rss
@rohhy

Design Changes Revealed: Firefox 4.0

The release of Firefox 4.0 may still be nearly 6 month away, but the excitement for the new version is already growing. One of the designers behind the browser has shared on his blog updated mock-ups of the new design.


1) App Button One of the more challenging, not to mention contentious, aspects of the Firefox UI update has been how to handle the MenuBar. On our first pass we were informed by how Safari and Chrome had handled this problem by paring down all menu items into two separate Page and Tools buttons. This approach has a few advantages but also some disadvantages. The new proposed approach to this problem is an App Button which is similar to the single menu approach taken by Windows 7 native applications (Paint, WordPad) and by MS Office.

The UX team feels this approach has several advantages over the previous idea:

•It is less complex
•Takes up less space
•Instead of two potentially conflicting locations for menu items, there is now only one unified location
•Can be placed in the upper left analogous to the Menubar paradigm it is replacing
•Similar to the far more ubiquitous Office 2008/2010 + Windows 7 application menu
•Reduces clutter on the Navigation Toolbar
•It also creates a more flexible and rich canvas for perhaps doing some decidedly non-menu-esque things

Appearance and Placement
One of the benefits of the App Button is that it is similar to the way Microsoft is treating its native apps and Office. Another benefit is that the placement is closer to where the Menubar would be and therefore it is more familiar.


One idea that we have already explored with the Pages and Tools buttons is to use text on the button instead of an icon. This is also reminiscent of the Menubar’s textual display and removes any ambiguity involved with icons. This approach is also explored in the most recent Office 2010 beta with the tab simply being labeled “File”. We discussed naming our App Button simply “Firefox” because it contains all the actions that apply to Firefox.

Attaching the button to the top of the window further implies that this menu affects Firefox as a whole.

Status of the Titlebar
In all the mockups up to this point the Titlebar has been removed and the space reallocated for portions of the tabs. Enough room was left for traditional window dragging. The rational behind this change was to further shrink vertical space and to address the redundancy of having the page title in the Titlebar and the tab.

In the original approach you would lose approximately the width of one tab (or less!) due to the window widgets. This was before talk of placing an App Button or an Identity button in this area. As it stands now you would be losing much more. It seems the vertical space tradeoff doesn’t stack up quite as well when losing so much horizontal tab space.

It would be better to leave the Titlebar, giving full access to it and not losing any tab space. It also won’t be frustrating for someone wanting to drag the window.

State of the Menu
What will this single menu look like? Something like the sketch I posted previously but not exactly. Ideas on this are welcome. Thoughts about what should and should no go into this menu can be based on work already done for menu cleanup.

2) Refining Toolbar Button Appearance:
Some initial work has gone into making the toolbar buttons more visible on light backgrounds and more crisp and dimensional (pressable).

This is work I am constantly reevaluating since they appear on variable backgrounds.

3) Location Bar:
Created some very early visuals for reevaluating site identity. Also the location bar is now properly recessed instead of floating.

4) Retain Separate Search Bar:
With the LocationBar containing an increasing amount of functionality it may be best to retain a clear distinction between the two fields.

5) Bookmarks Widget:
On a default profile or existing profile that hasn’t modified the Bookmarks Toolbar it will be hidden by default and the Bookmarks Widget placed in the Navigation Toolbar.

If the Bookmarks Toolbar is shown the Bookmarks Widget will appear there instead.

Current version available at:

www.mozilla.com/firefox/

Real Hard disk Capacity


Hard disk drive capacity is that manufacturers assume that kilobyte (KB), megabyte (MB), gigabyte (GB) and terabyte (TB) are different things from what they really are, making you to have a hard disk drive with less capacity than advertised. This problem is known by several names, like “rounding”, “formatted capacity vs. unformatted capacity”, etc. Some people even wrongly assume that the operating system is the villain behind the vanishing of space, but the truth of the matter is that the hard drive manufacturers are the one to blame, as they announce their products with a capacity higher than the real drive capacity.
Unit
Symbol
Base 2
Base 10
Kilo
K
2^10
10^3
Mega
M
2^20
10^6
Giga
G
2^30
10^9
Tera
T
2^40
10^12
Peta
P
2^50
10^15
Exa
E
2^60
10^18
For example, hard disk drive manufacturers assume that 1 GB equals to 1 billion (10^9) bytes, while in fact 1 GB equals to 1,073,741,824 (2^30) bytes.
Let’s take a real example, Seagate/Maxtor/Samsung hard disk drive with “250 GB”. It is announced as being a 250 GB hard disk drive, having 488,397,168 sectors. With this number of sectors we can easily find out that the capacity of this hard disk drive is of 250,059,350,016 bytes, or 232.88 GB and not 250 GB. So here is why your 250 GB hard drive is only formatted with 232 GB: it IS a 232 GB hard drive!

 Follow me @rohhy

Who invented "CTRL+ALT+DEL”?


Have you ever thought of the person who invited "CTRL+ALT+DEL" key combination?

"David Bradley" -- He is the one who spent 1 minute and 23 seconds in writing the source code that rescues the world's PC users for decades.

This extraordinary IBM employee retired after a prolong service of 29 years. His formula forces obstinate computer to restart when they no longer follow other commands. By 1980, Bradley was one of 12 people working to create the debut. The engineers knew they had to design a simple way to restart the computer when it fails to respond the user -- Bradley wrote the code to make it work.

Bradley says, "I did a lot of other things than Ctrl+Alt+Delete, but I'm famous for that one." His fame and success is achieved each time a PC user fails. He commented this relationship with Bill Gates by saying "I may have invented it, but Bill Gates made it famous by applying my formula.. When ever any Microsoft's Windows operating system made by him CRASHES, thus I win whenever he loses"!

Follow me @rohhy

Google search gets eyes and ears!


Google's first search engine let people search by typing text onto a Web page. Next came queries spoken over the phone.


On Monday, Google announced the ability to perform an Internet search by submitting a photograph.

The experimental search-by-sight feature, called Google Goggles, has a database of billions of images that informs its analysis of what's been uploaded, said Vic Gundotra, Google's vice president of engineering. It can recognize books, album covers, artwork, landmarks, places, logos, and more.

"It is our goal to be able to identify any image," he said. "It represents our earliest efforts in the field of computer vision. You can take a picture of an item, use that picture of whatever you take as the query."

However, the feature is still in Google Labs to deal with the "nascent nature of computer vision" and with the service's present shortcomings. "Google Goggles works well on certain types of objects in certain categories," he said.

Google Goggles was one of the big announcements at an event at the Computer History Museum here to tout the future of Google search. The company also showed off real-time search results and translation of a spoken phrase from English to Spanish using a mobile phone.

