tag:blogger.com,1999:blog-79854095495353602992024-03-13T07:45:17.366-07:00Engrmuh's BlogEngrmuhhttp://www.blogger.com/profile/07999644287947537783noreply@blogger.comBlogger39125tag:blogger.com,1999:blog-7985409549535360299.post-63846538893535340082011-01-10T10:23:00.000-08:002011-01-10T10:23:37.730-08:00Pakistani Bowlers on Top<object height="360" width="480"><param name="movie" value="http://www.dailymotion.com/swf/video/xghm9r_paknz1td33_news?additionalInfos=0"></param><param name="allowFullScreen" value="true"></param><param name="allowScriptAccess" value="always"></param><embed type="application/x-shockwave-flash" src="http://www.dailymotion.com/swf/video/xghm9r_paknz1td33_news?additionalInfos=0" width="480" height="360" allowfullscreen="true" allowscriptaccess="always"></embed></object><br />
<b><br />
</b><br />
<div style="background-attachment: initial; background-clip: initial; background-color: white; background-image: initial; background-origin: initial; background-position: initial initial; background-repeat: initial initial; font: normal normal normal 13px/19px Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0.6em; padding-left: 0.6em; padding-right: 0.6em; padding-top: 0.6em;"><br />
</div>Engrmuhhttp://www.blogger.com/profile/07999644287947537783noreply@blogger.com0tag:blogger.com,1999:blog-7985409549535360299.post-89010125416626180932011-01-10T10:20:00.000-08:002011-01-10T10:20:10.295-08:00Facebook privacy leakage again ??????<div style="background-attachment: initial; background-clip: initial; background-color: white; background-image: initial; background-origin: initial; background-position: initial initial; background-repeat: initial initial; font: normal normal normal 13px/19px Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0.6em; padding-left: 0.6em; padding-right: 0.6em; padding-top: 0.6em;"><strong>G</strong>oldman Sachs’s $450 million <a _mce_href="http://www.wikinvest.com/metric/Investments" class="zem_slink" href="http://www.wikinvest.com/metric/Investments" rel="wikinvest" title="Investments">investment</a> in Facebookhas raised many questions.<br />
<img _mce_src="http://pointblanktechnologies.com/wp/wp-content/uploads/2010/08/NoPrivacy-300x240.png" alt="beast image" class="aligncenter" height="240" src="http://pointblanktechnologies.com/wp/wp-content/uploads/2010/08/NoPrivacy-300x240.png" style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; display: block; margin-left: auto; margin-right: auto;" title="beast image" width="300" /><br />
<strong>499 Holders </strong><a _mce_href="http://finance.yahoo.com/q?s=GS" class="zem_slink" href="http://finance.yahoo.com/q?s=GS" rel="yahoofinance" title="NYSE: GS">Goldman Sachs</a> is offering $1.5 billion worth of <a _mce_href="http://facebook.com" class="zem_slink" href="http://facebook.com/" rel="homepage" title="Facebook">Facebook</a><a _mce_href="http://en.wikipedia.org/wiki/Share_%28finance%29" class="zem_slink" href="http://en.wikipedia.org/wiki/Share_%28finance%29" rel="wikipedia" title="Share (finance)">shares</a> to its private clients. The clients will not hold the shares directly but will invest in a special investment vehicle that will hold the shares on their behalf.<br />
<strong>Q</strong>uestions have arisen about whether this share issuance will push Facebook over 499 shareholders. Under <a _mce_href="http://en.wikipedia.org/wiki/Securities_regulation_in_the_United_States" class="zem_slink" href="http://en.wikipedia.org/wiki/Securities_regulation_in_the_United_States" rel="wikipedia" title="Securities regulation in the United States">federal securities laws</a> — Section 12(g) of the<a _mce_href="http://en.wikipedia.org/wiki/Securities_Exchange_Act_of_1934" class="zem_slink" href="http://en.wikipedia.org/wiki/Securities_Exchange_Act_of_1934" rel="wikipedia" title="Securities Exchange Act of 1934">Securities Exchange Act of 1934</a> — a company is required to begin reporting to the <a _mce_href="http://topics.nytimes.com/top/reference/timestopics/organizations/s/securities_and_exchange_commission/index.html?inline=nyt-org" href="http://topics.nytimes.com/top/reference/timestopics/organizations/s/securities_and_exchange_commission/index.html?inline=nyt-org" title="More articles about the U.S. Securities And Exchange Commission.">Securities and Exchange Commission</a>, filing quarterly and annual reports among other items, once it has more than 499 <a _mce_href="http://en.wikipedia.org/wiki/Stockholder_of_Record" class="zem_slink" href="http://en.wikipedia.org/wiki/Stockholder_of_Record" rel="wikipedia" title="Stockholder of Record">shareholders of record</a>. This does not mean it needs to do an <a _mce_href="http://en.wikipedia.org/wiki/Initial_public_offering" class="zem_slink" href="http://en.wikipedia.org/wiki/Initial_public_offering" rel="wikipedia" title="Initial public offering">initial public offering</a>, just commence these filings. The requirement to begin reporting is effective 120 days after the end of the fiscal year a company exceeded this amount. So, if Facebook goes over the amount this year, they are required to start reporting to the S.E.C. in early May of 2012.<br />
<img _mce_src="http://venturebeat.com/wp-content/uploads/2009/12/facebook-privacy.jpg" alt="beast image" class="aligncenter" height="388" src="http://venturebeat.com/wp-content/uploads/2009/12/facebook-privacy.jpg" style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; display: block; margin-left: auto; margin-right: auto;" title="beast image" width="196" /><br />
<strong>Offering Violation</strong> The <a _mce_href="http://en.wikipedia.org/wiki/Security_%28finance%29" class="zem_slink" href="http://en.wikipedia.org/wiki/Security_%28finance%29" rel="wikipedia" title="Security (finance)">securities</a> law issue here rests on whether there is a “general solicitation” such that this becomes a “public offering.” The federal securities laws strictly regulate any offering of shares. A company or underwriter like Goldman must find an exemption or otherwise register the securities with the S.E.C. The Facebook shares are not being registered, so Facebook and Goldman are relying on an exemption.<br />
<strong>Goldman </strong>Goldman is offering Facebook shares to its clients. Goldman here is an investment adviser to these clients, so it does have a fiduciary responsibility to know its customers and recommend appropriate investments. Individual investors, however, may have different tastes for risk and different returns than Goldman’s<a _mce_href="http://topics.nytimes.com/top/reference/timestopics/subjects/p/private_equity/index.html?inline=nyt-classifier" href="http://topics.nytimes.com/top/reference/timestopics/subjects/p/private_equity/index.html?inline=nyt-classifier" title="More articles about private equity.">private equity</a> arm. The Goldman clients may be willing to accept a lower return for other reasons like the security of knowing that the valuation is unlikely to go down, as part of a portfolio that allows for more speculation, etc. No doubt Goldman has disclosed the risks associated with Facebook copiously, and if investors, being fully informed of the material facts here, still want to invest, Goldman is doing its job.<br />
And end that's a rumor that facebook is closing , that privacy leaking network is not ending till by March 15 2011.</div>Engrmuhhttp://www.blogger.com/profile/07999644287947537783noreply@blogger.com0tag:blogger.com,1999:blog-7985409549535360299.post-68863931489312407972011-01-07T10:08:00.000-08:002011-01-07T10:08:46.000-08:00Intel launches second generation core processors<div style="background-attachment: initial; background-clip: initial; background-color: white; background-image: initial; background-origin: initial; background-position: initial initial; background-repeat: initial initial; font: normal normal normal 13px/19px Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0.6em; padding-left: 0.6em; padding-right: 0.6em; padding-top: 0.6em;"><strong>W</strong>orld's leading chip manufacturer <a _mce_href="http://maps.google.com/maps?ll=37.3879277778,-121.963538889&spn=0.01,0.01&q=37.3879277778,-121.963538889 (Intel%20Corporation)&t=h" class="zem_slink" href="http://maps.google.com/maps?ll=37.3879277778,-121.963538889&spn=0.01,0.01&q=37.3879277778,-121.963538889%20(Intel%20Corporation)&t=h" rel="geolocation" title="Intel Corporation">Intel</a> Thursday launched second generation <a _mce_href="http://en.wikipedia.org/wiki/Intel_Core" class="zem_slink" href="http://en.wikipedia.org/wiki/Intel_Core" rel="wikipedia" title="Intel Core">intel core</a> processors with built-in visual capabilities to deliver superior audio-visual experience, faster downloading ability and improved battery life.<br />
'The built-in visual capabilities enabled by these new processors are stunning. This combined with improved adaptive performance, will revolutionize the PC experience in a way that is obvious for every user to see and appreciate, a visibly smarter performance,' said R. Sivakumar, managing director sales and marketing group, Intel <a _mce_href="http://en.wikipedia.org/wiki/South_Asia" class="zem_slink" href="http://en.wikipedia.org/wiki/South_Asia" rel="wikipedia" title="South Asia">South Asia</a>.<br />
'The new features are bound to appeal to your senses and give you a better looking PC experience,' he added.<br />
Intel estimates that a 4-minute <a _mce_href="http://en.wikipedia.org/wiki/High-definition_video" class="zem_slink" href="http://en.wikipedia.org/wiki/High-definition_video" rel="wikipedia" title="High-definition video">HD video</a> that used to take 4 minutes to convert to play on an <a _mce_href="http://en.wikipedia.org/wiki/IPod" class="zem_slink" href="http://en.wikipedia.org/wiki/IPod" rel="wikipedia" title="IPod">iPod</a> would now take just 16 seconds.<br />
The new processor technology focusses on high-definition videos, mainstream gaming, online socialising and multimedia and combines visual and 3D graphics technology with performance-leading microprocessors on a single chip.<br />
<img _mce_src="http://www.compulink.co.nz/cart/image/userfiles/image/Intel%20Core%20i7%20Processor.jpg" alt="beast image" class="aligncenter" height="510" src="http://www.compulink.co.nz/cart/image/userfiles/image/Intel%20Core%20i7%20Processor.jpg" style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; display: block; margin-left: auto; margin-right: auto;" title="beast image" width="545" /><br />
