iphone which dominated the mobile world for its touch screen features is outclassed this year by many companies.Best android phones this year are
No One: HTC DESIRE
No Two: NEXUS ONE
No three: XPERIA X10 MINI PRO
No four: HTC LEGEND
No five: XPERIA X10
No six: HTC HERO
No seven: SAMSUNG GALAXY PORTAL
No eight: MOTOROLLA MILESTONE
No nine: LG IN TOUCH MAX GW620
No ten: T-MOBILE G2 TOUCH
For specifications click on name of each phone.
Thursday, October 28, 2010
Sunday, October 24, 2010
MeDiA pLaYeRs
There are many formats of audio and video .Each format has its own quality and importance.But how to play them.Huge number of media players available on the internet offer special features ,some of them really work but most are scam.
Here are the most efficient media players.(click on name to download)
Windows Media Player
WMP DESIGN
Real Player REAL PLAYER DESIGN
Winamp WINAMP DESIGN
VLC VLC DESIGN
Itunes I TUNES DESIGN
Media Jukebox MEDIA JUKEBOX DESIGN
Jet audio
JET AUDIO DESIGN
Here are the most efficient media players.(click on name to download)
Windows Media Player
WMP DESIGN
Real Player REAL PLAYER DESIGN
Winamp WINAMP DESIGN
VLC VLC DESIGN
Itunes I TUNES DESIGN
Media Jukebox MEDIA JUKEBOX DESIGN
Jet audio
JET AUDIO DESIGN
Sunday, October 17, 2010
CoMpUtEr ViRuS
A computer virus is a program(software).Viruses often exploit weaknesses in the security of operating systems or misplaced trust from users.A computer virus attaches itself to a program or file enabling it to spread from one computer to another, leaving infections as it travels.
Almost all viruses are attached to an executable file, which means the virus may exist on your computer but it actually cannot infect your computer unless you run or open the malicious program. It is important to note that a virus cannot be spread without a human action, (such as running an infected program) to keep it going.
The first virus(brain) was developed by Pakistanis in order to tackle copyright problem (1986).
Market of anti virus companies is due to presence of viruses.Viruses are intentionally produced by a group of software engineers of anti virus companies and are spreaded in cyber world by different methods and when they affect the people on large scale the software engineers of antivirus companies create a new version of antivirus this is how antivirus softwares are sold in the market.
But this is not the case always.Some time old programs can become viruses in a way they there are minor coding errors or garbage values which shake your system upside down.The unintentionally viruses are really hard to tackle in cyber world .They have been used as a weapon by hackers and blackmailers.
A worm is similar to a virus by design and is considered to be a sub-class of a virus. Worms spread from computer to computer, but unlike a virus, it has the capability to travel without any human action. A worm takes advantage of file or information transport features on your system, which is what allows it to travel unaided.
A trojan is destructive program that masquerades as a benign application. Unlike viruses, Trojan horses do not replicate themselves.A Trojan Horse is full of as much trickery as the mythological Trojan Horse it was named after. The Trojan Horse, at first glance will appear to be useful software but will actually do damage once installed or run on your computer.Some Trojans are designed to be more annoying than malicious (like changing your desktop, adding silly active desktop icons) or they can cause serious damage by deleting files and destroying information on your system. Trojans are also known to create a backdoor on your computer that gives malicious users access to your system, possibly allowing confidential or personal information to be compromised.
Almost all viruses are attached to an executable file, which means the virus may exist on your computer but it actually cannot infect your computer unless you run or open the malicious program. It is important to note that a virus cannot be spread without a human action, (such as running an infected program) to keep it going.
The first virus(brain) was developed by Pakistanis in order to tackle copyright problem (1986).
Market of anti virus companies is due to presence of viruses.Viruses are intentionally produced by a group of software engineers of anti virus companies and are spreaded in cyber world by different methods and when they affect the people on large scale the software engineers of antivirus companies create a new version of antivirus this is how antivirus softwares are sold in the market.
But this is not the case always.Some time old programs can become viruses in a way they there are minor coding errors or garbage values which shake your system upside down.The unintentionally viruses are really hard to tackle in cyber world .They have been used as a weapon by hackers and blackmailers.
A worm is similar to a virus by design and is considered to be a sub-class of a virus. Worms spread from computer to computer, but unlike a virus, it has the capability to travel without any human action. A worm takes advantage of file or information transport features on your system, which is what allows it to travel unaided.
