Sunday, April 20, 2008

The 500,000 GB MP3 Player

Sounds impossible? It could really happen, thanks to a new breakthrough.

Can you even imagine an MP3 player with a 500,000 GB capacity? It’s pretty much beyond belief. The most generous player today can only hold around 40,000 songs – they’d hardly make a dent on this.



The thing is, it could easily happen. Scientists at the University of Glasgow have created a nanotechnology breakthrough that could increase storage capacity by 150,000 times. It could mean 500,000 GB on a single chip and inch square.

The Glasgow scientists worked to create the molecule-sized switch that’s at the heart of it all.
Professor Lee Cronin at the University of Glasgow said,
“What we have done is find a way to potentially increase the data storage capabilities in a radical way.

We have been able to assemble a functional nanocluster that incorporates two electron donating groups, and position them precisely 0.32 nm apart so that they can form a totally new type of molecular switching device. The key advantage of the molecule sized switch is information / transistor density in traditional semi-conductors. Molecule sized switches would lead to increasing data storage to say 4 Petabits per square inch.

This breakthrough shows conceptually that this is possible (showing the bulk effect) but we are yet to solve the fabrication and addressing problems. The fact these switches work on carbon means that they could be embedded in plastic chips so silicon is not needed and the system becomes much more flexible both physically and technologically.”

The discovery was first reported in Nature Nanotechnology

Tuesday, April 15, 2008

10 beautiful iMac setups worth a look (pics)


Don’t forget to subscribe to our full RSS feed or email newsletter to receive the latest posts.
The Apple iMac is the stuff that dreams are made of. When it was released in 2000 (iMacs were released in 1998, but the current ’slim’ form was introduced in 2002), it was hailed as the best innovation seen in the recent past, and won many accolades for the design innovation.

The original Intel iMac (24″) received CNET’s “Must-have desktop” in their 2006 Top 10 Holiday Gift Picks list. Technology columnist Walt Mossberg described it as the “gold standard of desktop computing”, and Forbes hailed it as “industry-altering success”. No wonder iMacs turn eyeballs wherever it is spotted.


iMac is Apple’s range of home desktop computers. Priced at $1200-1800, iMac is an affordable, yet powerful workhorse. Sporting a single-unit design and sleek finishing that Apple is famous for, it is only natural that you would wish to have an iMac.
iMac, the design marvel


To increase the temptation, I have collected a list of some of the most exquisite iMac setups that I could find, on Flickr. I started out with some ~30 images, but pruned it down to the top 10 for the sake of readability, and also because many of them contained unwanted clutter.
Preference was given to neatness, lack of clutter and any other extras (exquisite lights, backgrounds etc.). The image credit link (on the titles) and short descriptions about the setup (after the image) are also provided. Instead of wasting time with the slow Flickr search, I searched for the images on CompFight, which loads the results via AJAX (meaning no extra pageloads). Enjoy!

continue reading...

Terrible songs from great albums

“The Long And Winding Road” by the Beatles (from “Let It Be”)
Capitol The Beatles are generally regarded as rock ’n’ roll’s greatest band, and Phil Spector was arguably its greatest producer. So how did bringing them together result in one of the most cloying moments in either party’s career? As the world would learn a quarter century later with the release of the Beatles’ “Anthology” outtakes collections, “The Long And Winding Road” is actually quite nice in its stripped-down form; maybe not one of the band’s best but certainly not the horrifically overproduced monstrosity found on “Let It Be.” Spector, clearly operating in the same mode as his uber-creepy “Silent Night” recitation at the end of his otherwise-classic Christmas album, drenched the song in strings and a choir so saccharine that the Beatles needed to end the album, their swan song, with the simple, bracing palate-cleanser of “Get Back” to remind the world of what it was about to lose forever.

