Wednesday, November 30, 2011

Apple's ipad + Microsoft



Software giant Microsoft, is working on an app for Apple's tablet as reported by the an ipad based news outlet. The app which is an adaptation of Microsoft Office could arrive before the next version of Office for Mac comes out, which is expected to hit the market late next year.

Microsoft said in a statement
"We already deliver Office on multiple platforms and devices and are committed to expanding in the future, but have nothing further to share today."
Microsoft already presently offers a handful of apps for both the iPad and the iPhone, including Bing and Windows Live Messenger, among others. Creating the Office application for the iPad could help the device's prospects in work environments, a market where it's already making inroads at the expense of Windows PCs.

It is no news that Microsoft is busily working on Windows 8, the next version of its flagship operating system which promises many features, for tablet computers. To download a developer's version of the window 8 click here.

March last year, Apple introduced its own office software,  the iWork, as a collection of individual apps for the iPad. The suite consists of Pages, Keynote and Numbers, the same lineup as offered for the Mac OS X users. All three of those apps can open and export Microsoft Office files that match up with Microsoft's Word, PowerPoint and Excel software, with Apple providing ways to natively view those files in its own built-in e-mail application.
The cost for the Office ipad app is likely to be around $10 as reported by the Daily. The amount is the same amount Apple charges for each of its individual iWork for iPad apps.

Tuesday, November 29, 2011

Batch Files:simple games

This is a nice video showing the application (advanced application) of batch files.....
It also gives you a better understanding of how batch files are written and how they work....
.......Enjoy......







Monday, November 28, 2011

What makes lithium ion batteries to swell ?



Well, today i will answer a very common question that people ask, probably because of their phones are powered by lithium ion batteries.
First a quote from a professor of Materials Chemistry at MIT who is an expert in advanced battery technologies, here is what he said;
“I’ve seen lithium-ion batteries that are so swollen you’d be tempted to prick them with a pin,” says Don Sadoway. The problem has to do with the chemistry of lithium ion batteries, that is how the batteries were manufactured, which reacts unfavorably to overcharging.
“There are strict limits on how much current can be put through a lithium-ion cell,” explains Sadoway. “During normal charging, you never see metallic lithium, which is inherently unstable. But during overcharging, the lithium builds up faster than it can dissipate. The result is that metallic lithium plates up on the anode. At the same time, the cathode becomes an oxidizing agent and loses stability.”
The big danger, says Sadoway, is that this chemical reaction is accompanied by heat because it is exothermic in nature and-- as every engineer knows -- warm gas occupies more space, which is what causes the battery to swell.
The bulging battery becomes a ticking bomb because if that battery is still kept on overcharge, it will get to a stage whereby the gases become so much that they cause the batteries to explode; in some cases that has happened.
As a safeguard, more recently manufactured batteries normally come with inbuilt  internal charging circuits, using charger ICs and vendor-supplied reference designs. Instead of controlling the charging directly like before, these internal battery pack circuits prevent an overcharge. And if they detect a limit, they shut down the battery.
Design of these circuits can be tricky, as consumers can accidentally connect the wrong power adaptor to a device. So engineers need to plan for almost any contingency.
And if they’ve been designing for nickel-metal-hydride batteries in the past, they need to throw the existing charger out as it will be incompatible with the new design. New phones nowadays inform the user when the battery is fully charged.....
I hope that has answered the question so when next your battery is full, disconnect it immediately to avoid overcharging....


