Wednesday, 14 September 2016

How to write table of any two digit number quickly....?

It is very easy to write single digit table within a short period, but to write two digit table it is very tedious for anyone.  Lets see this short cut method for those things. For example am describing the table of  87 as follow as...

First write down table of 8 than write table of 7 beside, 

Table value of 8
Table value of 7
Process
Table value of 87
8
7

87
16
14
(16 + 1)  = 17
174
24
21
(24 + 2)  = 26
261
32
28
(32 + 2)  = 34
348
40
35
(40 + 3)  = 43
435
48
42
(48 + 4)  = 52
522
56
49
(56 + 4)  = 60
609
64
56
(64 + 5)  = 69
696
72
63
(72 + 6)  = 78
783
80
70
(80 + 7)  = 87
870

CreativeThinkers is Back

After a long time, Creative thinkers is gonna active from now. Lets start to think more......!!

Thursday, 9 April 2015

Install any version of Windows using any Windows disc you can find


Reader Chris needs to reinstall Windows 7 Home Basic on his laptop. Just one problem: he lost his recovery discs.

A more common problem is when you need to reinstall Windows and you never had recovery discs to begin with. Few manufacturers provide them anymore, and many new PCs don't have optical drives even if they did.
Thankfully, there's a way around this. All you need is a Windows ISO file (basically the entire Windows operating system in a single container) and the free Ei.cfg Removal Utility. The latter deletes a key file inside the former, thus allowing you to install any version of Windows.
Let me explain that a bit further. Windows 7 and 8 installation discs are version-specific; they're designed to match up with your product key. That's why you can't use, say, a Windows 7 Home Premium product key to install Windows 7 Professional, even if you have a disc for the latter.
Likewise, even if Chris somehow laid hands on a Windows 7 Home Premium disc, his Home Basic license key wouldn't work. That's where Ei.cfg Removal Utility comes in: It effectively creates a "universal" Windows ISO, one that will install whatever version matches your product key.
From a high-level perspective, the process would work like this: Borrow a friend's install DVD, copy the ISO file from it to your hard drive, and then run Ei.cfg. When it's done doing its thing, use the Windows 7 USB/DVD Download Tool to put that tweaked ISO on a flash drive.
Now, just boot from that flash drive and choose the version of Windows you want to install. Enter your license key and you're good to go. (Don't bother trying to sneak an upgrade; remember, your key will work only with the version of Windows that came with your PC. In Chris' case, that's Windows 7 Home Basic.)
Can't find an install disc or don't have an optical drive? There are "official" Windows 7 SP1 ISO downloads available from the Windows 7 Forums.


Saturday, 21 February 2015

மின்னஞ்சலை (Email) கண்டுபிடித்தவர் யார் ?

மின்னஞ்சலை (Email) கண்டுபிடித்தவர் யார் ?
           யாராவது வெளிநாட்டுக்காரர்தான் என்று நினைத்திருப்பீர்கள்.இல்லை...! அவர் ஒரு தமிழர். அதுவும் தனது 14வயதில் கண்டுபிடித்து சாதனை செய்த சிவா அய்யாதுரை.ஒரு வீடியோ, போட்டோ, கடிதமாகவோ இருக்கட்டும் உடனே ஒருவருக்கு அனுப்ப வேண்டும் என்றால் (Email) லில் அனுப்பினால் அனுப்பிய மறு நிமிடம் அவருக்கு கிடைத்துவிடும்.மின்சாரம் இல்லாத மனிதனுடைய வாழ்க்கையை எப்படிக் கற்பனை செய்ய முடியாதோ, அதைப் போலவே (Email) இல்லாத மனித வாழ்க்கையை இனி நினைத்துப் பார்க்கவும் முடியாது.அமெரிக்காவின் நியூஜெர்ஸி மாகாணத்தில் உள்ள நெவார்க் என்ற ஊரில் வசித்துவருபவர்.அவருடைய அம்மா மீனாட்சிக்குச் சொந்த ஊர் தூத்துக்குடி மாவட்டத்தில் உள்ள பரமன்குறிச்சி, அப்பாவுக்குச் சொந்த ஊர் ராஜபாளையம் அருகேயுள்ள முகவூர். அம்மா அந்தக் காலத்திலேயே எம்எஸ்ஸி படித்தவர். அப்பா யுனிலீவர் போன்ற பெரிய நிறுவனங்களில் உற்பத்தித்துறைத் தலைவராக இருந்தவர்.பள்ளியில் படிக்கும்போது கோடை விடுமுறையில் நியூயார்க் பல்கலைக் கழகத்தில் FORTRAN, COBOL, PL/1, SNOBOL, BASIC ஆகிய ஐந்து வித்தியாசமான கம்ப்யூட்டர் மொழிகளைப் படித்து,