“My World” by Guns N’ Roses (from “Use Your Illusion II”)
Geffen Records
Guns N’ Roses’ plan of following up one of the landmark debuts of the 1980s — simultaneously releasing two albums that would have both been doubles in the age of vinyl — was, on the face of it, insane. But despite “Use Your Illusion II” being slightly wobbly (with the name-calling tantrum in the middle of “Get In The Ring,” an inferior second version of “Don’t Cry” and bassist Duff McKagen’s lackluster “So Fine”), there was surprisingly little chaff in what was effectively four albums’ worth of material. It looked like GN’R was going to pull off the whole mess, right up until the final 84 seconds, when Axl Rose decided to rap and everything fell apart in one laughable, deeply stupid instant. If “My World” was a joke, it was funny for all the wrong reasons. And if it wasn’t, then maybe we can keep waiting for “Chinese Democracy.”

“Endless, Nameless” by Nirvana (from “Nevermind”)
Geffen Records
From the instant Nirvana blew up huge, Kurt Cobain always had an antagonistic relationship with his own mass popularity. Nowhere is that more evident than on metallic grunge jam “Endless, Nameless,” the all-too-appropriately named hidden track that closed out “Nevermind.” The tuneless, freeform scree didn’t appear on every copy; those who were lucky enough to snatch up one of the first 50,000 before Nirvanamania went mainstream didn’t just find themselves with a collector’s item, they got a far better album. For everybody else who jumped onto the train after “Smells Like Teen Spirit” hit the top 40, the beautiful-bummer vibe created by the tellingly morose official closer “Something In The Way” was shattered by an unlistenable barrage of interminable cacophony. If you could hear it, Cobain hated you.

Mac vs. PC: The Ultimate Lab Test for New Desktops & Laptops-Part 1

This computer rivalry has been elevated to a cultural divide on par with Pepsi versus Coke. Taking it beyond personal taste, PM crunches the numbers—with some surprising results (and detailed benchmark scores).


We all know the stereotypes. Apple’s popular commercials have painted the picture in stark terms: There are two types of people, Mac people and PC people. And if the marketing is to be believed, the former is a hip, sport-coat-and-sneakers-­wearing type of guy who uses his computer for video chatting, music mash-ups and other cool, creative pursuits that starchy, business-suited PC users could never really appreciate unless they tried them on the slick Apple interface. Then again, Windows PC enthusiasts probably think that Mac guy is a smug slacker with an overpriced toy that can’t do any serious computing anyway. Funny thing is, both stereotypes are wrong. With a 7.5 percent market share, Macs are no longer just the computer choice of artists and unemployed writers. (Apple is, in fact, the fourth largest computer manufacturer in the world.) And now, more than ever, the guts of both platforms are remarkably similar. Both types of machines use Intel proc­essors (although some PCs can be configured with processors from AMD). Both buy memory, hard drives and graphics cards from the same small pool of suppliers. The underlying operating systems have distinctly different flavors, but in terms of functionality, Microsoft Windows Vista and Mac OS X Leopard have surprisingly similar built-in multimedia, Internet and productivity applications.

Yet what makes the platforms feel so dissimilar is their approaches to these applications. Internet Explorer versus ­Safari, Windows Media Center versus Front Row, Photo Gallery versus iPhoto, Backup and Restore Center versus Time Machine—these system components from Microsoft and Apple are designed to accomplish essentially the same goals. To users, however, the position and movement of the virtual knobs and levers make all the difference. These things are largely matters of preference and style, but you can still make a reasonable attempt to quantify them, and we did. We tested two all-in-one desktops and two laptops—one Mac and one PC per category—and assembled a panel of testers with a range of experience and preference that ran the gamut from expert users to my wife’s stepfather, who, by his own account, had never actually turned on a computer.


