Wednesday, 26 October 2011

Save energy with Toshiba’s E205 Laptop


Good: Bright, energy saving; HDTV wireless transmission.
Bad: Mouse pad is stiff and plastic frame is little bad.
Intermediate: Not suitable for every user.
What does Reader’s say:-

Toshiba recently introduced E205-S1904 Satellite laptop into the market. Costs, $999 laptop with good performance and can project signal beam to HDTV, but has many mechanical problems which don’t make it the ultimate product according to many users.
Toshiba designed the E205 for the sake of Best Buy's "Blue Label" program. In this the computer has made as per the easy usage of any user. Different comments passed for the product: The laptop's royal blue, molded-plastic case feels cheap, compared to other Toshiba models. Touching it makes it look your fingerprints; this is due to its glossy look.
The E205 features a repulsive keyboard and big touchpad, left and right mouse buttons are very hard to reach.
Glossy look
On the left side, there are jacks for a headphone and microphone, as well as a USB input, heat-dissipation vents are at the instead of the bottom. The E205's right side includes a slot-loading DVD player, a conventional USB port, and another USB input that accepts eSata cable, too. There's also an HD multimedia (HDMI) output.

how to project IMAGE DISPLAY ON TV

There’s an ambient-light sensor that automatically adjusts the brightness settings on the energy-saving, 14.1-inch, HD-resolution, LED-backlit screen. To the right of the keyboard, there's a touch-control panel to adjust the volume and playback of music and videos. The keyboard is nicely backlit as well, which helps in low-light situations.
Toshiba is one of the first PC makers to use a new Intel (INTC) technology called Wireless Display, or WiDi. It creates a wireless network that pairs the laptop with a Netgear (NTGR) Push2TV receiver that's included with the computer's purchase. This lets users easily display images from the E205 on a big-screen TV. Once the connection is established, it takes just a button push in Intel's Wireless Display software to initiate the transfer.
There are a couple of drawbacks. The technology doesn't currently work with copy-protected DVDs. And the laptop's display is disabled during the transfer, so users can't do something else on the laptop—such as deal with e-mail—while watching videos or listening to music.
Showing Back Ports
Overall performance was intermediate. The laptop runs on Intel's new Core i5 processor and includes a generous 4 gigabytes of memory, which can be expanded up to 8 GB. The 500-GB hard drive is generous for a laptop in the E205's price range. Battery life is a fairly typical 3.5 hours when running video at normal screen brightness.

SOME GRAPHICS CHIPS are not latest

It has 64-bit version of Microsoft's (MSFT) Windows 7 Home Premium operating system, which processes data in larger chunks than the 32-bit version. The E205 had no problems running multiple programs simultaneously. It worked without a hitch when I played video and listened to music at the same time, using Apple's (AAPL) iTunes software.
Intel's integrated graphics chip always seems to need a few seconds to work out the kinks when playing video, and this system was no different. An odd quirk of the E205 and other WiDi-equipped laptops is that users can't easily add more potent graphics chips from Nvidia (NVDA) or ATI (AMD). That could limit the machine's appeal for video game players. Intel executives say PC makers can create software that would let them add other graphics chips to their machines.
The E205 comes with a trial version of Microsoft Office and Works and Symantec's (SYMC) Norton Internet Security. There's also Best Buy's Software Installer application, which contains a list of programs and Web sites—including Netflix (NFLX), Roxio Creator (SNIC), and The Wall Street Journal (NWS)—that can quickly be installed. It's a neat way to shop for software to personalize your computer without being hobbled by preinstalled clutter you don't want.
The Toshiba E205's design may not work for everyone, but it's a powerful and affordable laptop whose innovation and ease of use packs are good.


Good: Bright, energy saving; HDTV wireless transmission.
Bad: Mouse pad is stiff and plastic frame is little bad.
Intermediate: Not suitable for every user.
What does Reader’s say:-

Toshiba recently introduced E205-S1904 Satellite laptop into the market. Costs, $999 laptop with good performance and can project signal beam to HDTV, but has many mechanical problems which don’t make it the ultimate product according to many users.
Toshiba designed the E205 for the sake of Best Buy's "Blue Label" program. In this the computer has made as per the easy usage of any user. Different comments passed for the product: The laptop's royal blue, molded-plastic case feels cheap, compared to other Toshiba models. Touching it makes it look your fingerprints; this is due to its glossy look.
The E205 features a repulsive keyboard and big touchpad, left and right mouse buttons are very hard to reach.
Glossy look
On the left side, there are jacks for a headphone and microphone, as well as a USB input, heat-dissipation vents are at the instead of the bottom. The E205's right side includes a slot-loading DVD player, a conventional USB port, and another USB input that accepts eSata cable, too. There's also an HD multimedia (HDMI) output.

how to project IMAGE DISPLAY ON TV

There’s an ambient-light sensor that automatically adjusts the brightness settings on the energy-saving, 14.1-inch, HD-resolution, LED-backlit screen. To the right of the keyboard, there's a touch-control panel to adjust the volume and playback of music and videos. The keyboard is nicely backlit as well, which helps in low-light situations.
Toshiba is one of the first PC makers to use a new Intel (INTC) technology called Wireless Display, or WiDi. It creates a wireless network that pairs the laptop with a Netgear (NTGR) Push2TV receiver that's included with the computer's purchase. This lets users easily display images from the E205 on a big-screen TV. Once the connection is established, it takes just a button push in Intel's Wireless Display software to initiate the transfer.
There are a couple of drawbacks. The technology doesn't currently work with copy-protected DVDs. And the laptop's display is disabled during the transfer, so users can't do something else on the laptop—such as deal with e-mail—while watching videos or listening to music.
Showing Back Ports
Overall performance was intermediate. The laptop runs on Intel's new Core i5 processor and includes a generous 4 gigabytes of memory, which can be expanded up to 8 GB. The 500-GB hard drive is generous for a laptop in the E205's price range. Battery life is a fairly typical 3.5 hours when running video at normal screen brightness.