Wednesday, November 23, 2011

IPv6 versus IPv4


The support for IPv6 (internet protocol version 6) has grown by almost 20 times in the past year by one measure, but most websites can only still be reached with the IPv4, the current Internet Protocol, which is already almost being exhausted of its available free addresses.
The number of sub-domains under .org, .net and .com that support Internet Protocol version 6 increased by about 1,900 percent in the year leading up to last month (October 2011), according to an automated sampling of sub-domains by Measurement Factory. The study, which was sponsored by IPv6 software specialist InfoBlox, used a script to automatically sample 1 percent of the sub-domains under the three well-known top-level domains.
The IPv4 can accommodate about 4 billion addresses only, while the IPv6 can accommodate nearly an unlimited supply of addresses. ICANN (Internet Corporation for Assigned Names and Numbers), the global governing body for the Internet, assigned the last of the unclaimed IPv4 addresses to regional registry bodies earlier this year. Some enterprises and service providers are using dual software stacks to  make a gradual transition to IPv6, but experts expect users eventually to come to the Internet without IPv4 addresses. They will need pure IPv6 communication, which cannot be currently offered by most website operator.
Last month, 25.4 percent of sub-domains under .com, .net and .org supported IPv6, up from just 1.27 percent a year earlier. All the figure means is that a DNS (Domain Name System) server can point to those sub-domains using IPv6. If a user with an IPv6-only device tries to go to a website, for example, the site's registrar can match up its URL with an IPv6 address and kick back an answer to the Web surfer, said Cricket Liu, vice president of architecture at InfoBlox.
Most of the dramatic boost in the past year came when GoDaddy, one of the world's largest domain registrars, made its DNS work with IPv6. GoDaddy claims its DNS service has more than 30 million customers. Had it not been for GoDaddy, the number of sub-domains supported would have grown by a bit more than double, to about 3 percent, according to Measurement Factory.
But for now, most of those DNS requests wouldn't take an IPv6-only user to an actual Web page, because less than 1 percent of all sub-domains surveyed had IPv6-enabled Web servers, according to the Measurement Factory study. Likewise, there were very few IPv6 email servers. Just over 2 percent of zones were served by IPv6-compatible mail servers.
The good news is that many more operators of websites, such as GoDaddy's customers, now can serve IPv6 visitors once they have an IPv6-compliant Web server, Liu said. Along with GoDaddy, Measurement Factory cited three other major registrars, Gandi and OVH in France and Active24 in the Czech Republic, that adopted IPv6 during the period.
GoDaddy has said that plans where underway to extend its IPv6 strategy by supporting the new protocol on its website hosting service. Then, companies that rely on GoDaddy instead of operating their own Web servers will be able to run an IPv6 site.
The study found France as the leader in IPv6 adoption, with 57 percent of sub-domains in France reachable by IPv6, followed by the U.S. and Czech Republic with 42 percent and 36 percent adoption respectively. But its scope was limited by examining only .com, .net and .org. For one thing, that left out sub-domains that are under country-level domains in Asia, where a more severe shortage of IPv4 addresses has led to strong government efforts behind IPv6 in some countries. 
The sample also overlooked other top-level domains where IPv6 has been more widely adopted, such as the .gov domain of the U.S. government and the .edu domain used by universities, said Nav Chander, an Internet infrastructure analyst at IDC. However, the move to pure IPv6 networking remains slow, Chander said. "There's still very little IPv6 usage," he said.



source

Batch Files: getting started part IV

This is the part four of the series " Batch Files " , i though it will be nice to post a video on the application of batch files (just an example). The text about batch files i have posted before is quite boring (believe me, i know especially when you don't have a video to watch and do...) so it about time we saw some action.....check out this video i got from youtube, i decided to share it here for whoever is interested...
Enough text, lets watch....

Tuesday, November 22, 2011

Google Android and the Samsung Galaxy smartphone

For those of us who have the time to view this (it is quite long but you can skip some part :-) and also a fast internet to avoid a lot of buffering ).....This is from the Android developer's channel on you-tube....
Enjoy.....


Sunday, November 20, 2011

Batch Files:more on batch files

Hi everyone,
This are some commands you might find yourself using in a batch file....
the list is just to make you familiar with some commands...

For those of us who already know a little of MS-DOS commands, we will know that they are not case sensitive and just like all MS-DOS commands, all batch file commands are not case sensitive as well However, all commands listed below are in caps to help you identify what is a command and what is not.
@Does not echo back the text after the at symbol. This is most commonly used as @ECHO OFF to prevent any of the commands in the batch file from being displayed, just the information needed.
%1The percent followed by a numeric value, beginning with one, allows users to add variables within a batch file. The below line is an example of what can be used in a batch file. ECHO Hello %1
When the above one-line batch file is created, add your name after the batch file. For example, typing myname (being the name of the bat file) and then your name:
myname bob
would output:
Hello bob
Note: This can be extended to %2, %3, and so on.
::One of two ways of adding remarks into the batch file without displaying or executing that line when the batch file is run.

