Website is better without music in background







Don't put background music on your website. If you want a professional website that has high traffic and retains visitors, it's a good rule of thumb to stick with. There are always rare exceptions (which I will list later), but for the most part, you should take this small tid-bit of wisdom to heart.
Here are the reasons why: 

1. Credibility - There are certain hallmarks that newbie website builders cannot help but fall for. Background music on a website is one of them. Unless you're selling music or music services, having background music play on your website makes it seem unprofessional. This lowers your websites credibility, and thus you lose retentions of your visitors. People aren't visiting your website to listen

Camera which records all that you see .Super Kamer






"Looxcie" is a camera which costs $ 200 which put in your ear and then from your perspective records all you see around. It is possible to conduct several hours of material, and then makeother recordings on previous recordings, and if you run intosomething more interesting, set in a special part of the camerawill help you to share your video with other users on You Tube orsimilar sites.
"Looxcie" is currently compatible only with Android phones. Thiscamera is a "gadget" very interesting because that enables to quickly record something at that point of view. In fact, it oftenhappens that when you want to record something quickly, it has already completed events, eg until you wanted the camera."Looxcie" button has not recording.
Simply put this device in the ear, and it will start to record. In addition, many people often look more "official" in videoincizimewhen it is directed to a simple camera.
With "Looxcie", very few people will ask what is

it that you hold to your ear, as it will appear to most cell phone headset, so peoplewill not change their behavior , to adjust the camera.

Facebook add Kosovo






Kosovo has recorded a victory in its application for recognition.Last month, Facebook started to recognize the tiny Balkan state.The social networking giant now identifies users of the capitalPristina, as users from Kosovo.
Facebook this came after some routine updates to the system.Score: Pristina is now deployed in Kosovo, not Bosnia and Herzegovina. Still not known why Facebook thought the capital ofKosovo is the capital of Bosnia, which neither country bordering Kosovo.

Is IBM Building a Computer That Thinks Like a Human?






There’s been quite a bit of hype around the media surrounding IBM’s press release about its program to build what it calls “cognitive computers,” which it claims “won’t be programmed the same way traditional computers are today. Rather, cognitive computers are expected to learn through experiences, find correlations, create hypotheses, and remember – and learn from – the outcomes, mimicking the brains structural and synaptic plasticity.” This has led to a host of stories over the weekend featuring the usual references to SkyNet and the Matrix.
But what’s the truth behind the hype? Honestly – it’s tough to tell. The press release is pretty frustratingly vague – it doesn’t have much in the way of technical details. There’s a little bit more

Battle Oracle-Google







The start of the trial in Oracle's lawsuit against Google over alleged Java copyright and patent violations in the Android mobile OS could be delayed, according to a judge's ruling issued Monday in U.S. District Court for the Northern District of California.

If a "second large criminal trial" does not begin as scheduled on Oct. 17, jury selection in the Oracle-Google matter will happen on Oct. 19, with the trial starting as planned on Oct. 31, Judge William Alsup said in the ruling. But if the criminal trial does move forward on schedule, it will require the postponement of Oracle vs. Google, he added.
It was not immediately clear which criminal case Alsup was referring to in Monday's order or how long the Android case's start would need to be postponed. The judge recently oversaw a major murder and racketeering trial involving the MS-13 street gang.
Oracle sued Google last year, claiming Android violated a series of patents and copyrights it holds on Java, control of which it acquired through the purchase of Sun Microsystems. Google has denied all wrongdoing.

The case could also be significantly delayed delayed if Alsup decides to stay the trial, pending a number of reexaminations of Oracle's patents by the U.S. Patent & Trademark Office. That process could take years.

IBM gets back to basics







IBM Impact, the big annual IBM software event in Las Vegas, can't help but remind you how huge the company is. This year 8,000 customers, partners, and IBM employees are here -- most of them crowded into one cavernous megascreen auditorium for the keynote, kicked off by a rock 'n' roll number that saw three musicians soloing on iPads. It's a feel-good show that typically comes with significant product announcements.
First and foremost this year is the release of WAS (WebSphere Application Server) version 8, an upgrade to the company's vastly extensible integration platform. According to IBM, the new version offers improved performance, security, and availability, along with broader support for programming models and standards. The new Feature Pack for Web 2.0 and Mobile extends the reach of WAS to mobile devices.

