Theme Music
Tuesday, 31 July 2012
Download Upgrading and Repairing Microsoft Windows E-Book
Tips For Email Safety & Attachments
Simple tips and tricks can make your email safe:
(1) Sensitive Information
When sending personal information such as an address or telephone number, verify that the email address you are sending it to belongs to the person you intend to receive it. Sensitive information such as passwords, bank account numbers and Social Security numbers should never be sent via email.
When sending personal information such as an address or telephone number, verify that the email address you are sending it to belongs to the person you intend to receive it. Sensitive information such as passwords, bank account numbers and Social Security numbers should never be sent via email.
(2) Phishing
Scams called “phishing” attempt to dupe consumers into revealing account login information by pretending to be a legitimate company and sending an email claiming that there is a problem with their account. Always check with the company that a suspect email is claiming to be.
Scams called “phishing” attempt to dupe consumers into revealing account login information by pretending to be a legitimate company and sending an email claiming that there is a problem with their account. Always check with the company that a suspect email is claiming to be.
(3) Junk Mail
Unsolicited or “junk” email is also called “spam.” Install a spam filter onto your desktop mail client or use a trusted webmail provider that provides powerful spam filters to automatically delete messages from known spammers.
Unsolicited or “junk” email is also called “spam.” Install a spam filter onto your desktop mail client or use a trusted webmail provider that provides powerful spam filters to automatically delete messages from known spammers.
(4) Sending Attachments
Before sending, check with your email provider to ensure that your attachment meets the size limits set by your administrator. If your document contains sensitive data, you can provide a layer of protection by first compressing it in a different file format (such as .zip or .rar) and requiring a password to access the data.
Before sending, check with your email provider to ensure that your attachment meets the size limits set by your administrator. If your document contains sensitive data, you can provide a layer of protection by first compressing it in a different file format (such as .zip or .rar) and requiring a password to access the data.
(5) Receiving Attachments
Always run a virus scan on an attachment before opening it. Never open an attachment from a spammer or otherwise unsolicited or unknown source. Never open attachments with the extension .exe as this may open a virus that can harm your computer.
Always run a virus scan on an attachment before opening it. Never open an attachment from a spammer or otherwise unsolicited or unknown source. Never open attachments with the extension .exe as this may open a virus that can harm your computer.
What Is In Store For Windows Phone 8
There are going to be a lot more features in Windows Phone 8 and the only one Microsoft has shown in any detail is the new Start screen, which keeps the idea of live tiles that show you lots of information at a glance but gives you more options for the size of tiles and how you arrange them.
There’s a new small tile size; you can fit four of those in the old Windows Phone 7 tile size.
The layout is completely flexible; press and hold the way you do on Windows Phone today and you can unpin a tile, drag it to a new position – or press the arrow that appears on the bottom of the tile to cycle through the small, large and medium sizes.
The layout is completely flexible; press and hold the way you do on Windows Phone today and you can unpin a tile, drag it to a new position – or press the arrow that appears on the bottom of the tile to cycle through the small, large and medium sizes.
Even without the Zune-style ‘trough’ to remind you your other apps are on the right hand side, you only get two of what’s now the medium tiles side by side, but there seven rows of small size tiles (or three and a half medium tiles) so you could cram in 28 small tiles if you wanted to.
More likely, you’ll want a mix of small and medium tiles, with a couple of the ‘double-wide’ large tiles for apps that show a lot of information on a live tile.
That’s no longer restricted to Microsoft apps, phone makers and mobile networks; any app can have a double-side tile now, and it can be a live tile that updates.
If you make a tile smaller, the tiles next to it don’t move over automatically; if you make it larger, it does push the other tiles out of the way, so you may have to move tiles a couple of tiles to get the layout you want.
You can use small tiles to offset medium tiles (at the side or above) so you get a staggered arrangement instead of just grouping them in the space of one medium tile.
The new Start screen gives you even more live information because you can fit so many more live tiles on. You get more control than ever over which tiles get more space and which have just enough room to show their icon or the number of text messages or missed calls.
You can still have the Windows Phone 7-size tiles in two rows and the three new sizes and the underlying seven by eight layout give you much more flexibility.
