone who is trying to be coy, cute, demure, and subtly enticing. You are an up-front person. You often don't get hints & you ever pass any. Your mate's physical attractiveness is important your physical needs are your primary concern. You tend to be very selfish, & not very emotional. You and your needs matter most. Others & their feelings come second. Your choices aren't very good & can only lead to trouble. You are very self satisfied & egoistic.

Does your name begin with: B -
You give off vibes of lazy sensuality. You enjoy being romanced, wined, and dined. You are very happy to receive gifts as an expression of the affection of your lover. You want to be pampered and know how to pamper your mate. You are private in your expression of endearments, and particular when it comes to love. You will hold off until everything meets with your approval. You can control your appetite & feelings. You require new sensations and experiences. You are willing to experiment.

Does your name begin with: C -
You are a very social individual, and it is important to you to have a relationship. You require closeness and togetherness. You want the object of your affection to be socially acceptable and good-looking. You see your lover as a friend and companion. You are very sensual, needing someone to appreciate and almost worship you. When this cannot be achieved, you have the ability to hold out on affection until you receive this. You are an expert at controlling your Desires and doing without.

Does your name begin with: D -
Once you get it into your head that you want someone, you move full steam ahead in yoursuit. You do not give up your quest easily. You are nurturing and caring. If someone has a problem, this turns you on. You are highly passionate, loyal, and intense in your involvements, sometimes possessive and jealous. You are very sharp & talented often with a sense of humor. When people bother to look deep inside they cannot resist what they see. The eccentric and unusual, having a free and open attitude stimulates you. You get jealous of other people and lose you temper.

Does your name begin with: E -
Your greatest need is to talk. If your date is not a good listener, you have trouble relating. A person must be intellectually stimulating or you are not interested sexually. You need a friend for A lover and a companion. You hate disharmony and disruption, but you do enjoy a good argument once in a while-it seems to stir things up. You flirt a lot, for the challenge is more important. But once you give your heart away, you are uncompromisingly loyal. You will fall asleep with a good book. sometimes, in fact, you prefer a good book to a lover.

Does your name begin with: F -
You are idealistic and romantic, putting your lover on a pedestal. You look for the very best mate you can find. You are a flirt, yet once committed, you are very loyal. You are sensuous and privately passionate. Publicly, you can be showy, extravagant, and gallant. You are a born romantic. Dramatic love scenes are a favorite fantasy past time. You can be a very generous lover.

Does your name begin with: G -
You are fastidious, seeking perfection within yourself and your lover. You respond to a lover who is your intellectual equal or superior, and one who can enhance your status. You are sensuous and know how to reach the peak of stimulation, because you work at it meticulously. You can be extremely active-never tiring out. Your duties and responsibilities take precedence over everything else. You may have difficulty getting emotionally close to people.

Does your name begin with: H -
You seek a mate who can enhance your zest for life, fun & everything you seek for. You will be very generous to your lover once you have attained a commitment. You are very affectionate & very strong. Your gifts are actually an investment in your partner. Before the commitment, though, you tend to be very careful with your every move and equally cautious in your involvement's often as you believe that you have to look out for yourself. You are a sensual and patient lover. You will hold off till everything meets your full approval. You are a perfectionist, hard to satisfy and strong in your beliefs. Not influentuable, you always stand your ground. People can always count on you to stand by them in a crisis. You are a dreamer w/ a passion for life.

Does your name begin with: I -
You have a great need to be loved, appreciated... even worshipped. You enjoy luxury, sensuality, and pleasures of the flesh. You like necking spend hours just touching, feeling & exploring. You look for lovers who know what they are doing. You are not interested in an amateur, unless that amateur wants a tutor. You are fussy and exacting about having your desires satisfied. You are Willing to experiment and try new modes of expression. You bore easily and thus require adventure and change. Your commitments don't last very long & you often tend to stray. Loyalty is not one of your strong points. You are more sensual than sexual, but you are sometimes downright lustful.

Does your name begin with: J -
You are blessed with a great deal of physical energy. When used for a good cause there is nothing to stop you, except maybe that they aren't always used for the good. (You could dance all night.) You respond to the thrill of the chase and the challenge of the mating game. You can carry on great romances in your head. At heart you are a roamer and need to set out on your own Every so often. You will carry on long-distance relationships with ease. You are idealistic and need to believe in love. You have a need to be nurtured deep within.

Does your name begin with: K -
You are secretive, self-contained, and shy. You are very sexy, sensual, and passionate, but you do not let on to this. Only in intimate privacy will this part of your nature reveal itself. When it gets down to the nitty-gritty, you are an expert. You know all the little tricks of the trade, can play any role or any game, and take your love life very seriously. You don't fool around. You have the patience to wait for the right person to come along. You are very generous & giving, often selfless. You are kind nature & sweet, which is found to be attractive by many. You are a good friend.