The emphasis on an application server may seem quaint, but WAS is actually the foundation of an endless portfolio of related products -- many of them obtained through acquisition -- including Lombardi for business process management, DataPower appliances for

11 hard truths about HTML5 ( part 1)







HTML5 heralds some nifty new features and the potential for sparking a Web programming paradigm shift, and as everyone who has read the tech press knows, there is nothing like HTML5 for fixing the Internet. Sprinkle some HTML5 into your code, and your websites will be faster and fancier -- it'll make your teeth white, too. But the reality of what HTML5 can do for those seeking native-app performance on the Web falls short of the hype.
After several years of enjoying HTML5's sophisticated new tags and APIs, the time is ripe to admit that there are serious limitations with the model. Not only are there reasons to grouse about HTML5 failing to fulfill our Web nirvana dreams, there are even reasons to steer away from HTML5 in some cases.
The truth is, despite its powerful capabilities, HTML5 isn't the solution for every problem. Its additional features are compelling and will help make Web apps formidable competitors for native apps, but security issues, limitations of local data storage, synchonization challenges, and politics should have us all scaling back our expectations for the spec. After all, every technology has its limitations.
What follows is a list of 11 hard truths Web developers must accept in making the most of HTML5.

HTML5 hard truth No. 1: Security is a nightmare
The fundamental problem with client-side computing is that the user ultimately has control over the code running on the machine. In the case of Web apps, when your browser comes with a great debugging tool, this control is easier than ever to abuse.
With a JavaScript debugger like Firebug, anyone who is curious about what Facebook, Google, or any other website is doing can just start inserting breakpoints and watch the code. This is great for debugging and learning how websites operate, but it's a nightmare for security.
Suppose there's a variable that holds a value you'd like to change; well, Firebug or any of the other browser debuggers is happy to help you tweak the data to be anything you desire. Do you want to trick your friends into thinking you're in another geographic location? It's easy to edit the variables that hold latitude and longitude to place your browser anywhere in the world. All the neat features of your Web app can be modified, and the browser environment makes it easier than it would be normally with native code.
There are limits to the security problems that can be incurred. Some JavaScript tools such as Google Web Toolkit are nearly as complicated as standard compilers. Their output can be fairly inscrutible. Luckily tools like the JavaScript Deminifier can help.

The danger depends, of course, on the nature of the application. It's one thing when someone edits their latitude and longitude to play tricks on their friends by checking into a website while pretending to be halfway around the world. The trouble begins when someone qualifies for all of the rights, privileges, and free beers accorded by being crowned the mayor of some location. When money gets involved, the games can only get worse. All of this means that client-based HTML5 apps can't be trusted with serious data collection, and it's better for everyone to be aware of their capabilities.

Google, shut down Slide social apps






Apparently the age of "superpoking" social network friends and throwing sheep at them is coming to a close.
Google plans to shut down the social applications developed by Slide, a company it acquired a year ago for $182 million. Slide products include SuperPoke and photo management and decorating tools like Slideshow and FunPix.

Slide's applications like Slideshow were very popular on MySpace during its heyday, and found success on other social networking sites, including Facebook, where the sheep-throwing feature of SuperPoke caught on, entertaining and annoying many.
But usage of Slide applications has apparently been declining and disappointing, according to a message Slide posted on its blog on Thursday.
"We created products with the goal of providing a fun way for people to connect, communicate and share. While we are incredibly grateful to our users and for all of the wonderful feedback over the years, many of these products are no longer as active or haven't caught on as we originally hoped," the post reads.
Slide's founder Max Levchin will also leave Google, as reported by The Wall Street Journal's AllThingsD blog on Thursday. Before launching Slide, Levchin co-founded PayPal and was its CTO.
After operating as an independent unit within Google since its acquisition in August 2010, Slide will be dismantled and its staff reassigned to work