Monday, 30 July 2012
Know About EVDO,What is EVDO?
EVDO is a protocol for high speed wireless broadband. Also known as EV-DO, 1xEvDO and 1xEV-DO, it's one of several major Third Generation (3G) wireless data standards. Mobile devices that use EVDO technology can upload and download data quickly, and the technology is always "on" whenever there is a signal from the wireless tower. Unlike a WiFi® connection, a device with EVDO does not need to be near a wireless hotspot; instead, the cell phone can itself become a hotspot and share its Internet connection with other devices.
Officially, the name defined by the Telecommunication Industry Association for this technology is "CDMA2000, High Rate Packet Data Air Interface." The acronym EVDO is short for "Evolution, Data Only" or "Evolution, Data Optimized," a reflection of the fact that it is the next evolution of the earlier Code Division Multiple Access 2000 (CMDA2000) family of wireless products. The EVDO standard was developed in 1999, but the protocol has been upgraded since then to improve its speed.
3G and CDMA
3G is designed to transmit voice and high-speed mobile data to people on the go. Several competing technologies are involved in the development of 3G networks as technology companies work on the best way to handle the mounting demand for wireless services around the world. Many firms invested in the development of 3G networks and technology use the Code Division Multiple Access (CDMA) approach, which has proved highly effective with mobile phone networks.
The biggest obstacle to implementing high speed wireless networks is the lack of bandwidth, or range of usable frequencies. Just as only so many radio stations can be squeezed onto the FM dial, only so much data can be transmitted across the available bandwidth. As the user load increases, the available frequencies tighten, and users can experience delays, dropped data, and other problems. Thus, providers have been working to find ways to use bandwidth more efficiently without sacrificing clarity and quality for their users.
How CDMA Works
CDMA uses advanced mathematical techniques to allow multiple wireless devices to transmit simultaneously on the same radio frequency. Every device, such as a cell phone, is assigned a unique mathematical signature. Transmitters apply this signature to the original signal and send a modified version. A receiver applies the inverse of the mathematical operation to recover the original signal.
The term "CDMA" is used both to refer generally to a channel access method and to the specific technologies that use that method as a backbone for radio transmissions. The intended meaning is usually clear from the context. CDMA2000, for example, is a data handling standard that uses CDMA technology.
How EVDO Works
Traditional wireless networks create a direct path between receiving and sending devices, much like traditional telephone networks. EVDO instead breaks data into individual packets, the same technique for data handling used on the Internet. Each packet is sent independently of all the other packets. This saves bandwidth for use by other devices; when neither party on a phone call is speaking, for example, the connection consumes no bandwidth. When an Internet site is accessed, no bandwidth is used until the site starts sending the web page.
The original EVDO protocol, called Revision 0, has a theoretical throughput of 2.4 megabits per second (Mbps). This is as fast as many wired DSL and cable broadband connections currently available in the United States. The upgrade to Revision A increases speed to a theoretical 3.1 Mbps. A third upgrade, to Revision B, was released in January 2010, although it is not fully deployed; Qualcomm, the developer, predicts download speeds as fast as 14.7 Mbps in some situations.
Qualcomm has produced impressive demonstrations of EVDO's capabilities. In one, a video conference was conducted with a participant traveling in a car at 60 mph (96 kph). Transferring the large amounts of data required for video conferencing is a major challenge, especially at such speeds. In another demonstration, a phone call was placed from a bullet train moving in excess of 150 mph (240 kph).
UMTS and HSDPA
The biggest challenge to EVDO has been the Universal Mobile Telecommunications System (UMTS). UMTS — which is sometimes known by the name of its radio interface standard, Wideband-CDMA (WCDMA) — uses larger bands for data transmission. This approach can be less vulnerable to interception and jamming than some other wireless technologies. Data transfer speeds are slower than with EVDO, however, with speeds of up to 2 Mbps.
HSDPA, which stands for High-Speed Downlink Packet Access, was built on WCDMA technology, but with a number of significant changes in the way that data is handled. This protocol is considered 3.5G or enhanced 3G, a step above 3G but not quite fourth generation. HSDPA shares one transmission channel between multiple users, and schedules data transfer to take advantage of the best possible conditions; this means that data may be sent to multiple users at the same time. Different speed versions of HSDPA are typically available to consumers, with download speeds ranging from 1.8 Mbps to 21 Mbps or higher.