A trojan is destructive program that masquerades as a benign application. Unlike viruses, Trojan horses do not replicate themselves.A Trojan Horse is full of as much trickery as the mythological Trojan Horse it was named after. The Trojan Horse, at first glance will appear to be useful software but will actually do damage once installed or run on your computer.Some Trojans are designed to be more annoying than malicious (like changing your desktop, adding silly active desktop icons) or they can cause serious damage by deleting files and destroying information on your system. Trojans are also known to create a backdoor on your computer that gives malicious users access to your system, possibly allowing confidential or personal information to be compromised.
Wednesday, October 13, 2010
SPOT FIXING DRAMA FLOPS !
Spot fixing drama erupted by English media at Oval has come to an end.
"Following extensive investigations into allegations about the one-day international between England and Pakistan at The Oval in London on 17 September, the ACSU(Anti-Corruption and Security Unit) has verified all the available information and concluded that there was no compelling evidence to suspect individual players or support staff," the ICC statement read.
Captain Afridi welcomed the decision of Oval clearance.
Shahid Afridi of Pakistan leads his team off the field after winning on September 17
All the videos were fake and a big propaganda has become unsuccessful.Yasir Hameed was also black mailed by English media.Unpopular cricketers were using this issue to gain attention of the people(like Sarfaraz nawaz) and many foreign players like Vettori ,Watson and Kumble were try to promote the fake scandal .The cheesy Veena Malik also used spot fixing issue to get fame.
Pakistan Cricket Board legal adviser Taffzul Rizvi said the ruling was a "positive development" but added any decision on whether to take legal action against British newspapers would wait for the outcome of the Lords spot-fixing inquiry.
"Following extensive investigations into allegations about the one-day international between England and Pakistan at The Oval in London on 17 September, the ACSU(Anti-Corruption and Security Unit) has verified all the available information and concluded that there was no compelling evidence to suspect individual players or support staff," the ICC statement read.
Captain Afridi welcomed the decision of Oval clearance.
Shahid Afridi of Pakistan leads his team off the field after winning on September 17
All the videos were fake and a big propaganda has become unsuccessful.Yasir Hameed was also black mailed by English media.Unpopular cricketers were using this issue to gain attention of the people(like Sarfaraz nawaz) and many foreign players like Vettori ,Watson and Kumble were try to promote the fake scandal .The cheesy Veena Malik also used spot fixing issue to get fame.
Pakistan Cricket Board legal adviser Taffzul Rizvi said the ruling was a "positive development" but added any decision on whether to take legal action against British newspapers would wait for the outcome of the Lords spot-fixing inquiry.
Monday, October 11, 2010
Whats ANDROID ?
Android is a mobile operating system initially developed by Android Inc., a firm purchased by Google in 2005.Android is based upon a modified version of the Linux kernel. It is a participant in the Open Handset Alliance(The Open Handset Alliance (OHA) is a business alliance of 78 firms for developing open standards for mobile devices).
Currently android technology is also used in Tablet PC's.
The Android operating system software stack consists of Java applications running on a Java based object oriented application framework on top of Java core libraries running on a Dalvik virtual machine featuring JIT compilation. Libraries written in C include the surface manager, OpenCore media framework, SQLite relational database management system, OpenGL ES 2.0 3D graphics API, WebKit layout engine, SGL graphics engine, SSL, and Bionic libc. The Android operating system consists of 12 million lines of code including 3 million lines of XML, 2.8 million lines of C, 2.1 million lines of Java, and 1.75 million lines of C++.
Features
Storage, Connectivity, Messaging , Web browser , Java support , Media support , Streaming media support , Additional hardware support , Development environment , Multi-touch , Bluetooth , Videocalling Multitasking , Voice based features and Tethering.
Android is open source and is replacing expensive technology in PC's.As in
OLPC(One Laptop per Child) and the cheapest laptop from India(35$ laptop) is based on android technology.
Currently android technology is also used in Tablet PC's.
The Android operating system software stack consists of Java applications running on a Java based object oriented application framework on top of Java core libraries running on a Dalvik virtual machine featuring JIT compilation. Libraries written in C include the surface manager, OpenCore media framework, SQLite relational database management system, OpenGL ES 2.0 3D graphics API, WebKit layout engine, SGL graphics engine, SSL, and Bionic libc. The Android operating system consists of 12 million lines of code including 3 million lines of XML, 2.8 million lines of C, 2.1 million lines of Java, and 1.75 million lines of C++.