Cisco buys Microsoft Office collaboration company






Cisco Monday announced that it has acquired privately held Versly, a maker of collaboration software for Microsoft Office applications.
Financial terms were not disclosed.
Versly's Microsoft Office plug-in enables collaboration around content in documents, spreadsheets, presentations and email. The software will allow Cisco to integrate social networking technologies within business applications, Cisco says.
Cisco says there are 600 million users of Microsoft Office applications, which include popular programs such as Microsoft Word, Excel, PowerPoint and Outlook. The acquisition will also provide more opportunity for Cisco partners to provide enhanced collaboration products, Cisco says.
Collaboration is one of Cisco's top company priorities and represents what the company believes to be a total addressable market of $45 billion.
Versly's software will be integrated into a variety of Cisco's collaboration programs. The software will allow users, for example, to receive notifications within Cisco Quad when the content of a document has changed, launch an instant messaging session through Jabber, or initiate a Web conferencing session from a presentation through WebEx.
Upon the close of the acquisition, Versly employees will be integrated into Cisco's Collaboration Software Group.

10 tips for VMworld 2011






For many virtualization users, VMworld has become a sort of pilgrimage -- a must-attend event for a lot of admins who are trying to find their virtual path. These individuals will do whatever it takes to make it to the event so that they can find out what's new, what's next, and what's hot and currently available to them, thus making them a virtualization rock star at work.

VMworld 2011 returns to Las Vegas for the first time since 2008 and once again chooses the Venetian Hotel as the event's host of operations. VMworld and Las Vegas seem to go together like peanut butter and jelly, popcorn and movies, and Elvis and fried bananas. But this could be VMworld's last hurrah in the entertainment capital of the world, as the show is expected to return to San Francisco for the foreseeable future. So to everyone who enjoys yelling, "let it ride," "jackpot," "hit me," and "bet it all on black," you might want to finalize those last-minute details and make your way to VMworld 2011 next week -- this could be your last time to enjoy these two venues together.

I've been fortunate to have been able to

Nations with better ISPs






Countries with good national security teams (CERTs) and diligent ISPs show consistently lower rates of malware infection than those states that adopt a less paternalistic approach to security, a new analysis by Microsoft researchers has suggested.

According to statistics drawn from the company's widely used Malicious Software Removal Tool (MSRT), the countries which have shown notably lower infection rates of malware are Austria, Finland, Germany, and Japan.
[ Learn how to greatly reduce the threat of malicious attacks with InfoWorld's Insider Threat Deep Dive PDF special report. ]
Using the

EnterpriseDB adding cloud option for PostgreSQL database






Companies looking to move database operations to public and private clouds will soon have another option in the form of Postgres Plus Cloud Server, EnterpriseDB announced Thursday.
EnterpriseDB's Postgres Plus Standard Server and Postgres Plus Advanced Server products are based on the open-source PostgreSQL database, with advanced features layered on the core code.

The upcoming Cloud Server product features a Web-based interface for managing clusters of database nodes. It includes automatic load balancing and failover, provides various monitoring functions and allows for online backups and "point-in-time" database recovery.
It will be available in standard and advanced editions, the latter of which includes EnterpriseDB's compatibility layer for Oracle's database, which allows Oracle workloads to be migrated over to EnterpriseDB, albeit not necessarily in exact form.

10 strong shooter in world







A committee of FIFA has made ​​an analysis, and has classified the top 10players hitting more fortë.Sipas estimates in the previous edition was launchedSchweinsteiger he had the stronger attack, from 188 km / second position h.Nëranked defender Dani Alves to Barcelona 154km/h.ndërsa third stroke ofRonaldo, with the stroke of 142km / h.
Here are the top 10 gunmen strong-
1. Bastian Schweinsteiger (Bayern Munich, 188 km / h)
2. Dani Alves (Barcelona, 154 km / h)
3. Cristiano Ronaldo (Real Madrid, 142 km / h)
4. Wayne Rooney (Manchester United, 133 km / h)
5. David Villa (Barcelona, 127 km / h)
6. Jerome Boateng (Bayern Munich, 119 km / h)
7. Diego Forlan (Atletico Madrid, 102 km / h)
8. Didier Drogba (Chelsea, 93 km / h)
9. Arjen Robben (Bayern Munich 91 km / h)
10.Frank Lampard (Chelsea, 84 km / h)