Does your name begin with: L -
You can be very romantic, attached to the glamour of love. Having a partner is of paramount importance to you. You are free in your expression of love and are willing to take chances, try new sexual experiences and partners, provided it's all in good taste. Brains turn you on. You must feel that your partner is intellectually stimulating, otherwise you will find it difficult to sustain the relationship. You require loving, cuddling, wining and dining to know that you're being appreciated.

Does your name begin with: M -
You are emotional and intense. When involved in a relationship, you throw your entire being into it. Nothing stops you; there are no holds barred. You are all consuming and rave someone who is equally passionate and intense. You believe in total freedom. You are willing to try anything and everything. Your supply of energy is inexhaustible. You also enjoy mothering your mate. You often have the greatest love affairs all by yourself, in your head. You are very imaginative.

Does your name begin with: N -
You may appear innocent, unassuming and shy; but we know that appearances can lie. When it comes to sex, you are no novice but something of a skilled technician. You can easily go to extremes, though, running the gamut from insatiability to boredom with the whole idea of love. You can be highly critical of you mate, seeking perfection in both of you. It is not easy to find someone who can meet your standards. You have difficulty expressing emotions and drawing close to lovers. You are often selfish, thinking you are always right no matter what. You never give in. Winning is your prime desire- at any cost. You often forget friends and family and you live for the moment.

Does your name begin with: O -
You are very interested in fun activities yet secretive and shy about your desires. You can re-channel much of your energy into making money and/or seeking we. You can easily have extended periods of celibacy. You are a passionate, compassionate lover, requiring the same qualities from your mate. Love is serious business; thus you demand intensity, diversity, and are willing to try anything or anyone. Sometimes your passions turn to possessiveness, which must be kept in check.

Does your name begin with: P -
You are very conscious of social proprieties. You wouldn't think of doing anything that might harm your image or reputation. Appearances count. Therefore, you require a good-looking partner. You also require an intelligent partner.. Oddly enough, you may view your partner as your enemy...a good fight stimulates those vibes. You are relatively free of hang-ups. You are willing to experiment and try new ways of doing things. You are very social and sensual; you enjoy flirting and need a good deal of physical gratification.

Does your name begin with: Q -
You require constant activity and stimulation. You have tremendous physical energy. It is not easy for a partner to keep up with you. You are an enthusiastic lover and tend to be attracted to people because of their ethnic groups. You need romance, hearts and flowers, and lots of conversation to turn you on and keep you going.

Does your name begin with: R -
You are a no-nonsense, action-oriented individual. You need someone who can keep pace with you and who is your intellectual equal-the smarter the better. You are turned on more Quickly by a great mind than by a great body. However, physical attractiveness is very important to you. You have to be proved to be worthy for a partner. You are privately very sexy, but you do not show this outwardly. If your new lover is not all that great in *** games, you are willing to serve as a teacher. *** Is important; you can be a very demanding playmate.

Does your name begin with: S -
For you, it is pleasure before business. You can be romantically idealistic to a fault and is capable of much sensuality. But you never loose control of your emotions. Once you make the commitment you stick like glue. You could get jealous and possessive. You tend to be very selfish often regarding yourself as the only human being on the planet. You like being the center of attention. You are very caring sensitive, private & sometimes very passive. Turned on by soft lights, romantic thoughts. When it gets down to the nitty-gritty, you are an expert. You know all the little tricks of the trade, can play any role, or any game, and take your love life very seriously. You don't fool around. You have the patience to wait for the right person to come along. You are very generous & giving, often selfless. You are kind nature & sweet, which is found to be attractive by many. You are a good friend.

Does your name begin with: T -
You are very sensitive, private & sometimes very passive. You like someone who takes the lead. You get turned on by music, soft lights & romantic thoughts. You fantasize & tend to fall in & out of lovesoon. When in love you are romantic, idealistic, mushy & extremely. You enjoy having your senses & your feelings stimulated, titillated & teased. You are a great flirt. You can Make your relationships fit your dreams, all in your own head. Once you put your mind to something you manage to stand by it and see your dreams through. You aren't very good at expressing your feelings. You like things your own way. You do not like change; you like to hold on to things. This may not always be good because if given opportunity things may develop into great things. You work your way to the top. Attention must be given to what others say because even though you don't want to hear it their advice may turn out to save your life.

Does your name begin with: U -
You are enthusiastic & at your happiest when in love. When not in love you're in love w/ love a/ways looking for someone to adore. You see romance as challenge. You are a roamer & Needs adventure excitement & freedom. You enjoy giving gifts & looking good. You are willing to put others feelings above yours.

Does your name begin with: V -
You are individualistic & you need freedom, space & excitement. You wait till you know someone well before committing yourself. Knowing someone means psyching her/him out. You feel a need to get into his/her head to see what makes him tick. You are attracted to eccentric types. You believe that age is no barrier. You are good at responding to danger, fear & suspense.