Features
Storage, Connectivity, Messaging , Web browser , Java support , Media support , Streaming media support , Additional hardware support , Development environment , Multi-touch , Bluetooth , Videocalling Multitasking , Voice based features and Tethering.
Android is open source and is replacing expensive technology in PC's.As in
OLPC(One Laptop per Child) and the cheapest laptop from India(35$ laptop) is based on android technology.
Wednesday, October 6, 2010
IBM Probes Atomic Memories, Photovoltaics, Quantum Computers
Semiconductor designers today are attempting to design atomically accurate materials using the scanning tunneling microscope (STM) to image individual atoms. Unfortunately, only still images could be made. Now IBM has reinvented STM to work like pulsed lasers, permitting measurements to be made on a sub-nanosecond time scale, resulting in videolike movies of atoms made at rates of billions of frames per second .
IBM invented the STM in the 1980s to create topographical maps of the locations of individual atoms on semiconductor surfaces. Resembling a raised-relief map of Earth, the STM is now used in every semiconductor lab worldwide. Upping the ante, IBM has now reinvented the pulsed-STM to make measurements a million times faster.
"Ordinarily, an STM measurement is a very slow process because it is measuring a very small current," said Andreas Heinrich, a physicist in IBM's Almaden Lab. "Our main breakthrough was to turn this situation around, continuing to measure current in the same way, but getting our time dependence from the pump-probe technique.”
STMs work by applying a voltage to a tiny tip held a few nanometers above the material being characterized. The voltage induces "quantum tunneling," whereby electrons teleport across the gap—disappearing from the tip and reappearing on the material without traversing the space in between. The new pulsed-STM improves on this technique by preceding measurements with a pump pulse followed by a probe pulse to read out the results.
Scanning tunneling microscope topograph of an iron atom (large yellow) on a nitride-covered substrate (blue), which someday may enable single-atom bit cells for memory chips.
"The pump pulse is basically the hammer that hits the bell and drives it into an excited 'ringing' state, and then the probe pulse is like a finger touching the bell to see if it is still ringing or not," said Heinrich.
In its demonstration, the pump signal set an iron atom's electrons into the "down-spin," or "1," state, and then, by virtue of quantum tunneling of the magnetization, relaxes back into the "up-spin," or "0," state without passing through the intermediate angles between up and down. By performing the test over and over, each time with a slightly longer interval between pump and probe pulse, IBM was able to determine the "refresh" time of future single-atom memory chips.
Compared with traditional dynamic random access memory (DRAM) memory chips, whose data values must be refreshed every 50 milliseconds or so, IBM's characterization of single atoms of iron used as the bit cells in future DRAMs would require refreshing much more quickly, about every 50 to 250 nanoseconds.
Scanning tunneling microscopes create raised-relief maps of the surface on a semiconductor chip.
Besides characterizing possible atomic memory chip materials, IBM hopes that solar cell researchers will use its pulsed-STM method to improve their formulations—using a flash of light as the pump pulse to "ring the bell," followed by a normal electronic probe pulse to measure the photovoltaic material's efficiency.
The next step for Heinrich's lab will be to demonstrate that the pulsed-STM can be used to extend the frontiers of quantum computing.
Scanning tunneling microscope topograph of a test chip's surface (green) with individual atoms (bumps) placed within cut-outs (blue) for characterization.
"What we need to do is control the amount of quantum mechanics," said Heinrich. "I see myself as being at a crossroads. One way is to have less quantum mechanics, which will make our single-atom bit cells more stable. But the other way is to have more quantum mechanics. Then we can start to perform quantum computations on the atomic scale too."(smartertechnology)
IBM invented the STM in the 1980s to create topographical maps of the locations of individual atoms on semiconductor surfaces. Resembling a raised-relief map of Earth, the STM is now used in every semiconductor lab worldwide. Upping the ante, IBM has now reinvented the pulsed-STM to make measurements a million times faster.
"Ordinarily, an STM measurement is a very slow process because it is measuring a very small current," said Andreas Heinrich, a physicist in IBM's Almaden Lab. "Our main breakthrough was to turn this situation around, continuing to measure current in the same way, but getting our time dependence from the pump-probe technique.”
STMs work by applying a voltage to a tiny tip held a few nanometers above the material being characterized. The voltage induces "quantum tunneling," whereby electrons teleport across the gap—disappearing from the tip and reappearing on the material without traversing the space in between. The new pulsed-STM improves on this technique by preceding measurements with a pump pulse followed by a probe pulse to read out the results.