1978 இல் நியூஜெர்ஸி மாகாணத்தில் நெவார்க்கில் உள்ள “யுனிவர்சிட்டி ஆஃப் மெடிஸின் அண்ட் டென்ஸ்ட்ரி’யில்கம்ப்யூட்டர் புரோகிராம் பணிக்காகச் சேர்ந்தார் அப்போது அங்கே உள்ள அலுவலகத்தில் உள்ள எல்லா தகவல் பரிமாற்றங்களும் காகிதத்தில் எழுதப்பட்டு அதன் மூலமே நடந்தன. இது மனித உழைப்பையும், நேரத்தையும் அதிகமாக எடுத்துக் கொண்டதால், இந்தத் தகவல் தொடர்பு பணியைக் கம்ப்யூட்டர் மயமாக்க முடியுமா? என்று அவர்கள் கேட்ட போது இவருக்கு 14 வயது.தொடர்ந்து பலநாட்கள் கடுமையாக உழைத்து தகவல் தொடர்புக்கான கம்ப்யூட்டர் புரோகிராமை உருவாக்கினார். அதன் Code ஐம்பதாயிரத்துக்கும் மேற்பட்ட வரிகளை உடையதாக இருந்தது. அதை E MAIL என்று அழைத்தார்.இந்த E MAIL-ஐக் கண்டுபிடிப்பதற்கு முன்பு கம்ப்யூட்டரின் மூலம் செய்திகளை அனுப்புவது இருந்ததா? என்றால் இருந்தது. ஆனால் ஒரு கம்ப்யூட்டருக்கும் இன்னொரு கம்ப்யூட்டருக்கும் இருந்த நேரடி இணைப்பின் மூலமாக இருந்தது. அப்படி அனுப்பியதும் வெறும் டெக்ஸ்ட் மெசேஜ்ஜாக மட்டுமே இருந்தது.இவர்தான் FORTRAN IV என்ற programming language -ஐப் பயன்படுத்தி முதன்முதலில் கம்ப்யூட்டர் மூலம் செய்திகளை அனுப்புவதற்கு புரோகிராமை உருவாக்கியவர், இது DATABASE, LAN உடன் தொடர்புடையதாக இருந்தது.இ – மெயிலில் உள்ள INBOX, OUTBOX, FROM, TO, SUBJECT, CC, BCC, DATA, BODY, FORWARD, REPLY எல்லாம் இவர் உருவாக்கியவை.அதற்குப் பிறகு “மசாசூùஸட்ஸ் இன்ஸ்டிடியூட் ஆஃப் டெக்னாலஜி’யில் (MIT) மேற்படிப்புக்காகச் சென்றார்,மிக அதிகமான திறமையுள்ள, கண்டுபிடிப்புகள் செய்யும் மாணவர்களை அந்தக் கல்லூரி ஆண்டுதோறும் அடையாளம் காட்டிச் சிறப்பிக்கும். 1980 இல் 1040 மாணவர்கள் படித்தனர். அப்படி அடையாளம் காட்டிச் சிறப்பிக்கப்பட்ட நான்கு மாணவர்களில் இவரும் ஒருவர்.1982 ஆகஸ்ட் 30 இல் இ-மெயிலைக் கண்டுபிடித்ததற்காக காப்புரிமை பெற்றார்....

Friday, 2 January 2015

நீங்கள் வாங்கும் பொருள் எந்த நாட்டுடையது என்பதை பார் கோட் மூலம் அறிந்து கொள்வது எப்படி....??



சீனாவில் தயாரிக்கப்பட்ட பொருட்கள் என்றால் இப்பொழுது இந்தியா மட்டும் இல்ல, உலகமே சந்தேகம் கண் கொண்டு பாக்க ஆரம்பிச்சுருச்சு. பால் பவுடர் பிரச்சனை,சீன பொம்மைகள் என்று எல்லாத்துலயும் நச்சு பொருட்கள் இருபதாக சொல்ல படுகிறது, சிலர் சீன பொருட்கள் விலை குறைவாக கிடைகிறது என்று தேடி போய் சீன பொருட்களை வாங்குவார்கள் அவர்களுக்கும் இந்த தகவல் பயனுள்ளதாக இருக்கும்.


(தவிர்பதற்கும் சரி வாங்குவதற்கும் சரி),சரி நம்ம எப்படி சீன,தைவான் பொருட்களை தான் நாம வாங்குகிறோமா என்று சரி பார்ப்பது.
இப்பொழுது எல்லா பொருட்களுக்கும் பார்கோடு பயன்பாட்டில் உள்ளது என்று உங்களுக்கு தெரியும்,பார் கோடு என்பது machine readble format யில் இருக்கும்.
அதில் முதல் மூன்று எண்கள் 690.691,692 என்றால் அது சீனாவில் தயாரிக்கப்பட்ட பொருள் என்று அர்த்தம் ,471 என்றால் தைவானில் தயாரிக்கப்பட்ட பொருள் ஆகும்.
நீங்கள் வாங்கும் பொருள் எந்த நாட்டிலிருந்து வருகிறது என்று இதனை வைத்து தெரிந்து கொள்ளலாம். போலி மருந்துகள் மாதிரி expiry date யை, இதனை அச்சடிக்க முடியாது என்பதும் நமக்கு கொஞ்சம் ஆறுதல் அளிக்கிறது. இனி மேல் பார்கோடை பார்த்து வாங்குங்க .