"It could be we are really at the cusp of an entirely new computing era," Gundotra said, with "devices that can understand our own speech, help us understand others, and augment our own sight by helping us see further."

Offering one real-world example of the service in action, Gundotra said that when a guest came by for dinner, he snapped a photo of a wine bottle she gave him to assess its merits. The result--"hints of apricot and hibiscus blossom"--went far beyond his expertise, but that didn't stop him from sharing the opinion over dinner.

He also demonstrated Google Goggles to take a photo of the

Itsukushima Shrine in Japan, a landmark tourists may recognize even if they can't read Japanese. The uploaded photo returned a description of the shrine on his mobile phone.

Although the service can recognize faces, since faces are among the billions of images in the database, it doesn't right now, Gundotra said.

"For this product, we made the decision not to do facial recognition," Gundotra said.

"We still want to work on the issues of user opt-in and control. We have the technology to do the underlying face recognition, but we decided to delay that until safeguards are in place."

Follow me @rohhy 

Asus launched Multi-touch Netbook

asus%20t911256025404
Asus has launched the first multi-touch netbook called PC T91MT. This is the successor of the swivel screen Eee PC T91.
The new netbook sports a nice touchscreen with the support from TouchSuite application. It has the same application as that of the Eee PC T91 except the advancements in the screen, storage capacity and OS in the latter set. PC T91MT has a good memory support of up to 2GB DDR2 memory.
The Multi-touch PCT91MT netbook comes with a large 8.9-inch glossy LED-backlit display with multi-touch capability. It also offers 1024x600 pixel resolution. The netbook runs with a 1.33GHz Intel Atom Z520 processor.
Additionally, the multi-touch netbook has Wi-Fi connectivity and option for massive online storage with it. The other features include Bluetootrh, stereo speakers and built-in 0.3MP webcam. The set can have a battery life of five hours.
The netbook has drag, drop and pinch facility along with the 256-level pressure sensor to reproduce handwriting. The users can also enjoy with its FotoFun application in editing photos and writing reminders for Memos.
The multi-touch PCT91MTnetbook is available at a price of $532 (Rs. 25,500 approx.).

Follow me @rohhy 

Nero 9: What’s better than free? Free forever!


What’s better than free? Free forever! Nero offers you the chance to enjoy Nero's world-renowned data disc burning and copying features for an unlimited time, absolutely FREE!

Enjoy basic data burning and copying capabilities for your CDs and DVDs from the world’s most trusted digital media brand, Nero.

Includes Nero Ask Toolbar for world-class search technology with one-of-a-kind search tools to help you get what you’re looking for faster. Connect directly to the My Nero community to share your music, photo and video blogs, and to exchange ideas on a variety of community and technology topics.

Please note: Nero Free and Trial versions are strictly for personal, non-business use. Nero Technical Support is not available for free products such as the Nero 9 Lite. Under no conditions may this free download be sublicensed, redistributed, sold, or used for commercial purposes without the prior written permission from Nero.
http://www.nero.com/ena/downloads-nero9-free.php

Google unveils social search function


HAMBURG: Google is testing a new social search function to make it easier for people find their friends' blogs and twitter feeds.


The only catch is that users of the service need to have an open profile with Google that includes personal contact data.

Once those conditions are met, the user can access the service at the Google Labs. Typing in "New York" will yield a list of friends in the user's social network who have posted items from the Big Apple. Settings can be altered so that only postings from close friends and acquaintances are included in the "social graph."

Google Germany spokesman Stefan Keuchel says the new social search function is separate from a recently launched service allowing real time searches of Twitter feeds. Social Search works quickly, but not in real time. It is currently only available in English.

Follow me at Twitter
@rohhy

The Man Who Made You Put Away Your Pen

When was the last time you actually set pen to paper and mailed off a personal letter to someone? It's probably been awhile — and the man to blame is Ray Tomlinson.

Back in 1971, Tomlinson was a young engineer at the Boston firm of Bolt, Beranek and Newman — known today as BBN Technologies. He'd been given a task: Figure out something interesting to do with ARPANET, the newborn computer network that was the predecessor of the modern-day Internet.

"We were working on ways in which humans and computers could interact," he tells NPR's Guy Raz. But instead, Tomlinson started tinkering with the interaction — or lack of it — between distant colleagues who didn't answer their phones. He eventually found a way to send messages from one computer to another — inventing the system we now know as e-mail.

He began by sending messages between two computers in his office. "The keyboards were about 10 feet apart," he remembers. "I could wheel my chair from one to the other and type a message on one, and then go to the other, and then see what I had tried to send."

Unfortunately for posterity, Tomlinson doesn't remember what was in that first e-mail. The test messages he sent to himself were often just gibberish — strings of characters or a few phrases from the Gettysburg Address. "The first e-mail is completely forgettable," he says. "And, therefore, forgotten."

By way of his invention, Tomlinson is also responsible for the elevation of the @ sign from symbol to icon. To send messages between different computers, he needed a way to separate the names of senders and recipients from the names of their machines. The @ sign just made sense; it wasn't commonly used in computing back then, so there wouldn't be too much confusion. The symbol turns an e-mail address into a phrase; it means "user 'at' host," Tomlinson explains. "It's the only preposition on the keyboard."

Today, more than a billion people around the world type that @ sign every day. Tomlinson says that back in 1971, he did have some idea of the impact his invention would have.

"What I didn't imagine was how quickly that would happen."

Follow me @rohhy 

First Twitter Message From Space Sent


Astronaut Mike Massimino has boldly gone where no man has gone before: He sent the first Twitter message from space.

Massimino began using the microblogging Web site a few months ago, updating his followers on the day-to-day life of an astronaut and his training for the upcoming mission.

Massimino and the other six members of the space shuttle Atlantis' trip to service the Hubble Space Telescope launched Monday. His first Twitter message (called a "tweet") from space communicated his excitement about the launch — in under 140 characters (one of the site's constraints).

"Launch was awesome!!" Massimino tweeted Tuesday via his Twitter alter ego @Astro_Mike. "I am feeling great, working hard, & enjoying the magnificent views, the adventure of a lifetime has begun!"

Since then, he's sent a couple more messages through the social networking technology. Massimino transmits his messages to Mission Control on the ground, and NASA posts them to the Web at: http://twitter.com/astro_mike.

"Rendezvous and grapple were great, getting ready for our first spacewalk," Massimino tweeted Thursday.

Massimino is a veteran spacewalker making his second trek to Hubble. He took up Twitter at the suggestion of NASA's Public Affairs Office, as a way to give the public a peek at life as an astronaut.

"Being an astronaut's a cool job, we're very fortunate to have it and day-to-day we get to do some fun things," Massimino said before flight. But the busy schedule can make it hard to reach out to people, he said. "The opportunity to use Twitter has been great, because by definition it has to be short."