Scanning tunneling microscope topograph of an iron atom (large yellow) on a nitride-covered substrate (blue), which someday may enable single-atom bit cells for memory chips.
"The pump pulse is basically the hammer that hits the bell and drives it into an excited 'ringing' state, and then the probe pulse is like a finger touching the bell to see if it is still ringing or not," said Heinrich.
In its demonstration, the pump signal set an iron atom's electrons into the "down-spin," or "1," state, and then, by virtue of quantum tunneling of the magnetization, relaxes back into the "up-spin," or "0," state without passing through the intermediate angles between up and down. By performing the test over and over, each time with a slightly longer interval between pump and probe pulse, IBM was able to determine the "refresh" time of future single-atom memory chips.
Compared with traditional dynamic random access memory (DRAM) memory chips, whose data values must be refreshed every 50 milliseconds or so, IBM's characterization of single atoms of iron used as the bit cells in future DRAMs would require refreshing much more quickly, about every 50 to 250 nanoseconds.
Scanning tunneling microscopes create raised-relief maps of the surface on a semiconductor chip.
Besides characterizing possible atomic memory chip materials, IBM hopes that solar cell researchers will use its pulsed-STM method to improve their formulations—using a flash of light as the pump pulse to "ring the bell," followed by a normal electronic probe pulse to measure the photovoltaic material's efficiency.
The next step for Heinrich's lab will be to demonstrate that the pulsed-STM can be used to extend the frontiers of quantum computing.
Scanning tunneling microscope topograph of a test chip's surface (green) with individual atoms (bumps) placed within cut-outs (blue) for characterization.
"What we need to do is control the amount of quantum mechanics," said Heinrich. "I see myself as being at a crossroads. One way is to have less quantum mechanics, which will make our single-atom bit cells more stable. But the other way is to have more quantum mechanics. Then we can start to perform quantum computations on the atomic scale too."(smartertechnology)
Friday, October 1, 2010
Online Backup's
Technology is growing too fast , new technologies are invented and old are improved.If your are using old computers and your are running out of space , or if you cannot carry your usb or portable harddisk every where you can store your documents online.
Yes online or remote back up is the right solution for you.Online backup is a method of offsite data storage in which files, folders, or the entire contents of a hard drive are regularly backed up on a remote server or computer with a network connection.
There are many websites which offer online backup but following sites are the one which offer large online backup and are free.
1.Windows live Skydrive Space offered=25GB , only microsoft office files can be uploaded.
2.Dropbox Space offered=2GB for free users
3.A Drive Space offered=50GB for free users
4.divShare Space offered=5GB for free users
5.badongo Space offered=unlimited for free users
6.StoreWith Space offered=unlimited for free users
7.Google docs Space offered=1GB
Security Concerns:
The most prominent online backup service providers stake their reputations on keeping your data safe and secure during both file transfer and the online data storage facilities. Before the files even leave your computer, they are secured using at least 128-bit SSL encryption technology. That is one of the same security measures that banks use while you are performing transactions.
But anything can happen because big networks like facebook are unreliable.Best choice should be Windows live skydrive but it only supports Microsoft office files.
Yes online or remote back up is the right solution for you.Online backup is a method of offsite data storage in which files, folders, or the entire contents of a hard drive are regularly backed up on a remote server or computer with a network connection.
There are many websites which offer online backup but following sites are the one which offer large online backup and are free.
1.Windows live Skydrive Space offered=25GB , only microsoft office files can be uploaded.
2.Dropbox Space offered=2GB for free users
3.A Drive Space offered=50GB for free users
4.divShare Space offered=5GB for free users
5.badongo Space offered=unlimited for free users
6.StoreWith Space offered=unlimited for free users
7.Google docs Space offered=1GB
Security Concerns:
The most prominent online backup service providers stake their reputations on keeping your data safe and secure during both file transfer and the online data storage facilities. Before the files even leave your computer, they are secured using at least 128-bit SSL encryption technology. That is one of the same security measures that banks use while you are performing transactions.
But anything can happen because big networks like facebook are unreliable.Best choice should be Windows live skydrive but it only supports Microsoft office files.
Labels:
adrive,
badongo,
divshare,
dropbox,
googledocs,
online backup,
skydrive,
SSL,
storewith
Subscribe to:
Posts (Atom)