SOME GRAPHICS CHIPS are not latest

It has 64-bit version of Microsoft's (MSFT) Windows 7 Home Premium operating system, which processes data in larger chunks than the 32-bit version. The E205 had no problems running multiple programs simultaneously. It worked without a hitch when I played video and listened to music at the same time, using Apple's (AAPL) iTunes software.
Intel's integrated graphics chip always seems to need a few seconds to work out the kinks when playing video, and this system was no different. An odd quirk of the E205 and other WiDi-equipped laptops is that users can't easily add more potent graphics chips from Nvidia (NVDA) or ATI (AMD). That could limit the machine's appeal for video game players. Intel executives say PC makers can create software that would let them add other graphics chips to their machines.
The E205 comes with a trial version of Microsoft Office and Works and Symantec's (SYMC) Norton Internet Security. There's also Best Buy's Software Installer application, which contains a list of programs and Web sites—including Netflix (NFLX), Roxio Creator (SNIC), and The Wall Street Journal (NWS)—that can quickly be installed. It's a neat way to shop for software to personalize your computer without being hobbled by preinstalled clutter you don't want.
The Toshiba E205's design may not work for everyone, but it's a powerful and affordable laptop whose innovation and ease of use packs are good.

Bicycle that converts kinetic energy into electric energy



Bluetooth-enabled bicycle wheel has been successfully invented by the researchers of Massachusetts Institute of Technology (MIT). This cycle has the advantage as it has the sensors installed in it, which keeps a kind of GPS system with the other friends of yours. The wheel has got a technology which can convert utilize/store the kinetic energy of the rolling motion of the wheels. Since this is the latest inventions in terms to transport, people are getting shifted to bicycle and leaving their smoky cars behind. It is major activity in Paris and Barcelona.
When the rider applies the breaks the whole of the kinetic motion is being converted into the electric energy by the motors installed in it. This converted energy is being stored in the batteries installed within. The wheel of the cycle is just the same as it is of the common cycle. The difference lies in its Nano-technology and all the necessary components are installed in it which performs the entire task. Further, this electric energy can be used anywhere.




Bluetooth-enabled bicycle wheel has been successfully invented by the researchers of Massachusetts Institute of Technology (MIT). This cycle has the advantage as it has the sensors installed in it, which keeps a kind of GPS system with the other friends of yours. The wheel has got a technology which can convert utilize/store the kinetic energy of the rolling motion of the wheels. Since this is the latest inventions in terms to transport, people are getting shifted to bicycle and leaving their smoky cars behind. It is major activity in Paris and Barcelona.
When the rider applies the breaks the whole of the kinetic motion is being converted into the electric energy by the motors installed in it. This converted energy is being stored in the batteries installed within. The wheel of the cycle is just the same as it is of the common cycle. The difference lies in its Nano-technology and all the necessary components are installed in it which performs the entire task. Further, this electric energy can be used anywhere.


Keyboard shortcuts for windows 8


Here is a list of shortcuts which can be used in Windows 8.

WinKey+Enter: Narrator launch
WinKey+PgUp: Tiles move to the left
WinKey+PgDn: tiles move to the right
WinKey+Shift+.: Split move to the left
WinKey+.: Split move to the right
WinKey+C: Charm open
WinKey+D: Show desktop
WinKey+E: Windows explorer open
WinKey+F: Search panel open
WinKey+H: Share charm open
WinKey+I: Settings charm open
WinKey+K: Connect charm open
WinKey+L: Lock computer
WinKey+O: Screen location lock
WinKey+Q: Search panel open
WinKey+R: Open run
WinKey+V: Cycle through toasts
WinKey+W: Search panel settings
WinKey+ Y: Desktop visualization
WinKey+Z: Application bar open

These are some of the shortcuts which can be used in Windows 8 metro interface.


Here is a list of shortcuts which can be used in Windows 8.

WinKey+Enter: Narrator launch
WinKey+PgUp: Tiles move to the left
WinKey+PgDn: tiles move to the right
WinKey+Shift+.: Split move to the left
WinKey+.: Split move to the right
WinKey+C: Charm open
WinKey+D: Show desktop
WinKey+E: Windows explorer open
WinKey+F: Search panel open
WinKey+H: Share charm open
WinKey+I: Settings charm open
WinKey+K: Connect charm open
WinKey+L: Lock computer
WinKey+O: Screen location lock
WinKey+Q: Search panel open
WinKey+R: Open run
WinKey+V: Cycle through toasts
WinKey+W: Search panel settings
WinKey+ Y: Desktop visualization
WinKey+Z: Application bar open

These are some of the shortcuts which can be used in Windows 8 metro interface.

Download and installation of Windows 8 on a drive partition



How to download and install Windows 8 pre-beta version (developer edition) on a new partition.
Although running your current window , you can dabble with the windows 8 in a new partition making it for the sake of checking and getting experienced.
Well, to start with, if you have a new drive then this is a very easy task to perform. Just visit the website Microsoft Developer Network site, download the ISO image and burn it to a DVD, turn off your PC. Place your hard drive into the motherboard; this depends on the type of hard drive you are using. It can be usb connected also and just need a change in BIOS menu, which is quite simple. Turn on your PC and make sure that your CD-ROM drive gets the booting option and you should boot off your new Windows 8 disk. Run the windows 8 installer and follow the steps as per the software.
However, if you have only a single drive and need a partition then it becomes, little bit time consuming to do the same. This will tell you how to make a partition in your hard drive. Assuming that you have windows 7, go to control panel and then to administrative tools. Now, double-click on the "Computer Management" option. "Disk Management" << "Storage">>.
Now, you can see that your primary drive is already partitioned into C:\ and contains all the program files and folders.
Right-click on the C:\ volume and select the "Shrink Volume" option, and make the size of your volume to almost 16 gigabytes for a 32-bit installation of Windows 8 or 20 gigabytes for a 64-bit installation.
Now, you will be able to see a new partitioned drive appearing next to C:\ drive. Right-click on it, select the "New Simple Volume" option, and select the "Next" button until you reach the screen for assigning letters and drive paths.
Assign the letter of your choice. Click "Next" and give your volume a witty name, and then hit "Next" (and then "Finish") to quick-format the volume as an NTFS partition.
Now, burn the Windows 8 image to a disc using a free like Imgburn or CDBurnerXP, then reboot your PC, open BIOS menu and change the boot order to optical drive.