While he's doing his best to stay in touch from orbit, there are some times that Twitter will be technologically out of reach for Massimino.

"We do not have a text device certified for spacewalks, so during that period he'll be unavailable," said fellow astronaut Scott Altman, commander of Atlantis' STS-125 mission.

Follow me @rohhy 

The 50 Best Inventions of 2009


From a rocket of the future to a $10 million lightbulb, here are TIME's picks for the best new gadgets and breakthrough ideas of the year
The Best Inventions
  1. The Best Invention of the Year: NASA's Ares Rockets
  2. The Tank-Bred Tuna
  3. The $10 Million Lightbulb
  4. The Smart Thermostat
  5. Controller-Free Gaming
  6. Teleportation
  7. The Telescope for Invisible Stars
  8. The AIDS Vaccine
  9. Tweeting by Thinking
  10. The Electric Eye
  11. The Mercury Probe
  12. The Personal Carbon Footprint
  13. The Solar Shingle
  14. The Handheld Ultrasound
  15. The YikeBike
  16. Vertical Farming
  17. The Planetary Skin
  18. The $20 Knee
  19. A Watchdog for Financial Products
  20. The Electric Microbe
  21. The Bladeless Fan
  22. The Custom Puppy
  23. The Cyborg Beetle
  24. The Biotech Stradivarius
  25. The Nissan Leaf
  26. The Robo-Penguin
  27. The Universal Unicycle
  28. YouTube Funk
  29. Dandelion Rubber
  30. Wooden Bones
  31. The Living Wall
  32. The School of One
  33. The No-Punt Offense
  34. The Human-Powered Vending Machine
  35. The Handyman's X-Ray Vision
  36. Meat Farms
  37. Packing, Improved
  38. The Foldable Speaker
  39. The Levitating Mouse
  40. The Edible Race Car
  41. The High-Speed Helicopter
  42. The Supersuit
  43. The Eyeborg
  44. Spiderweb Silk
  45. The Sky King
  46. The Smart Bullet
  47. The Fashion Robot
  48. The 3-D Camera
  49. The Newest Cloud
  50. The World's Fastest (Steam-Powered) Car

The Five Worst Inventions


The Smile Police

Employees at Keihin Electric Express Railway in Japan have their smiles scanned by software to maximize cheeriness


The Jane Austen Monster Mashup Novel
It started with Pride and Prejudice and Zombies. Please let it end soon.


Snuggies for Dogs
It's bad enough that humans wear "the blanket with sleeves." Do we have to put them on dogs as well? Do we really?


The Gas-Mask Bra
You have to admire the good intentions of the inventor who made a bra that converts handily into a pair of gas masks


Computer Critics
A new standardized test in the U.K. will use software, not humans, to grade student essays. Shakespeare wept.

Britney's Twitter account hacked!




Pop diva Britney Spears has become a victim of Internet hackers.

The Toxic singer's Twitter and MySpace accounts were hacked and the messages posted on her page claimed she worshipped the devil.

However, several of the messages were deleted after Spears' management regained control of the account, reports China Daily.

The 27-year-old singer's Twitter feed has more than 3.7 million followers and is updated by herself and her "team" of handlers.

A message apologized for "any offense the hacker's messages caused."

Britney on Twitter!

There is plenty of water on the moon, NASA confirms!

WASHINGTON: There is indeed water on the moon - as first indicated by India's maiden lunar mission Chandrayaan - and plenty of it, US space scientists said on the basis of impacts made by a new satellite.

"Indeed yes, we found water," Anthony Colaprete, the principal investigator for US space agency NASA's Lunar Crater Observation and Sensing Satellite, said in a news conference on Friday.

The satellite, known as Lcross, slammed into a crater near the Moon's south pole a month ago. The impact carved out a hole 60 to 100-feet wide and kicked up at least 24 gallons of water.

"We got more than just whiff," said Peter H Schultz, a professor of geological sciences at Brown University and a co-investigator of the mission. "We practically tasted it with the impact."

The Indian Space Research Organisation (ISRO) had announced the path-breaking discovery of water on the moon by India's Chandrayaan-1 on September 24 after data from NASA's Moon Mineralogy Mapper (M3) instrument indicated the presence of water molecules on the lunar surface.

M3 was one of the 11 scientific instruments onboard Chandrayaan that ISRO launched October 22, 2008, but the moon mission had to be aborted on August 30 after Chandrayaan lost radio contact with the earth.

The new US Lcross mission consisted of two pieces - an empty rocket stage to carve into the lunar surface and a small spacecraft to measure what was kicked up, but it too slammed into the surface.

The twin impacts in the Cabeus crater October 9 created a plume of material from the bottom of a crater that has not seen sunlight in billions of years, NASA said.

The plume travelled at a high angle beyond the rim of Cabeus and into sunlight, while an additional curtain of debris was ejected more laterally.

"We're unlocking the mysteries of our nearest neighbour and, by extension, the solar system," said Michael Wargo, chief lunar scientist at NASA Headquarters in Washington. "The moon harbours many secrets, and LCROSS has added a new layer to our understanding."

"We are ecstatic," said Anthony Colaprete, LCROSS project scientist and principal investigator at NASA's Ames Research Center in Moffett Field, California.

Follow me @rohhy 

Go! a new programming language from google


Go! is a concurrent programming language, first publicly documented by Keith Clark and Francis McCabe in 2003 and included as part of the Network Agents project at Sourceforge. It is oriented to the needs of programming secure, production quality, agent based applications. It is multithreaded, strongly typed and higher order (in the functional programming sense). It has relation, function, and action procedure definitions. Threads execute action procedures, calling functions and querying relations as need be. Threads in different agents communicate and coordinate using asynchronous messages. Threads within the same agent can also use shared dynamic relations acting as memory stores.


Its nature as a multi-paradigm programming language, integrating logic, functional, object-oriented, and imperative programming styles, is particularly applied to ontology-based modeling, as exploited for the Semantic Web in allowing a type system where OWL classes can be represented in the type system. The design of Go!, according to Bordini et al.'s survey, also took into consideration critical issues such as security, transparency, and integrity, in regards to the adoption of logic programming technology. Agents in Go! contain both reactive and deliberative aspects, and coordinate using BDI structures, and their style of expression has influenced the modeling of agent systems in Erlang.

Where did the idea for Go come from?

Pike, Thompson and Robert Griesemer of Java HotSpot virtual machine and V8 JavaScript engine fame, decided to make a go of developing a new language out of frustration with the pace of building software. Said Pike:

"In Google we have very large software systems and we spent so long literally waiting for compilations, even though we have distributed compilation and parallelism in all of these tools to help, it can take a very long time to build a program. Even incremental builds can be slow. And we looked at this and realized many of the reasons for that are just fundamental in working in languages like C and C++, and we needed a different approach. We also decided the tools that everybody used were also slow. So we wanted to start from scratch to write the kind of programs we need to write here at Google in a way that the tools could be really efficient and the build cycles could be very short."