Saturday, November 19, 2011

Google Android updates causes confusion


Google Android OS upgrades may leave many consumers scratching their heads in confusion and others pulling out their hair in frustration.
The first smarpthone sporting the new Ice Cream Sandwich software, the Samsung Galaxy Nexus, hit the market yesterday in the U.K. The heavy anticipated smartphone is expected to be made available in other markets around the world by the end of this month.
The biggest selling point of the new smartphone is the Operating System it runs on: Ice Cream Sandwich. This new OS not only redesigns the Android user interface and provides one release of software for both tablets and smartphones, but it also adds a whole lot of new cool features. These includes but are not limited to: facial recognition to unlock the phone, and a very cool new exchange platform Android Beam, it provides an NFC-driven feature to exchange content like maps, contact details, and YouTube videos.
The release of the Samsung's Nexus Galaxy and the new Google's Ice Cream Sandwich OS software has millions of existing Android owners wondering when or if their smartphone might get the new OS software. Even though Google said earlier this week that it's made the source code available to developers, it's unclear when and on which devices manufacturers and carriers will start rolling out the software.
Even Samsung, which is the manufacturer making the Galaxy Nexus, hasn't been clear about when other Samsung Android phones will get the update.
Galaxy Nexus, the first Ice Cream Sandwich OS powered smartphone
(Credit: Samsung)
Other manufacturers have been just as kept in the dark. Motorola has said that its new Droid Razr will likely run on the OS software in the early part of 2012. And HTC said its new Rezound smartphone announced earlier this month is already "Ice Cream Sandwich-ready," but it wouldn't say when the device would actually get Ice Cream Sandwich.
The confusion over which devices will get Ice Cream Sandwich and when they might get it is just one more example of how the rapid evolution of the operating system is fragmenting the market. Not only are there dozens of hardware options for Android phones, but in the three years that the Google OS has been on the market, there have already been six major releases of the software introduced not including Ice Cream Sandwich. There have also been several minor point updates, or sub-updates, to the software along the way.
These software releases get version numbers and are also associated with names of yummy desserts. They span from Cupcake Android 1.5 to Honeycomb Android 3.2 and now Ice Cream Sandwich 4.0.
Google is well aware of the problems associated with how different versions of software and hardware complicate the market. In May, at its Google I/O developer conference, the company announced a new initiative to reign in software version fragmentation across Android devices. Google said it would work with manufacturers and wireless carriers to develop guidelines to help get updates to devices more quickly. Google pledged that participating partners and carriers would receive the most-current version of the Android software, for up to 18 months after the device's initial release. There's been little talk of these efforts since the announcement was made.

Friday, November 18, 2011

Batch Files: getting started part III

Now lets try to modify the first example a bit...i.e. make it more cooler, so this modified batch file example is going to list all the files in a folder and put the list in a new text file . We will use the directory command "dir" that you are already familiar with.
Open Notepad and enter the line "@echo off" (without quotes).
Next enter another line dir "C:\Program Files" > C:\list_of_program_files.txt(I'm assuming that your Program Files folder is on the C: drive). This will give us the two-line file @echo offdir "C:\Program Files" > C:\list_of_program_files.txt
 Now save this two-line file as "listprograms.bat" (without quotes) to some convenient location. Be sure that Notepad is saving as "All files" and not as a text file

  • Note that complete paths are used for files including the drive letter, even the files' extension is specified. 
  • Also note the quotes

Video album:google jobs

Check this out.....
Ever wanted to know how it is like to work for google,
see below....