மற்ற நாடுகளின் முதல் எண்கள்


00-13: USA & Canada

20-29: In-Store Functions

30-37: France

40-44: Germany

45: Japan (also 49)

46: Russian Federation

471: Taiwan

474: Estonia

475: Latvia

477: Lithuania

479: Sri Lanka

480: Philippines

482: Ukraine

484: Moldova

485: Armenia

486: Georgia

487: Kazakhstan

489: Hong Kong

49: Japan (JAN-13)

50: United Kingdom

520: Greece

528: Lebanon

529: Cyprus

531: Macedonia

535: Malta

539: Ireland

54: Belgium & Luxembourg

560: Portugal

569: Iceland

57: Denmark

590: Poland

594: Romania

599: Hungary

600 & 601: South Africa

609: Mauritius

611: Morocco

613: Algeria

619: Tunisia

622: Egypt

625: Jordan

626: Iran

64: Finland

690-692: China

70: Norway

729: Israel

73: Sweden

740: Guatemala

741: El Salvador

742: Honduras

743: Nicaragua

744: Costa Rica

746: Dominican Republic

750: Mexico

759: Venezuela

76: Switzerland

770: Colombia

773: Uruguay

775: Peru

777: Bolivia

779: Argentina

780: Chile

784: Paraguay

785: Peru

786: Ecuador

789: Brazil

80 – 83: Italy

84: Spain

850: Cuba

858: Slovakia

859: Czech Republic

860: Yugoslavia

869: Turkey

87: Netherlands

880: South Korea

885: Thailand

888: Singapore

890: India

893: Vietnam

899: Indonesia

90 & 91: Austria

93: Australia

94: New Zealand

955: Malaysia

977: International Standard Serial Number for Periodicals (ISSN)

978: International Standard Book Numbering (ISBN)

979: International Standard Music Number (ISMN)

980: Refund receipts

981 & 982: Common Currency Coupons

Sunday, 28 December 2014

Futurist Predictions in the World of Technology


Start the Countdown

Futurists can dish out some exciting and downright scary visions for the future of machines and science that either enhance or replace activities and products near and dear to us.




Being beamed from one location to another by telportation was supposed to be right around the corner/in our lifetime/just decades away, but it hasn't become possible yet. Inventions like the VCR that were once high tech -- and now aren't -- proved challenging for some: The VCR became obsolete before many of us learned how to program one. And who knew that working with atoms and molecules would become the future of technology? The futurists, of course.
Forecasting the future of technology is for dreamers who hope to innovate better tools -- and for the mainstream people who hope to benefit from the new and improved. Many inventions are born in the lab and never make it into the consumer market, while others evolve beyond the pace of putting good regulations on their use.
Next, we'll take a look at some sound-loving atoms, tiny tools for molecules, huge bunches of data and some disgruntled bands of people who may want to set all of this innovation back with the stroke of a keyboard.

Neurohacking


Will there be a day when you say "I can't read your mind, you know!" and the reply will be "Oh, stop it -- of course you can!"? It could happen. Neuro scientists are finding ways to read people's minds with machines, and although this has been in the works for decades, real progress is being made by researchers at the University of California, Berkeley, and elsewhere. Translating electrical activity from the brain by means of decoding brainwaves is one way to help sufferers of dementia, for example, who have complications with neurotransmitters relaying thoughts into comprehensible speech or holding thoughts long enough to get them out verbally before they're forgotten.


On the other hand, it is more than a little frightening to know that science and machines could soon have access to our innermost thoughts. Implications for neurohacking into people's thoughts have also been studied in relation to neuromarketing, which targets people's brains by manipulating their wants and desires through marketing and advertising. Our thoughts and actions could actually be hijacked by a form of media that makes us think we're getting what we want, when really, we're going for something our brains may only think is supposed to be good.







Wednesday, 12 November 2014

Creativity in Picture......!




The creativity in the picture is depend on the nature of seeing the pictures an imaging such things to them. It is of picture of full of imagination in the seen of a real picture by little more changes.







Saturday, 1 November 2014

Router

Router (computing):
A router is a networking device, commonly specialized hardware, that forwards data packets between computer networks. This creates an overlay inter network, as a router is connected to two or more data lines from different networks. When a data packet comes in one of the lines, the router reads the address information in the packet to determine its ultimate destination. Then, using information in its routing table or routing policy, it directs the packet to the next network on its journey. Routers perform the "traffic directing" functions on the Internet. A data packet is typically forwarded from one router to another through the networks that constitute the inter network until it reaches its destination node.

The most familiar type of routers are home and small office routers that simply pass data, such as web pages, email, IM, and videos between the home computers and the Internet. An example of a router would be the owner's cable or DSL router, which connects to the Internet through an ISP. More sophisticated routers, such as enterprise routers, connect large business or ISP networks up to the powerful core routers that forward data at high speed along the optical fiber lines of the Internet backbone. Though routers are typically dedicated hardware devices, use of software-based routers has grown increasingly common.

Routing is often confused with bridging, which performs a similar function. The principal difference between the two is that bridging occurs at a lower level and is therefore more of a hardware function whereas routing occurs at a higher level where the software component is more important. And because routing occurs at a higher level, it can perform more complex analysis to determine the optimal path for the packet.