How Does This Affect Users?
An advantage of EVDO is that it uses the same broadcasting frequencies as existing CDMA networks. As purchasing spectrum from regulatory agencies is extremely expensive, this brings down the cost of building and using new networks. HSDPA, while offering faster download speeds with the higher levels of service, may also be more expensive for the consumer.
Mobile Internet users should remember that what standard is used for transmitting data is usually dependent on the network; a cell phone from Verizon in the US will have access to EVDO, for example, but not HSDPA. Users who will be traveling in foreign countries with wireless devices may want to check to see if they are supported on a given network. For frequent travelers, it may be advisable to consider investing in a device that will work reliably on international networks in order to avoid problems with dropped calls, inability to send data, and other issues.
As new wireless standards develop, the quality of wireless services tends to improve. Various options are not available in all areas, and may have differing rates of performance. Newer technologies can come with unexpected kinks and service plans may be more costly. Early adopters can also find it difficult to access technical support and assistance, as technicians may not be as familiar with the products they are using.
Know About MIDI Keyboard
A Musical Instrument Digital Interface (MIDI) keyboard is a musical instrument like a piano keyboard. The MIDI portion indicates that the instrument has a communication protocol built in that allows it to communicate with a computer or other MIDI-equipped instrument.
The MIDI interface is now so easy to implement that almost all keyboards sold today are some type of MIDI keyboard. This ranges from a simple 100 US dollar (USD) MIDI keyboard sold at the local department store to a 30,000 USD grand piano with a built-in MIDI keyboard controller. Every type of MIDI keyboard can connect to any other type of musical instrument that sports a MIDI interface. The 30,000 USD instrument will sound much better than the 100 USD instrument, but both can be controlled by the computer or other instrument in the same way.
It is also possible to purchase a MIDI keyboard with no sound capabilities at all. This device requires the musician to have some other MIDI device that is capable of understanding the MIDI messages and generating the correct sounds. This other instrument may be a computer or a dedicated sound box with a number of different instruments programmed into it. This approach allows one company to concentrate on making the keyboard and another to specialize in recreating instruments electronically. It also allows the musician to upgrade the instrument without losing the familiarity of the keyboard.
When purchasing a MIDI keyboard, there are several things to consider. The two most important are your budget and your level of comfort with the keyboard itself. If you have an unlimited budget, the choice is easier; simply buy the best MIDI keyboard that feels good to you.
If your budget is more constrained, then concentrate on getting the keyboard with the best feel. You can always upgrade the sound quality at a later date. To upgrade the feel, you will need to get a new keyboard and learn to become comfortable with the feel all over again.
MIDI keyboards can have different amounts of keys. Classical musicians and purists will insist on all 88 keys being present. Keyboards with 76 keys are also popular. MIDI keyboards with fewer keys are used when space is at a premium or for amateurs with a very limited budget.
MIDI keyboards come with a range of different feels. Some attempt to recreate the feel and action of a classic piano, while others have more of an electronic feel. Some are velocity sensitive, so that the faster the key is pressed, the louder the note sounds. Some are touch sensitive, so that the note sounds different depending on how hard the key is pressed. An inexpensive MIDI keyboard has neither effect.
Finally, if you are considering a used MIDI keyboard, remember that MIDI keyboards are more like cars than wine with respect to age. A wine improves with age, but a car runs down. An old MIDI keyboard, like an old car, is more likely to fail and more difficult to repair.
Sunday, 29 July 2012
Know About Dual Core Technology
Dual core technology refers to two individual microprocessors on a single die cast chip. This is essentially two computer processing units (CPUs) in one. The advantage of a dual core chip is that tasks can be carried out in parallel streams, decreasing processing time. This is referred to as thread-level parallelism (TLP).
TLP is also possible on motherboards that can accommodate two separate CPU dies. When TLP is accomplished in a single CPU through dual core technology, it is called chip-level multiprocessing (CLM).