Wednesday, November 16, 2011

Batch Files: getting started part 2


The first line in a batch file often consists of this command
   @echo off
By default, a batch file will display its commands as it runs. The purpose of writing this first command is to make sure the display is turned off. The command "echo off" turns off the display for the whole script, except for the "echo off" command itself. If you wish to make the turn off command apply to the echo command as well then you type the "at" sign "@" in front of the echo command
i.e. @echo off
It doesn't really affect the batch file whether you use "@echo off" or just "echo off" . The scripts we will discuss are very brief and omitting this line won't make any great difference. However, as a matter of good practice, it will be wise to enter it in our scripts, especially if the script is going to be a long one.
If you are familiar with  the commands used in CMD, one of them that we mostly use (or i use a lot) is the "dir" command, without the quotes...It lists all the files and folder in the present directory you are on...try it now
open command prompt,  to run command prompt >>
on windows XP click start...click run...and type cmd....OR go to accessories and click on cmd
on windows 7 just search for cmd and run it,
you will see the prompt below as your present directory if you installed to drive C: or something similar depending on your machine and where you installed your windows

C:\"your work-group e.g Users"\"your home folder">

now type in the dir command and a list of all the files and folders present there will be displayed...
the ones that have a <DIR> in front of them are folders while the rest with extensions e.g .txt .exe .bat are files...

The first batch file example i want to introduce will just

Tuesday, November 15, 2011

Internet Architects Warn of Risks in Ultrafast Networks

SANTA CLARA, Calif. — If nothing else, Arista Networks proves that two people can make more than $1 billion each building the Internet and still be worried about its reliability.
Jim Wilson/The New York Times
The Arista Networks founders, Andreas Bechtolsheim, left, David Cheriton and Kenneth Duda, with a data-routing switch at the company's headquarters in Santa Clara, Calif.
Jim Wilson/The New York Times
Lorenz Redlefsen, an Arista engineer, with a data-routing switch.
David Cheriton, a computer science professor at Stanford known for his skills in software design, and Andreas Bechtolsheim, one of the founders of Sun Microsystems, have committed $100 million of their money, and spent half that, to shake up the business of connecting computers in the Internet’s big computing centers.
As the Arista founders say, the promise of having access to mammoth amounts of data instantly, anywhere, is matched by the threat of catastrophe. People are creating more data and moving it ever faster on computer networks. The fast networks allow people to pour much more of civilization online, including not just Facebook posts and every book ever written, but all music, live video calls, and most of the information technology behind modern business, into a worldwide “cloud” of data centers. The networks are designed so it will always be available, via phone, tablet, personal computer or an increasing array of connected devices.
Statistics dictate that the vastly greater number of transactions among computers in a world 100 times faster than today will lead to a greater number of unpredictable accidents, with less time in between them. Already, Amazon’s cloud for businesses failed for several hours in April, when normal computer routines faltered and the system overloaded. Google’s cloud of e-mail and document collaboration software has been interrupted several times.
“We think of the Internet as always there. Just because we’ve become dependent on it, that doesn’t mean it’s true,” Mr. Cheriton says. Mr. Bechtolsheim says that because of the Internet’s complexity, the global network is impossible to design without bugs. Very dangerous bugs, as they describe them, capable of halting commerce, destroying financial information or enabling hostile attacks by foreign powers.
Both were among the first investors in Google, which made them billionaires, and, before that, they created and sold a company to the networking giant Cisco Systems for $220 million. Wealth and reputations as technology seers give their arguments about the risks of faster networks rare credibility.
More transactions also mean more system attacks. Even though he says there is no turning back on the online society, Mr. Cheriton worries most about security hazards. “I’ve made the claim that the Chinese military can take it down in 30 seconds, no one can prove me wrong,” he said. By building a new way to run networks in the cloud era, he says, “we have a path to having software that is more sophisticated, can be self-defending, and is able to detect more problems, quicker.”
The common connection among computer servers, one gigabit per second, is giving way to 10-gigabit connections, because of improvements in semiconductor design and software. Speeds of 40 gigabits, even 100 gigabits, are now used for specialty purposes like consolidating huge data streams among hundreds of thousands of computers across the globe, and that technology is headed into the mainstream. An engineering standard for a terabit per second, 1,000 gigabits, is expected in about seven years.
Arista, which is based here, was built with the 10-gigabit world in mind. It now has 250 employees, 167 of them engineers, building a fast data-routing switch that could isolate problems and fix them without ever shutting down the network. It is intended to run on inexpensive mass-produced chips. In terms of software and hardware, it was a big break from the way things had been done in networking for the last quarter-century.
“Companies like Cisco had to build their own specialty chips to work at high speed for the time,” Mr. Bechtolsheim said. Because of improvements in the quality and capability of the kind of chips used in computers, phones and cable television boxes, “we could build a network that is a lot more software-enabled, something that is a lot easier to defend and modify,” he said.
For Mr. Cheriton, who cuts his own hair despite his great wealth, Arista was an opportunity to work on a new style of software he said he had been thinking about since 1989.....>>