Types of Routing Protocols 

Table 3-1 showed how routing protocols can be classified according to various characteristics. This section gives an overview of the most common IP routing protocols. Most of these routing protocols will be examined in detail in other chapters. For now, this section gives a very brief overview of each protocol.

Classifying Routing Protocols 

Routing protocols can be classified into different groups according to their characteristics. Specifically, routing protocols can be classified by their:

Purpose: Interior Gateway Protocol (IGP) or Exterior Gateway Protocol (EGP)
Operation: Distance vector protocol, link-state protocol, or path-vector protocol
Behavior: Classful (legacy) or classless protocol
For example, IPv4 routing protocols are classified as follows:

RIPv1 (legacy): IGP, distance vector, classful protocol
IGRP (legacy): IGP, distance vector, classful protocol developed by Cisco (deprecated from 12.2 IOS and later)
RIPv2: IGP, distance vector, classless protocol
EIGRP: IGP, distance vector, classless protocol developed by Cisco
OSPF: IGP, link-state, classless protocol
IS-IS: IGP, link-state, classless protocol
BGP: EGP, path-vector, classless protocol

The data networks that we use in our everyday lives to learn, play, and work range from small, local networks to large, global inter networks. At home, a user may have a router and two or more computers. At work, an organization may have multiple routers and switches servicing the data communication needs of hundreds or even thousands of PCs.

Routers forward packets by using information in the routing table. Routes to remote networks can be learned by the router in two ways: static routes and dynamic routes.

In a large network with numerous networks and subnets , configuring and maintaining static routes between these networks requires a great deal of administrative and operational overhead. This operational overhead is especially cumbersome when changes to the network occur, such as a down link or implementing a new subnet. Implementing dynamic routing protocols can ease the burden of configuration and maintenance tasks and give the network scalability.



This introduces dynamic routing protocols. It explores the benefits of using dynamic routing protocols, how different routing protocols are classified, and the metrics routing protocols use to determine the best path for network traffic. Other topics covered in this chapter include the characteristics of dynamic routing protocols and how the various routing protocols differ. Network professionals must understand the different routing protocols available in order to make informed decisions about when to use static or dynamic routing. They also need to know which dynamic routing protocol is most appropriate in a particular network environment.

Sunday, 12 October 2014

I LOVE MY MOM........!

        A Poor Couple lived in a Small Village in India.They had only 1 Son.They gave him the Best Education.Son Graduated as an Engineer in the nearby CityEventually He got Married to a Rich Girl.Initially, They Lived with His Parents in the Village.Soon the Wife got Tired of Village Life & Persuaded Her Husband to Move to the City Leaving His Old Parents in the Village.As Time went,the Husband saw an Ad in the Newspaper about a Job Vacancy in U.S.He was Successful & Lived in U.S for 20 Years with His Wife.Regularly, He used to Send Money to His ParentsEventually with Time, He Stopped & Forgot about His Parents whether they ever Existed.Every Day He Pray & Immediately after each Prayer He used to see Someone telling Him in a Dream that his Prayer is not Accepted.One Day, He Related this Story to a 'Pious Aalim' who Advised Him to go Back to India to Visit His Parents.The Man Flew to India & Reached the Boundary of His Village.Everything was Changed over there.He could not Find His House.So He asked to the Head of the Village about the Whereabouts of His Parents.The Head of the Village directed Him to a House & said: "In this House, Lives an Old Blind Lady who Lost Her Husband a Few Months Ago. She has a Son who Migrated to US 20 Years back & Never came Back again. What an Unfortunate Man." Son enters that Home & Finds His Mother on the Bed.He Tip-Toed as He did not want to Wake Her up.He hears His Mother Whispering or Mumbling Something.He gets Closer to Hear His Mothers Voice.This is what His Mother was Saying: "God ! I am now Very Old & Blind.My Husband just Died.There is no One to Lower Me in My Grave when I Die. So please Send My Son to Fullfill My Last Wish". This is the Ending of a Story where the Prayer of a Mother is Accepted. 
                                            A Human Body can Bear only 45 Del (units) of Pain. But at the Time of Giving Birth, A Mother feels upto 57 Del (units) of Pain. This is similar to 20 Bones getting Fractured, all at the Same Time.This is just to tell U the extent, to which a Mother Loves Her Child. So, Love Ur Mom till the End of Ur Life.The Lady with whom U Fight almost Everyday, Suffered so much Pain just to give U a Beautiful Life.

Saturday, 13 September 2014

The Beautiful Lines........

A good leader can engage in a debate frankly and thoroughly, knowing that at the end she/he and the other side must be closer, and thus emerge stronger. And you don't have that idea when you are arrogant, superficial, and uninformed.

CO-INCIDENCE OF LIFE

1.LIFE has 4 letters so does DEAD.

2.HATE  has 4 letters so does LOVE.

3.ENEMIES  has 7 letters so does FRIENDS.

4.LYING  has 5 letters so does TRUTH.

5.HURT  has 4 letters so does HEAL.

6.NEGATIVE  has 8 letters so does POSITIVE.

7.FAILURE  has 7 letters so does SUCCESS.

8.BELOW  has 5 letters so does ABOVE.

9.CRY  has 3 letters so does JOY.