Our testers were asked to set up the computers right out of the box and explore the machines through everyday tasks such as Web surfing, document creation, uploading photos, downloading Adobe Acrobat files and playing music and movies through Media Center and Front Row (the entertainment software suites integrated into Vista and Leopard, respectively). Our testers were instructed to divorce themselves as much as possible from their previous technological preferences and rate their experiences with each computer’s software and hardware. Usability surveys are like taste tests—a useful look at the subjective appeal of a device. (Is it fun? Is it easy? Would I be happy to live with this thing?) But beneath their packaging, computers are data-crunching machines that can be run like racehorses. So the second component of our test regimen was about pure performance. Our computers were closely matched, but in the interest of full disclosure, we’ll spit out the caveats: The Gateway One PC had a processor that runs 400 MHz slower than its iMac competitor (not a heck of a difference in this age of dual-core chips), but it also had two extra gigabytes of DDR2 memory. In the laptop category, our Asus M51 had a 2.2 GHz processor, compared to 2.4 GHz for our MacBook. But the Asus had a larger screen, a more sophisticated graphics card and an extra gig of RAM. All that extra RAM may seem to give an advantage to the PCs. Vista, however, is a noted memory hog, so throwing more RAM into PC computers is probably less of a perform­ance booster for manufacturers than it is a new baseline hardware specification. Before we pulled out our stopwatches, we turned to two industry-standard, cross-platform benchmarking tools—Geekbench from Primate Labs and Cinebench from Maxon—to get third-party results. We ran both benchmarking programs on our Mac and PC desktop and laptop computers before our testers got their dirty little hands on the equipment to ensure that no confounding software could poison the results.


These benchmarks are reliable indicators of performance, but the numbers feel somewhat meaningless to ordinary users. Which is why we created our own suite of tests to meas­ure the speed of everyday tasks. We logged boot-up and shutdown times, and launch times for the Internet browser and media player built into each operating system, as well as for common applications such as Microsoft Word and Adobe Photoshop. We tested how long it took for each computer to rip a CD and install a few big software suites. The laptops were forced to play the longest movie we could find (Saving Private Ryan—2 hours, 49 minutes) until they wheezed, sputtered and shut down. Finally, we put all four computers through a stress test. We ran three video sources (a YouTube clip, a DVD and an .avi file), DivX encoding, instant messaging, Word, Adobe Acrobat and a spyware scan simultaneously—then retimed our launch of Photoshop. The results gave us a clear winner in the performance categories, but the big surprise was how little difference we found in user preferences. Turns out, both platforms are capable and easy to use, but only one was the victor.

Complete IT Solutions - Web Dev 8$/Hr

Are you ready to break the shackle and leap forward to better customer service, more productivity, efficient ways of problem solving and think beyond the averages?
We are group of experts in IT/Software development, enterprise solutions, fixed bid projects and product development.We develop and create solutions, which are faster and more efficient.
We do complete research and investigations before providing solutions to problems and we are very economical in our approach.

We are well equipped with IT resources and keep our self updated on the market trends and provide solutions which are compatible on any platforms, easy to implement and will surely have less maintenance cost.

Give us a try and feel the Difference. We are looking forward to hear from you.
Some of our sample rate (Promotional, lock in your rate before promotion ends). World econony is heading towards recession, will you be a victim. Don't let your company go on recession , partner with technology leader today. Web Developer - 8$/hrJava/J2ee Developer - 10$/hrWebsphere/Portal Admin/Developers - 12$/hrSecurity Expert - 15$/hrArchitect - 25$/hrProject Manager - 25$/hr

On top of our great rate, we are so confident in our quality that we are offering 5 Year Warranty on any our services or product we offer. This is never heard in IT industry, where quality and service is taken for granted.