Read more by checking out the full story on new york times, follow the link below....





source

Twitter's business model is based on 'serendipity'



Jack Dorsey
When Jack Dorsey, the creator and executive chairman of Twitter, was asked about Twitter's business model, he said it was hardly thought out.
"The business model is focused around serendipity," said Dorsey, who spoke with moderator David Kirkpatrick on Sunday at Techonomy 2011.
It's hard to imagine that answer will silence the Twitter skeptics.
Twitter, for now, is about growth and, according to Dorsey, engagement. While growth is obvious--after just five years in business, Twitter is now handling 250 billion Tweets every day--the engagement seems less so.
Dorsey, who splits his time between Twitter and Square, where he is co-founder and CEO, said that Twitter's ad products--promoted trends, promoted accounts, and promoted Tweets--get engagement rates between 1 percent and 5 percent.
Dorsey compared it with the early days of Google AdWords, referring to the text ads that appear alongside search results.
"When AdWords came out, people resisted," he said. Now, he argues, that people believe that the ads make the search experience better. Dorsey said he doesn't even think of Twitter's promoted products as ads "in the traditional sense."
"It's how we introduce you to something new," he said. "Something that might be hard to find but that you have an interest in."
That sounds like the sort of talk any advertiser would use justify ads that people might or might not want. Twitter, however, is till new territory for advertisers, and the company is moving carefully with altering the experience.
"The user experience is what matters," said Dorsey. "If the user experience is bad, then we fail."




source

Sunday, November 13, 2011

Batch Files: getting started


Hi, today i wanna start a new series of topics on writing of a batch file to run on a windows machine....A lot of people run windows, so i felt this is a good way to get more from your window's machine.
Batch files allow MS-DOS and Microsoft Windows users to create a lists of commands to run one after the other once the batch file has been execute. Think of them as a to-do list of all what you want your computer to do.
For example, you could write a batch file to run frequently run commands, deleting a series of files, moving files, etc, you get the idea...just basic understanding of MS-DOS commands
is needed to write a batch file.
A good example of a batch file for someone who is more familiar with Windows or the MacOS is to think of a batch file as a shortcut in Windows or an icon on the MacOS. Much like a shortcut, batch files could be used to run one or more commands or programs through the command line.
Another example of a very well known batch file is the autoexec.bat, which is a simple boot file loaded each time the computer is loaded on MS-DOS and early Windows computers. This batch file contained all the necessary commands and programs used to run MS-DOS and Windows each time the computer booted.
As you can see the extension of a batch file is .bat or .cmd, files of this type are recognized and executed through an interface (sometimes called a shell) provided by a system file called the command interpreter. In Windows XP/ Vista the command interpreter is the file cmd.exe. The large assortment of versatile commands available in Windows XP/Vista/7 makes batch files a powerful tool.
Constructing a batch file consists of nothing more than opening any text editor like the accessory Notepad, entering some lines containing commands, and saving the file with an extension BAT or CMD. (The CMD extension is limited to newer Windows systems and is not recognized in Windows 9x/Me systems. In Windows XP, Vista, and 7 there is little practical difference between the two extensions.)

  * Don't use Wordpad or Word unless you are very careful to save all files in pure text format. The commands themselves are often quite simple and there is no need to learn a programming language. Those who wish can explore the intricacies that are available with branching and looping, just follow the links. I will be discussing straightforward application of batch files to everyday tasks. The focus will be on saving time and effort for some routine stuff like system housekeeping and simple file management.
....so stay tuned....

Friday, November 11, 2011

New addition:translator

Hi everyone, a language translator has been added so that you can view this blog in other languages....
To view the posts in other languages other than English, just click on the down arrow of the translator at the top of the blog and make your selection from the list of available languages....