Does your name begin with: W -
You are very proud, determined & refuse to take no for an answer when it comes to love. Your ego is at stake all the time. You are romantic, idealistic, often in love with love itself, not seeing Your partner for who she or he really is. You feel deeply about love & tends to throw all of yourself into a relationship. Nothing is too good for your lover. You like playing love games.

Does your name begin with: X -
You need constant stimulation because you get bored quickly. You can handle more than 1 relationship at a time with ease. You can't shut off your mind. You can do 2 things at once. You are very talented.

Does your name begin with: Y -
You are sensual & very independent. If you can't have it your way, you will forget the whole thing. You want to control your relationships, which doesn't work out too well. You respond to physical stimulation. However if you can make money you will give up the pleasures of the flesh for the moment. You have a need to prove yourself the best. You want feedback on your performance. You are open, stimulating & romantic.

Does your name begin with: Z -
You are very romantic but show feels that to love means to suffer. You wind up serving your mate & attracting people who have unusual trouble. You see yourself as a lover's saviour.

Where did I come from ?

One day, Little Johnny asked his father, "Where did I come from?"

His father knew this question would be coming someday and was prepared. He gave Little Johnny all the facts about mommies and daddies making babies. He told it very carefully and honestly, so Little Johnny would understand.

Instead, Little Johnny just frowned in puzzlement.

Finally, his father asked, "Johnny, what are you so puzzled about?"

Little Johnny remarked, "That's sure strange... Billy said he came from California!"

Who wants to be a CEO?

The new CEO of a large high tech corporation was meeting the CEO who was stepping down.The ex-CEO handed his successor three envelopes, with this advice...
"Open these if you run up against a problem you don't think you can solve," he said.

Things went along pretty smoothly, but six months later, sales took a nose-dive and he was really catching a lot of heat. At his wit's end, he remembered the envelopes. He went to his drawer and took out the firs envelope and read, "Blame your predecessor."

Calling a press conference immediately, he tactfully but decisively laid he blame at the feet of the previous CEO.  Satisfied with his comments, Wall Street and the press responded positively, sales began an uptick and the crisis was soon behind him.

However, about 18 months later, the company was again experiencing a noticible dip in sales, combined with significant production delays... With some trepidation, the CEO quickly opened the second envelope. This time the message read simply: "Reorganize."

This he did, and the company quickly rebounded. After several profitable quarters, alas, the company once again fell on difficult times...

Now, calm and confident, the experienced CEO went to his office, closed the door and opened the third envelope. This message said, "Prepare three envelopes."

The Whole Truth. Roflmao !

At school, a boy was told by a classmate that most adults are hiding
at least one dark secret, and that this makes it very easy to blackmail them
by saying, "I know the whole truth". The boy decides to go home
and try it out. He goes home, and as he is greeted by his mother he says, "I
know the whole truth."

His mother quickly hands him $20 and says, "Just don't tell your father."
Quite pleased, the boy waits for his father to get home from work, and
greets him with, "I know the whole truth." The father promptly hands him $40
and says, "Please don't say a word to your mother." Very pleased, the boy is
on his way to school the next day, when he sees the mailman at his front
door.
The boy greets him by saying, "I know the whole truth." The mailman drops
the mail, opens his arms, and says, "Then come give your FATHER a big hug."

Are you fluent in English ?

If you think you are fluent in speaking English ... Try this without a stutter! . . . .

Mr. See and Mr. Soar were old friends. See owned a saw and Soar owned a seesaw. Now See's saw sawed Soar's seesaw before Soar saw See, which made Soar sore. Had Soar seen See's saw before See saw Soar's seesaw, then See's saw would not have sawed Soar's seesaw. But See saw Soar and Soar's seesaw before Soar saw See's saw, so See's saw sawed Soar's seesaw. It was a shame to let See see Soar so sore just because See's saw sawed Soar's seesaw.

Advice for software engineers. :)

Software Engineers are advised not to spend too much time sitting before computers because the following things may happen in their future.

1. When asked about a bus schedule, you wonder if it is 16 or 32 bits.

2. When counting objects, you count 0,1,2,3,4,5,6,7,8,9,A,B,C,D..

3. At the superstore, you check to see if a kilogram is 1024 grams, a litre is 1024 mls.

4. When you dream, you are going to dream in 256 palettes of 256 colors.

5. When your wife says "If you don't turn off that damn machine and come to sleep, then I am going to divorce you!", you are going to scream at her for omitting the "else" clause.

6. You try to sleep , and think : sleep(8 * 60 * 60); /* sleep for 8 hours */

7. When you are reading a book, you would look for the scroll bar to get to the next page.

8. If you want to call somebody you pick up the phone and start dialing an IP number.

9. You are going to look for an icon to double-click, to open your bedroom window.

10. When you go to balance your check book, you would discover that you'll be doing the math in octal.

11.You would look for a trash can icon to throw garbage.

12.When you get in the elevator you would double-click the button for the floor you want to go.