So, in this way you can install windows 8 in your portioned drive.



How to download and install Windows 8 pre-beta version (developer edition) on a new partition.
Although running your current window , you can dabble with the windows 8 in a new partition making it for the sake of checking and getting experienced.
Well, to start with, if you have a new drive then this is a very easy task to perform. Just visit the website Microsoft Developer Network site, download the ISO image and burn it to a DVD, turn off your PC. Place your hard drive into the motherboard; this depends on the type of hard drive you are using. It can be usb connected also and just need a change in BIOS menu, which is quite simple. Turn on your PC and make sure that your CD-ROM drive gets the booting option and you should boot off your new Windows 8 disk. Run the windows 8 installer and follow the steps as per the software.
However, if you have only a single drive and need a partition then it becomes, little bit time consuming to do the same. This will tell you how to make a partition in your hard drive. Assuming that you have windows 7, go to control panel and then to administrative tools. Now, double-click on the "Computer Management" option. "Disk Management" << "Storage">>.
Now, you can see that your primary drive is already partitioned into C:\ and contains all the program files and folders.
Right-click on the C:\ volume and select the "Shrink Volume" option, and make the size of your volume to almost 16 gigabytes for a 32-bit installation of Windows 8 or 20 gigabytes for a 64-bit installation.
Now, you will be able to see a new partitioned drive appearing next to C:\ drive. Right-click on it, select the "New Simple Volume" option, and select the "Next" button until you reach the screen for assigning letters and drive paths.
Assign the letter of your choice. Click "Next" and give your volume a witty name, and then hit "Next" (and then "Finish") to quick-format the volume as an NTFS partition.
Now, burn the Windows 8 image to a disc using a free like Imgburn or CDBurnerXP, then reboot your PC, open BIOS menu and change the boot order to optical drive.


So, in this way you can install windows 8 in your portioned drive.

How to rename admin account in Windows 7




These steps can be taken to easily change Admin account name in Windows 7.


1. Click Start, type Run and type "secpol.msc"

2. Press OK

3. Local Security Policy loads.

4. In the left panel find Local Policies then press Security Options.

5. In the right panel go to Policy then Accounts: Then Rename administrator account.

6. Now you can change the name and apply and OK and exit the window.


So, this is how you can change your admin name in very easy steps.







These steps can be taken to easily change Admin account name in Windows 7.


1. Click Start, type Run and type "secpol.msc"

2. Press OK

3. Local Security Policy loads.

4. In the left panel find Local Policies then press Security Options.

5. In the right panel go to Policy then Accounts: Then Rename administrator account.

6. Now you can change the name and apply and OK and exit the window.


So, this is how you can change your admin name in very easy steps.




Infolinks Self-Service Marketplace... (A new innovation)



A new revolution to the I.T. world, “Infolinks” Self-Service Marketplace is a new/latest approach and growing like anything. With its powerful servers which make it possible to search the relevant word and creating a meaningful link to your post in your website/blog. This saves a lot of time in getting the correct word as it would be the case if done manually and the precision and accuracy can’t be matched with software so far. This is increasing the advertisers to get more revenue without any much work to do. All the credit goes to intelligent servers which are capable of linking your single word to the big information, side by side increasing your revenue too.

This is a good source for not only advertisers but also to the general people around as they are getting the required information very easily and in no time. So, to conclude; this type of Marketing which is all genuine has much to offer to the people around with different trades and making their revenues much higher along with saving of their precious time. This can be treated as a technology drift as it provides the relevant aim with less/no fatigue to the webmasters and to the publishers.

Sources:






A new revolution to the I.T. world, “Infolinks” Self-Service Marketplace is a new/latest approach and growing like anything. With its powerful servers which make it possible to search the relevant word and creating a meaningful link to your post in your website/blog. This saves a lot of time in getting the correct word as it would be the case if done manually and the precision and accuracy can’t be matched with software so far. This is increasing the advertisers to get more revenue without any much work to do. All the credit goes to intelligent servers which are capable of linking your single word to the big information, side by side increasing your revenue too.

This is a good source for not only advertisers but also to the general people around as they are getting the required information very easily and in no time. So, to conclude; this type of Marketing which is all genuine has much to offer to the people around with different trades and making their revenues much higher along with saving of their precious time. This can be treated as a technology drift as it provides the relevant aim with less/no fatigue to the webmasters and to the publishers.

Sources:




A simple program in C++ to concatenate a phone-number


The following program can be implemented to concatenate a phone number if you know its area, exchange and phone number.


#include<iostream.h>
#include<conio.h>
#include<stdio.h>

struct phone
{
int area_code;
int exchange;
int phone_number;
};


void main()
{
phone a,e,p;
clrscr();
cout<<"Enter the Area Code:";
cin>>a.area_code;
cout<<"\n\n";
cout<<"Enter the exchange:";
cin>>e.exchange;
cout<<"\n\n";

cout<<"Enter the number:";
cin>>p.phone_number;
cout<<"\n\n\n\n";
cout<<"My phone number is:";
cout<<"\n\n";
cout<<"\t\t\t"<<"+"<<"("<<a.area_code<<")"<<e.exchange<<"_"<<p.phone_number;
getch();
}

The following program can be implemented to concatenate a phone number if you know its area, exchange and phone number.