Thanks,
Giga Frequency

Thursday, November 10, 2011

I need feedbacks...

Hi everyone,
i will really appreciate it if we could all give feed-backs on the stuff i post by leaving comments after every stuff  posted....you can also give your reactions to the posts by checking one or more of the reaction checkboxes.......
whatever your thought about the posts or any extra contributions to the stuff posted, you can just share with everyone by leaving a comment.......
you can also leave questions as comments so that someone out there will answer it, i will equally try to answer questions as well :)....
It is easy to leave a comment, you just type in your comment in the comment box, select a profile or just select Anonymous, or you can put a name where it say name/url by selecting that profile and then just click on post comment....that is all.....

Thanks for everything.....you guys rock....

Giga Frequency

WEP encryption:very lame

Hello,
you know guys, i still wonder why in this day and time people are still lame enough to use Wired Equivalent Privacy(WEP) encryption for their wireless networks when it is so easily cracked(in less than two hours). I was at a cafe and guess what? WEP encryption for their wireless hotspot...how lame is that?.....
well,
...if you don't know a lot about WEP, check it out here on Wikipedia
I decided to post this video i got from youtube to show you guys how easy it is to hack a wireless network, for those who already know, good for you :-).....
for those who don't know, well.....
This video shows one method of hacking a wireless WEP connection and gives you some tips on how to better secure your wireless.












TERMINAL COMMANDS:

Startx
/etc/init.d/networking start
airmon-ng
airmon-ng stop [wireless card name]
airmon-ng start [wireless card name]
airmon-ng

Tuesday, November 8, 2011

Mac: the iMac


The iMac spots all-new quad-core processors, Advanced graphics, Thunderbolt technology, FaceTime HD. iMac is a desktop that is regarded to some as a workhorse disguised as an all-in-one wonder. Below are some of its features:

LED back-lighting:

Full brightness with no waiting. That’s the advantage of the LED-backlit of the iMac display. Unlike displays that take time to warm up before they reach maximum brightness, an LED-backlit display comes on  instantly and it is uniformly bright. LED backlighting also lets you finely tune the iMac display to suit the ambient light in even the dimmest room.

More pixels:

The 21.5-inch iMac features 1920-by-1080 resolution. The 27-inch iMac boasts even greater resolution of 2560-by-1440. That’s a whopping 78 percent more pixels than

The iCloud...


iCloud stores your music, photos, documents, and more and wirelessly pushes them to all your devices. Automatic, effortless, and seamless....

Every new iPhone, iPad, and iPod touch comes with the  iOS 5 and every new Mac that is manufactured comes with OS X Lion which means they are already configured for iCloud.

iCloud is also easy to set up and use, it takes only a few steps before all your important stuff is up to date on your iPhone, iPad, iPod touch, Mac, and PC. Learn how to set up iCloud
iCloud makes it quick and effortless to access just about everything on the devices you use every day. It automatically and securely stores your content so it's always available to your iPhone, iPad, iPod touch, Mac, or PC.
It gives you access to your music, apps, latest photos, and more from whichever device you happen to be using. And it keeps your email, contacts, and calendars up to date across all your devices. No syncing required. No management required. In fact, no anything required. iCloud does it all for you.
When you sign up for iCloud, you automatically get 5GB of free storage. And that’s plenty of room, because of the way iCloud stores your content. Your purchased music, apps, books, and TV shows, as well as your Photo Stream, don’t count against your free storage. Since your mail, documents, Camera Roll, account information, settings, and other app data don’t use as much space, you’ll find that 5GB goes a long way. And if you need more storage, you can easily purchase a storage upgrade right from your device.

source


check out this video about iCloud.....