Example
Gender::= male

female.
person <˜ {dayOfBirth:[]=>day. age:[]=>integer.
gender:[]=>Gender. name:[]=>string.
home:[]=>string. lives:[string]{}}.
person:[string,day,Gender,string]$=person.
person(Nm,Born,Sx,Hm)..{
dayOfBirth()=>Born.
age() => yearsBetween(now(),Born).
gender()=>Sx.
name()=>Nm.
home()=>Hm.
lives(Pl) :- Pl=home().
yearsBetween:[integer,day]=>integer.
yearsBetween(...) => ..
}.
newPerson:[string,day,Gender,string]=>person.
newPerson(Nm,Born,Sx,Hm)=>$person(Nm,Born,Sx,Hm).

- Rohy :)
Follow me @rohhy 

Google's SPDY: Doubles the speed of Web!

SPDY: An experimental protocol for a faster web
Google is apparently in the early stages of a research project that appears to aim as high as perhaps replacing the HTTP protocol, the fundamental technology that essentially makes the World Wide Web possible.


In a somewhat obscure post on the Chromium blog, the development branch of their Chrome browser, Google reveals they’ve been working on a new protocol dubbed SPDY for “SPeeDY” for its goal of making the web faster.

While HTTP is an “elegantly simple protocol” that has powered the web since 1996, the tone of Google’s post is almost patronizing, as if HTTP were our doddering old uncle that’s had his day and needs to be put out to pasture. Then again, Google’s hubris is perhaps warranted as one of the only companies with enough clout and resources to indeed spur on the “evolution of websites and browsers” with an entirely new protocol designed to speed up the communication between web servers and clients.

They reveal they’ve already got a prototype web server and a Chrome client with built-in SPDY support that they’ve been testing in the lab. With these tools they’ve reportedly been able to see an up to 55% speed increase in page loading, and feel like the project is now stable enough to warrant soliciting feedback from the web community. The SPDY documentation is now available, as well as the source code. Google encourages feedback on the new protocol in the Chromium Google Group.

Google:
Executive summary
As part of the "Let's make the web faster" initiative, we are experimenting with alternative protocols to help reduce the latency of web pages. One of these experiments is SPDY (pronounced "SPeeDY"), an application-layer protocol for transporting content over the web, designed specifically for minimal latency. In addition to a specification of the protocol, we have developed a SPDY-enabled Google Chrome browser and open-source web server. In lab tests, we have compared the performance of these applications over HTTP and SPDY, and have observed up to 64% reductions in page load times in SPDY. We hope to engage the open source community to contribute ideas, feedback, code, and test results, to make SPDY the next-generation application protocol for a faster web.

SPDY frequently asked questions
Q: Doesn't HTTP pipelining already solve the latency problem?
A: No. While pipelining does allow for multiple requests to be sent in parallel over a single TCP stream, it is still but a single stream. Any delays in the processing of anything in the stream (either a long request at the head-of-line or packet loss) will delay the entire stream. Pipelining has proven difficult to deploy, and because of this remains disabled by default in all of the major browsers.

Q: Is SPDY a replacement for HTTP?
A: No. SPDY replaces some parts of HTTP, but mostly augments it. At the highest level of the application layer, the request-response protocol remains the same. SPDY still uses HTTP methods, headers, and other semantics. But SPDY overrides other parts of the protocol, such as connection management and data transfer formats.

Q: Why did you choose this name?
A: We wanted a name that captures speed. SPDY, pronounced "SPeeDY", captures this and also shows how compression can help improve speed.

Q: Should SPDY change the transport layer?
A: More research should be done to determine if an alternate transport could reduce latency. However, replacing the transport is a complicated endeavor, and if we can overcome the inefficiencies of TCP and HTTP at the application layer, it is simpler to deploy.

Q: TCP has been time-tested to avoid congestion and network collapse. Will SPDY break the Internet?
A: No. SPDY runs atop TCP, and benefits from all of TCP's congestion control algorithms. Further, HTTP has already changed the way congestion control works on the Internet. For example, HTTP clients today open up to 6 concurrent connections to a single server; at the same time, some HTTP servers have increased the initial congestion window to 4 packets. Because TCP independently throttles each connection, servers are effectively sending up to 24 packets in an initial burst. The multiple connections side-step TCP's slow-start. SPDY, by contrast, implements multiple streams over a single connection.

Q: What about SCTP?
A: SCTP is an interesting potential alternate transport, which offers multiple streams over a single connection. However, again, it requires changing the transport stack, which will make it very difficult to deploy across existing home routers. Also, SCTP alone isn't the silver bullet; application-layer changes still need to be made to efficiently use the channel between the server and client.

Follow me @rohhy 

Doodle 4 Google - My India

Google likes to reflect the ever-changing world of the users through the logo designs on their homepage. These ‘doodles’ celebrate scientists, artists, local events or special dates and are designed by the original doodler, 31-year-old, Dennis Hwang.

Google now giving you a chance to design a doodle for them, through their doodle competition, Doodle 4 Google. If you are currently a student in any school in India (between the 1st and 10th standards), then this is your chance to have your doodle be displayed on the Google India homepage. The theme of this competition is 'My India'. The best doodles will be voted on by a panel of judges as well as by the Indian public, and the winning doodle will be featured on the Google India homepage for a day, to be viewed by millions of people. The final winner will also win his or her very own laptop (and a technology grant for their school)!



Winning Doodle 4 Google 'My India' Doodle - Puru Pratap Singh


Original Doodler

Google doodles, the drawings that are designed on, and through, the Google logo on our home page, are the creation of 31-year-old Google Webmaster Dennis Hwang. Since Dennis began celebrating and marking worldwide events and holidays with his doodles in 2000, his work has been seen by millions and reached cult status, with fans waiting with bated breath to see his next creation, and even websites and blogs devoted to his work. We spoke to Dennis about his doodles and how he got his ideal job:


Most people have to choose only one of their interests to pursue. How did you get such a cool job that meshes computers and art?

"I had an internship with Google in college. I was given the task of helping with maintenance of the website and I soon became an assistant webmaster. Before I joined Google, the founders Larry Page and Sergey Brin were already thinking about holiday logos...and when I joined, they knew I was studying art and suggested I should give it a shot. I've been doing it since then as my 20% project."

Are you constantly trying to keep up with current events and holidays?

"How far I work in advance depends. Sometimes, we react really quickly to current events. When the Mars Rover landed, I created a logo in less than 24 hours. For all of the international countries, if there's a special day and we think it's in line with the Google brand, we want to commemorate it."