In dual core CPUs, each microprocessor generally has its own on-board cache, known as Level 1 (L1) cache. L1 cache significantly improves system performance, because it is much faster to access on-chip cache than to use random access memory (RAM). L1 cache is accessed at microprocessor speeds.
Dual core chips also commonly feature secondary shared cache on the CPU, known as Level 2 (L2) cache. Motherboards may also have a cache chip designated as Level 3 (L3) cache. While faster than RAM, L3 cache is slower than cache built into the dual core chip.
Dual core technology has advantages over double-core or twin-core technology. These latter terms refer to two independent CPUs installed on the same motherboard. Dual core chips take up less real estate on the motherboard, have greater cache coherency, and consume less power than two independent CPUs. However, dual core technology also has its drawbacks.
For software to take advantage of dual core architecture, it must be written to utilize parallel threading. Otherwise, the program functions in single-core mode, using just one data stream or one of the built-in microprocessors. Unfortunately, coding for TLP is quite intensive, as interleaving shared data can create errors and slow performance. Because of these and other issues, a dual core processor does not deliver twice the speed of a single-core processor, though there is a significant increase in performance under optimal conditions. Finally, dual core chips run hotter than their single-core cousins.
Whether a dual core processor is right for you will depend on what you plan to use your computer for. If the programs you regularly require are designed for TLP, then you may benefit greatly from a dual core chip. If not, you may be better served by a high-end single-core CPU.
What Is FLAC?
FLAC stands for Free Lossless Audio Codec, a leading compression technique that preserves original audio quality while reducing file size. FLAC is an open-source, royalty-free format that has been adopted widely for its many advantages in digital audio reproduction.
Compression techniques take large files such as wave (.wav) files and reduce the data bits while preserving as much of the audio landscape as possible. A well-known audio compression format is MP3 (.mp3). MP3 files slim down bulky wave and compact disk (.cda) files to a fraction of their original size, making MP3 an ideal format for portable audio players. The MP3 format allows a vast library of songs to fill a very small storage footprint. However, there is a trade-off in audio quality.
FLAC surpasses MP3 quality by preserving the original soundscape in exact detail. The FLAC format reduces the original file size by roughly 30-60% with no loss of quality, hence it is a lossless format. This differs from the MP3 format which is a lossy format, or a format that loses quality in the conversion process.
One of the great strengths of FLAC is its very fast decoding time, or ability to stream even on modest hardware. Technical specifics in the framed architecture also allow it to be error resistant, in that each frame has the information it needs to decode itself. If a frame is corrupted, the data lost in the stream is a mere blip.
This differs from other types of lossless formats where the entire stream would essentially become corrupted.
Another feature of FLAC is that it can handle up to eight channels of audio for preserving surround sound recordings. FLAC is also a good choice for archiving audio CDs, as one can always use the FLAC file later to convert to future formats. A further advantage of FLAC is that it supports replaygain, a technique for ensuring that recorded sound files play at the same volume level.
The only real disadvantage of FLAC files is that the compression ratio is not as steep as other codecs. Files will be somewhat larger. However, with all of the advantages of FLAC, this is a happy trade off for many audiophiles.
Considering the falling prices of flash cards, portable players, and storage devices, the FLAC format will likely only gain support. FLAC files can play on iPods® with installation of the open source firmware replacement, Rockbox (though this might affect warranty). FLAC files can also be played on other portable devices and on home or auto compact disc players that support the FLAC format.
What are the Seven Modes of Music?
We have the ancient Greeks to thank for the modern seven modes of music, although some of their original modes have been replaced over time. Greek musicians may have been the first to understand the intimate relationship of mathematics and music theory, leading to what we understand as the major and minor scales. A traditional scale may be divided into 8 notes, but the intervals between those notes are not always equal. The Greeks developed scales which began and ended on each note of the original major scale (Ionian) we still hear today. The Greeks named the different scales after cities which reflected the mood of the seven modes of music. Modern music theorists now call these modes Ionian, Dorian, Phrygian, Lydian, Mixolydian, Aeolian and Locrian.