Monday, November 7, 2011

Ipad 3


Reports on the launch of the next iPad range from Apple releasing an ‘iPad Mini’ along with the iPad 3, to the company only launching the iPad 3 at some point in 2012.  According to a new report however, Apple’s next tablet will be an upgraded iPad 2 in early 2012, with the iPad 3 arriving later in the year.
The report from Digitimes claims the next iPad will be released in March of 2012, featuring better battery life, while being thinner overall.
Unfortunately for those desiring a a massive upgrade over the iPad 2, Digitimes believes the next iPad will only be an upgraded iPad 2, not the iPad 3.  The story goes on to claim Apple will then release the iPad 3 in third quarter of 2012.
Much like reports from July which proclaimed Apple would announce an iPad 2 Plus in September following the release of the iPad 2, It is difficult to believe Apple would launch a minor upgrade to the iPad 2 and then follow that up with the iPad 3.
What does seem likely is that the next iPad will feature better battery life, a modified form, the A6 processor, and possibly a Retina Display provided Apple’s suppliers can manufacture enough of the displays to suit Apple.


Will Apple will release an upgraded iPad2 and the iPad3 in 2012?
what do you think?

Sunday, November 6, 2011

Windows Live Messenger 2011 download

 
Windows Live Essentials 2011 requires the following:
  • Operating system: 32- or 64-bit version of Windows 7, or Windows Vista with Service Pack 2 and the Platform Update for Windows Vista, or Windows Server 2008 R2, or Windows Server 2008 with Service Pack 2 and the Platform Update for Windows Server 2008.
  • Processor: 1.6 GHz or higher
  • Memory: 1 GB of RAM or higher
  • Resolution: 1024 × 576 minimum
  • Internet connection: Online services require dial-up or high-speed Internet access (provided separately—local or long-distance charges may apply). High-speed Internet access is recommended for some features.
  • Graphics card: Windows Live Movie Maker requires a graphics card that supports DirectX 9 or higher and Shader Model 2 or higher.


Some Windows Live programs have additional requirements.
  • Windows Live Photo Gallery and Movie Maker require some components of DirectX 9, which might be installed for you if they're not found on your computer.
  • Windows Live Mesh requires OS X 10.5 or newer to run on a Mac.
  • Windows Live Messenger video chat requires a webcam, a microphone, speakers or a headset, and high-speed Internet access. HD video chat requires a compatible HD webcam and a 2.0 GHz or higher processor. HD webcams may also have additional system requirements.


To download windows live messenger click here

.........it is free......

....on the right hand side of the page you will see a blue box which says "Download Messenger"....click that to initiate the download....

Saturday, November 5, 2011

Windows 8 / Windows 2011 downloads


For all those windows lovers, the developer preview is up for grabs now on the newly launched Developer site.There are two kinds of builds available on the Developer site; the first one is with Developer tools and a 64 Bit version while the other version is without the Developer tools in 32 bit as well as 64 bit version. 
 Beware, it is a developer's release.....also i think you might want to run it in a virtual box/machine so that any glitches in the OS wont affect you e.g inability to revert back to your previous OS e.t.c ....

Windows Developer Preview with developer tools English, 64-bit (x64)

  • 64-bit Windows Developer Preview
  • Windows SDK for Metro style apps
  • Microsoft Visual Studio 11 Express for Windows Developer Preview
  • Microsoft Expression Blend 5 Developer Preview
  • 28 Metro style apps including the BUILD Conference app

Windows Developer Preview English, 64-bit (x64)

Includes a disk image file (.iso) to install the Windows Developer Preview and Metro style apps on a 64-bit PC.

Windows Developer Preview English, 32-bit (x86)

Includes a disk image file (.iso) to install the Windows Developer Preview and Metro style apps on a 32-bit PC.

macbook

The New MacBook pro....
Hello guys, i just thought that i should post something about the MacBook but i really had nothing to say.....
Apple has said it all on their official site about the MacBook...
for a detailed info on the MacBook Pro you should visit them here

Post your comment below on what you think about the MacBook Pro....

Thanks,
Giga Frequency

Friday, November 4, 2011

Also some more CMD stuff...

Also got it from youtube...i know it old info :-(  but for those who don't know them...here they are.......

if you have problems with denied access, run command prompt(cmd) as an administrator. That should fix it :-)...