10.ANGER  has 5 letters so does HAPPY.

11.RIGHT  has 5 letters so does WRONG.

12.RICH  has 4 letters so does POOR.

13.FAIL  has 4 letters so does PASS.

14.KNOWLEDGE  has 9 letters so does IGNORANCE.

15.CHURCH has 6 letters so does MOSQUE and TEMPLE.

Monday, 11 August 2014

A Light-Weight and Scalable Network Profiling System



  • Long-term network monitoring in high-speed networks requires new ways for collecting, storing and analyzing flow-based network traffic information. A project at the IBM Zurich Research Laboratory looked at alternatives to the conventional flow-based network profiling approach with the objective of improved scalability for high flow rates. The result is a light-weight and scalable network profiling system for NetFlow and IPFIX that is based on a novel time series aggregation database.
  • The continuing trend toward distribution of computing resources increases the need to tightly control the networks providing remote access to resources such as servers, storage and databases. An important means for controlling networks is network performance monitoring and, in particular, network profiling. A typical profiling system collects and analyzes information about the traffic flows passing an observation point in the network, eg, a router or traffic meter. A flow is a sequence of packets with common properties (ie, protocol and source/destination addresses/ports).
  • In the past, flow-based network profiling has proven to be useful for a number of applications, including network monitoring, billing and planning. To facilitate smooth operation of service access in distributed computing architectures (eg, SANs, computational Grids) the demand for profiling will continue to rise.
  • Other network profiling systems have a critical scalability problem regarding the storage, analysis and access of collected profiling information. Indeed, this was the primary motivation for the development of our approach. In high-speed networks with average flow rates of 1,000 flows/s and peak flow rates of as much as 20,000 flows/s, storage for 180 MB/h (3.6 GB/h at peak times) must be provided and maintained. Over longer time periods (ie, months, years), the data accumulates, resulting in an over-loaded system with slow reporting.
  • Time Series Aggregation Database
  • Our profiling approach addresses the scalability problem by using a novel aggregation database (ADB) for time series information. ADB provides a mechanism for efficient incremental storage of primary data values which are associated with time intervals. The database stores data values in groups of circular arrays of decreasing resolution and is, therefore, able to handle large time series data sets with fast access times and limited storage. ADB automatically assures that the array resolution of older data values is lower than the resolution of newer data values. Additionally, great care was taken with the design of ADB in order to reduce memory to disk synchronization and cache the relevant arrays in memory for fast data import and export.
  • Array grouping in ADB is efficient for obtaining a sorted view of related parameters. This feature is of great importance in our profiling tool for efficiently displaying sorted lists of top protocols, top hosts, top flows, etc.
  • ADB has a built-in array allocation optimization which further reduces the storage requirements. If an array is updated with values of progressing intervals, no preceding array space is allocated because it will never be needed. Furthermore, for insertion of new values, array space is only allocated in fixed chunks in order to avoid allocation of potentially unused array space. These optimizations reduce the required storage allocations considerably for only sparsely filled time series data streams. In network profiling, these optimizations are very useful when, for instance, a dynamically assigned IP address is only observed during a certain time period (eg, a week). In this case, space in a monthly array is only allocated around the actual observation period and not for the entire month.

  • Sample reports of the traffic profiling system.
    Implementation

  • The developed system is the first profiling system we know of that implements the emerging IETF IPFIX standard. As such it supports IPv6 at data and control plane and can receive flow records over SCTP.
  • The reports show traffic information in graphs and tables regarding domains, protocols, QoS tags, hosts/servers, individual flows, packet and flow statistics, port/host scans and other networking aspects. The reporting period can be varied over many time scales. Custom zoom reports regarding specific traffic aspects can be generated on demand.
  • A typical problem in network profiling systems is that bursts of high flow rates can be caused by observed port or host scans. In these cases, a single packet may be considered a flow since no other proceeding packet will have the same properties with regard to the source/destination addresses and ports. The rate of the flow export can, under extreme circumstances, even exceed the data rate. Unfortunately, bursts of high flow rates can not only provoke flow table overflows at the observation points but may also render the analysis and storage to be no longer able to keep up with the incoming flow information. For these cases, we added an automatic mechanism to our system to aggregate flow records of a port or host scan into a single record.
    The described profiling system, including the aggregation database (ADB), has been developed over the past two years. The system has been installed at a number of IBM locations and is currently being tested at two European ISPs. Snapshots of sample reports are shown in the figure.

Monday, 4 August 2014

What is a Motherboard?

The motherboard serves to connect all of the parts of a computer together. The CPU, memory, hard drives, optical drives, video card, sound card and other ports and expansion cards all connect to the motherboard directly or via cables.

The motherboard is the piece of computer hardware that can be thought of as the "back bone" of the PC.