Do you get suggestions from Google users?

"I get quite a lot of suggestions from users. We're really open to user feedback and having ideas sent to us because our users are really creative. For example, a French astronomer had emailed us about the Venus Transit, in which Venus casts a shadow on the sun every 122 years. During the transit, you'll see a black dot moves across the sun, so here is what I drew."

How do you decide on the design of the drawings?

"First, I do a lot of brainstorming, search for images on Google, and absorb all the imagery. Then I apply a design that interacts with letters. I find that a bit more interesting."

Do you have favorite doodles?

"I have several favorites. Usually, artists' birthdays are the ones I spend the most effort on, like Monet's birthday."

How difficult is it to reinvent recurring holidays?

"It's definitely a challenge, but it's one I look forward to. I've been doing this for quite a while and need to come up with fresh ideas every year. There's only so many ways to draw a turkey or a pumpkin!"

Follow me @rohhy 

Water on the Moon; Even Google’s Celebrating!



Google’s been on a homepage logo changing spree: they’ve celebrated H.G. Wells, the bar code, Confucious, Gandhi, and Sesame Street over the last few months alone.


If you check Google.com now though, you’ll see that the search giant is celebrating something different: the discovery of water on the moon! NASA made the stunning announcement earlier today after its moon bombing mission successfully revealed water under the lunar surface. And now the GoogleGoogle logo depicts the bombing revealing water.

When you think about it, Google had a quick turnaround time for this logo. As fellow space enthusiasts, our hats go off to NASA and the men and women behind the successful mission. Hopefully this is only the beginning of something even bigger than ourselves.

Water on the moon:
YouTube Video:
http://www.youtube.com/watch?v=YpsGO-JhrJQ

Word Magic!

Do you know? You can add some random text in Microsoft Word by giving just one word command??? Check this out! This is really interesting, I was surprised when first seen this!
  1. Open MS-Word
  2. Create new document
  3. Type ‘=rand(10)’
  4. Press enter
  5. See what happening!!!



If this not work: check you have auto correct turned on, and then try again!

It will add 10 random paragraphs in MS-Word. If you have office 2003 or previous version then it will add the writing the ‘quick brown fox jumped over the lazy dog’ if office 2007 then it will add some useful information about MS-Word. Try this! :)

The anatomy of e-mail

History and Evolution of Electronic mail

The History
In 1957, at the heights of the Cold War, the Soviet Union scored one against the United States when it successfully put in place the world’s first artificial satellite, Sputnik I. To up the ante with the Soviets, the US Department of Defense set up a division dedicated to extreme technology research, ARPA (Advanced Research Project Agency), which later fashioned ARPANET. For the first time in history, computers were able to exchange information electronically.

 How it works?



















Evolution
1969 The birth of ARPANET, the precursor to today’s Internet, designed for sharing research among scientists. The system crashed at the first login!

1971 Ray Tomlinson sends the first e-mail

1979 Emoticons bring life into otherwise boring computer newsgroup

1982 TCP/IP, where the Internet owes its true origins, is invented

1984 William Gibson coins the world cyberspace in his book Neuromancer

1991 The WWW is officially created by Tim Berner-Lee. He created the first www protocol at CERN, Switzerland

1993 The world’s first graphical Web browser, Mosaic, is released to the public and the concept of ‘surfing’ comes to life

1996 40 million people are online in more than 150 countries around the world

2000 Over 4 billion e-mail per day are sent in the world. Over 1 billion Web sites exist on the Internet. Every day, 7 million new pages are added!

2001 1.8 billion pages on the Web, with over half on them in the English Language

2005 Worldwide, the number of e-mail boxes will grow to 1.2 billion from 505 million in 2000



Not a bed of roses!
The sheer freedom and flexibility that e-mail offered has made it the number one application used on the Internet. But with the fruits of e-mail also come the pits of invasion. In its early days, e-mail was a very safe means of sending messages since the e-mail itself consisted mostly of text. But once e-mail was capable of carrying attachments, malicious hackers started using it to send Viruses, Trojans and Worms.

As if this isn’t enough to face users to take a cautions approach towards e-mail, things get nastier with the abuse of unsolicited e-mail, spam. Named after the tins of American “SPiced hAM”, for each legitimate message send across the Net, there seems to be a disproportionately higher amount of spam filled with promises of getting filthy rich, shedding pounds off your waist, and buying fabulous offers that you can’t afford to miss.


Commerce takes a twist
The growth of e-mail has had a profound influence on enterprise. Documents, visual designs and just about any piece of business correspondence can be sent instantly, and at much lower costs than overnight delivery services. E-mail has provided a grand replacement for telephone calls in many instances. What’s more, as this medium is so informal, one doesn’t have to worry about composing grammatically correct words and sentences.

Since there is no paper involved, the storing and retrieval of message becomes much easier and quicker with less space consumed.
Follow me @rohhy 

Origins of the term “SPAM"

To mean net abuse

Much to the chagrin of Hormel Foods, maker of the canned "Shoulder Pork and hAM"/"SPiced hAM" luncheon meat, the term "spam" has today come to mean network abuse, particularly junk E-mail and massive junk postings to USENET.

How did the term get this meaning? I went on a mission of etymological research. In this article you'll learn how the term, born of canned ham, moved into BBSs and MUDS and then was applied to USENET postings and E-mail. I've put in a short history of the earliest big spams, including a special page about the first E-mail spam from 1978. (You'll be astounded to see which net celebrity defends the spam. But we were all younger then.)

(This is an interesting time for spammiversaries. March 31st, 2003 marks the 10th anniversary of the term Spam being applied to a USENET post, and May 3rd marks the 25th anniversary of the earliest documented E-mail spam.)

Plus at the bottom, a bit about the term surfing the net.

Most people have some vague awareness that it came from at first from the spam skit by Monty Python's Flying Circus. In the sketch, a restaurant serves all its food with lots of spam, and the waitress repeats the word several times in describing how much spam is in the items. When she does this, a group of Vikings (don't ask) in the corner start a song:

"Spam, spam, spam, spam, spam, spam, spam, spam, lovely spam! Wonderful spam!"

Until told to shut up.

Thus the meaning of the term at least: something that keeps repeating and repeating to great annoyance. How did the two get connected?

Canter and Siegel

In April of 1994, the term was not born, but it did jump a great deal in popularity when two lawyers from Phoenix named Canter and Siegel posted a message advertising their fairly useless services in an upcoming U.S. "green card" lottery. This wasn't the first such abusive posting, nor the first mass posting to be called a spam, but it was the first deliberate mass posting to commonly get that name. They had posted their message a few times before, but on April 12, they hired an mercenary programmer to write a simple script to post their ad to every single newsgroup (message board) on USENET, the world's largest online conferencing system. There were several thousand such newsgroups, and each one got the ad.