#include<iostream.h>
#include<conio.h>
#include<stdio.h>

struct phone
{
int area_code;
int exchange;
int phone_number;
};


void main()
{
phone a,e,p;
clrscr();
cout<<"Enter the Area Code:";
cin>>a.area_code;
cout<<"\n\n";
cout<<"Enter the exchange:";
cin>>e.exchange;
cout<<"\n\n";

cout<<"Enter the number:";
cin>>p.phone_number;
cout<<"\n\n\n\n";
cout<<"My phone number is:";
cout<<"\n\n";
cout<<"\t\t\t"<<"+"<<"("<<a.area_code<<")"<<e.exchange<<"_"<<p.phone_number;
getch();
}

Backing up of DATA in Cloud Computing



Well, cloud is the latest trend for all the departments as well as for the personal use, as it is the most reliable and the cheap source to get through with your needs. If you belong to an organization then using such a computing means proper utilization of your resources. All the thing/software is just located at one end of the globe and all the users are availing the facilities far apart from the place.
When we talk about the backing up of data in such systems then this sounds something bad. The sources that provide such facilities don’t believe in uploading your valuable data to be uploaded into their servers because this makes them dull and also the scloudpace and time decreases. Henceforth, they just love to upload little bit of data especially the files and small folders.
So, in such cases one must be very specific to the hard drives in case of system failures. No doubt that this technology is growing at a faster rate but we cannot say anything about the backing up of data would be reliable foe an individual/organization in the coming future and it entirely depends on the latest technologies.
Therefore, other secondary Medias would be a good option in case of system failures. 


Well, cloud is the latest trend for all the departments as well as for the personal use, as it is the most reliable and the cheap source to get through with your needs. If you belong to an organization then using such a computing means proper utilization of your resources. All the thing/software is just located at one end of the globe and all the users are availing the facilities far apart from the place.
When we talk about the backing up of data in such systems then this sounds something bad. The sources that provide such facilities don’t believe in uploading your valuable data to be uploaded into their servers because this makes them dull and also the scloudpace and time decreases. Henceforth, they just love to upload little bit of data especially the files and small folders.
So, in such cases one must be very specific to the hard drives in case of system failures. No doubt that this technology is growing at a faster rate but we cannot say anything about the backing up of data would be reliable foe an individual/organization in the coming future and it entirely depends on the latest technologies.
Therefore, other secondary Medias would be a good option in case of system failures. 

Be ready for the IPv6 networking!



The latest technology growing at a much pace and will tend to grow exponentially in upcoming years. Going into more depth it is an IP address standard constructed to replace the leading IPv4 protocol which is leading since the year 1980 for the very purpose of internet traffic routing.

The best thing about this technology is that it allows providing more options of assigning addresses spaces as compared to the IPv4 protocol. As security is the main requirement in any network, hence it provides more encryption than any other protocol configuration. It has not been deployed across the globe globally and only few of the organizations are using it.

Although the future needs more addresses, since the internet connections are increasing at an enormous rate. For about 30 years, 32-bit addressing played a major role and after that IPv4 served and is serving with its fullest but the time needs much more addressing so, one can say that this protocol would surely solve our purpose. Statistics show that only about 0.2% of the internet users have this technology and rest depends upon IPv4 technology only.


Decomposition of an IPv6 address into its binary form.

Top websites and internet service providers including Google, Facebook, and Yahoo Networks joined with more than 1000 other participating websites in World IPv6 Day , which was organized for its successful test with the time this group of users is increasing at a much faster rate.

The best utilization of this technology can be seen from the year 2012 onwards itself.



The latest technology growing at a much pace and will tend to grow exponentially in upcoming years. Going into more depth it is an IP address standard constructed to replace the leading IPv4 protocol which is leading since the year 1980 for the very purpose of internet traffic routing.

The best thing about this technology is that it allows providing more options of assigning addresses spaces as compared to the IPv4 protocol. As security is the main requirement in any network, hence it provides more encryption than any other protocol configuration. It has not been deployed across the globe globally and only few of the organizations are using it.

Although the future needs more addresses, since the internet connections are increasing at an enormous rate. For about 30 years, 32-bit addressing played a major role and after that IPv4 served and is serving with its fullest but the time needs much more addressing so, one can say that this protocol would surely solve our purpose. Statistics show that only about 0.2% of the internet users have this technology and rest depends upon IPv4 technology only.


Decomposition of an IPv6 address into its binary form.

Top websites and internet service providers including Google, Facebook, and Yahoo Networks joined with more than 1000 other participating websites in World IPv6 Day , which was organized for its successful test with the time this group of users is increasing at a much faster rate.

The best utilization of this technology can be seen from the year 2012 onwards itself.

100 Mbps Internet speed from BSNL



Bharat Sanchar Nigam Limited (BSNL), the government setup across the country has stated that it would provide a 100 Mbps internet speed to the customers. FTTH (Fibre to home) is the service that would provide this facility of high data transmission rate. Although, looking at the present scenario of 3-G this speed is much higher than these services but as optical fibres have zero/no data loss in transmission over the distance, hence we can imagine of such blazing speed. If this would turn in a success than other telecom companies in India would also like to serve the masses with the same technology, this service is implemented in Pune, it would be providing these connections to about 100 customers as a test phase. Now, why only Pune has been selected, this is due to the reason that all the new technologies are selected mainly in Pune and after their successful completion they are put into use by the other state. This has been a kind of tradition now.
According to (BSNL) Pune Principal General Manager, VK Mahendra ,"A couple of connections were activated in the city in the last few months on a pilot basis. After studying its performance, the BSNL has decided to float the services on a commercial basis. The FTTH service will be provided through optical fibre cables using the 'gigabit-capable passive optical network' (GPON). This will enable high speed downloading and uploading. Hence, customers will get speed in addition to the existing broadband. The BSNL is looking at high-end customers who require high-speed internet".