Its new features include Intel Quick Sync Video, and a new version of the company's award-winning Intel Wireless Display which now adds 1080p HD (high definition) and content protection for those wishing to beam premium HD content from their laptop screen to their <a _mce_href="http://en.wikipedia.org/wiki/Television" class="zem_slink" href="http://en.wikipedia.org/wiki/Television" rel="wikipedia" title="Television">TV</a>.<br />
More than 500 laptops and desktops designs based on these products are expected from all major computer makers worldwide.Systems are likely to be available from <a _mce_href="http://en.wikipedia.org/wiki/Original_equipment_manufacturer" class="zem_slink" href="http://en.wikipedia.org/wiki/Original_equipment_manufacturer" rel="wikipedia" title="Original equipment manufacturer">OEMs</a> (original equipment manufacturer) like HCL, <a _mce_href="http://www.wipro.com/index.htm" class="zem_slink" href="http://www.wipro.com/index.htm" rel="homepage" title="Wipro">Wipro</a>, <a _mce_href="http://maps.google.com/maps?ll=37.413579,-122.14508&spn=0.01,0.01&q=37.413579,-122.14508 (Hewlett-Packard)&t=h" class="zem_slink" href="http://maps.google.com/maps?ll=37.413579,-122.14508&spn=0.01,0.01&q=37.413579,-122.14508%20(Hewlett-Packard)&t=h" rel="geolocation" title="Hewlett-Packard">HP</a>, Lenevo, <a _mce_href="http://www.toshiba.co.jp/worldwide/" class="zem_slink" href="http://www.toshiba.co.jp/worldwide/" rel="homepage" title="Toshiba">Toshiba</a> and Dell among others as well as from local channel partners.<br />
The company said that the price range of the products incorporated with the second generation intel core processors will increase marginally.</div>Engrmuhhttp://www.blogger.com/profile/07999644287947537783noreply@blogger.com0tag:blogger.com,1999:blog-7985409549535360299.post-70202696785053754042011-01-02T23:41:00.000-08:002011-01-02T23:41:57.927-08:00Try before you buy storage hardwareWhat you choose for your primary storage may be the most important purchasing decision you ever make. That storage will form the bedrock -- or the shaky ground -- upon which the rest of your server and application environment will be built. Primary storage is a major capital investment and frequently has a much longer life cycle than most infrastructure components, often remaining in production for five years or more.<br />
<div class="separator" style="clear: both; text-align: center;"><a href="http://www.techpowerup.com/img/08-02-01/woah.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="385" src="http://www.techpowerup.com/img/08-02-01/woah.jpg" width="450" /></a></div><br />
<br />
It's hard to know what you're getting without rolling up your sleeves and putting your hands on it. I highly recommend doing just that. Fortunately, almost all of the major storage players offer evaluation units you can test firsthand. At the very least, get one of each of the top options you're considering. Get familiar with the ins and outs of the management interface, learn how easy (or difficult) the device is to configure, and if practical, do a head-to-head performance test. The evaluation process often brings up questions you would never have thought to ask potential storage suitors without seeing the product and making it work on your own. Many times, potential storage customers will visit an existing customer instead of doing a full evaluation, but this is only part of the story. Yes, you typically learn some valuable lessons, but you won't find out how the storage will work in your environment.sourceEngrmuhhttp://www.blogger.com/profile/07999644287947537783noreply@blogger.com0tag:blogger.com,1999:blog-7985409549535360299.post-43768873237879523642010-12-23T04:03:00.000-08:002010-12-23T04:03:34.346-08:00http://computerbeast.wordpress.com/<a href="http://computerbeast.wordpress.com/">http://computerbeast.wordpress.com/</a>Engrmuhhttp://www.blogger.com/profile/07999644287947537783noreply@blogger.com0tag:blogger.com,1999:blog-7985409549535360299.post-48276062698967910012010-12-22T05:10:00.000-08:002010-12-22T05:10:15.440-08:00Is Stuxnet the new weapon for cyber insurgents?<strong>W</strong>eaker combatants have always used unconventional or inexpensive means to defy stronger foes, including guerrilla warfare and suicide attacks that depend on a greater willingness to sacrifice life.<br />
<br />
This approach can be decisive. Of all “asymmetric” wars since 1800 in which one side had far more armed power than the other, the weaker side won in 28 percent of cases, according to a 2001 study by US political scientist Ivan Arreguin-Toft.<br />
<br />
The ratio may now be set to shift further in favour of the underdog.<br />
<br />
The revelation this year of a novel way to use computers to sabotage an enemy’s lifeline infrastructure suggests a powerful new kind of weapon is moving within reach of weak states, militant groups and criminals, some analysts say.<br />
<br />
That weapon is likely to be a variant of Stuxnet, a highly destructive Internet worm discovered by a Belarus company in June and described by European security company Kaspersky Labs as “a fearsome prototype of a cyber-weapon”, analysts say.<br />
<br />
“<strong><span style="text-decoration: underline;">A GREAT DANGER”</span></strong><br />
<br />
“Stuxnet is like the arrival of an F-35 fighter jet on a World War I battlefield,” blogged German industrial control systems expert Ralph Langner.<br />
<br />
Whoever created the bug, believed by many to have targeted an Iranian uranium enrichment facility, the job likely required many man-hours of work and millions of dollars in investment.<br />
<br />
But now that its code has been publicly analysed, hackers will need only a few months to develop a version of the customised malware for black market sale, some experts say.<br />
<br />
Ali Jahangiri, an information security expert who tracks Trojan codes, harmful pieces of software that look legitimate, describes that prospect as “a great danger.”<br />
<br />
“The professional Trojan codemakers have got the idea from Stuxnet that they could make something similar which can be used by governments, criminals or terrorists,” he told Reuters.<br />
<br />
Stuxnet’s menace is that it reprogrammes a control system used in many industrial facilities to inflict physical damage.<br />
At risk is automation equipment common to the networks on which modern societies depend – power plants, refineries, chemical plants, pipelines and transport control systems.<br />
<br />
<img class="aligncenter" title="beast image" src="http://t2.gstatic.com/images?q=tbn:3uJ6oY_9zXHnzM:http://images.defensetech.org/wp-content/uploads//2010/05/Computer-Hackers1.jpg&t=1" alt="beast image" width="276" height="220" /><br />
<br />
Analysts say they suspect hackers are rushing to build a version of the worm and sell it to the highest bidder before experts can install counter-measures plants across the globe.<br />
<br />
“My greatest fear is that we are running out of time to learn our lessons,” US information security expert Michael Assante told a Congressional hearing on Stuxnet this month.<br />
<br />
“<a href="http://en.wikipedia.org/wiki/Stuxnet" target="_blank"><strong>Stuxnet</strong> </a>… may very well serve as a blueprint for similar but new attacks on control system technology,” said Assante, President of the US National Board of Information Security Examiners, which sets standards for security professionals.<br />
<br />
Langner says multinational efforts against malware inspired by Stuxnet won’t work since “treaties won’t be countersigned by rogue nation states, terrorists, organised crime, and hackers.”<br />
<br />
“All of these will be able to possess and use such weapons soon,” he said. If the next Stuxnet cost less than $1 million on the black market, then “some not-so-well equipped nation states and well-funded terrorists will grab their checkbooks.”<br />
<br />
As well as favouring small states, cyber appears to be a tool of special value for Russia and China, since it allows them to become equals to the United States in a sphere where US conventional military dominance counts for nothing.<br />
<br />
Stuxnet is a powerful example of the fastest-growing sort of computer bug – customised malware written specifically to attack a precise target. What is new is its power, and the publicity it has attracted through a presumed link to Iran.<br />
<br />
<img class="aligncenter" title="beast image" src="http://www.rainbowskill.com/wp-content/uploads/2009/08/d3-300x225.jpg" alt="beast image" width="300" height="220" /><br />
<br />
That publicity will have drawn attention in small nations such as North Korea, which can be expected to take an interest in acquiring a Stuxnet-like capability to balance an inferiority in conventional arms with its US-backed southern foe.<br />
<br />
Like some impoverished countries in Africa, North Korea has a cyber advantage – it has so few systems dependent on digital networks that a big cyber attack on it would cause almost no damage, writes former US National Security Coordinator Richard Clarke in his book Cyber War.Engrmuhhttp://www.blogger.com/profile/07999644287947537783noreply@blogger.com0tag:blogger.com,1999:blog-7985409549535360299.post-27833918952775479202010-12-18T03:46:00.000-08:002010-12-18T22:11:49.319-08:00Technical Joke's<img class="aligncenter" title="beast image" src="http://s3.amazonaws.com/readers/2009/07/03/5_4.jpg" alt="beast image" width="380" height="460" /><br/><br/><img class="aligncenter" title="beast image" src="http://mrbadak.com/wp-content/images/Jan07/punitionis8.jpg" alt="beast image" width="380" height="460" /><img class="aligncenter" title="beast image" src="http://i32.tinypic.com/ftlddz.jpg" alt="beast image" width="380" height="460" /><img class="aligncenter" title="beast image" src="http://bagofbeans.tsangal.org/wp-content/uploads/2007/02/color_codes.png" alt="beast image" width="380" height="460" />Engrmuhhttp://www.blogger.com/profile/07999644287947537783noreply@blogger.com0tag:blogger.com,1999:blog-7985409549535360299.post-63916788028898476482010-12-07T02:51:00.000-08:002010-12-18T22:11:49.310-08:00Mac vs PC, desktops vs laptops<strong>T</strong>he humble desktop or laptop computer hasn't yet sunk to the status of commodity product, but it's getting close. On one hand, processing power, memory and storage keep getting cheaper and more plentiful; on the other, competing manufacturers have been settling on the same set of features.<br/><br/><strong>T</strong>hey do, however, remain resolutely divided on one issue: Mac or PC? So are many of you.