Photo of a Gigabyte AMD AM1 FS1b Socket HDMI D-Sub mATX Motherboard (GA-AM1M-S2H)The Motherboard is Also Known As:

mainboard, mobo (abbreviation), MB (abbreviation), system board, logic board

Important Motherboard Facts:


  • Desktop motherboards, cases and power supplies all come in different sizes called form factors. All three must be compatible to work properly together.
  • Motherboards vary greatly in respect to the types of components they support. For example, each motherboard supports a single type of CPU and a short list of memory types. Additionally, some video cards, hard drives and other peripherals may not be compatible. The motherboard manufacturer should provide clear guidance on component compatibilities.
  •  In laptops and tablets, and increasingly even in desktops, the motherboard often incorporates the functions of the video card and sound card. This helps keep these types of computers small in size.
  • In a desktop, the motherboard is mounted inside the case, opposite the most easily accessible side. It is securely attached via small screws through pre-drilled holes.
  • The front of the motherboard contains ports that all of the internal components connect to. A single socket/slot houses the CPU. Multiple slots allow for one or more memory modules to be attached. Other ports reside on the motherboard which allow the hard drive and optical drive (and floppy drive if present) to connect via data cables.
  • Small wires from the front of the computer case connect to the motherboard to allow the power, reset and LED lights to function. Power from the power supply is delivered to the motherboard by use of a specially designed port.
  • Also on the front of the motherboard are a number of peripheral card slots. These slots are where most video cards, sound cards and other expansion cards are connected to the motherboard.
  • On the left side of the motherboard (the side that faces the back end of the desktop case) are a number of ports. These ports allow most of the computer's external peripherals to connect such as the monitor, keyboard, mouse, speakers, network cable and more.
  • All modern motherboards also include USB ports here, and increasingly other ports like HDMI and FireWire, that allow compatible devices to connect to your computer when you need them - devices like digital cameras, printers, etc.
  • The desktop motherboard and case are designed so that when peripheral cards are used, the sides of the cards fit just outside the back end, making their ports available for use.



Computer-integrated Manufacturing

The term "computer-integrated manufacturing" is both a method of manufacturing and the name of a computer-automated system in which individual engineering, production, marketing, and support functions of a manufacturing enterprise are organized. In a CIM system functional areas such as design, analysis, planning, purchasing, cost accounting, inventory control, and distribution are linked through the computer with factory floor functions such as materials handling and management, providing direct control and monitoring of all the operations.
As a method of manufacturing, three components distinguish CIM from other manufacturing methodologies:
  • Means for data storage, retrieval, manipulation and presentation;
  • Mechanisms for sensing state and modifying processes;
  • Algorithms for uniting the data processing component with the sensor/modification component.
CIM is an example of the implementation of information and communication technologies (ICTs) in manufacturing.
CIM implies that there are at least two computers exchanging information, e.g. the controller of an arm robot and a micro-controller of a CNC machine.
Some factors involved when considering a CIM implementation are the production volume, the experience of the company or personnel to make the integration, the level of the integration into the product itself and the integration of the production processes. CIM is most useful where a high level of ICT is used in the company or facility, such as CAD/CAM systems, the availability of process planning and its data.
There are three major challenges to development of a smoothly operating computer-integrated manufacturing system:
  • Integration of components from different suppliers: When different machines, such as CNC, conveyors and robots, are using different communications protocols (In the case of AGVs, even differing lengths of time for charging the batteries) may cause problems.
  • Data integrity: The higher the degree of automation, the more critical is the integrity of the data used to control the machines. While the CIM system saves on labor of operating the machines, it requires extra human labor in ensuring that there are proper safeguards for the data signals that are used to control the machines.
  • Process control: Computers may be used to assist the human operators of the manufacturing facility, but there must always be a competent engineer on hand to handle circumstances which could not be foreseen by the designers of the control software.
  • Subsystems in computer-integrated manufacturing:

    A computer-integrated manufacturing system is not the same as a "lights-out" factory, which would run completely independent of human intervention, although it is a big step in that direction. Part of the system involves flexible manufacturing, where the factory can be quickly modified to produce different products, or where the volume of products can be changed quickly with the aid of computers. Some or all of the following subsystems may be found in a CIM operation:
    Computer-aided techniques:
    • CAD (computer-aided design)
    • CAE (computer-aided engineering)
    • CAM (computer-aided manufacturing)
    • CAPP (computer-aided process planning)
    • CAQ (computer-aided quality assurance)
    • PPC (production planning and control)
    • ERP (enterprise resource planning)
    • A business system integrated by a common database.
    Devices and equipment required:
    • CNC, Computer numerical controlled machine tools
    • DNC, Direct numerical control machine tools
    • PLCs, Programmable logic controllers
    • Robotics
    • Computers
    • Software
    • Controllers
    • Networks
    • Interfacing
    • Monitoring equipment
    Technologies:
    • FMS, (flexible manufacturing system)
    • ASRS, automated storage and retrieval system
    • AGV, automated guided vehicle
    • Robotics
    • Automated conveyance systems
  • There are multiple areas of usage:
    • In Industrial and Production engineering
    • In mechanical engineering
    • In electronic design automation (printed circuit board (PCB) and integrated circuit design data for manufacturing)

Thursday, 31 July 2014

List of computer term etymologies:

1)Abend —
Originally from an IBM System/360 error message,BEEB short for "abnormal end".
2)Booting or Bootstaraping —
           Loading or fetching the OS to the memory for processing while the the system starts.
3) Cookie —
A packet of information that travels between a browser and the web server.
4)Daemon —
A process in an operating system that runs in the background.It is falsely considered an acronym for       Disk And Execution Monitor.
5)Ethernet —
A computer networking technology.
6)Finger —
Unix command that provides information about users logged into a system.