Quickly people identified it as "spam" and the word caught on. Future multiple postings soon got the appelation. Some people also applied it to individual unwanted ads that weren't posted again and again, though generally it was associated with the massive flood of the same message. It turns out, however, that the term had been in use for some time before the famous green card flood.

Later, some particularly nasty folks figured they could take mass e-mailing software (which had been around for decades to handle mailing lists) and use it to send junk e-mail to large audiences who hadn't asked for it. The term quickly came to be used to describe these unwanted junk e-mails, and indeed that is the most common use of the term today.

The MUDders

The "green card" spam didn't coin the term, and it wasn't even the first "spam" -- though it was the first really large commercial one.

My research shows the term goes back to the late 1980s and the "MUD" community.

A MUD is a multi-user-dungeon. That's a somewhat archaic term for a real time multi-person shared environment, which is to say a shared world where users can chat, move around and interact with locations and objects in the environment. MUDs were named that because the first reminded people of "adventure" or "Dungeons and Dragons" games that involved jointly exploring a cave or dungeon. Modern successors of the MUD include EverQuest and The Sims Online.

But most people used MUDs to chat, and to play around and impress one another with objects they created. They were at first a highly evolved successor for the chat room.

The term spamming got used to apply to a few different behaviours. One was to flood the computer with too much data to crash it. Another was to "spam the database" by having a program create a huge number of objects, rather then creating them by hand. And the term was sometimes used to mean simply flooding a chat session with a bunch of text inserted by a program (commonly called a "bot" today) or just by inserting a file instead of your own real time typing output.

There are unconfirmed reports as well that the term migrated to MUDs from early "chat" systems. Rich Frueh believes the term originated on Bitnet's Relay, the early chat system that IRC was named after. When the ability to input a whole file to the chat system was implemented, people would annoy others by dumping the words to the Monty Python Spam Song. Peter da Silva reports use in early 80s chat on TRS-80 based BBSs, but feels since they imported other Bitnet Relay customs, the term may have come from there. Another unconfirmed report from a BBS user claims to have seen it defined as a "Single Post to All Messagebases" though this origin seems unlikely in my personal opinion.

Another report describes indirectly a person simply typing "spam, spam..." in a MUD with a keyboard macro until being thrown off around 1985.

(A report by a blogger that she believes she observed the birth of the term spam in AOL Star Trek chat rooms turns out to date from 94-95 and thus postdates the word entering common usage via other channels.)

My research has not found BBSers or Relay chatters using the term in USENET messages, so for now I conclude it was MUDders who brought the term to USENET and email.

Here we see a thread where MUDders discuss the meaning and origin of the word Spam in 1990.



First Spams

After the MUDders used the term, from time to time it would be used to describe a net abuse, but its use was fairly rare. People far more commonly talked of the luncheon meat. It wasn't a bad term at the time, and many people liked to use it in site names, userids, signatures etc.

1978: The first internet E-mail spam, sent by DEC

Einar Stefferud, a longtime net hand, reports that DEC announced a new DEC-20 machine in 1978 by sending an invite to all ARPANET addresses on the west coast, using the ARPANET directory, inviting people to receptions in California. They were chastised for breaking the ARPANET appropriate use policy, and a notice was sent out reminding others of the rule.

I have put up a page with the message and its reaction or you can see it directly in the msggroup archives (if they come back online.) It may amuse some to see a young Richard Stallman as one of the defenders of the spam!

Compaq now owns DEC, so perhaps Bill Hewlett and Dave Packard's heirs are simply among those who vowed never to do business with spammers? Of course in 1978 nobody called this a spam.

Even earlier, non-network spam

Tom Van Vleck, co-author of the CTSS MAIL command, reports an even earlier spam sent on MIT's Compatbile Time Sharing System (CTSS) as far back as 1971. A sysadmin named Peter Bos used CTSS MAIL to send everybody the anti-war message that: "THERE IS NO WAY TO PEACE. PEACE IS THE WAY." He reports the spammer defended it by saying, "but this is important." He was also an authorized admin, so this one is somewhat harder to classify. A great history of early mail systems provides more details.

And people were thinking about the problem even before it took place. In 1975, RFC706 by Jon Postel mused on the issue.

jj@cup.portal.com says: HELP ME!

Rob Noha, using the account JJ@cup.portal.com posted on May 24, 1988 to as many newsgroups as he could find a plea to HELP ME! and send money to his college fund, as he was, he claimed, running out.

Thus the first USENET spam was, in a sense, a charity spam. Or perhaps charity 'scam' is a better word.

JJ posted to many groups, but each post was crossposted to 4 or 5 newsgroups, to reduce the total volume, but still annoy.

However, nobody ever used the term "spam" to refer to this posting until 1996. It did spark a lot of debate about the merits of having sites like Portal, which sold accounts to anybody with a few dollars. This somewhat elitist viewpoint got even more prevalent when AOL was poised to join the fray.

Make Money Fast

For many years, the classic unwanted post on USENET was the "Dave Rhodes" "MAKE MONEY FAST" post. This was a pretty standard chain letter, but a lot of people started sending it to mailing lists and posting it to newsgroups for no good reason. Most were roundly chastised. Some ran away and were never heard from again. Others learned to play well with others.

However, while there were many "MAKE MONEY FAST" postings in the early 90s and even the 80s, they were usually one-off postings, each one by a different person. Thus they weren't called spam (until after ARMM, below.)

ARMM -- first to be called spam.

In 1993, Richard Depew tried to make some changes in USENET. He advanced a somewhat controversial idea called retro-moderation, where newsgroups would be semi-moderated (that is to say, regulated so that not all postings would appear) through a moderator who canceled postings that broke the rules.

Moderated groups were common, but with those, each posting was pre-screened by the moderator. He suggested allowing a moderator to screen after the fact. Because this was new, and reminded people of censorship (since canceling the postings of others was normally a major faux pas), this was quite controversial. Depew got his own fan group, and both allies and detractors.

However, what really got people upset was March 31, 1993. He had been playing with some software to perform the retro-moderation task. His software, called ARMM, had a bug, and he ran it, and it ended up posting 200 messages in a row to news.admin.policy, the newsgroup where people discussed the running of the net. You can see an example here.

It really ticked people off, and some people, knowing the term from MUDs, called it a spam. The very day ARMM was run, Joel Furr, as far as I can tell, was the first to call a spam a spam.

Depew himself shortly apologized for having done a spam, using the term himself. However, many would say that this wasn't a true spam, since it was an accident.

First Giant Spam

The first major USENET spam came on January 18 of 1994. Every single newsgroup found in it a religious screed declaring: Global Alert for All: Jesus is Coming Soon.