<br/><br/>I think Apple's <a class="zem_slink" title="Mac OS" rel="homepage" href="http://www.apple.com/macosx/">Mac OS</a> X is safer and simpler than <a href="http://computerbeast.wordpress.com/2010/09/17/microsoft-internet-explorer-9/" target="_blank"><span class="zem_slink">Microsoft's</span> </a>Windows 7. It requires less setup work and ongoing maintenance, and most <a class="zem_slink" title="Personal computer" rel="wikipedia" href="http://en.wikipedia.org/wiki/Personal_computer">PCs</a> lack the smart, stylish design of Macs. Apple's stores can be horribly crowded, but their Genius Bars (with an appointment) offer first-person tech support that's unparalleled among most PC vendors.<br/><br/>But I also know that PCs cost a lot less than Macs. And while Windows 7 retains such traditional annoyances as prolonged program installations, upgrades and uninstallations, its <a class="zem_slink" title="Windows Vista" rel="homepage" href="http://windows.microsoft.com/en-US/windows-vista/products/home">Home Premium</a> edition represents a significant advance over the widely loathed Windows Vista and especially Vista's cut-rate Home Basic release.<br/><br/>You'd think that in a down economy, customers would opt for the cheaper option, but Apple's market share keeps going up.<br/><br/>Whatever operating system you pick, you'll have to choose between a laptop and a desktop. Most people get laptops and with good reason: The traditional cost gap between portable and stationary machines has largely vanished, leaving a desktop's bigger screen and more comfortable keyboard as its major real-world advantages.<br/><div id="inline-ad"><br/><div><img class="aligncenter" title="beast image" src="http://blogs.ubc.ca/brandonregier/files/2010/12/apple-vs-windows-laptop-hunters.jpg" alt="beast image" width="507" height="400" /></div><br/></div><br/>If you plan on taking a laptop places, however, don't buy one that weighs more than five pounds or has a battery that isn't at least advertised as running three hours. (Those qualifications rule out many budget-priced Windows laptops.)<br/><br/>If you're buying a laptop as a second or third machine, a Windows or Linux netbook that would otherwise offer insufficient storage could make sense. But watch out for awkward keyboard layouts, as evidenced by a too-small right-hand Shift key. And - just this one time - pay attention to processor speeds, as the Intel Atom chips in most netbooks run on the slow side.<br/><br/>What about an option that didn't exist last year, tablet computers like Apple's iPad?<br/><br/>To me, they only make sense as a secondary device. The iPad requires a separate Mac or PC for setup and software updates and, without the webcam that's become standard on home laptops, it can't do video calling. A newer, Android-based tablet, Samsung's Galaxy Tab, suffers from high pricing compared to <a class="zem_slink" title="iPad" rel="homepage" href="http://www.apple.com/ipad/">the iPad</a> and even many netbooks, as well as some awkward moments in its software. (Look for a full review of that next week.)<br/><br/>Will this piece ever get to the traditional questions of computer shopping - what specifications to look for? Yes.<br/><br/>Ignore the processor entirely (outside of notebooks, as outlined above) unless you'll be editing video often and intensively. Three or four gigabytes of memory should suffice; two GB, seen on some entry-level Macs and cheaper PCs, can get cramped if you keep multiple applications open at once. (A year ago, buying a PC with less than 4 GB of RAM would have allowed you to get the 32-bit edition of Windows 7, but that more compatible option has essentially been banished from retail by 64-bit versions that don't offer a meaningful benefit to most home users.)<br/><br/>As for storage, 250 gigabytes of hard disk space should also be plenty unless you have an enormous video collection. You can get away with less on a second computer or if you don't have a large digital-media archive. Anything but a netbook (or Apple's high-priced answer to that category, the <a class="zem_slink" title="Apple" rel="homepage" href="http://www.apple.com">MacBook</a> Air) will have a <a class="zem_slink" title="Optical disc drive" rel="wikipedia" href="http://en.wikipedia.org/wiki/Optical_disc_drive">CD-burner</a> drive that can probably burn <a class="zem_slink" title="DVD" rel="wikipedia" href="http://en.wikipedia.org/wiki/DVD">DVDs</a>, too. But you're unlikely to use an optical drive's write capability to do more than burn a backup CD or DVD. Spending extra for a Blu-ray drive makes no sense to me.<br/><br/>Expansion is yet another issue where you no longer have much to choose from. All you need are a few <a class="zem_slink" title="Universal Serial Bus" rel="wikipedia" href="http://en.wikipedia.org/wiki/Universal_Serial_Bus">USB ports</a> to plug in a mouse, a printer or other peripheral devices and an SD Card slot for your camera or phone's memory card. Apple's cheapest models fall short on those requirements but just about every other computer meets them. The FireWire ports on most Macs and the eSATA ports on some PCs can accommodate external hard drives but don't do much else; I can't call either essential.<br/><br/><img class="aligncenter" title="beast image" src="http://cr4.globalspec.com/PostImages/201011/desktop_vs_laptop_1234EBBA-077F-0237-EC34184C36F34D6B.jpg" alt="beast image" width="400" height="230" /><br/><br/>Every machine has WiFi wireless these days as well, leaving only Bluetooth as an option to consider if you have a wireless mouse or your phone can transfer files with this under-used wireless technology.<br/><br/>With all the above criteria in mind, picking a Mac should be a relatively straightforward process (the basic iMac or the 13-in. MacBook should each do fine as a general-purpose home machine). But how to pick one PC out of so many similar competitors? I'd like to say you should choose the one with the cleanest software bundle, but vendors seem to have sunk to a common level of mediocrity.<br/><br/>Unless you custom-order a stripped-down bundle online, you're likely to get the same set of third-party software: Microsoft's Windows Live bundle of Internet and multimedia software, an expiring trial copy of Internet-security software, a trial copy of Microsoft Office, and DVD software that duplicates what comes built into <a href="http://computerbeast.wordpress.com/2010/08/23/xp-boring-looks/" target="_blank">Windows 7</a>.<br/><br/>Maybe one PC vendor will try to set themselves apart in this department in time for next year's computer-shopping column. We can only hope.Engrmuhhttp://www.blogger.com/profile/07999644287947537783noreply@blogger.com0tag:blogger.com,1999:blog-7985409549535360299.post-30285511376172466462010-11-25T02:34:00.000-08:002010-12-18T22:11:49.300-08:00Pakistan Asian Hockey Champion 2010<strong>P</strong>akistan have won the final of men hockey in asian games 2010 .<a class="zem_slink" title="Pakistan" rel="geolocation" href="http://maps.google.com/maps?ll=33.6666666667,73.1666666667&spn=10.0,10.0&q=33.6666666667,73.1666666667%20%28Pakistan%29&t=h">Pakistan</a> are the champion for the eight time in asian games.Great day for Pakistan they also won the men double squash final today and are just giving so happiness to their nation.I am proud to be Pakistani.<br/><br/><img class="aligncenter" title="beast image" src="http://www.clbuzz.com/wp-content/uploads/2010/03/England-vs-Pakistan.jpg" alt="beast image" width="455" height="325" /><br/><br/><img class="aligncenter" title="beast image" src="http://www.dawn.com/wp-content/uploads/2010/10/pakhockeyafp543.jpg" alt="beast iomage" width="484" height="275" /><br/><br/>oh sorry to mention the goals scored.And they were 2-0. Sohail Abbass scored 1 goal and <a class="zem_slink" title="Rehan Butt" rel="wikipedia" href="http://en.wikipedia.org/wiki/Rehan_Butt">Rehan Butt</a> the second goal.Engrmuhhttp://www.blogger.com/profile/07999644287947537783noreply@blogger.com0tag:blogger.com,1999:blog-7985409549535360299.post-64913955008498103442010-11-24T02:22:00.000-08:002010-12-18T22:11:49.254-08:00TECHNICAL WRITING STYLE(do's)<span style="text-decoration:underline;"><strong>Technical writing</strong></span><br/><br/><strong>O</strong>ne specific area of communication that involves transmitting and understanding the knowledge of a technical subject to others that need to know the basics and details of the subject in question. In written form, this type of communication is called technical writing.<br/><br/><strong>Goal of a <a class="zem_slink" title="Technical writer" rel="wikipedia" href="http://en.wikipedia.org/wiki/Technical_writer">technical writer</a></strong><br/><br/>Remember that your aim as a technical writer is not to impress, but <strong>to inform.</strong><br/><br/><a href="http://computerbeast.wordpress.com/tag/information/"><img class="alignleft" title="beast image" src="http://www.gic-edu.com/uploads/technical_writing-5.jpg" alt="beast image" width="485" height="322" /></a><br/>&nbsp<br/>In <a class="zem_slink" title="Technical writing" rel="wikipedia" href="http://en.wikipedia.org/wiki/Technical_writing">Technical Writing</a> Style<br/><br/><strong>DO’s</strong><br/><ul><br/> <li>• <strong>Important information first</strong></li><br/> <li>• <strong>Normal word order</strong></li><br/> <li>• <strong><a class="zem_slink" title="Deterrence (legal)" rel="wikipedia" href="http://en.wikipedia.org/wiki/Deterrence_%28legal%29">Sentence length</a></strong></li><br/> <li>• <strong>Active voice</strong></li><br/> <li>• <strong>Parallel structure</strong></li><br/> <li>• <strong>Preview List</strong></li><br/> <li>• <strong>Keep it real</strong></li><br/></ul><br/><span style="text-decoration:underline;"><strong>IMPORTANT INFORMATION FIRST</strong></span><br/><br/>By putting important information at the beginning of a sentence, we make that sentence easier to understand(or in paragraph). It also serves to clarify what is the most important part of the sentence.<br/><br/>Important information first<br/><br/>• <strong><span style="text-decoration:underline;">Unclear: </span></strong>Its unwise to walk area near the <strong>cliff </strong>edge, <strong>walking</strong> there may result in a dangerous fall and therefore it is recommended that one remains a safe distance to maintain personal <strong>safety</strong>.<br/><br/>• <strong><span style="text-decoration:underline;">Clear:</span></strong><br/><br/>Danger -- Stay away from the cliff its very steep.<br/><span style="text-decoration:underline;"> <strong> </strong></span><br/><br/><span style="text-decoration:underline;"><strong>NORMAL <a class="zem_slink" title="Word order" rel="wikipedia" href="http://en.wikipedia.org/wiki/Word_order">WORD ORDER</a>:</strong></span><br/><br/>Subject verb order(SVO). By using this order the sentences become more clarified.