Tips for using Facebook






Date and place of birth 
Based on this information, at first sight trivial, identity thieves and other crooks come to a large number of data for you. How to start - come up to record your number.
Address
Even 40 percent of users, "Facebook" have set the address in their profile, even though 60 percent of them claim not to know their friends. Why?
I'm on holiday
Thieves - aye.
Negative Comments
Maybe you hate your boss, have a negative attitude towards the Roma, homosexuals or certain politicians, but you are advised not to reveal this "Facebook". The truth is that your data is accessible to all those whom your information will be needed, even if we overlook the secret services, your current employer or future can gather enough information from your wall in the future can use against you. Keep in mind, democracy is just a beautiful theory that has never functioned in practice.
Password
No password is crazy to put on his site, but you can find it indirectly.Your favorite songs, strings, records for names and surnames, dates of birth, names of friends and your loved ones, names of banks ... and everything else that is accidentally caught in your profile, in this case are the preferred source information to hackers.
Risks
The new trend and new branch oversight in your profile to "Facebook" recently and even health insurance companies. In your profile they want something that will show your poor health.Specifically, the aim are those who prefer extreme sports clips to publish in their statutes, which are sure to signal the insurance companies that you should not cooperate. Also, as I am sick statuses, spondiloza, ishijas and pain in the back, neck, leg, will not have to publish in your profile. In any social network if you are.

How To Make Bootable USB







Having a bootable USB is very essential, especially if you are a Netbook user. Using bootable USB to install an operating system (OS) not only makes the installation faster, but also saves a DVD.
Creating or using an USB drive to install Windows operating systems is very easy if you follow the below mentioned steps.
bootable usb drive
If you are planning to use bootable USB to install Windows 7 or Vista please refer our guides:
Coming back to bootable USB guide, here we assume that you are using either Vista or Windows 7 to create a bootable USB.
1. Insert your USB (4GB+ preferable) stick to the system and backup all the data from the USB as we are going to format the USB to make it as bootable.
2. Open elevated Command

Commands for symbols , ç , ë etc







Alt 15=¤
Alt 20=¶
Alt 21=§
Alt 128=Ç
Alt 129=ü
Alt 130
Alt 131=â
Alt 132=ä
Alt 133=à
Alt 134=å
Alt 135=ç
Alt 136=ê
Alt 137=ë
Alt 138=è
Alt 139=ï
Alt 140=î
Alt 141=ì
Alt 142=Ä
Alt 143=Å
Alt 144=É
Alt 145=æ
Alt 146=Æ
Alt 147=ô
Alt 148=ö
Alt 149=ò
Alt 150=û
Alt 151=ù
Alt 152=ÿ
Alt 153=Ö
Alt 154=Ü
Alt 155=¢
Alt 156=£
Alt 157=¥
Alt 160=á
Alt 161=í
Alt 162=ó
Alt 163=ú
Alt 164=ñ
Alt 165=Ñ
Alt 166=ª
Alt 167=º
Alt 168=¿
Alt 170= ¬
Alt 171=½
Alt 172=¼
Alt 173=¡
Alt 174=«
Alt 175=»
Alt 179=¦
shift 6, alt 147, shift 6= ^ô^
alt 147, alt 168, alt 147=ô¿ô
alt 225=ß

MAC OS Keyboard commands







    Startup and Login 

      command+option+O+FInvoke Open Firmware
      command+option+P+RReset PRAM
      TStartup in FireWire Target Disk Mode
      optionInvoke Startup Manager
      command+SInvoke single-user mode
      command+VInvoke verbose mode
      CBoot from CD/DVD
      XBoot into OS X (if you previously booted from OS 9 on the same volume)
      shift (immediately at startup)Safe boot
      shift (after boot screen, until login screen)Override auto-login
      shift (after login screen)Safe login
      option+escape, then click on a userPresent name/password login dialog instead of list of users