BSNL has checked all the possible towers to transmit the high speed internet access and had a talk with the people about their acceptance to some of the installations in their premises. This test is really a matter of concern because if this passes a great deal, then the outlook of internet accessing will surely be changed to a new level and the common man across the globe would get a benefit of that. BSNL telephone exchanges needs to be upgraded for the new high speed devices and the same work has been almost done in the city and at no time they will provide these 100 connections of high speed transmission to the public.

as this is the only telecom company in India, which is totally owned by the government and provides cheap rates broadband services of unmatched quality and this success would increase its popularity to a large extent.

(Optical Fibre)



Bharat Sanchar Nigam Limited (BSNL), the government setup across the country has stated that it would provide a 100 Mbps internet speed to the customers. FTTH (Fibre to home) is the service that would provide this facility of high data transmission rate. Although, looking at the present scenario of 3-G this speed is much higher than these services but as optical fibres have zero/no data loss in transmission over the distance, hence we can imagine of such blazing speed. If this would turn in a success than other telecom companies in India would also like to serve the masses with the same technology, this service is implemented in Pune, it would be providing these connections to about 100 customers as a test phase. Now, why only Pune has been selected, this is due to the reason that all the new technologies are selected mainly in Pune and after their successful completion they are put into use by the other state. This has been a kind of tradition now.
According to (BSNL) Pune Principal General Manager, VK Mahendra ,"A couple of connections were activated in the city in the last few months on a pilot basis. After studying its performance, the BSNL has decided to float the services on a commercial basis. The FTTH service will be provided through optical fibre cables using the 'gigabit-capable passive optical network' (GPON). This will enable high speed downloading and uploading. Hence, customers will get speed in addition to the existing broadband. The BSNL is looking at high-end customers who require high-speed internet".

BSNL has checked all the possible towers to transmit the high speed internet access and had a talk with the people about their acceptance to some of the installations in their premises. This test is really a matter of concern because if this passes a great deal, then the outlook of internet accessing will surely be changed to a new level and the common man across the globe would get a benefit of that. BSNL telephone exchanges needs to be upgraded for the new high speed devices and the same work has been almost done in the city and at no time they will provide these 100 connections of high speed transmission to the public.

as this is the only telecom company in India, which is totally owned by the government and provides cheap rates broadband services of unmatched quality and this success would increase its popularity to a large extent.

(Optical Fibre)

VLC (Future Technology)



Visible Light Communication is a latest technology in the field of optical data transmission, serving dual purpose, one of data transmission and other of the illumination. Our knowledge about the science that light medium is less crowded since it is not based on bandwidths and frequencies and also no magnetic fluctuations.

Since, all the other Medias are more bulky and has a much chances of data loss and interferences, this technology is capable of transmitting high speed (speed of light) data transfer.

VLC technology can transmit data at hundreds of megabits per second with even not much loss of the data. Moreover this is the best since speed has crossed every bar in this case as it is the speed of light which comes to action in this very technology. Light radiation neither interferes nor suffers from electromagnetic interference (EMI) causing it to be the best option in cases where electromagnetic radiations is the great issue, the places like hospitals, power projects and many more.


The security is always the concern, hence this system of communication is more secured within the scope in buildings and small platforms hence can be incorporated in the defence/military sites.

Check out the project here:


Applications:
The scope for this technology:
  • Wi-Max Relief – it can provide a large bandwidth in addition to other Medias too.
  • Local Area Network – is very capable of providing high speed data transmission and much secured login sessions.
  • Revenues – since, it is a wireless technology and hence can be used to earn within a small domain.
  • Exhaustive Environment- can work in environments like petrol pumps, electromagnetic areas since light has nothing to do with such things.
  • Defence/Military– can be used in mobile stations in spying etc.
  • Water Communication – can establish communication of divers with mobile vehicles.
This project is going to be implemented from the year 2012 on its full power.



Visible Light Communication is a latest technology in the field of optical data transmission, serving dual purpose, one of data transmission and other of the illumination. Our knowledge about the science that light medium is less crowded since it is not based on bandwidths and frequencies and also no magnetic fluctuations.

Since, all the other Medias are more bulky and has a much chances of data loss and interferences, this technology is capable of transmitting high speed (speed of light) data transfer.

VLC technology can transmit data at hundreds of megabits per second with even not much loss of the data. Moreover this is the best since speed has crossed every bar in this case as it is the speed of light which comes to action in this very technology. Light radiation neither interferes nor suffers from electromagnetic interference (EMI) causing it to be the best option in cases where electromagnetic radiations is the great issue, the places like hospitals, power projects and many more.


The security is always the concern, hence this system of communication is more secured within the scope in buildings and small platforms hence can be incorporated in the defence/military sites.

Check out the project here:


Applications:
The scope for this technology:
  • Wi-Max Relief – it can provide a large bandwidth in addition to other Medias too.
  • Local Area Network – is very capable of providing high speed data transmission and much secured login sessions.
  • Revenues – since, it is a wireless technology and hence can be used to earn within a small domain.
  • Exhaustive Environment- can work in environments like petrol pumps, electromagnetic areas since light has nothing to do with such things.
  • Defence/Military– can be used in mobile stations in spying etc.
  • Water Communication – can establish communication of divers with mobile vehicles.
This project is going to be implemented from the year 2012 on its full power.