7) Gopher —
An early distributed document search and retrieval network protocol on the Internet.
8)Hotmail —
Free email service, now part of MSN. The idea of accessing email via the web from a  computer anywhere in the world.
9) ID10T -
Pronounced "ID ten T" - is a code frequently used by a customer service representative  (CSR) to annotate their notes and identify the source of a problem as the person who is reporting  the problem rather than the system being blamed. This is a thinly veiled reference to the CSR's  opinion that the person reporting the problem is an IDIOT. Example: Problem reported caused by    ID10T, no resolution possible

10)Jakarta Project —
A project constituted by Sun and Apache to create a web server for Java servlets and JSPs.Jakarta was the name of the conference room at Sun where most of the meetings between Sun and Apache took place.
11)Kerberos —
A computer network authentication protocol that is used by both Windows 2000 and Windows XP as their default authentication method.
12)liveware -
computer personnel.It play on the terms "software" and "hardware". Coined in 1966,
the word indicates that sometimes the computer problem is not with the computer itself, but with user.
13) Macintosh, Mac —
  A personal computer from Apple Computer.From McIntosh, a popular type of apple.
14)Nerd —
A colloquial term for a computer person, especially an obsessive, singularly focused one.
15)OLIVER -
CICS interactive test/debug software.The name of this online interactive software - that prevented CICS system abends caused by application programs.
16)ping —
a computer network tool used to detect hosts.
17)Query string —
In the World Wide Web, is an optional part of a Uniform Resource Locator (URL)
18) RSA —
An asymmetricalgorithm for public key cryptography.
19)SPIM —
A simulator for a virtual machine closely resembling the instruction set of MIPS processor,  is simply MIPS spelled backwards. In recent time, spim has also come to mean SPam sent over Instant Messaging.
20)Trojan horse —
A malicious program that is disguised as legitimate software.
21)Unix —
an operating system.
22)Virus —
a piece of program code that spreads by making copies of itself.
23)Worm —
a self-replicating program, similar to a virus.
24)X Window System —
a windowing system for computers with bitmap displays.
25)Yahoo —
internet portal and web directory.
26)zip —
a file format, also used as a verb to mean compress.

Monday, 28 July 2014

OPEN SOURCE-Innovation communities

  • The principle of sharing pre-dates the open-source movement; for example, the free sharing of information has been institutionalized in the scientific enterprise since at least the 19th century. Open-source principles have always been part of the scientific community. The sociologist Robert K. Merton described the four basic elements of the community – universalism (an international perspective), communalism (sharing information), disinterestedness (removing one's personal views from the scientific inquiry) and organized skepticism (requirements of proof and review) that accurately describe the scientific community today.
  • These principles are, in part, complemented by US law's focus on protecting expression and method but not the ideas themselves. There is also a tradition of publishing research results to the scientific community instead of keeping all such knowledge proprietary. One of the recent initiatives in scientific publishing has been open access – the idea that research should be published in such a way that it is free and available to the public. There are currently many open access journals where the information is available free online, however most journals do charge a fee (either to users or libraries for access). The Budapest Open Access Initiative is an international effort with the goal of making all research articles available free on the Internet.
  • The National Institutes of Health has recently proposed a policy on "Enhanced Public Access to NIH Research Information." This policy would provide a free, searchable resource of NIH-funded results to the public and with other international repositories six months after its initial publication. The NIH's move is an important one because there is significant amount of public funding in scientific research. Many of the questions have yet to be answered – the balancing of profit vs. public access, and ensuring that desirable standards and incentives do not diminish with a shift to open access.
  • Farmavita.Net is a community of pharmaceuticals executives that has recently proposed a new business model of open-source pharmaceuticals.The project is targeted to development and sharing of know-how for manufacture of essential and life-saving medicines. It is mainly dedicated to the countries with less developed economies where local pharmaceutical research and development resources are insufficient for national needs. It will be limited to generic (off-patent) medicines with established use. By the definition, medicinal product have a "well-established use" if is used for at least 15 years, with recognized efficacy and an acceptable level of safety. In that event, the expensive clinical test and trial results could be replaced by appropriate scientific literature.
  • Benjamin Franklin was an early contributor eventually donating all his inventions including the Franklin stove, bifocals, and the lightning rod to the public domain.
  • New NGO communities are starting to use the open-source technology as a tool. One example is the Open Source Youth Network started in 2007 in Lisboa by ISCA members.
  • Open innovation is also a new emerging concept which advocate putting R&D in a common pool. The Eclipse platform is openly presenting itself as an Open innovation network.


Sunday, 20 July 2014

GNU/LINUX NAMING CONTROVERSY

The GNU/Linux naming controversy is a dispute among members of the free and open source software community over how to refer to the computer operating system commonly called Linux.
GNU/Linux is a term promoted by the Free Software Foundation (FSF), its founder Richard Stallman, and its supporters, for operating systems that include GNU software and the Linux kernel.The FSF argues for the term GNU/Linux because GNU was a longstanding project to develop a free operating system, of which they say the kernel was the last missing piece.
Proponents of the Linux term dispute GNU/Linux for a number of reasons, such as the fact that the term Linux is far more commonly used by the public and media.