    System-wide 

Faculty of Natyral Science






Simulations found by clicking here

Instruction shown below can be downloaded by clicking here
For a particle in the trap potential is applied Shërdingerit equation, from which energy levels are found (which are discrete) levels and corresponding wave functions.
In this applet menu with buttons appear:
"A pit", "Two Hole (Molecular Connections)" and "lots of holes (with band structure)"
Select "A pit." Window opens, dotted:
Forms of potential energy function with Indigo dye which can be solved on the right to "Potential Hole" in one of five forms.
Also can kofigurohet potential under the given parameters in the table.Likewise, the condition of wave functions.
Below on the right to "Probability density of" choose the probability density function such as square wave, it appears at the bottom of the window in graphical form. So can optionally choose "function Valor" which contains the real part, imaginary, amplitude and phase from 0 to 2π.
In the bottom right of the window can be chosen depending on the particle mass of the electron mass.
Select the square shape of the potential, density probailitetit option and move the particle as an electron mass. Indigo line represents the form of potential which can be expanded (narrow) or deeper (or becomes more shallow) by two arrows. Depth of hole energy is scaled in units of eV, while its width in units of nm length. Note that the green lines representing the full energy increase when enlarging the hole width or depth, and reduced if the bridge or narrow the width of the pit depth. Explain why?
Whenever I go near to one of mauzin energy levels, to the left of the level of Energy show the full value of the level in eV. The fixed rate is in red.
Below are the graphical form of the function of the probability density waves of fixed energy level and the level where we bring mauzin.
If we click the MAUZ a level then it gets red and becomes a fixed rate.
Choose the right option "wave function" and look into the pit below potential, the real part, imaginary part of wave functions for a fixed level and the target with MAUZ.
Broaden and narrow pit potential overlook differences of wave functions, its qualities and full of energy.
Change the size of the particle several times and see the changes in the applet.
If energy levels are very close to the right to choose "Show magnifying glass" to enlarge to 10 times the distance between them.
Choose different forms of potential and repeat the above operations, the changes look and wave functions corresponding energy levels.
Select "Two Hole (Molecular Connections)" from the main menu, perform the same actions that were mentioned above. Note the changes in values ​​of energy levels and wave functions or appearance of the density of wave functions. Why is that?
Select the "Many Gropas (with band structure)" from main menu. Try to change the number of holes from 1 to 10. Perform the same actions that were mentioned above. Note the changes in values ​​of energy levels and wave functions or appearance of the density of wave functions. Why is that?

Application that find the stolen IPhone






"ActiveTrak" Company, presented its version of the application against theft iOSGadgetTrak. Like previous versions, version 2.5 helps to restore the iPhone-n,iPad or iPod Touch, if you accidentally stolen. All you need to do is install the application and register your hardware to the website "GadgetTrak."
If your phone is stolen or picture, tell the site which will activate the service for tracking your device, writes "Macworld". Updated application that has someother options. In fact, it now supports the camera: if you have iPhone 4 will useboth the front and the camera's rear, so you can see the picture of the thief whohas stolen the lock device and the surroundings in which the .
Also, the application has "the introductory" so the thief can send the message.Also, here is the possibility of adding e-mail address at which service will senddetails of the investigation to steal your equipment. Application settings arepassword protected.

Even if the "idiot" who has their phone stolen or somehow manage to picturepassword, but he could not stop until the logohet tracking on your web-site"GadgetTrack". The price of this application is 0.99 dollars.

Value of twitter






Twitter social network is valued at 7.8 billion dollars, more than double last December at an auction in which investors have paid 34.50 dollars for everyaction.
At the auction conducted in December, investors had put Twitter worth $ 3.7billion.
Social network, in recent weeks become one of the protagonists of the democratic philosophy riots in the Arab world, numbering more than 175 million users.
In this mikroblog, users deliver messages up to 140 characters and to write an average of an average of 95 million "tweet" on the day.