Rubber Ammunition



This is really going to hit you hard- If you are a protestor then be aware of your boundaries because it can really make you dead at no time, by not letting you dead but somewhat the same. The army has decided to handle the protest marches which sometimes become more violent with their new ammunition technology comprising of rubber bullets.
We cannot say exactly how hard it can hit you but very sure that its really going to bang you and get you admitted to the medical care. This step has been taken by viewing the so much violating protests, although this was the idea of United States but this can be implemented by other nations too.
Although it’s not the same as you have small balloon rifles which can be seen in the fair most commonly, if this bullets hits you over the head it can severely make you injured and sometimes can even be fatal.

(Installation of rubber in the bullet)

The main aim of such bullets is to make one stop of what he is doing and not to make him injured. The kinetic energy of the ammunition burnt is directly delivered to the body part and the tapering is done so finely to the bullets that it just bounces back and stops the person. For some while one can feel that he has gone but really this shock can stop that person ever to do such a deed.
Hence, many of you can oppose this and many of you would love to have it once and find it as a fun but many-a-times it can lead one to death so, be a human not an animal while protesting. 


This is really going to hit you hard- If you are a protestor then be aware of your boundaries because it can really make you dead at no time, by not letting you dead but somewhat the same. The army has decided to handle the protest marches which sometimes become more violent with their new ammunition technology comprising of rubber bullets.
We cannot say exactly how hard it can hit you but very sure that its really going to bang you and get you admitted to the medical care. This step has been taken by viewing the so much violating protests, although this was the idea of United States but this can be implemented by other nations too.
Although it’s not the same as you have small balloon rifles which can be seen in the fair most commonly, if this bullets hits you over the head it can severely make you injured and sometimes can even be fatal.

(Installation of rubber in the bullet)

The main aim of such bullets is to make one stop of what he is doing and not to make him injured. The kinetic energy of the ammunition burnt is directly delivered to the body part and the tapering is done so finely to the bullets that it just bounces back and stops the person. For some while one can feel that he has gone but really this shock can stop that person ever to do such a deed.
Hence, many of you can oppose this and many of you would love to have it once and find it as a fun but many-a-times it can lead one to death so, be a human not an animal while protesting. 

SkyNET – Hacker’s say



An aerial drone which can access unsecured wireless networks across the globe has been developed by the Stevens Institute of Technology. SkyNet is the name given to this device. It is constructed in two phases. Firstly, a small helicopter has been constructed which could make it fly and secondly, a small computer is being installed which can attack different wireless networks. This is well capable of accessing the networks and making them useful for hacking and getting all the important information concerning to a particular hacked network.

SkyNet dimension

SkyNet makes it possible to handle the network from the remote location and getting all the access to the host computer and getting all the information from that computer. Thus, it becomes quite difficult to the sufferer of this attack to know that, from where the computer is being accessed and only way to find it out is to know the flying co-ordinate of the SkyNet which is unpredictable. The other method to catch it can be, to follow it back to its base after its all task of spamming and hacking, which can be fake to make one disguise.
So, when it comes of its internal parts, it consists of quadrocopter, one GPS receiver to locate the co-ordinates on the graph of its location at the controller side. 3G modem along with pair of Wi-Fi cards is needed for high rate of instruction flow to this device. Last but the most important is the modded Linux computer specially modded for hacking purpose. So, the aggregate cost is about $600.
Therefore, this can be a total crash to your information if you have not secured connection. So, be careful while getting into some network and make sure it is highly secured otherwise SkyNet is there to access your useful information and getting over your system completely.



An aerial drone which can access unsecured wireless networks across the globe has been developed by the Stevens Institute of Technology. SkyNet is the name given to this device. It is constructed in two phases. Firstly, a small helicopter has been constructed which could make it fly and secondly, a small computer is being installed which can attack different wireless networks. This is well capable of accessing the networks and making them useful for hacking and getting all the important information concerning to a particular hacked network.

SkyNet dimension

SkyNet makes it possible to handle the network from the remote location and getting all the access to the host computer and getting all the information from that computer. Thus, it becomes quite difficult to the sufferer of this attack to know that, from where the computer is being accessed and only way to find it out is to know the flying co-ordinate of the SkyNet which is unpredictable. The other method to catch it can be, to follow it back to its base after its all task of spamming and hacking, which can be fake to make one disguise.
So, when it comes of its internal parts, it consists of quadrocopter, one GPS receiver to locate the co-ordinates on the graph of its location at the controller side. 3G modem along with pair of Wi-Fi cards is needed for high rate of instruction flow to this device. Last but the most important is the modded Linux computer specially modded for hacking purpose. So, the aggregate cost is about $600.
Therefore, this can be a total crash to your information if you have not secured connection. So, be careful while getting into some network and make sure it is highly secured otherwise SkyNet is there to access your useful information and getting over your system completely.

Programming Ethics



Basics

When we deal with data structures, they are mainly of two types; linear or nonlinear. Linear term is used when a data structure is forming a sequence, and other doesn’t. We know everything in computer deals with memory and henceforth, we have a concept of array and linked lists. Similarly, nonlinear structures are represented as graphs and trees. The main purpose of such classification is to minimize our work and to perform basic operations on these liner structures.

Traversing: In this each element is processed in the list.
Searching: To find a location of an element with a known value.
Insertion: To add a new element in the list.
Deletion: To remove an element from the list.
Sorting: To arrange the elements in some defined order.
Merging: Combining more than two lists in a single list.


Now, it depends upon the user to use the best available option, i.e. arrays or linked list according to the available data and the number of operations one need to carryout.

Linear Arrays


A linear array can be described as a collection of same type of data type and should be finite i.e. having an end point. The elements in this case are referenced respectively with the help of index collection of consecutive numbers mainly starting from zero as a default. While dealing with memory, the elements are again stored respectively in consecutive memory locations.