Understanding the seven modes of music requires a basic understanding of intervals and musical notation. We can define a musical scale with 8 letters (A-G), so that a "C" scale becomes C D E F G A B C with no flattened or raised notes. But another way to look at this scale is through intervals. This is the musical theory behind the familiar Do Re Mi Fa So La Ti Do exercises in choir or early band practice. Each of those syllables represents an interval in a major (Ionian) scale. These intervals are not evenly spaced, thus giving each one a specific relationship to each other. "Do" sounds very finished and solid, for instance. "Ti", by comparison, sounds very unfinished and unresolved. It is called a leading tone, which means it wants to lead the melody back to the final note "Do". It's the relationship between these intervals which give the modes their musical interest.
In the Ionian mode, the intervals are divided into a very familiar pattern of whole and half steps. Most of us would instantly recognize the Ionian mode when played on a piano. The rest of the seven modes of music retain this familiar pattern, but start on different notes. Here's a quick breakdown on each mode and their relationship to the original Ionian intervals:
Ionian Mode (W-W-H-W-W-W-H) In this definition, W stands for 'Whole Step' and H stands for 'Half Step'. The Ionian mode defines the familiar major scale pattern we hear as do, re, mi, fa, so, la, ti, do. The half step between Ti and Do gives the scale some tension and release. The majority of popular songs are written in the Ionian mode.
Dorian Mode (W-H-W-W-W-H-W) Dorian mode is most commonly heard in Celtic music and early American folk songs derived from Irish melodies. Songs written in Dorian mode sound a little melancholy because the final note (re) doesn't quite resolve itself. The song may be over, but the singer is still unsettled.
Phrygian Mode (H-W-W-W-H-W-W) Modern composers and guitarists commonly use Phrygian mode because it works well with the Ionian. Guitarists use modal music to create interesting solo lines which can be played against melodies in other modes. Composers often find the Phrygian mode to be as useful as the traditional minor (Aeolian) scale, but without the inherent sadness.
Lydian Mode (W-W-W-H-W-W-H) Lydian mode is the complete opposite of the Ionian, so it feels as solid as a major scale but the intervals are surprising and unexpected. This is a popular mode among jazz musicians who enjoy using a mixture of major and minor chord progression in inventive ways.
Mixolydian Mode (W-W-H-W-W-H-W) Mixolydian is similar to Lydian in the sense of a major scale feel with minor intervals. Mixolydian mode is another popular scale for solo musicians looking for a counterpoint to the Ionian key of the song.
Aeolian Mode (W-H-W-W-H-W-W) Aeolian mode is still in vogue today, although we tend to refer to it as the minor key. The intervals of Aeolian mode create the same feel as many modern blues songs. Songs composed in Aeolian mode have a strong sense of sadness. The final note of an Aeolian scale feels resolved in a completely different sense than the Ionian. If the Dorian mode reflects melancholy, the Aeolian reflects despair.
Locrian Mode (H-W-W-H-W-W-W) Locrian mode is considered to be so unstable and unsatisfying that most composers consider it unworkable. There are few songs written in the Locrian mode, which has lead some music experts to label it a 'theoretical' mode. It exists because all seven notes of the Ionian scale could form modes in a mathematical sense, but the relationship between intervals in the Locrian mode is simply not that interesting musically.
To remember the seven modes of music, many musicians use the following memory aid: "I Do F(ph)ollow Lonely Men And Laugh."
Know About Socreates, Who Was Socrates?
When we speak of Socrates, we must differentiate between the historical person and the figurative one, i.e., the Socrates of Plato. Either way, Socrates perhaps can be considered the father of western philosophy. His influence can be found in virtually all philosophical works, and his views are still discussed and debated today.
The historical man lived in ancient Athens from 470-399 BCE. He was a very well known philosopher during his lifetime, but made his living as a stonemason. As a philosopher, it is peculiar that Socrates never wrote down any of his views. For this reason, what is known of him and his philosophy must be surmised from the works of other ancient philosophers such as Xenophon, Aristotle and especially Plato, all of whom wrote of him after his death. The only known work produced about Socrates during his lifetime was a fictional play called Clouds.
It is widely accepted that Socrates lived an honorable and virtuous life. He lived meticulously according to the laws of his state and believed strongly in justice. He believed that virtue is knowledge and famously stated that, “The unexamined life is not worth living.” Despite his noble character, Socrates suffered a lot of criticism that eventually led to his condemnation and subsequent death.