<br/><br/><span style="text-decoration:underline;">SUBJECT</span><span style="text-decoration:underline;"> <em>VERB</em> OBJECT</span><br/><br/><strong>Umer </strong> <em>eats </em> apple.<br/><br/><strong>Many people </strong><em>hate</em> America.<br/><br/><strong><span style="text-decoration:underline;">SENTENCE LENGTH</span><br/></strong><br/><br/>The length of a sentence is vitally important in conveying information, which is of course the primary task of the technical writer. The ideal sentence length for technical writing is somewhere between <strong>15 and 25 words</strong>, and varying the length of your sentences makes for lively reading.<br/><br/><span style="text-decoration:underline;"><strong><a class="zem_slink" title="Active voice" rel="wikipedia" href="http://en.wikipedia.org/wiki/Active_voice">ACTIVE VOICE</a></strong></span><br/><br/>In the active voice, the <strong>object</strong> receives the action of the verb. Active voice is shorter and more interesting to read.<br/><br/><strong><em> </em></strong><br/><br/><em> For passive voice object becomes the subject and vice versa.</em><br/><br/><span style="text-decoration:underline;"><strong><a class="zem_slink" title="Parallelism (grammar)" rel="wikipedia" href="http://en.wikipedia.org/wiki/Parallelism_%28grammar%29">PARALLEL STRUCTURE</a> </strong></span><br/><br/>Parallel construction signals to the reader that two ideas are of equal importance. If two or more ideas or items are connected by a <a class="zem_slink" title="Grammatical conjunction" rel="wikipedia" href="http://en.wikipedia.org/wiki/Grammatical_conjunction">coordinating conjunction</a> such as <em>“and”, “but” or “or”,</em> then those ideas should be expressed in parallel or equivalent grammatical constructs. Items and ideas of <strong>equal </strong>importance should be presented using equivalent grammatical structures.<br/><br/>• <strong> Not Parallel: </strong><br/>Mary likes hiking, swimming, and <strong><span style="text-decoration:underline;">to ride</span> </strong>a bicycle.<br/><br/>• <strong> Parallel: </strong><br/>Mary likes hiking, swimming, and riding a bicycle.<br/><br/><span style="text-decoration:underline;"><strong>PREVIEW LIST</strong></span><br/><br/>Lists are a useful tool in technical writing. Preview list contains the keywords to be used in the document. They can be presented in both ways : vertical and horizontal.<br/><br/>Preview list example<br/><br/>Communication is divided into two types<br/><br/>• Verbal communication<br/><br/>• <a class="zem_slink" title="Nonverbal communication" rel="wikipedia" href="http://en.wikipedia.org/wiki/Nonverbal_communication">Non-verbal communication</a><br/><br/><span style="text-decoration:underline;"><strong>KEEP IT REAL(You):</strong></span><br/><br/>Maintain focus and only give information about the task at hand .Write what you have experienced. Use “you” to point to the reader.<br/><br/>• e.g. <strong>I</strong> took the training course so that <strong><span style="text-decoration:underline;">you</span></strong> could experience the problems firsthand.<br/><br/>• I took the training course so that I could experience the problems firsthand.<br/><br/><em> </em>Engrmuhhttp://www.blogger.com/profile/07999644287947537783noreply@blogger.com3tag:blogger.com,1999:blog-7985409549535360299.post-69873196055798498592010-11-22T03:14:00.000-08:002010-12-18T22:11:49.244-08:00Technical Writing StyleEngrmuhhttp://www.blogger.com/profile/07999644287947537783noreply@blogger.com0tag:blogger.com,1999:blog-7985409549535360299.post-68969921576018875182010-11-19T10:42:00.000-08:002010-12-18T22:11:49.233-08:00Pakistan’s golden girls proud of Asian Games triumph<strong><a class="zem_slink" title="Pakistan" rel="geolocation" href="http://maps.google.com/maps?ll=33.6666666667,73.1666666667&spn=10.0,10.0&q=33.6666666667,73.1666666667%20%28Pakistan%29&t=h">Pakistan</a>’s victorious <a class="zem_slink" title="Women's cricket" rel="wikipedia" href="http://en.wikipedia.org/wiki/Women%27s_cricket">women’s cricket</a> captain Sana Mir said Friday their historic <a class="zem_slink" title="Asian Games" rel="wikipedia" href="http://en.wikipedia.org/wiki/Asian_Games">Asian Games</a> <a class="zem_slink" title="Gold medal" rel="wikipedia" href="http://en.wikipedia.org/wiki/Gold_medal">gold medal</a> was welcome good news for a country where the men’s game is mired in scandal.</strong><br/><br/>The emphatic 10-wicket win over <a class="zem_slink" title="Bangladesh" rel="geolocation" href="http://maps.google.com/maps?ll=23.7,90.35&spn=10.0,10.0&q=23.7,90.35%20%28Bangladesh%29&t=h">Bangladesh</a> was Pakistan’s first gold of the Games and comes amid fixing allegations swirling around the men’s team.<br/><br/>Pakistan, whose president congratulated the team after their victory, is recovering from catastrophic floods and has been hit by a series of devastating militant attacks over the past few years, leaving thousands dead.<br/><br/><img class="aligncenter" title="beast image" src="http://mygoogletrends.info/wp-content/uploads/HLIC/65ce16a55e231f544e19a8e4281f64f4.jpg" alt="beast image" width="287" height="262" /><br/><br/><strong>“</strong>Whatever is happening in men’s <a class="zem_slink" title="Cricket" rel="wikipedia" href="http://en.wikipedia.org/wiki/Cricket">cricket</a> I don’t know how much is true and how much is false,” said <a href="http://en.wikipedia.org/wiki/Sana_Mir" target="_blank">Sana Mir</a>, adding that Pakistan was not alone in having people who did not play by the rules.<br/><br/>“The way the women’s team has played and the way they have handled themselves on and off the field is really wonderful for <a class="zem_slink" title="Demographics of Pakistan" rel="wikipedia" href="http://en.wikipedia.org/wiki/Demographics_of_Pakistan">Pakistanis</a> living in Pakistan and abroad,” she said.<br/><br/><img class="aligncenter" title="beast image" src="http://www.karachifriends.com/wp-content/uploads/2010/08/Pak-women-cricket-for-ICC-women-cricket-challenge.jpg" alt="beast image" width="320" height="240" /><br/><br/>Sana, who took two wickets for 23 runs, said the media often focused on the problems besetting Pakistan but the nation “must be proud of us.”<br/><br/>“There are lot of good things happening in Pakistan and this is one of them,” she said.<br/><br/>Sana denied the women’s team was breaking new ground, saying it was thanks to powerful female role models .<br/><br/>“We are not the pioneers. We are just following in the footsteps of the strong women of Pakistan,” she said.<br/><br/><strong>T</strong>he 24-year-old said it had become more acceptable for men to watch the women’s game and the women’s team improved by playing against under-19 and under-25 men’s teams.Engrmuhhttp://www.blogger.com/profile/07999644287947537783noreply@blogger.com0tag:blogger.com,1999:blog-7985409549535360299.post-82048192268339496682010-11-16T08:41:00.000-08:002010-12-18T22:11:49.193-08:00HAPPY EID MUBARIKHappy Eid Greetings to my viewers and to wordpress.<br/><p style="text-align:center;"><a href="http://computerbeast.files.wordpress.com/2010/11/image023.jpg"><img class="aligncenter size-full wp-image-295" title="beast image" src="http://computerbeast.files.wordpress.com/2010/11/image023.jpg" alt="beast image" width="570" height="427" /></a> <strong>THESE ARE MY OWN FOR THIS EID.</strong></p><br/>Happy Eid Greetings to my viewers and to wordpress.<br/><br/><p偋Happy Eid Greetings to my viewers and to wordpress.<br/><p 偋Happy Eid Greetings to my viewers and to wordpress.</p><br/><br/><p s偋Happy Eid Greetings to my viewers and to wordpress.</p><br/><p 偋Happy Eid Greetings to my viewers and to wordpress.</p><br/><br/><p s偋Happy Eid Greetings to my viewers and to wordpress.</p><br/><p 偋Happy Eid Greetings to my viewers and to wordpress.</p><br/><br/><p> </p><br/><p style="text-align:center;"><a href="http://computerbeast.files.wordpress.com/2010/11/image023.jpg"><img class="aligncenter size-full wp-image-295" title="beast image" src="http://computerbeast.files.wordpress.com/2010/11/image023.jpg" alt="beast image" width="570" height="427" /></a> <strong>THESE ARE MY OWN FOR THIS EID.</strong></p><br/>Happy Eid Greetings to my viewers and to wordpress.<br/><p style="text-align:center;"><a href="http://computerbeast.files.wordpress.com/2010/11/image023.jpg"><img class="aligncenter size-full wp-image-295" title="beast image" src="http://computerbeast.files.wordpress.com/2010/11/image023.jpg" alt="beast image" width="570" height="427" /></a> <strong>THESE ARE MY OWN FOR THIS EID.</strong></p><br/>Happy Eid Greetings to my viewers and to wordpress.<br/><p style="text-align:center;"><a href="http://computerbeast.files.wordpress.com/2010/11/image023.jpg"><img class="aligncenter size-full wp-image-295" title="beast image" src="http://computerbeast.files.wordpress.com/2010/11/image023.jpg" alt="beast image" width="570" height="427" /></a> <strong>THESE ARE MY OWN FOR THIS EID.</strong></p><br/>Happy Eid Greetings to my viewers and to wordpress.<br/><p style="text-align:center;"><a href="http://computerbeast.files.wordpress.com/2010/11/image023.jpg"><img class="aligncenter size-full wp-image-295" title="beast image" src="http://computerbeast.files.wordpress.com/2010/11/image023.jpg" alt="beast image" width="570" height="427" /></a> <strong>THESE ARE MY OWN FOR THIS EID.</strong></p><br/><p style="text-align: center;"偋Happy Eid Greetings to my viewers and to wordpress.</p><br/><br/><p style="text-align:center;"><a href="http://computerbeast.files.wordpress.com/2010/11/image023.jpg"><img class="aligncenter size-full wp-image-295" title="beast image" src="http://computerbeast.files.wordpress.com/2010/11/image023.jpg" alt="beast image" width="570" height="427" /></a> <strong>THESE ARE MY OWN FOR THIS EID.</strong></p><br/>Happy Eid Greetings to my viewers and to wordpress.<br/><br/><pEngrmuhhttp://www.blogger.com/profile/07999644287947537783noreply@blogger.com1tag:blogger.com,1999:blog-7985409549535360299.post-60767953874996746612010-11-13T23:58:00.000-08:002010-12-18T22:11:49.137-08:00Q-Link Mini<div id="mbottomr"><strong>I</strong>n today's electronic world, electro-smog is unavoidable. In fact, no product can "shield" us from exposure to EMFs or to other stressors.<br/><br/><strong>B</strong>ut attaching the <a href="http://mini.qlinkproducts.com/Scripts/mini.asp?page=purchase" target="_blank">Q-Link Mini</a> to your favorite devices allows YOU to take preventative action by engaging, activating and supporting your own body's <a class="zem_slink" title="Nature" rel="wikipedia" href="http://en.wikipedia.org/wiki/Nature">natural</a> defenses and energy systems.