Plans for GNU, a complete computer operating system composed entirely of free software, were made in 1983 by Richard Stallman, founder of the Free Software Foundation. In September of that year, Stallman published his manifesto in Dr. Dobb's Journal detailing his new project publicly, and outlining his vision of free software.Software development work began in January 1984. GNU was to be a complete Unix-like operating system composed entirely of free software. By 1991, the GNU mid-level portions of the operating system were almost complete, and the upper level could be supplied by the X Window System, but the lower level (kernel, device drivers, system-level utilities and daemons) was still mostly lacking. The GNU kernel, GNU Hurd, was still in its infancy. The Hurd followed an ambitious design which proved unexpectedly difficult to implement and has only been marginally usable.
In 1991, the first version of the Linux kernel was released by Linus Torvalds. Early Linux kernel developers ported GNU code, including the GNU C Compiler, to run on Linux. Later, when the GNU developers learned of Linux, they adapted other parts of GNU to run on the Linux kernel. This work filled the remaining gaps in running a completely free operating system.
Over the next few years, there were a number of suggestions for how to name operating systems using the Linux kernel and GNU components. In 1992, the Yggdrasil Linux distribution adopted the name "Linux/GNU/X". In Usenet and mailing-list discussions, one can find usages of "GNU/Linux" as early as 1992 and of "GNU+Linux" as early as 1993. The Debian project switched to calling itself "GNU/Linux" in early 1994 During this time it was sponsored by the Free Software Foundation's GNU Project. Debian founder Ian Murdock later noted that this change was made in response to a request by Richard Stallman (who initially proposed "Lignux," but suggested "GNU/Linux" instead after hearing complaints about the awkwardness of the former term). GNU's June 1994 Bulletin describes "Linux" as a "free Unix system for 386 machines" (with "many of the utilities and libraries" from GNU), but the January 1995 Bulletin switched to the term "GNU/Linux" instead.
Stallman's and the FSF's efforts to include "GNU" in the name started around 1994, but were reportedly mostly via private communications (such as the abovementioned request to Debian) until 1996 In May 1996, Stallman released Emacs 19.31 with the Autoconf system target "linux" changed to "lignux" (shortly thereafter changed to "linux-gnu" in emacs 19.32),[citation needed] and included an essay "Linux and the GNU system"[citation needed] suggesting that people use the terms "Linux-based GNU system" (or "GNU/Linux system" or "Lignux" for short). He later used "GNU/Linux" exclusively, and the essay was superseded by Stallman's 1997 essay, "Linux and the GNU project".

Sunday, 29 June 2014

Microsoft Student Associates Program #MSAIndia”.

Hai Everyone,
                        This is Natesanathan.K doing my Final year B.E., Computer Science in Anjalai Ammal Mahalingam Engineering College, Kovilvenni , Tiruvarur District.
           
             Here by i have to share some information or impacts about Microsoft which changes me in a great manner .In my childhood days till my higher secondary i didn't know any knowledge about windows even a computer but once i get it in to it which makes me a tremendous change to make me much interest of it to knowing all about it. In my past day I like to use MS paint to do some fun activities for just a entertainment work but later i had to knows that it not  entertainment one but will make a more effect to the computer world of designing.
                       The Microsoft had provided lot of different versions of Operating System which consists of unique properties respectively .The OS such as Windows7(professional, Ultimate),Vista, Windows Diamond, WindowsXp,Windows8,Windows8.1 all these are which makes the major changes to all who are in computer world. I have been used all these OS which helps me in learning more things in the computer world to do something innovatively and of thinking as much more to survive a lot.  
                  One of the great things about Working at Microsoft is having access to an incredible array of technologies that help us to get work done. And in the field of designing, imaging, movie making etc. which the windows played a wide role. In multimedia it helps me till my childhood days to do or think something different as i can in my life, which makes my people to get a lot of interest to knowing about it their carrier as i did till my days.
                   And i had learned about MS office which supported me all ways to survive in my studies as well as in my day to day life too. The MS Excel which is used to store record in a order and to maintain a efficient work of maintaining logs. The MS word which helps me in documentation process and even of preparing leave letter just a example to it. And the most important thing which plays a major role is preparing slides by using MS PowerPoint which helps to express the content easier to user as well as to the viewers through slides. It consists of lot of designing tools which makes the understating of contents easier than by books.    
                    There is lot of things to tell about Micr



osoft which changes my life in the computer world. And there is still more of innovating in the windows which could also make tremendous changes in the computer world. And they had introduced the Tabs and windows phones which had spreader all over the world in these days. All peoples are using Tabs for their comfort ability. And now days all people were using windows phones for conveniences and better use of bringing all features as it is in the computers.  And it consists of lot features supported by their logical and technical architecture to all the systems in these days which play a major role in human with the computer.  
                     In the future i would bring more use of it to my people of knowing these thing from their childhood days and make use of it to get well minded in it and to get a good scope in it to survive as more in the computer world along with Microsoft.