Contact us today at (Go local, call the local number)
USA - 201.952.1423, sales@srest.biz, sales@srest.net
India - 986.706.4951, india@srest.biz, india@srest.net
Amchi Mumbai (Bombay) - 2966.0167, mumbai@srest.biz, mumbai@srest.net
Maharastra - 022-2966.1118, maharastra@srest.biz, maharastra@srest.net
Delhi - 981.156.7353, delhi@srest.biz, delhi@srest.net
Kolkatta (Calcutta) - 933.109.5207, mailto:sales@srest.biz, kolkatta@srest.net


It regular news in US that millions of credit card information was stolen from this big companies or from that fortune 500 companies. We just wonder how can it happen, when you spend millions or potentially billions of dollars in IT. Social Security information stolen. Confidential information stolen. We just wonder how.... think .. we just cannot come with a logical reasons.. Companies instead of worrying or preventing future attacks, just keep the same set of IT policies, peoples, hardware, software, vendors, managers, CEO, CIO etc. Offer customers whose information has been stolen credit protection and that's is the end of matters. It time for us to take customer or user more seriously than that. We have complete secure solutions from small companies, site (costing only 100$) to large multi naitonal multi nation website. Call us today and lets helps you potential prevent such an hack at your company or site or your computers. We challenge you to try our competitor and see if anyone can beat our price or the quality, most important quality. Most of the quality and security stuff we should deal 99.99% of IT companies are not even aware of. Yeah somehow they can manage to deliver some stuff at some time. Most IT projects are delayed, we always deliver on or before time. Most IT projects are over budgeted, we always deliver on or less than budgeted amount.



IN JAVA/J2EE/WEBSERVICES/WEB DESIGN/APPLICATIONS SECURITY HERE IS THE CHALLENGE FOR YOU... GO NOW AND TRY OUR COMPETITOR, AND ASK ANY OF IT VENDOR TO SEND YOU THEIR BEST WORKING CODE, GIVE IT TO US AND WE WILL TELL YOU HOW THAT COULD HAVE BEEN IMPLEMENTED BETTER. OR IF YOU ALREADY HAVE SOME CODE, JUST SEND US 100 LINES SELF CONTAINED MODULE, AND WE WILL TELL YOU HOW THAT COULD HAVE BEEN IMPLEMENTED BETTER.




Technology/Procedures which we cover are(related to IT) and are absolutely mastery in : Java, J2ee, Xml, Websphere/WAS, Weblogic, Enterprise Architecture, SAX, Mysql, Tomcat, Ajax, Portal, WPS, Websphere Portal Architecture, Design, UML, Design Patterns, OOAD, Rational, Full life Cycle Development, RSA, Eclipse, NVU, Multimedia, Performance, Scalibility, Requirement Analysis, RAD, Realibility, Failover, SQL, Faces/JSF, Eclipse Europa, Struts, PKI, SOA, Analysis, Clustering, Reporting, Content Management, EJB, Entity Beans, Security, Integration, CRM, Log4j, Trouble Shooting, Disaster Recovery, Secure Insurance, Webservices, Credential, Encryption, Ant, Maintainence, Data Modeling, Secure Banking, SSL, Search, WPAI, Site Minder, Profiling Applications, Single Sign On, Secured Securities, JMS, WSAD, JSR168, Open Source, Credential Vault, High availability, Administration, JDBC, JNDI, RMI, JAXB, TAM (Tivoli Access Management), Secure Financial Services, Mentoring, JAI, JCE, JAAS, DTD, Topology Preparation, Team Development, Debugging, CASTOR, XSL, SOAP, WSDL, UDDI, Managing, Transaciton, Sybase, Javascript, CSS, DHTML, Oracle, DNA, HTTP Streaming, Web Design, AXIS, AWT, SWING, Secure Java, Java Multimedia, Search Engine Optimization, Web Development, Email, hmailserver, Squirrel, Applet, Java 2D, Search Engine Submission, Webmaster, RUP, LDAP, Perl, Virtual Portal, Unix Shell, Scripts, Internet Marketing, Theme, Impersonation, Messaging, Guidelines, Standards, Breaking Monolithic Architeture, Collaboration Center, Messenger, Testing, Framework, Reusuabliity, Reporting Tool, Component Architecture, Real Object Oriented Architecture, PDF Application, Reusability, Prototypes, Resource Planning, Monitoring Applications, Hardware Sizing, Greater performance, CSV/Excel Applications, Integration With SAP, Integration with Siebel, Integration with COGNOS, Feasibility Study, Resolving Critical Issues, Effectively Managing Global Team, Proof-of-concepts, JSP, Servlet, Rational Rose, Regression, Testing, Load Testing, Rapid Development, Test, Web 2.0, Multimedia, Secured Applications, Portal Framework, Design and Development, Best Practices, Enterprise Search, SAP, AS400, Mainframe, Photoshop, CorelDraw, MS, Micorsoft Technologies, ASP, Seibel, ERP, Vignette, Filenet, Verity, IPlanet, Data Warehouse, Improving Bad Design, Corba, DCE Reportnet, Cognos, C#, PB(Power Builder), Lotus Notes, Meeting Deadlines, and many others which we have not listed becuase of space limitations. Please visit our consulting to know couple of more areas we cover.