This one caused a ton of debate and controversy. The Andrews University sysadmin (Clarence Thomas, no relation) who sent it generated a flurry of complaints against his institution and some press, though reportedly he never got more than a mild punishment at the time. He did however eventually leave the University, but was also known to have done some more minor religious spams at later dates.

Normally in USENET you can post a message to more than one newsgroup using the "crossposting" mechanism. The advantage with this is that the message only goes out once, and people who read both newsgroups only see it once. This feature is highly useful if not abused, yet most major conferencing systems never implemented it.

However, it was not practical to crosspost to every single newsgroup, nor desired. Still, this event provided a button at the USENIX Unix conference saying "Jesus is coming and he doesn't know how to crosspost."

One of the most annoying things about this message was that not only did you see it again, and again, for every newsgroup you read, but it also showed up as the only message of the day in newsgroups that had low traffic levels. Most people like their low traffic newsgrous with low traffic, and this posting and others like it would soon spoil that serenity.

Green Card

Around four months after the Jesus spam, in April of 1994, Canter and Siegel posted the famous Green Card Lottery - Final One? spam. It also was posted to every group.

Unlike prior net abusers, Canter and Siegel didn't turn tail and run. They were proud of it, even though net residents attacked in return, flooding their phone lines, fax machine and mail boxes. Every account they had associated with this activity was pulled. Their ISP was overloaded by the heat of the reaction, actually hurting a lot of people.

They were unrecalcitrant, and this is what really made people angry. This spam made the newspapers; it made them famous. They announced plans to form a consulting company to post such ads for other people. They wrote and got published a book about their exploits with the long title of: How to Make a Fortune on the Information Superhighway : Everyone's Guerrilla Guide to Marketing on the Internet and Other On-Line Services.

The book was dreadful, and didn't sell well, and in a remarkable show of restraint, people on the net ignored calls to stage protests at their book signings, and instead ignored them. It worked, and they vanished into deserved obscurity.

Onward

I wrote this to be a history of the term spam, though that required a bit of the history of the act itself. Keith Lynch has a Spam Timeline which details some of the later history of spam. In fact, back in 1989 I wrote what I think was the first timeline history of USENET which can now be filled out with the use of google.

Spam did a lot to ruin USENET, unfortunately. Newsgroup spam was brought into check, oddly enough, by people applying Depew's ARMM principles with better software engineering skills. Today the only reason USENET manages at all is an army of anti-spam software that send out cancels and NoCem messages, with filters that block it on the way into servers.

But E-mail spam caused even more harm, in a way. Records show people quickly started talking about email spams not long after the term became popular for USENET spam. As E-mail spam grew, it became apparent that many mailings were being generated to anybody who had posted to a USENET newsgroup. Programs were "harvesting" the addresses from messages to make mailing lists and send junk mail to them.

This in turn made people afraid to participate in the net. Post to the net (or go into a chat room) with your real E-mail address, and you would soon find your mailbox flooded with spam. Not very appealing. A number of people left the net or stopped posting altogether. Others took to no longer putting their real e-mail address in their postings, either putting in a useless address, or putting in an address that a live human could figure how to change into the real one.

One great damage of that was it broke the E-mail reply function in USENET. One thing that had made USENET quite different in the early days from other online conferences like BBSs and Compuserve was that not only could you reply to a posting with E-mail, you were often expected to. The recipient was expected to summarize replies if they were interesting. That way it kept down (but certainly didn't eliminate) private messages and me-too posts presented to everybody. You were supposed to take your flame wars to E-mail; now it's very difficult to do so.

I did this research because I've been doing a lot of thinking about the spam problem and solutions to it, particularly in E-mail. I have a page of essays on spam if you are curious.

When Google expanded their USENET archive to go back 20 years, it became possible for the first time to really research these questions again.

By the way, Hormel eventually gave up complaining about the new definition for their trademark and decided to embrace the fact it boosted sales of their merchandise.

More remembrances of USENET

At about the same time as I was researching this, I wrote an article for the O'Reilly Network called I Remember USENET with some stories of the early days of the net. You may enjoy it.

Other Etymology (Net-Surfing)

The new USENET archive at google is a gold-mine for etymology. For example, a bit of research seems to show that the term "net-surfing" originated with Brendan Kehoe, also known as the author of "Zen and the art of the Internet," an early internet book.

In this thread from 1991 he uses the term to refer to somebody browsing telnet sites (there was no web at the time). Two messages later, Ron Newman talks about how he likes the term and wants to spread it!

However, others claim independent coinage, including possibly Mark McCahil the Gopher developer (they used the metaphor a lot) and others back to the 80s who talked about Information Surfing. Paul Saffo used the term "information surfing" in a 1988 magazine column and reports it was commonly used and "definitely already in the zeitgeist" before he wrote it. Even Marshall McLuhan used the metaphor of surfing data like ur-surfer Duke Kahanomoku.

In addition, the term "channel surfing" shows first use in January 91, and seems to have originated at the same time. Several of the early users of forms of the term claim they did so due to a love of real water surfing, so this appears to be a metaphor of many parents.

Bugs & Viruses!




Difference between Bugs & Viruses!
Software & Hardware errors called Bugs, While Viruses are malicious software

Related Words:
Bug
Trojan
Spyware
Worms
Threats
SPAM
Phishing
Hacking
Malicious Software
Malware
Virus

BUG
The original Bug!
Grace Hopper (1906-1992)
On one occasion during Hopper’s work for Aiken, the computer failed. Hopper traced the problem and found a Bug (insect) in the wiring. While she was removing the Bug, said I am debugging the machine!

DEBUG
Trace a problem and solve it
Debugging means tracing an error in hardware or software and removing it!

TROJAN-HORSE
The first Trojan-Horse
In ancient roman time…
SPARTA is attacking TROY, but they could not able to go through the mighty walls of TROY. SPARTANS mad a wooden horse and placed it in front of TROY’s gate. The TROYs taken the horse inside the Gate. At midnight; soldiers filled in the horse came out and open the Gate of TROY and thousand of SPARTA’s soldiers entered the fort and defeated the TROYs!

SPYWARE
Triggered to spy
SPYWAREs are made to spy on any important or sensitive data or find out what are you doing with/on your computer!

WORMS
Mostly harmless..!!
Worms are mostly harmless, but they written to make fun of some one or do tricks on screen!
Worms copies itself to memory and then spreads to folders and drives.

THREATS
Security Risk
If your system has some security settings are wrong then your system is easily connectable remotely.
Anyone with some advance knowledge of Hacking can connect to your system without your permission.