When it comes of defining an array, this is simply in three parts. Firstly, we need to define its name then its data type (by default it is integer in case of C++), and the last one is its index set. So, it looks like int A [5]. Here, A is the name & 5 is the index set, this array is of integer type.


Note: Length of an array is given by a formula. Length=UB-LB+1, UB means upper bound and LB stands for lower bound. For an instance, the length or the number of elements in an array is always one more then the defined index set. Now, when actual programming is done with arrays, we come across two terms. Statical approach is the approach where it is defined in the memory that while compilation of a program, allocates memory space for array & hence sixe becomes fixed during program execution. Another approach is to get the value of index set while execution & hence this is termed a dynamical approach.




Basics

When we deal with data structures, they are mainly of two types; linear or nonlinear. Linear term is used when a data structure is forming a sequence, and other doesn’t. We know everything in computer deals with memory and henceforth, we have a concept of array and linked lists. Similarly, nonlinear structures are represented as graphs and trees. The main purpose of such classification is to minimize our work and to perform basic operations on these liner structures.

Traversing: In this each element is processed in the list.
Searching: To find a location of an element with a known value.
Insertion: To add a new element in the list.
Deletion: To remove an element from the list.
Sorting: To arrange the elements in some defined order.
Merging: Combining more than two lists in a single list.


Now, it depends upon the user to use the best available option, i.e. arrays or linked list according to the available data and the number of operations one need to carryout.

Linear Arrays


A linear array can be described as a collection of same type of data type and should be finite i.e. having an end point. The elements in this case are referenced respectively with the help of index collection of consecutive numbers mainly starting from zero as a default. While dealing with memory, the elements are again stored respectively in consecutive memory locations.

When it comes of defining an array, this is simply in three parts. Firstly, we need to define its name then its data type (by default it is integer in case of C++), and the last one is its index set. So, it looks like int A [5]. Here, A is the name & 5 is the index set, this array is of integer type.


Note: Length of an array is given by a formula. Length=UB-LB+1, UB means upper bound and LB stands for lower bound. For an instance, the length or the number of elements in an array is always one more then the defined index set. Now, when actual programming is done with arrays, we come across two terms. Statical approach is the approach where it is defined in the memory that while compilation of a program, allocates memory space for array & hence sixe becomes fixed during program execution. Another approach is to get the value of index set while execution & hence this is termed a dynamical approach.


Computer Graphics



Computer Graphics is always a growing branch of computers, where every day new inventions are made and the main aim is to make a best output as it was never before. All this is programming itself, a program that determines the graphic properties along with the hardware that manages with the program and thus making it successful at the end. Here is a simple program to move two different circles in opposite directions using a simple C program.

#include<graphics.h>
#include<conio.h>
#include<dos.h>
Void main()
{
int gd=DETECT,gm,y,x;
initgraph(&gd,&gm,”D:\\TURBOC3”);
for(x=0,y=get maxx(); x<=get maxx(); y--,x++)
{
setcolor (WHITE);
circle (x,240,60);
circle (y,240,60);
delay (10);
setcolor (BLACK);
circle(x,240,60);
circle(y,240,60);
}
getch();
}

Henceforth, check this out and this is the basic programming that is done to make any of the complex graphics and these graphics today make your lives more digital and colorful.





Computer Graphics is always a growing branch of computers, where every day new inventions are made and the main aim is to make a best output as it was never before. All this is programming itself, a program that determines the graphic properties along with the hardware that manages with the program and thus making it successful at the end. Here is a simple program to move two different circles in opposite directions using a simple C program.

#include<graphics.h>
#include<conio.h>
#include<dos.h>
Void main()
{
int gd=DETECT,gm,y,x;
initgraph(&gd,&gm,”D:\\TURBOC3”);
for(x=0,y=get maxx(); x<=get maxx(); y--,x++)
{
setcolor (WHITE);
circle (x,240,60);
circle (y,240,60);
delay (10);
setcolor (BLACK);
circle(x,240,60);
circle(y,240,60);
}
getch();
}

Henceforth, check this out and this is the basic programming that is done to make any of the complex graphics and these graphics today make your lives more digital and colorful.



Display Devices



CRT Basics

The most widely used technique to represent a picture and the most useful one in today’s era is still the CRT. This is the same technique used in home television sets.


There are mainly two types of CRT’s namely, magnetic deflection and the other is electrostatic deflection. A beam is projected first, from the highly excited electron gun and further the beam is deflected from the focusing system along with magnetic deflection coils and this coil adjusts a particular point on the phosphorous screen. Since, the phosphorous has a property of illumination and thus the striking of an electron causes the illumination. This illumination lasts exponentially and thus it needs to be refreshed. Hence, in case of raster scan system sixty frames per second needs to be refreshed for continuous view.

The most important component of CRT is an electron gun which consists of a heating element, a control grid, a focusing anode and an accelerating anode. The heating element ignites and excites an electron, projects towards focusing anode which focuses the electron towards a particular position on the phosphorous screen and to increase the speed we use accelerating anode. Since, (+ve and –ve) charge attract each other and hence the electron gets speed up towards the screen.


Beam – Penetration Method


This method is again used for displaying color pictures in random scan monitor. In this we use two layers of phosphor namely, red and green which are coated onto the internal part of CRT screen and the final color generated depends upon the penetration level of the beam. A beam of slow velocity of electrons is capable of only exciting the outer red layer and the beam of fast moving electrons get through the red layer and excites the green inner layer. Further, orange and yellow colors are emitted on the intermediate velocity of the electron beam. All this acceleration is controlled by beam-accelerating voltage. The only drawback of this method is that it is only capable of producing four colors and hence picture quality is not good.