<br/><br/><strong>Q</strong>-Link wearers consistently report a reduction of many of the symptoms often associated with exposure to EMFs ... Thousands describe feeling more focused, more aware, more energized and prepared to perform.</div><br/><div><img class="aligncenter" title="beast i9mage" src="http://the-gadgeteer.com/wp-content/uploads/2010/06/qlink-mini-300x181.png" alt="beast image" width="300" height="181" /></div><br/><div></div><br/><div><br/><div id="mbottomr">When your body senses stress, it responds by engaging its own natural <a class="zem_slink" title="Weapon" rel="wikipedia" href="http://en.wikipedia.org/wiki/Weapon">defense systems</a>. These bio-support systems work together in an organized matrix of living energies which has been called the "<a class="zem_slink" title="Energy (esotericism)" rel="wikipedia" href="http://en.wikipedia.org/wiki/Energy_%28esotericism%29">biofield</a>".<br/><br/><strong>U</strong>nfortunately, EMFs and other stressors interfere with the proper operation of the human biofield and its ability to support our bodies' natural defenses. But when the biofield is reinforced by positive energies like those found in nature - like those programmed into the Q-Link Mini - then our bodies can respond naturally to life's stress and challenges.</div><br/></div><br/><div></div><br/><div><strong>T</strong>hen, when you use your mobile phone, or listen to music on an <a class="zem_slink" title="Digital audio player" rel="wikipedia" href="http://en.wikipedia.org/wiki/Digital_audio_player">mp3 player</a>, or hold your game player - the Q-Link Mini focuses and strengthens the biofield's ability to support your body's natural defenses to EMFs and other stressors.</div><br/><div></div><br/><div><object height="350" width="425"><br/> <param name="movie" value="http://www.youtube.com/v/PieL-4jkO88"><br/> <param name="wmode" value="transparent"><br/> <embed src="http://www.youtube.com/v/PieL-4jkO88;rel=0" type="application/x-shockwave-flash" wmode="transparent" height="350" width="425"><br/> </object></div><br/><div></div><br/><div><strong>T</strong>he proprietary technology which powers the Mini and all Q-Link products is called Sympathetic Resonance Technology (SRT™), because when our bodies interact with it they respond by resonating "<a class="zem_slink" title="Sympathy" rel="wikipedia" href="http://en.wikipedia.org/wiki/Sympathy">sympathetically</a>" just like a properly tuned instrument responds in harmony to the vibrations of a <a class="zem_slink" title="Tuning fork" rel="wikipedia" href="http://en.wikipedia.org/wiki/Tuning_fork">tuning fork</a>.</div>Engrmuhhttp://www.blogger.com/profile/07999644287947537783noreply@blogger.com2tag:blogger.com,1999:blog-7985409549535360299.post-45470004641855549702010-11-06T11:54:00.000-07:002010-12-18T22:11:49.071-08:00CLEAN YOUR PC<strong>Y</strong>es clean your pc ,iam not talking about formatting it or <a class="zem_slink" title="Cleanliness" rel="wikipedia" href="http://en.wikipedia.org/wiki/Cleanliness">cleaning</a> it from viruses.Clean your computer physically.<br/><br/><img class="aligncenter" title="beast image" src="http://www.thereviewcrew.com/wp-content/uploads/2010/02/dirty-keyboard.jpg" alt="beast image" width="380" height="300" /><br/><br/><strong>K</strong>eyboard and <a class="zem_slink" title="Mouse" rel="wikipedia" href="http://en.wikipedia.org/wiki/Mouse">mouse</a> can spread <a class="zem_slink" title="Disease" rel="wikipedia" href="http://en.wikipedia.org/wiki/Disease">diseases</a> if you do not clean them regularly and in a proper manner.and even the mouse .You are at great risk if you eat while using computer. Flu , <a class="zem_slink" title="Influenza" rel="wikipedia" href="http://en.wikipedia.org/wiki/Influenza">influenza</a> and other diseases can be easily spread by touch.Dangerous bacteria can badly affect specially if you are using a shared computer .<br/>Not only <a class="zem_slink" title="Keyboard instrument" rel="wikipedia" href="http://en.wikipedia.org/wiki/Keyboard_instrument">keyboard</a> or mouse you should also clean the screen regularly .<br/><br/><strong>T</strong>he following can stuck in your keyboard by consistent use<br/><br/>Dust<br/>Dead <a class="zem_slink" title="Skin" rel="wikipedia" href="http://en.wikipedia.org/wiki/Skin">skin cells</a><br/>Dirty hands(sweat)<br/>Solid food particles<br/><br/><img class="aligncenter" title="beast image" src="http://farm1.static.flickr.com/62/159004847_305bf19e4d.jpg" alt="beast image" width="333" height="500" /><br/>If you use a shared computer, other users may also spread contagious <a class="zem_slink" title="Cutaneous conditions" rel="wikipedia" href="http://en.wikipedia.org/wiki/Cutaneous_conditions">skin diseases</a> on your keyboard.<br/><br/>Now its time to combat,i mean its time to clean the <a class="zem_slink" title="Personal computer" rel="wikipedia" href="http://en.wikipedia.org/wiki/Personal_computer">PC</a>.<br/><br/><strong>F</strong>or internal cleaning of Central processing unit you should use blower and in small areas toothbrush is best.Please do not use <a class="zem_slink" title="Vacuum cleaner" rel="wikipedia" href="http://en.wikipedia.org/wiki/Vacuum_cleaner">vacuum cleaner</a> it can damage the circuitry of system.<img class="aligncenter" title="beast image" src="http://petrolleafblowershop.com/images/backpack%20leaf%20blower%20pic%206.jpg" alt="beast image" width="300" height="300" /><strong>F</strong>or cleaning of monitor many products (sprays) are available but you can easily use wet towels.For keyboard and mouse use <a class="zem_slink" title="Cotton swab" rel="wikipedia" href="http://en.wikipedia.org/wiki/Cotton_swab">cotton buds</a> to clean through spaces and if dust is hard to remove you can use wet cloth to soften it and then remove by toothbrush.<br/><br/><img class="aligncenter" title="beast image" src="http://www.nmm.ac.uk/upload/package/52/waste/images/cotton_buds.jpg" alt="beast image" width="300" height="250" />Engrmuhhttp://www.blogger.com/profile/07999644287947537783noreply@blogger.com3tag:blogger.com,1999:blog-7985409549535360299.post-76667973529448374922010-11-01T09:38:00.000-07:002010-12-18T22:11:49.049-08:00RaMpAnT Razzaq StUnS South Africa<p class="news-body"> </p><br/><p class="news-body"><strong>T</strong>here are match-winning centuries and there are Match-winning Centuries. You will travel far and wide, maybe even go back in time, but you will struggle to find a more remarkable game-stealing hundred than the one the Sheikh Zayed Stadium in Abu Dhabi saw tonight. An outrageous 72-ball 109 from Abdul Razzaq dragged Pakistan to a series-levelling target of 287 against South Africa, one ball and one wicket left.</p><br/><p class="news-body">It was scarcely-scriptable and only when Razzaq hit his tenth six in the last over, slogging Albie Morkel over midwicket to climax an unimaginable orgy of power-hitting, was a Pakistan win even worth contemplating; until then he had played to a backdrop of impending, imminent doom. To even get to that point needing 14 was a feat because for 99 overs Pakistan looked a distant second best; a solid, now-to-be-forgotten century from Colin Ingram, hands from Hashim Amla and JP Duminy and the continuing refusal of Pakistan's top order to turn up, the distinct story till then.</p><br/><p class="news-body"><a href="http://computerbeast.wordpress.com/tag/cricket/"><img class="aligncenter" title="beast image" src="http://p.imgci.com/db/PICTURES/CMS/123700/123709.jpg" alt="beast image" width="650" height="1000" /></a></p><br/><p class="news-body"><a href="http://computerbeast.wordpress.com/tag/afridi/" target="_blank"><strong>S</strong>hahid Afridi</a> and Fawad Alam had tried gamely to make something of the disaster of 70 for 4 in the 19th over. The spinners were on, Afridi was around so inevitably some fun was had. When Afridi went in the 30th, the score at 136, still the best they could hope for was an honourable scrap.</p><br/><p class="news-body"><strong>R</strong>azzaq began quietly, expressive as a stone, and even a dance-down six off Robin Peterson four overs after Afridi left felt decorative. Alam, meanwhile, was getting bogged down by his own inability to clear a field. But South Africa relaxed, the pair stuck at it. Alam suddenly got going and Razzaq smoked a couple more sixes. By the 40th over, at 200 for 5, theoretically it looked possible - in this age of Twenty20 at least - even if, in reality, it didn't feel gettable.</p><br/><p class="news-body">But for once, Pakistan timed their Powerplay right and when Johan Botha was taken for 11 in the very first, a little tension crept in. Only a little though, for Alam went soon, Morne Morkel bowled two fine overs, there was the inevitable run-out and even though Razzaq had reached his fifty, it was done and dusted.</p><br/><p class="news-body"><strong>T</strong>he 47th over, bowled poorly by Charles Langeveldt, was pivotal. Razzaq launched a sequence of length balls for three sixes in his favourite areas - flat-batted over extra cover, high over long-on and down the ground. Eighteen runs but no expression. Wahab Riaz's run-out off the last ball was merely collateral damage as 53 from 24 became 33 from 18.</p><br/><p class="news-body"><a href="http://computerbeast.wordpress.com/tag/cricket/"><img class="aligncenter" title="beast image" src="http://p.imgci.com/db/PICTURES/CMS/123700/123704.jpg" alt="beast image" width="650" height="1000" /></a></p><br/><p class="news-body">Razzaq had decided at the fall of Alam that if the match was to be won, it would be by him alone, so with the tail in, several singles were turned down. <strong>W</strong>ith 25 needed from 12, Langeveldt was lofted down the ground and then pulled with cartoonish violence to midwicket. By the time Razzaq had taken the 14 needed off the last over he had scored 63 of the last 65, effectively from the 45th over onwards. Six sixes came in the last four overs, and only at the very end, after crashing a drive through point, did he let his emotions out, dropping his bat and trying to run but not knowing where to go.