In any of the areas, yes and we are ready to review any applications and will suggest possibility on how to improve your applications. Most clients which choose to do has achieved performance benefits from 1000 times (100000%) to 100%. (This figure are based on what an application response should have been or will be after Srest's magic touch). We believe anything which takes more than 100 milliseconds needs to be analyzed. Our architect have delivered performance with response as low as 4 milliseconds (0.004 seconds). Most customer response is, its ok, if it is taking 10 seconds, anyway it is internal applications. Anytime we have any application which takes more than 3seconds in processing, it is just disaster waiting to happen. As such applications degrade very rapidly even on slight load, say virus scan kick off. Or they are just not multi thread safe, 2 users uses it and it start overwriting each other. Some say it not application problem it is hardware issues, well in most cases we found that application can certainly be improved many folds. We will also suggest you how to fine tune your server. Don't fool yourself or continue fooling your customer. Your customer deserves it and cost will be actually less than what you are spending now. To try us, we know it will cost you nothing on what you spend currently. Our consultants have worked in many fortune 500 companies. Its time when quality and real work to stand apart. Dazzle your customer today!!! It is really shame that even after spending millions of dollars most our business applications are struggling. Its so slow taking, almost any applications, whether it is banking, insurance or take it any fields. It is so unsecured that it can be hacked any moment anytime. Most IT people from IT companies or from fortune 500's have no idea what it means to be secure applications. They don't even know the threat. There are some bright spots, but most time, they are asked to just shutup and don't impede project development. Yeah they create security department thinking secure application is an afterthought. Well it is not, from the day we start requirement analysis, we think how or what user behaviour can cause security issues or data leaks. hey..hey..hey.. security does not impede project. It is a must for any applications. Some incidents happen somewhere, it angers somebody and results 1000's of websites and applications are hacked. We are anytime at the mercy of the bad guys, hoping that they will spare your company and you. No, it time for us to protect ourself. It is not rocket science to develop a secure applications, all we have to do is to follow few basic rules. Call us today... can't think you afford 10$/hr for developer when you are currently spending more than 25$/hr on your existing vendor. And don't forget the overhead cost, support structure, HR people, accounting people, legal people, leads to lead them, managers to manage them. You can keep your whole development team with us and for only 10$/hr they will deliver quality and secure solutions and we will manage all the overhead. You even have the right to hire, promote, demote or fire your developer from your team.You may wonder how we achieve such low rates and such high quality and paying our developer/architect among the the highest in industry. * Architect and Developer get more than 50% of our revenue to them. * We have no middle layer, manager, Vice President, Account Manager. It just you and your team. Our support team only helps them may their life at SRest a very useful, rewarding * Satisfied employees * Satisfied customers * No Politics * Continuous training. We continue to improve each area new articles, tutorials, classes. * Less property cost * Currently we invest 100% of our profit in future and more innovative products and services. * Hiring the right people for right tasks * many others..call us to find out how you can benefit from unique company which is nothing like any traditional companies/or any other internet companies. We have only one motto, absolute high quality and security in anything we do.

creadits to: http://kolmic.com/

Welcome to my world

hooollaaaaaa.......testing2

Response.Write("hello world");