Shadow Mask Method

The method used in color T.V. sets. This is capable of producing much more colors. This has (RGB) i.e. Red, Green and Blue phosphor color dots at each pixel position. It consists of three electron guns corresponding to each pixel position. The phosphor dots are just arranged in a triangular position. The arrangement of it is done such that corresponding color is ignited by just the same type of electron gun passing through the shadow mask. Now again, different colors are prepared on the basis of intensity of projected electrons. In this case we can have eight different kinds of colors.

The Direct View Storage Tube (DVST)

The technology uses high rated phosphor which can hold the illumination for longer period of time as compared to simple phosphor. Its refresh rate is 30-50 frames/sec. and it can be used to draw vector graphic system because for dynamic picture this is not a good option since, it does not have a good picture clear/erase technology. It has flickering effect due to discontinuity of picture.

Raster Scan System

This system deals with the entire system of the formation of a raster scan image. This system uses the core method of raster scan technology. Here, a screen is divided in the coordinates as (640,480). In most of the system top-left coordinate is initialized as (0, 0). The whole screen will be plotted in the even and odd way along y-axis, i.e. firstly 1, 3 or 2, 4 and so on. This method is used so that all the pixels are illuminated at much faster rate. In this, scanning is done in two ways. So, the system that keeps track of such a technology is termed as raster scan system.
In this system, CPU is connected to the system bus which acts as a common terminal to carry data and at one end it’s connected to system memory and other are video controllers which are also connected to each other. In this system memory is portioned as frame buffer to record the frame each time a new frame is generated. The video controller controls all the components relating to frame rate etc. This all is further connected to monitor for final display work.


Graphic Driver

Video controller or the graphic card is one and the same thing. This is just the upgraded version of free buffer which we earlier used as a portioned part.This is done so to increase the system RAM so that we can increase the speed of a computer system, rest the work is same.

Glossary:

Persistence- The time taken by the illuminated light from the phosphor coated stream to decay one-tenth of its original intensity.

Resolution- Number of points of pixels which can be drawn without overlapping each other on the screen.

Aspect Ratio- It is the ratio of vertical pixels to the horizontal pixels which are required to display equal length line in both directions.






CRT Basics

The most widely used technique to represent a picture and the most useful one in today’s era is still the CRT. This is the same technique used in home television sets.


There are mainly two types of CRT’s namely, magnetic deflection and the other is electrostatic deflection. A beam is projected first, from the highly excited electron gun and further the beam is deflected from the focusing system along with magnetic deflection coils and this coil adjusts a particular point on the phosphorous screen. Since, the phosphorous has a property of illumination and thus the striking of an electron causes the illumination. This illumination lasts exponentially and thus it needs to be refreshed. Hence, in case of raster scan system sixty frames per second needs to be refreshed for continuous view.

The most important component of CRT is an electron gun which consists of a heating element, a control grid, a focusing anode and an accelerating anode. The heating element ignites and excites an electron, projects towards focusing anode which focuses the electron towards a particular position on the phosphorous screen and to increase the speed we use accelerating anode. Since, (+ve and –ve) charge attract each other and hence the electron gets speed up towards the screen.


Beam – Penetration Method


This method is again used for displaying color pictures in random scan monitor. In this we use two layers of phosphor namely, red and green which are coated onto the internal part of CRT screen and the final color generated depends upon the penetration level of the beam. A beam of slow velocity of electrons is capable of only exciting the outer red layer and the beam of fast moving electrons get through the red layer and excites the green inner layer. Further, orange and yellow colors are emitted on the intermediate velocity of the electron beam. All this acceleration is controlled by beam-accelerating voltage. The only drawback of this method is that it is only capable of producing four colors and hence picture quality is not good.

Shadow Mask Method

The method used in color T.V. sets. This is capable of producing much more colors. This has (RGB) i.e. Red, Green and Blue phosphor color dots at each pixel position. It consists of three electron guns corresponding to each pixel position. The phosphor dots are just arranged in a triangular position. The arrangement of it is done such that corresponding color is ignited by just the same type of electron gun passing through the shadow mask. Now again, different colors are prepared on the basis of intensity of projected electrons. In this case we can have eight different kinds of colors.

The Direct View Storage Tube (DVST)

The technology uses high rated phosphor which can hold the illumination for longer period of time as compared to simple phosphor. Its refresh rate is 30-50 frames/sec. and it can be used to draw vector graphic system because for dynamic picture this is not a good option since, it does not have a good picture clear/erase technology. It has flickering effect due to discontinuity of picture.

Raster Scan System

This system deals with the entire system of the formation of a raster scan image. This system uses the core method of raster scan technology. Here, a screen is divided in the coordinates as (640,480). In most of the system top-left coordinate is initialized as (0, 0). The whole screen will be plotted in the even and odd way along y-axis, i.e. firstly 1, 3 or 2, 4 and so on. This method is used so that all the pixels are illuminated at much faster rate. In this, scanning is done in two ways. So, the system that keeps track of such a technology is termed as raster scan system.
In this system, CPU is connected to the system bus which acts as a common terminal to carry data and at one end it’s connected to system memory and other are video controllers which are also connected to each other. In this system memory is portioned as frame buffer to record the frame each time a new frame is generated. The video controller controls all the components relating to frame rate etc. This all is further connected to monitor for final display work.


Graphic Driver

Video controller or the graphic card is one and the same thing. This is just the upgraded version of free buffer which we earlier used as a portioned part.This is done so to increase the system RAM so that we can increase the speed of a computer system, rest the work is same.

Glossary:

Persistence- The time taken by the illuminated light from the phosphor coated stream to decay one-tenth of its original intensity.

Resolution- Number of points of pixels which can be drawn without overlapping each other on the screen.

Aspect Ratio- It is the ratio of vertical pixels to the horizontal pixels which are required to display equal length line in both directions.