(<em><a href="http://www.cricinfo.com/pakistan-v-south-africa-2010/content/story/484507.html" target="_blank">cricinfo</a></em>)</p>Engrmuhhttp://www.blogger.com/profile/07999644287947537783noreply@blogger.com0tag:blogger.com,1999:blog-7985409549535360299.post-47685716868665941182010-10-28T07:24:00.000-07:002010-12-18T22:11:49.038-08:00AnDrOiD's BeSt PhOnEs<strong>i</strong>phone which dominated the mobile world for its touch screen features is outclassed this year by many companies.Best android phones this year are<br/><br/> <br/><br/> <br/><br/><strong>No One:</strong> <a href="http://www.htc.com/www/product/desire/overview.html" target="_blank"><span style="text-decoration:underline;">HTC DESIRE</span></a><br/><br/><img class="aligncenter" title="beast image" src="http://www.theinquirer.net/IMG/518/92518/htc-desire-540x334.jpg?1266319705" alt="beast image" width="540" height="334" /><br/><br/> <br/><br/> <br/><br/> <br/><br/><strong>No Two: </strong> <a href="http://www.google.com/googlephone/tour/" target="_blank"><span style="text-decoration:underline;">NEXUS ONE</span></a><br/><br/><img class="aligncenter" title="beast image" src="http://handies.phandroid.com/media/nexus-one-1269816018-806.jpg" alt="beast image" width="540" height="442" /><strong> </strong><br/><br/> <br/><br/> <br/><br/><strong>No three: </strong> <span style="text-decoration:underline;"> <a href="http://www.sonyericsson.com/cws/corporate/products/phoneportfolio/specification/xperiax10minipro" target="_blank">XPERIA X10 MINI PRO</a></span><br/><br/><img title="beast image" src="http://experts.thelink.co.uk/wp-content/uploads/2010/07/Sony-Ericsson-Xperia-X10-Mini-Pro-review-03.jpg" alt="beast image" width="500" height="500" /><br/><br/> <br/><br/> <br/><br/><strong>No four: </strong> <span style="text-decoration:underline;"> <a href="http://www.htc.com/www/product/legend/overview.html" target="_blank">HTC LEGEND</a></span><br/><br/><img class="aligncenter" title="beast image" src="http://latestmobilephones.co.in/wp-content/uploads/2010/04/htc-legend.jpg" alt="beast image" width="280" height="350" /><strong> </strong><br/><br/> <br/><br/><strong>No five: </strong> <a href="http://www.sonyericsson.com/cws/products/mobilephones/overview/xperiax10" target="_blank"><span style="text-decoration:underline;">XPERIA X10</span></a><br/><br/><img class="aligncenter" title="beast image" src="http://img.metro.co.uk/i/pix/2009/11/XperiaX10_450x550.jpg" alt="beast image" width="450" height="550" /><strong> </strong><br/><br/> <br/><br/><strong>No six: </strong> <a href="http://www.htc.com/www/product/hero/overview.html" target="_blank"><span style="text-decoration:underline;">HTC HERO</span></a><br/><br/><img class="aligncenter" title="beast image" src="http://www.uncrate.com/men/images/2009/06/htc-hero-2.jpg" alt="beast image" width="570" height="405" /><br/><br/> <br/><br/> <br/><br/><strong>No seven:</strong> <a href="http://www.samsungmobile.co.uk/mobile-phones/samsung-galaxy-portal" target="_blank"> <span style="text-decoration:underline;">SAMSUNG GALAXY PORTAL</span></a><br/><br/><img class="aligncenter" title="beast image" src="http://dailyfreeinformation.com/wp-content/uploads/2010/09/samsung-galaxy-1.jpg" alt="beast image" width="478" height="478" /><br/><br/> <br/><br/> <br/><br/> <br/><br/><strong>No eight: </strong> <a href="http://www.motorola.com/Consumers/XW-EN/Consumer-Products-and-Services/Mobile-Phones/Motorola-MILESTONE-XW-EN" target="_blank"><span style="text-decoration:underline;">MOTOROLLA MILESTONE</span></a><br/><br/><img class="aligncenter" title="beast image" src="http://handies.phandroid.com/media/motorola-milestone-1270904231-290.jpg" alt="beast image" width="450" height="400" /><br/><br/> <br/><br/> <br/><br/><strong>No nine:</strong> <a href="http://www.lg.com/uk/mobile-phones/all-lg-phones/LG-touch-screen-phones-GW620.jsp" target="_blank"> <span style="text-decoration:underline;">LG IN TOUCH MAX GW620</span></a><br/><br/><img class="aligncenter" title="beast image" src="http://www.lg.com/uk/mobile-phones/images/lg-mobile_phones-GW620-3_4view-large.png" alt="beast image" width="335" height="495" /><br/><br/> <br/><br/> <br/><br/><strong>No ten:</strong> <a href="http://www.t-mobile.co.uk/content/g2-touch/index.html#//see-what-i-can-do" target="_blank"><span style="text-decoration:underline;"> T-MOBILE G2 TOUCH</span></a><br/><br/><img class="aligncenter" title="beast image" src="http://www.uberphones.com/photos/2008/10/g2.jpg" alt="beast image" width="468" height="353" /><br/><br/> <br/><br/>For specifications click on name of each phone.Engrmuhhttp://www.blogger.com/profile/07999644287947537783noreply@blogger.com0tag:blogger.com,1999:blog-7985409549535360299.post-78714384527180092092010-10-24T00:45:00.000-07:002010-12-18T22:11:48.990-08:00MeDiA pLaYeRsThere are many formats of audio and video .Each format has its own quality and importance.But how to play them.Huge number of media players available on the internet offer special features ,some of them really work but most are scam.<br/><br/><strong>H</strong>ere are the most efficient media players.(click on name to download)<br/><br/><a href="http://windows.microsoft.com/en-US/windows/products/windows-media-player" target="_blank">Windows Media Player</a> <img class="aligncenter" title="beast image" src="http://www.wpfw.org/assets/images/streamicons/wmp.jpg" alt="beast image" width="80" height="80" /><br/><br/><em>WMP DESIGN </em><img class="aligncenter" title="beast image" src="http://www.actualtools.com/images/WindowsMediaPlayer.gif" alt="beast image" width="430" height="320" /><br/><br/><a href="http://pk.real.com/" target="_blank">Real Player</a> <img class="aligncenter" title="beast image" src="http://www.wpfw.org/assets/images/streamicons/real.jpg" alt="beast image" width="80" height="80" /><em>REAL PLAYER DESIGN </em><img class="aligncenter" title="beast image" src="http://realplayer.brothersoft.com/screenshots/RealPlayer-10.5-%286.0.12.1741%29_2.png" alt="beast image" width="430" height="320" /><br/><a href="http://www.winamp.com/" target="_blank"></a><br/><br/><a href="http://www.winamp.com/" target="_blank">Winamp</a> <img class="aligncenter" title="beast image" src="http://www.veryicon.com/icon/preview/Application/3D%20Cartoon%20Icons%20Pack%20III/Winamp%20Icon.jpg" alt="beast image" width="80" height="80" /><em>WINAMP DESIGN</em> <img class="aligncenter" title="beast image" src="http://download.cnet.com/i/tim//2010/02/09/fmimg2879391993873834231.gif" alt="beast image" width="430" height="320" /><br/><a href="http://www.videolan.org/vlc/" target="_blank"></a><br/><br/><a href="http://www.videolan.org/vlc/" target="_blank">VLC</a> <img class="aligncenter" title="beast image" src="http://freefullsoftware.net/wp-content/uploads/blogger/_uME4UaS_IiQ/SWzoHvzzMCI/AAAAAAAABD0/yRQIzZraQaE/s400/VLC_icon.jpg" alt="beast image" width="80" height="80" /><em>VLC DESIGN </em><img class="aligncenter" title="beast image" src="http://images1.videolan.org/vlc/screenshots/1.0.0/VLC_Gnome.png" alt="beast image" width="430" height="320" /><br/><a href="http://www.apple.com/itunes/download/" target="_blank"></a><br/><br/><a href="http://www.apple.com/itunes/download/" target="_blank">Itunes</a> <img class="aligncenter" title="beast image" src="http://img61.imageshack.us/img61/5714/itunes7lr8.png" alt="beast image" width="80" height="80" /><em>I TUNES DESIGN </em><img class="aligncenter" title="beast image" src="http://www.smh.com.au/ffximage/2005/04/26/itunes_wideweb__430x310.jpg" alt="beast image" width="430" height="320" /><br/><a href="http://www.mediajukebox.com/" target="_blank"></a><br/><br/><a href="http://www.mediajukebox.com/" target="_blank">Media Jukebox</a> <img class="aligncenter" title="beast image" src="http://softfive.com/files/uploads/J.-River-Media-Jukebox-icon.jpg" alt="beast image" width="80" height="80" /><em>MEDIA JUKEBOX DESIGN </em><img class="aligncenter" title="beast image" src="http://www.mediajukebox.com/images/ReflectScreen.gif" alt="beast image" width="430" height="320" /><br/><a href="http://www.jetaudio.com/" target="_blank"></a><br/><br/><a href="http://www.jetaudio.com/" target="_blank">Jet audio</a> <img class="aligncenter" title="beast image" src="http://img.informer.com/icons/png/48/1432/1432172.png" alt="beast image" width="80" height="80" /><br/><em> JET AUDIO DESIGN </em><img class="aligncenter" title="beast image" src="http://the-gadgeteer.com/assets/jetaudio-iaudio-m3-20gb-player26.jpg" alt="beast image" width="430" height="320" />Engrmuhhttp://www.blogger.com/profile/07999644287947537783noreply@blogger.com5tag:blogger.com,1999:blog-7985409549535360299.post-24376110635213707582010-10-17T10:21:00.000-07:002010-12-18T22:11:48.958-08:00CoMpUtEr ViRuS<strong>A</strong> computer virus is a program(software).Viruses often exploit weaknesses in the security of operating systems or misplaced trust from users.A computer virus attaches itself to a program or file enabling it to spread from one computer to another, leaving infections as it travels.<br/><br/><strong>A</strong>lmost all viruses are attached to an executable file, which means the virus may exist on your computer but it actually cannot infect your computer unless you run or open the malicious program. It is important to note that a virus cannot be spread without a human action, (such as running an infected program) to keep it going.<br/><br/><img src="http://computerbeast.wordpress.com/DOCUME%7E1/XPPRESP3/LOCALS%7E1/Temp/moz-screenshot.png" alt="" /><span style="color:#ff0000;"><strong>The first virus(brain) was developed by Pakistanis in order to tackle copyright problem (1986).</strong></span><br/><br/><span style="color:#ff0000;"><strong><br/></strong></span><br/><br/><span style="color:#ff0000;"><strong><img class="aligncenter" title="beast image" src="http://www.imageenvision.com/150/26226-clip-art-graphic-of-a-sick-desktop-computer-cartoon-character-with-a-virus-by-toons4biz.jpg" alt="beast image" width="125" height="150" /><br/></strong></span><br/><br/><strong>M</strong>arket of anti virus companies is due to presence of viruses.Viruses are intentionally produced by a group of software engineers of anti virus companies and are spreaded in cyber world by different methods and when they affect the people on large scale the software engineers of antivirus companies create a new version of antivirus this is how antivirus softwares are sold in the market.<br/><br/><strong>B</strong>ut this is not the case always.Some time old programs can become viruses in a way they there are minor coding errors or garbage values which shake your system upside down.The unintentionally viruses are really hard to tackle in cyber world .They have been used as a weapon by hackers and blackmailers.<br/><br/><img class="aligncenter" title="beast image" src="http://cdn.techpp.com/wp-content/uploads/2009/10/windows_7_compatible_antivirus_software.jpg" alt="beast image" width="468" height="280" /><br/><strong>A</strong> worm is similar to a virus by design and is considered to be a sub-class of a virus. Worms spread from computer to computer, but unlike a virus, it has the capability to travel without any human action. A worm takes advantage of file or information transport features on your system, which is what allows it to travel unaided.