10 Android applications that should have






Have you bought or received as a gift and Android phones are launched in search of applications. We will research them and somehow facilitate this text will point out 10 applications free, but useful, which in our opinion, would have to have any Android device.
If we accidentally omitted any of your own preferred application, or some other applications think they deserved to be on this list, then enter those.
1. Dropbox
Cloud service, which enables storage free on-line data up to 2GB. It is possible in almost all popular operating systems, both mobile and in the personal computer. For example, the computer simply drag the desired content in Dropbox Map, which then automatically keeps the Dropbox server and have available at any time from any device on which you install Dropbox, because synchronization is performed in order automatic. Link-http://www.androidzoom.com/android_applications/productivity/dropbox_gqik.html
2. Springpad
There are many services Cloud to work with different types of records. However, SpringPad has a somewhat more logical concept in general and a ranking on intuition. The initial screen offers three options: new records, existing records and records of email and this provides a much desired simplicity. Entering data into the computer, is performed through the web site as Springpad so simple. Obviously, start to create a user account. Link - http://www.androidzoom.com/android_applications/productivity/springpad_gzgm.html
3. Fringe
One of the clients, the most popular instant messaging and VoIP, also supports videothirrjet weather since the devices that have front-facing camera. Upon installation, you must create user account and select the protocols by which you want to communicate. Supported Windows Live (MSN) Goolge Talk, ICQ, and AIM messenger Yahoo!. VoIP calls are supported by Google Talk and personal Fringe Protocol Regulation, through which can be used even video calls. Link - http://www.androidzoom.com/android_applications/communication/fring-free-video-calls-im_bgmb.html
4. Winamp
One of the most popular applications for the reproduction of music, it is also possible for the Android platform. Promote more opportunities and options, the application more interesting and useful, is the synchronization of content and playlist-centric with the Desktop version of Winamp, via WiFi's. In order to synchronize the work on the computer, it is necessary to have installed Winamp 5.6. Also, Winamp input enables the data from iTunes. Link - http://www.androidzoom.com/android_applications/media_and_video/winamp_mfqp.html
5. ThinkFree Office
This browser documentation for most would be useful. ThinkFree Office offers browsing of documents and their integration into ThinkFree service, which means saving on-line data up to 1GB. Document formats are supported: doc, xls, ppt and pdf. Documents can also be sent through E-mail. Link -
6. Google Reader
Reader 's RSS Feed Google. At any moment, wherever possible are your channels. It is important to note that supports the use of multiple accounts of Google, while in terms of other characteristics, are available almost all, like the web version. Link - http://mob.hr/google-reader-za-android/
7. WeatherBug
Although applications for the weather prognosis, have entered into a particular topic, we should mention that WeatherBug is a service present in almost all platforms, because it provides all relevant information, such as temperature, weather conditions, wind directions, prognosis and others. Link - http://www.androidzoom.com/android_applications/weather/weatherbug_bcfh.html
8. Facebook
The newest version of Facebook client for Android, has experienced a significant progress. Besides the standard support of multiple services, Facebook Android also supports Facebook Chat. Link - http://www.androidzoom.com/android_applications/social/facebook-for-android_zst.html
9. Dolphin
One of the better browsers and faster for mobile platforms. Although standard Web browser is not bad, again Dolphin offers a wide range of possibilities, and one of the most useful is the appearance of pages in tabs. Also supported Multitouch and Pinch Zooming while reading the UAB-pages is very fast.
10. Amazon Kindle
This works very well and the picture of Android devices become more extensive, then he tells himself. Especially effective in computers picture as supports all the possible applications and is extremely easy to use. Link-http://www.appbrain.com/app/kindle/com.amazon.kindle

Computer Learning (part 3)






Computer Acronyms definitions
AGP (Accelerated Graphics Port)
Stands for "Accelerated Graphics Port." AGP is a type of expansion slot designed specifically for graphics cards. It was developed in 1996 as an alternative to the PCI standard. Since the AGP interface provides a dedicated bus for graphics data, AGP cards are able to render graphics faster than comparable PCI graphics cards.

Like PCI slots, AGP slots are built into a computer'smotherboard. They have a similar form factor to PCI slots, but can only be used for graphics cards. Additionally, several AGP specifications exist, including AGP 1.0, 2.0, and 3.0, which each use a different voltage. Therefore, AGP cards must be compatible with the specification of the AGP slot they are installed in.

Since AGP cards require an expansion slot, they can only be used in desktop computers. While AGP was popular for about a decade, the technology has been superseded by PCI Express, which was introduced in 2004. For a few years, many desktop computers included both AGP and PCI Express slots, but eventually AGP slots were removed completely. Therefore, most desktop computers manufactured after 2006 do not include an AGP slot.



BASIC (Beginner's All-purpose Symbolic Instruction Code)
Stands for "Beginner's All-purpose Symbolic Instruction Code." BASIC is a computer programming language that was developed in the mid-1960s to provide a way for students to write simple computer programs. Since then, the language has evolved into a more robust and powerful language and can be used to create advanced programs for today's computer systems.