1. Accessibility Controls - access.cpl
2. Accessibility Wizard - accwiz
3. Add Hardware Wizard - hdwwiz.cpl
4. Add/Remove Programs - appwiz.cpl
5. Administrative Tools - control admintools
6. Automatic Updates - wuaucpl.cpl
7. Bluetooth Transfer Wizard - fsquirt
8. Calculator - calc
9. Certificate Manager - certmgr.msc
10. Character Map - charmap
11. Check Disk Utility - chkdsk
12. Clipboard Viewer - clipbrd
13. Command Prompt - cmd
14. Component Services - dcomcnfg
15. Computer Management - compmgmt.msc
16. Control Panel - control
17. Date and Time Properties - timedate.cpl
18. DDE Shares - ddeshare
19. Device Manager - devmgmt.msc
20. Direct X Troubleshooter - dxdiag
21. Disk Cleanup Utility - cleanmgr
22. Disk Defragment - dfrg.msc
23. Disk Management - diskmgmt.msc
24. Disk Partition Manager - diskpart

Windows Command Tips

Just some CMD tips...i know it is not much...got it from youtube :-) .....


Thursday, November 3, 2011

Wednesday, November 2, 2011

Video 'radar' to stop drone mid-air collisions

 Something for the programming and robotics dudes/guys....check it out

IF DRONES are ever going to monitor road traffic, say, they will need a way to automatically avoid other aircraft. This is vital in case the drone loses radio contact with its ground pilot, but the radar systems needed to see other aircraft are too heavy for most lightweight drones.
Now Debadeepta Dey of Carnegie Mellon University in Pittsburgh, Pennsylvania, has a possible solution. If drones only fly in clear weather, when visual flight rules allow light aircraft to fly without radar, corners can be cut. That means video cameras and image-processing software can do a drone's sense-and-avoid work, says Dey.
His team has written software that applies three filters to a drone's video feed. The first detects contrast deviations in the sky that might be aircraft in the distance. The next filter sorts distant aircraft from, say, much nearer birds by their shape. The third then tracks the motion of the object to see if it is steady and flies like an aircraft, rather than a bird, allowing false positives to be removed.
In early test flights the team has achieved a 98 per cent success rate at picking up aircraft at ranges of up to 8 kilometres (International Journal of Robotics Research, DOI: 10.1177/0278364911412807).

Tuesday, November 1, 2011

Submarines talk securely using Quantum keys


SUBMARINES must be able to talk securely with remote naval bases while remaining submerged. Could quantum communications allow them to pull off this technically challenging feat?
Submarines employ random "keys" known as one-time pads to encrypt messages. Each key can only be used once, making it impossible for eavesdroppers to crack the code.
One problem with this is that the key must be securely agreed before the submarine leaves base. There is a risk involved in having many keys on board, in case the sub is captured and they fall into hostile hands.
The other problem is that submarines receive messages using low-frequency radio waves that can penetrate water, but only a few characters per second can be transmitted at these frequencies. To receive high frequencies, which can boost the data rate, submarines have to surface and risk detection.
"You want the submarine to be undetectable for as long as possible - we're talking about several weeks," says Marco Lanzagorta, director of quantum technologies at US defence firm ITT.

He suggests that a technique called quantum key distribution (QKD) could solve these problems. It uses the quantum properties of photons, which are polarised in two different ways to encode 0s and 1s, to generate and exchange a key. Any attempt to intercept the photons disturbs these properties and raises the alarm.
To establish a secure link while remaining 100 metres underwater, submarines could transmit photons of laser light to satellites, for retransmission to base. With the key exchanged, the submarine could then communicate via laser pulses with guaranteed security.
Lanzagorta's simulations suggest it would be possible to transmit and receive data at 170 megabytes per second, enough for video communication. He will present his ideas next month at a cryptography workshop in Gaithersburg, Maryland, hosted by the US National Institute of Standards and Technology. Later he plans to conduct experiments at the US Naval Research Laboratory in Washington DC to investigate how well a photon's quantum state is preserved as it travels through water.
Rupert Ursin of the University of Vienna in Austria was part of a team that, in 2007, set a QKD record by sending photons 144 kilometres through air. That showed that quantum-encrypted signals can in principle be sent to and from satellites, though Ursin says such an experiment is still far off because much of the necessary equipment has never flown in space. It is "quite visionary" to contemplate quantum-encrypted signalling from Earth to a satellite, he says. "This submarine communication stuff is even more visionary."




source