<br/><strong>A</strong> trojan is destructive program that masquerades as a benign application. Unlike viruses, Trojan horses do not replicate themselves.A Trojan Horse is full of as much trickery as the mythological Trojan Horse it was named after. The Trojan Horse, at first glance will appear to be useful software but will actually do damage once installed or run on your computer.Some Trojans are designed to be more annoying than malicious (like changing your desktop, adding silly active desktop icons) or they can cause serious damage by deleting files and destroying information on your system. Trojans are also known to create a backdoor on your computer that gives malicious users access to your system, possibly allowing confidential or personal information to be compromised.<br/><br/><a href="http://computerbeast.files.wordpress.com/2010/10/computer-viruses.jpg"><img class="aligncenter size-medium wp-image-247" title="beast image" src="http://computerbeast.files.wordpress.com/2010/10/computer-viruses.jpg?w=300" alt="beast image" width="300" height="239" /></a>Engrmuhhttp://www.blogger.com/profile/07999644287947537783noreply@blogger.com2tag:blogger.com,1999:blog-7985409549535360299.post-86370349706332685902010-10-13T09:56:00.000-07:002010-12-18T22:11:48.937-08:00SPOT FIXING DRAMA FLOPS !<strong>S</strong>pot fixing drama erupted by English media at Oval has come to an end.<br/><br/>"Following extensive investigations into allegations about the one-day international between England and Pakistan at The Oval in London on 17 September, the ACSU(Anti-Corruption and Security Unit) has verified all the available information and concluded that there was no compelling evidence to suspect individual players or support staff," the ICC statement read.<br/><br/>Captain Afridi welcomed the decision of Oval clearance.<br/><br/><a href="http://computerbeast.wordpress.com/tag/cricket/"></a><a href="http://computerbeast.wordpress.com/tag/cricket/"><img class="aligncenter" title="beast image" src="http://www.google.com/hostednews/afp/media/ALeqM5iM3qc-GAQgoUHHr-9uPsQH_DnRXw?docId=photo_1286979902239-1-0&size=l" alt="beast image" width="512" height="341" /></a><span style="text-decoration:underline;color:#333300;"><em>Shahid Afridi of Pakistan leads his team off the field after winning on September 17</em></span><br/><br/><strong>A</strong>ll the videos were fake and a big propaganda has become unsuccessful.Yasir Hameed was also black mailed by English media.Unpopular cricketers were using this issue to gain attention of the people(like Sarfaraz nawaz) and many foreign players like Vettori ,Watson and Kumble were try to promote the fake scandal .The cheesy Veena Malik also used spot fixing issue to get fame.<br/><br/><strong>P</strong>akistan Cricket Board legal adviser Taffzul Rizvi said the ruling was a "positive development" but added any decision on whether to take legal action against British newspapers would wait for the outcome of the <span style="text-decoration:underline;">Lords spot-fixing inquiry.</span>Engrmuhhttp://www.blogger.com/profile/07999644287947537783noreply@blogger.com1tag:blogger.com,1999:blog-7985409549535360299.post-88390588334663231632010-10-11T08:38:00.000-07:002010-12-18T22:11:48.927-08:00Whats ANDROID ?<strong>A</strong>ndroid is a mobile operating system initially developed by Android Inc., a firm purchased by Google in 2005.Android is based upon a modified version of the Linux kernel. It is a participant in the Open Handset Alliance(The Open Handset Alliance (OHA) is a business alliance of 78 firms for developing open standards for mobile devices).<br/><br/>Currently android technology is also used in Tablet PC's.<br/><br/><a href="http://www.android.com/"><img class="aligncenter" title="beast image" src="http://upload.wikimedia.org/wikipedia/en/a/a5/Android-logo.jpg" alt="beast image" width="220" height="242" /></a><br/><br/><strong>T</strong>he Android operating system software stack consists of Java applications running on a Java based object oriented application framework on top of Java core libraries running on a Dalvik virtual machine featuring JIT compilation. Libraries written in C include the surface manager, OpenCore media framework, SQLite relational database management system, OpenGL ES 2.0 3D graphics API, WebKit layout engine, SGL graphics engine, SSL, and Bionic libc. The Android operating system consists of 12 million lines of code including 3 million lines of XML, 2.8 million lines of C, 2.1 million lines of Java, and 1.75 million lines of C++.<br/><br/><a href="http://www.sonyericsson.com/cws/products/mobilephones/overview/xperiax10mini"></a><a href="http://www.sonyericsson.com/cws/products/mobilephones/overview/xperiax10mini"><img class="aligncenter" title="beast image" src="http://www.itechnews.net/wp-content/uploads/2010/02/Sony-Ericsson-Xperia-X10-mini-android-phone.jpg" alt="beast image" width="291" height="372" /></a><br/><br/><strong>Features</strong><br/>Storage, Connectivity, Messaging , Web browser , Java support , Media support , Streaming media support , Additional hardware support , Development environment , Multi-touch , Bluetooth , Videocalling Multitasking , Voice based features and Tethering.<br/><br/><a href="http://computerbeast.files.wordpress.com/2010/10/oacaira3rvnsoe3.jpg"><img class="aligncenter size-medium wp-image-224" title="beast image" src="http://computerbeast.files.wordpress.com/2010/10/oacaira3rvnsoe3.jpg?w=300" alt="beast image" width="300" height="213" /></a><br/><br/><strong>A</strong>ndroid is open source and is replacing expensive technology in PC's.As in<br/>OLPC(One Laptop per Child) and the cheapest laptop from India(35$ laptop) is based on android technology.Engrmuhhttp://www.blogger.com/profile/07999644287947537783noreply@blogger.com0tag:blogger.com,1999:blog-7985409549535360299.post-74690898277633927462010-10-06T11:40:00.000-07:002010-12-18T22:11:48.901-08:00IBM Probes Atomic Memories, Photovoltaics, Quantum Computers<strong>S</strong>emiconductor designers today are attempting to design atomically accurate materials using the scanning tunneling microscope (STM) to image individual atoms. Unfortunately, only still images could be made. Now IBM has reinvented STM to work like pulsed lasers, permitting measurements to be made on a sub-nanosecond time scale, resulting in videolike movies of atoms made at rates of billions of frames per second .<br/><br/><strong>I</strong>BM invented the STM in the 1980s to create topographical maps of the locations of individual atoms on semiconductor surfaces. Resembling a raised-relief map of Earth, the STM is now used in every semiconductor lab worldwide. Upping the ante, IBM has now reinvented the pulsed-STM to make measurements a million times faster.<br/><br/>"<strong>O</strong>rdinarily, an STM measurement is a very slow process because it is measuring a very small current," said Andreas Heinrich, a physicist in IBM's Almaden Lab. "Our main breakthrough was to turn this situation around, continuing to measure current in the same way, but getting our time dependence from the pump-probe technique.”<br/><br/><a href="http://computerbeast.wordpress.com/tag/online-backup/" target="_blank"><img src="http://www.smartertechnology.com/images/stories/rcjIBMmemory1.jpg" alt="" align="left" /></a><strong>S</strong>TMs work by applying a voltage to a tiny tip held a few nanometers above the material being characterized. The voltage induces "quantum tunneling," whereby electrons teleport across the gap—disappearing from the tip and reappearing on the material without traversing the space in between. The new pulsed-STM improves on this technique by preceding measurements with a pump pulse followed by a probe pulse to read out the results.<br/><br/><strong>S</strong>canning tunneling microscope topograph of an iron atom (large yellow) on a nitride-covered substrate (blue), which someday may enable single-atom bit cells for memory chips.<br/><br/>"The pump pulse is basically the hammer that hits the bell and drives it into an excited 'ringing' state, and then the probe pulse is like a finger touching the bell to see if it is still ringing or not," said Heinrich.<br/><br/><strong>I</strong>n its demonstration, the pump signal set an iron atom's electrons into the "down-spin," or "1," state, and then, by virtue of quantum tunneling of the magnetization, relaxes back into the "up-spin," or "0," state without passing through the intermediate angles between up and down. By performing the test over and over, each time with a slightly longer interval between pump and probe pulse, IBM was able to determine the "refresh" time of future single-atom memory chips.<br/><br/><a href="http://www.ibm.com/us/en/" target="_blank"><img src="http://www.smartertechnology.com/images/stories/rcjIBMmemory2a.jpg" alt="" width="275" height="218" align="left" /></a><br/><br/><strong>C</strong>ompared with traditional dynamic random access memory (DRAM) memory chips, whose data values must be refreshed every 50 milliseconds or so, IBM's characterization of single atoms of iron used as the bit cells in future DRAMs would require refreshing much more quickly, about every 50 to 250 nanoseconds.<br/><br/>Scanning tunneling microscopes create raised-relief maps of the surface on a semiconductor chip.<br/><br/><strong>B</strong>esides characterizing possible atomic memory chip materials, IBM hopes that solar cell researchers will use its pulsed-STM method to improve their formulations—using a flash of light as the pump pulse to "ring the bell," followed by a normal electronic probe pulse to measure the photovoltaic material's efficiency.<br/><br/><a href="http://computerbeast.wordpress.com/tag/unbuntu/" target="_blank"><img src="http://www.smartertechnology.com/images/stories/rcjIBMmemory3.jpg" alt="" width="332" height="210" align="left" /></a><strong>T</strong>he next step for Heinrich's lab will be to demonstrate that the pulsed-STM can be used to extend the frontiers of quantum computing.<br/><br/>Scanning tunneling microscope topograph of a test chip's surface (green) with individual atoms (bumps) placed within cut-outs (blue) for characterization.<br/><br/>"What we need to do is control the amount of quantum mechanics," said Heinrich. "I see myself as being at a crossroads. One way is to have less quantum mechanics, which will make our single-atom bit cells more stable. But the other way is to have more quantum mechanics. Then we can start to perform quantum computations on the atomic scale too."