BASIC originally used numbers at the beginning of each instruction (or line) to tell the computer what order to process the instructions. Lines would be numbered as 10, 20, 30, etc., which would allow additional instructions to be placed between commands later on if needed. "GOTO" statements enabled programs to loop back to earlier instructions during execution. For example, line 230 of a BASIC program may have an "if" clause that tells the computer to jump back to line 50 if a variable is less than 10. This instruction might look something like this:

230 IF (N < 10) THEN GOTO 50

More modern BASIC implementations use "while loops," which perform a series of instructions as long as a certain case is true. Newer BASIC development software also supports more data types, such as integers, strings, and arrays, for storing variables and other data. While the first BASIC development environments were strictly text-based, today's BASIC programming software allows developers to design much of their programs visually, using a graphical user interface. Some of the more popular BASIC development programs used today include REALbasic and Microsoft Visual Basic.



DDR2 (Double Data Rate 2)
Stands for "Double Data Rate 2." DDR2 RAM is an improved version of

Computer Learning (part 2)






Bits and Bytes definitions
Bandwidth
Bandwidth refers to how much data you can send through a network or modem connection. It is usually measured in bits per second, or "bps." You can think of bandwidth as a highway with cars travelling on it. The highway is the network connection and the cars are the data. The wider the highway, the more cars can travel on it at one time. Therefore more cars can get to their destinations faster. The same principle applies to computer data -- the more bandwidth, the more information that can be transferred within a given amount of time.


Bit
The computer term "bit" comes from the phrase "Binary DigIT," which is

Hack Rapidshare :-) (part 3)






Here are some hints to help you more efficiently use rapidshare. Skipping waiting time and bypassing download limits are rapidshare hacks that everybody should know. These tips have been retested and continue to work well.

Rapidshare has been an excellent tool for sharing large files. Recently users have discovered ways of bypassing the download limits and skipping waiting times.
Several readers have emailed recently (Oct 2010) that these methods continue to work well.
Update: Two new methods of bypassing download limits have been posted. These are more advanced and may require additional software or hardware, but you should check them out when you are done with these easier methods:
Rapidshare traces the users IP address to limit each user

Rapidshare Hacking ( part 1)






New working trick .. genuine


After searching a lot i found dis amazing thing. its like a proxy browser called TORPAK..it can change ur permanent IP to static IP. so jus wen u restart ur browser u will hav new IP... u can also set intervals between changing ur proxy...so now download mutliple files at d same time......it also has integration of IDM with it..





tip:

u have to close this perticular browser than open again and it will start downloading from RAPIDSHARE

10 richest people in the world






1.Carlos Slim $74.0 billion 71 Mexico
2.Bill Gates $56.0 billion 55 United States
3.Warren Buffett $50.0 billion 80 United States
4.Bernard Arnault $41.0 billion 62 France
5.Lawrence Ellison $39.5 billion 66 United States
6.Lakshmi Mittal $31.1 billion 60 India
7.Amancio Ortega $31.0 billion 74 Spain
8.Eike Batista $30.0 billion 53 Brazil
9.Mukesh Ambani $27.0 billion 53 Yemen
10.Christy Walton $26.5 billion 55 United States 

Technical terms explain






802.11b
802.11b is a Wi-Fi standard developed by the IEEE for transmitting data over a wireless network. It operates on a 2.4 GHz band and allows for wireless data transfers up to 11 Mbps. A faster standard, called 802.11g, was introduced a few years after 802.11b and supports data transfer rates up to 54 Mbps. This can make a difference in the speed of data transfers within a local network, but since broadband Internet access is limited to around 5 Mbps, a 802.11b wireless connection will not be a bottleneck for Internet access. Most wireless networks are based on either 802.11b or 802.11g.

Ad Hoc Network

Software Learning






Software terms explain
 Antivirus
Antivirus software is a type of utility used for scanning and removing viruses from your computer. While many types of antivirus (or "anti-virus") programs exist, their primary purpose is to protect computers from viruses and remove any viruses that are found.




Most antivirus programs include both automatic and manual scanning capabilities. The automatic scan may check files that are downloaded from the Internet, discs that are inserted into the computer, and files that are created by softwareinstallers. The automatic scan may also scan the entire hard drive on a regular basis. The manual scan option allows you to scan individual files or your entire system whenever you feel it is necessary.



Since new viruses are constantly being created by computerhackers, antivirus programs must keep an updated database of