Socrates was egregiously disliked by the prestigious citizens of Athens. This was because of what is now called Socratic irony and the Socratic method. Socratic irony means that one pretends to be ignorant in order to expose the false beliefs of another during a discussion. The Socratic method refers to a series of questions and answers which are meant to analyze, test or define a particular concept.
The philosopher was famous for claiming that the only thing he knew was that he knew nothing, hence Socratic irony. He made it his mission to question all the self-professed wise men of Athens in order to learn from them through the Socratic method. By his questioning, Socrates intended to make clear the lack of logic in their beliefs. This turned out to be extremely embarrassing and deflating to his aristocratic contemporaries. However, the youth of Athens found the deflation extremely amusing and fascinating, and so he gained a large following.
Public disdain for Socrates ultimately resulted in his conviction on the vague charges that he was guilty of corrupting the young and worshiping false gods. Plato’s Apology is thought to be a meticulous, word for word record of the man's trial and death, which explicates these charges as well as his defense. Socrates passively accepted his conviction and death sentence because of his commitment to the law. He died at the age of 71 from hemlock poisoning, despite the opportunity to escape into exile with the help of his friends.
Socrates was the teacher and mentor of the great philosopher Plato. When we speak of the figurative man, we are referring to Plato’s writings of Socrates, in which he is the character that expresses Plato’s views. In many of Plato’s books, such as The Republic, Crito and Phaedrus, he is the interlocutor or speaker. Although we can not be sure which views written by Plato actually belonged to the other man, it is thought that much of his character and style was preserved.
The figurative Socrates also appears as the main character in an ancient satirical play. Clouds, written by the Greek poet Aristophanes, was written and preformed during his lifetime. The play poked fun at the man, as well as other philosophers melded into his character. According to Plato, Socrates was extremely annoyed by Aristophanes’ portrayal. Despite the satirical nature of Clouds, scholars believe that some of Socrates character in the play was true to his historical nature.
Download Sacred Morning Chants Hanuman
Basic Beliefs of Hinduism
For millions of Hindus, depending on a number of factors, beliefs and philosophies vary. However, there are some beliefs that are common across the incredibly wide span of Hinduism.
Primary amongst these beliefs is the idea of one Being, from whom all other incarnations evolve. Hindus around the world worship one of these incarnations, depending on the quality or virtue that deity is said to possess. Another belief that is common to Hindus is that the human being possesses a soul (atma) that is eternal. This soul lives on after the death of the physical form, and takes rebirth in another form, until the soul has evolved into a pure and true essence, after which it achieves moksha, or liberation from the cycle.
Hindus believe in karma, or a rule of cause and effect. It is said that one’s thoughts and actions have an effect on one’s life, whether in this life or the next. Those who refrain from evil or impure thoughts and deeds cause their souls to be reborn in higher forms, until they achieve moksha or salvation; those who pollute their souls with evil will be reborn in a lower form, even an animal if they commit wicked deeds.
Hinduism also teaches that life is sacred. It encourages a lifestyle of ahimsa (non-violence) in which all life is revered and treasured. While vegetarianism is a practice in Hinduism, there are some sections of Hindus (especially those in coastal areas where vegetables are limited) who have relied on fish, chicken and mutton for their diet, and have done so for generations. However, the cow is a sacred animal for all Hindus and most practising Hindus consider it blasphemous to turn to it for anything other than milk or to worship it.
While Hinduism does not require presence of its followers in temples, most devotees set aside a place in their homes for a shrine, and perform a daily ritual of worship or puja there. The puja is simple; women bathe to purify themselves, then wash the idols, place fresh flowers and light incense or agarbattis at the shrine, and sing a devotional verse or hymn. Often, food, fruit or sweets (prasad) are placed in the shrine, and then handed out to members of the family as a way of receiving blessings.
Beliefs vary with different deities and different regions, but tolerance, good living, non-violence and purity in actions could be said to be the basic tenets of belief for all Hindus.
Friday, 27 July 2012
Subscribe to:
Posts (Atom)