(smartertechnology)Engrmuhhttp://www.blogger.com/profile/07999644287947537783noreply@blogger.com2tag:blogger.com,1999:blog-7985409549535360299.post-89124385003954996792010-10-01T12:49:00.000-07:002010-12-18T22:11:48.878-08:00Online Backup's<strong>T</strong>echnology is growing too fast , new technologies are invented and old are improved.If your are using old computers and your are running out of space , or if you cannot carry your usb or portable harddisk every where you can store your documents online.<br/><br/><a href="http://computerbeast.wordpress.com/2010/09/24/torrent/#comments"><img class="aligncenter" title="beast image" src="http://www.pixiefix.co.uk/images/backup%20diagram.gif" alt="beast image" width="500" height="508" /></a><br/><strong>Y</strong>es online or remote back up is the right solution for you.Online backup is a method of offsite data storage in which files, folders, or the entire contents of a hard drive are regularly backed up on a remote server or computer with a network connection.<br/><br/><strong>T</strong>here are many websites which offer online backup but following sites are the one which offer large online backup and are free.<br/><br/>1<a href="http://explore.live.com/windows-live-skydrive" target="_blank">.Windows live Skydrive</a> Space offered=25GB , only microsoft office files can be uploaded.<a href="http://explore.live.com/windows-live-skydrive"></a><a href="http://explore.live.com/windows-live-skydrive"><img class="aligncenter" title="beast image" src="http://www.ilvirtuale.com/files/2008/02/windowskydrive.jpg" alt="beast image" width="500" height="230" /></a><br/><br/>2.<a href="http://www.dropbox.com/" target="_blank">Dropbox</a> Space offered=2GB for free users<a href="http://www.dropbox.com/"><img class="aligncenter" title="beast image" src="http://graemeeyre.info/wp-content/uploads/2009/10/dropbox_logo.jpg" alt="beast image" width="500" height="230" /></a><br/><br/>3.<a href="http://www.adrive.com/" target="_blank">A Drive</a> Space offered=50GB for free users<a href="http://www.adrive.com/"><img class="aligncenter" title="beast image" src="http://www.tipsfor.us/wp-content/uploads/2008/11/adrive-logo.png" alt="beast image" width="500" height="230" /></a><br/><br/><a href="http://www.adrive.com/" target="_blank"></a><br/>4.<a href="http://www.divshare.com/" target="_blank">divShare</a> Space offered=5GB for free users<a href="http://www.divshare.com/"><img class="aligncenter" title="beast image" src="http://www.palemoon.org/dl-images/divshare-logo.png" alt="beast image" width="500" height="230" /></a><br/>5.<a href="http://www.badongo.com/" target="_blank">badongo</a> Space offered=unlimited for free users<a href="https://www.badongo.com/"><img class="aligncenter" title="beast image" src="http://www.badongo.com/images/logo_badongo1.net.gif" alt="beast image" width="500" height="230" /></a><br/>6.<a href="http://www.storewith.com/default.aspx" target="_blank">StoreWith</a> Space offered=unlimited for free users<a href="http://www.storewith.com/default.aspx"><img class="aligncenter" title="beast image" src="https://cooltoolsforschools.wikispaces.com/file/view/storewith.png" alt="beast image" width="500" height="230" /></a><br/><br/>7.<a href="https://www.google.com/accounts/ServiceLogin?service=writely&passive=1209600&continue=http://docs.google.com/&followup=http://docs.google.com/&ltmpl=homepage" target="_blank">Google docs</a> Space offered=1GB <a href="https://www.google.com/accounts/ServiceLogin?service=writely&passive=1209600&continue=http://docs.google.com/&followup=http://docs.google.com/&ltmpl=homepage"><img class="aligncenter" title="beast image" src="http://justtoological.com/wp-content/uploads/2009/04/google-docs-logo.jpg" alt="beast image" width="500" height="230" /></a><br/><br/><span style="text-decoration:underline;"><strong>Security Concerns:</strong></span><br/><br/>The most prominent online backup service providers stake their reputations on keeping your data safe and secure during both file transfer and the online data storage facilities. Before the files even leave your computer, they are secured using at least 128-bit SSL encryption technology. That is one of the same security measures that banks use while you are performing transactions.<br/><br/><a href="http://computerbeast.wordpress.com/about/"><img class="aligncenter" title="beast image" src="http://extremetrix.com/blog/wp-content/uploads/2010/09/Computer-Security.jpg" alt="beast image" width="500" height="230" /></a><br/><br/><strong>B</strong>ut anything can happen because big networks like facebook are unreliable.Best choice should be<a href="http://explore.live.com/windows-live-skydrive" target="_blank"> Windows live skydrive</a> but it only supports Microsoft office files.Engrmuhhttp://www.blogger.com/profile/07999644287947537783noreply@blogger.com1tag:blogger.com,1999:blog-7985409549535360299.post-61817011755241120292010-09-28T12:57:00.000-07:002010-12-18T22:11:48.866-08:00Happy Birthday Google<strong>T</strong>welve years ago the world got Googled and things haven't been the same since.<br/><br/><strong>I</strong>n just over a decade, the Silicon Valley company has become one of the titans of the tech industry, changing the way we do everything from email to pictures to video and more.<br/><br/><a href="http://computerbeast.wordpress.com/about/"><img class="aligncenter" title="beast image" src="http://sites.google.com/site/myfavoritephotoclub/google/Google-Happy-Birthday.jpg" alt="beast image" width="253" height="270" /></a><br/><br/><strong>T</strong>o celebrate its milestone, Mountain View-based Google changed the logo on its homepage Monday to an image of a cake made by the hand of famed American painter Wayne Thiebaud.<br/><br/>In the process Google also officially ends a long running debate on whether the company's birthday was on Sept. 7, 15 or 27. The company has celebrated on different days in the past.<br/><br/><strong>O</strong>ver the years Google has grown from more than a search engine. The company has revolutionized the advertising world along with expanding its business into the cell phone industry, fighting a bitter feud with fellow tech company Apple and made its employees the envy of disgruntled workers everywhere.<br/><br/><a href="http://computerbeast.wordpress.com/about/"><img class="aligncenter" title="beast image" src="http://plus.maths.org/latestnews/sep-dec08/google10/cake.jpg" alt="beast image" width="300" height="305" /></a><br/><br/>Not bad for a company that hasn't even hit puberty.courtesy(msnbc)Engrmuhhttp://www.blogger.com/profile/07999644287947537783noreply@blogger.com0tag:blogger.com,1999:blog-7985409549535360299.post-85810211359137757182010-09-24T07:22:00.000-07:002010-12-18T22:11:48.845-08:00ToRrEnT<strong>A</strong> torrent file contains the URLs of multiple trackers and integrity metadata about all the pieces. It can also contain additional metadata defined in extensions to the BitTorrent specification.<br/><p style="text-align:left;"><a href="http://www.bittorrent.com/"><img class="aligncenter" title="beast image" src="http://www.software-p2p.com/wp-content/uploads/2009/10/bittorrent-logo.png" alt="beast image" width="300" height="170" /></a><br/><strong>T</strong>orrents are good for users because they can download any expensive and overprice software easily(e.g photoshop).The torrent users should be thankful to software engineers who crack high quality software applications by their reverse enginnering skills.They users can also download songs, mostly movies , ebooks etc.</p><br/><strong>B</strong>ut it is not good for software producing companies because because they spent too much time on research and development of software and at the end they are not rewarded well.<br/>It has also affected the business of optical disc sellers ,any game song album and movie is easily download able by torrents.Song albums and movies are available in pirate version before release and film business is affected(that's good).<br/><br/><strong>T</strong>he speed of the downloading depends on two things; the number of other users sharing the file and the number of other users downloading this same file.<br/><br/><span style="text-decoration:underline;"><strong>Here are some of the popular torrent websites </strong></span>.<br/><br/><a href="http://www.torrentz.com/" target="_blank">www.torrentz.com/</a> <a href="http://computerbeast.wordpress.com/?p=192&preview=true#respond"><img class="aligncenter" title="beast image" src="http://upload.wikimedia.org/wikipedia/en/6/68/Torrentz_logo.png" alt="beast image" width="340" height="120" /></a><br/><br/><a href="http://www.isohunt.com/" target="_blank">www.isohunt.com/ </a><img class="aligncenter" title="beast image" src="http://i198.photobucket.com/albums/aa236/werewinterwolf/ISOHUNTlogo.png" alt="beast image" width="340" height="120" /><br/><br/><a href="http://thepiratebay.org/" target="_blank">http://thepiratebay.org/</a> <img class="aligncenter" title="beast image" src="http://upload.wikimedia.org/wikipedia/commons/thumb/1/16/The_Pirate_Bay_logo.svg/529px-The_Pirate_Bay_logo.svg.png" alt="beast image" width="340" height="120" /><br/><br/><a href="http://www.monova.org/" target="_blank">http://www.monova.org/</a> <img class="aligncenter" title="beast image" src="http://lh5.ggpht.com/_GEiY3s3yU4k/SxC4HNhElSI/AAAAAAAAJQw/mnAIO5T8WKE/Monova_thumb4.jpg?imgmax=800" alt="beast image" width="340" height="120" /><br/><br/><a href="http://www.kickasstorrents.com/" target="_blank">http://www.kickasstorrents.com/</a> <a href="http://computerbeast.wordpress.com/?p=192&preview=true#respond"><a href="http://computerbeast.files.wordpress.com/2010/09/kickasstorrents.png"><img class="aligncenter size-full wp-image-254" title="beast image" src="http://computerbeast.files.wordpress.com/2010/09/kickasstorrents.png" alt="beast image" width="340" height="120" /></a><br/></a><br/><br/><a href="http://www.torrentreactor.net/" target="_blank">http://www.torrentreactor.net/</a> <img class="aligncenter" title="beast image" src="http://z.about.com/d/websearch/1/0/1/a/torrentreactor.png" alt="beast image" width="340" height="120" /><br/><br/><a href="http://www.mininova.org/" target="_blank">www.mininova.org/</a> <a href="http://computerbeast.files.wordpress.com/2010/09/mininova_logo.jpg"><img class="aligncenter size-full wp-image-255" title="beast image" src="http://computerbeast.files.wordpress.com/2010/09/mininova_logo.jpg" alt="beast image" width="340" height="120" /></a><br/><a href="http://www.newtorrents.info/" target="_blank">http://www.newtorrents.info/</a> <img class="aligncenter" title="beast image" src="http://forums.newtorrents.info/style_images/1/logo4.gif" alt="beast image" width="340" height="120" />Engrmuhhttp://www.blogger.com/profile/07999644287947537783noreply@blogger.com1