PHISHING
Online phishing (pronounced like the word fishing) is a way to trick computer users into revealing personal or financial information through an e mail message or website. A common online phishing scam starts with an e mail message that looks like an official notice from a trusted source, such as a bank, credit card company, or reputable online merchant. In the e mail message, recipients are directed to a fraudulent website where they are asked to provide personal information, such as an account number or password. This information is then usually used for identity theft.

HACKING
Getting in someone’s System (without their permission!) and copying or deleting their data will called Hacking! Some time hacking used to Hack a software to use without license (Pirated software).

MALICIOUS SOFTWARE, MALWARE AND VIRUSES
Meant to damage!
A virus is a program that replicates itself. It spreads by making copies of itself on a computer or by inserting computer code into program or operating system files. Viruses don't always damage files or computers, but they usually affect a computer's performance and stability. For a virus to infect a computer or to spread, you usually have to do something, such as open an infected program.

Symptoms of Virus!
Often system hangs
Software not running properly
Files are corrupted
Icons are wrong or missing
Automatically restarting
Some messages shows frequently

Fight against Viruses…
Anti-Virus
Anti-Spyware (Windows Defender)
Firewall
User Account Control
Parental Control
Windows Update
Backup & Restore

Gamolution!






Gamolution! (History of Computer Games)

From PAC MAN and MARIO of yesteryear to the life real graphics games of this days। From 2D to 3D, it has evolutes to large gaming industry॥ It is all begin on the old mono-chrome screens and 33MHz PCs.. Yes, that was real! Today’s most cell phones can have faster processor than this! But we have enjoyed it at that time. . Now it is becoming large gaming industry of XBOX 360 and others!

Arcade Games and the Earliest Video Game Emulation
The idea of emulation in computer science dates back to the 1950s, but it was some time before emulation would be practical for video games (which can be traced back to 1962's Spacewar!). Early arcade games and home units in the 1970s were crude enough that savvy fans could reverse-engineer and build their own versions of Home Pong or other popular games – an example of hardware-based video game emulation.

By the beginning of the 1980s, video games had become increasingly lucrative, and emulation threatened game manufacturers। Pirates used hardware emulation to make convincing clones of Nintendo's most popular Game & Watch units (portable, one-game precursors to the Game Boy), while other blockbuster arcade games of the time, such as the puzzle game Tetris, were also prominent victims of illegal video game emulation.



1972  Pong


1979 Space Invaders



1982 Pitfall


1986 Mario


1989 Prince of Persia


1991 Wolfenstein


1992 Mortal Combat


1994 Duke Nukem


1996 Quake


1998 Half-Life


1999 Unreal Tournament Quake III



2001 Max Payne


The 1980s saw video game systems designed for home use, using separate game cartridges, proliferate and begin to supplant arcades in popularity. The Atari 2600, Nintendo Entertainment System, and Sega Master System dominated this era of 8-bit video game systems. By the early 1990s, The Super Nintendo and Sega Genesis battled for supremacy in the 16-bit console wars.

Personal computers were becoming powerful enough that software emulation of these early games was becoming possible. This type of video game emulation worked by using ROM images (copies of the data from a game cartridge's Read-Only Memory chip) of old games. But as with the hardware emulators of the 1980s, these ROMs were very often illegal copies, which game publishers tried to suppress.

By the late 1990s, there was an explosion of video game emulators, as game libraries grew and computers got faster – and became internet-ready. One of the earliest NES emulators, NESticle, was soon followed by RockNES, Genecyst (emulating the Genesis), ZSNES, and Snes9x (emulating the Super NES), just to name a few. Sites such as Zophar's Domain made emulators and ROM images more widely available online.

3D Graphics and Video Game Emulation on Current Systems
Emulators have been less successful at duplicating games from the era of three-dimensional games for technical reasons – video game emulators such as Mupen64 (duplicating Nintendo 64 on Linux, Windows, and Mac) required top-of-the-line computers, and still could only run a few ROMs without glitches. And as systems became harder to reverse-engineer and emulate accurately, emulator development was dampened by legal action, such as when commercial PlayStation emulator Bleem! was bankrupted by a lawsuit brought by Sony.


That aside, video game emulation serves an important purpose in many current-generation consoles, helping expand backward-compatibility. The Nintendo Wii emulates the hardware of the earlier Nintendo GameCube, and has a Virtual Console which emulates many systems from earlier eras, such as NES, SNES, Nintendo 64, Sega Genesis, TurboGrafx-16, and Neo Geo. Gamers are legally able to purchase and download ROM images of games first made for those systems.

Early models of the PlayStation 3 contained the same hardware as earlier PlayStations, although current production models are unable to play PS and PS2 games. The PlayStation Portable, however, does have software emulation allowing it to play some original PlayStation games. Similarly, the Xbox 360 achieves some backwards-compatibility with original Xbox games through software emulation and an added hard drive.


The State of Video Game Emulation Today
Thanks to legal concerns, and the technological barriers to emulating current systems, video game emulation remains a pastime mostly for nostalgic hobbyists। Nevertheless, emulation does provide a way for younger gamers to appreciate older hits, and video game scholars also use emulators to preserve the digital culture of yesteryear

***
@rohhy

The Past is Future!




The new OS coming out on October 22nd from Microsoft, and we call it Windows 7. It looks pretty good and more reliable ever since Microsoft’s Windows Vista was release! There are many enhancement in Windows 7 but one of it’s best future is XP Mode! Yes it runs productive Windows XP software as it was run on Windows XP platform. This is made possible with the help of Hardware based visualization and virtualization technology. The Windows XP Mode (XPM) is a virtual machine package for Windows Virtual PC containing a pre-installed, licensed copy of Windows XP SP3 as its guest OS. Pre-installed integration components allow applications running within the virtualized environment to appear as if running directly on the host, sharing the native desktop and Start Menu of Windows 7 as well as participating in file type associations. XP Mode applications run in a Terminal Services session in the virtualized Windows XP, and are accessed via Remote Desktop Protocol by a client running on the Windows 7 host. Applications running in Windows XP mode do not have compatibility issues as they are actually running inside a Windows XP virtual machine and redirected using RDP to the Windows 7 host.



It has many advantages like:
Start from Windows 7 start menu
Support USB
Use printers and other ports
Internet connectivity






Virtualization supported motherboards from INTEL:
VT-d is enabled on the following chipsets:

Intel Q35 GMCH with ICH9 DO (Bearlake chipset)
The following chipsets have VT-d capability, but OEMs may not have enabled in systems based on these:

Intel X38

Intel X48

VT-d will be enabled on these future products:

Intel Q45 (Eaglelake)
For Intel Desktop Boards, these have VT-d support enabled:

Intel DQ35JO

Intel DQ35MP

Intel DX38BT

Intel DX48BT2

These future Intel Desktop Boards will have VT-d support:

Intel DQ45CB

Intel DQ45EK

*************************************

@rohhy