Tuesday, August 24, 2010

Golden Text

Step 1: Open a new document with "Black" background!


Step 2: Take two same Front and same Front Size text!
2.1: Color should be different.
Step 3: Select any of them and edit "Layer Style" by clicking on "fx"!
3.1: Do as it is in below pictures!




3.3: Click on "OK"!
Step 4: Select another text to edit!
4.1: Do as it is in below pictures!

4.2: Click on "OK"!

Step 5: Bring both text together!
Step 6: Save it!

Monday, August 23, 2010

Hyper Color

Step 1: Open a New document!
Fill as New picture has given
!

Then click OK!
1.1:Rename "Layer 0" as "Bg Layer"!

Step 2: Press "g" or select "paint Bucket Tool"!
2.2: Fill the back ground(Bg Layer) with "Black" color!


Step 3: Press "t" or select "Horizontal Type Tool" to type text!
3.1: Select the area to type text!
3.2: Select text color "White"!
3.3: Set Front Size "30pt"!
3.4: Write your own text!
Example: Kaarubasona.


Step 4: Click on "fx"!
4.1: Select "Gradient Overlay"!

4.2: Fill as Layer Style picture!

4.3: Click on "OK"!
Step 5: Select "Bg Layer"!
5.1: Go to:
Filter>>Render>>Lighting Effects!
5.2: Fill as Lighting Effects picture!
5.3: Click on "OK"!

Step 6: Save the document!









Wednesday, May 26, 2010

Difference between IPv4 and IPv6

1] IPv4-Source and destination address are 32 bits(4bytes) in length.
IPv6-Source and destination address are 128 bits(16bytes) in length.

2] IPv4-IPsec support is optional.
IPv6-IPsec support is mandatory requirement.

3] IPv4-No identification of 'packet flow' by routers.
IPv6-Packet flow identification by routers is included in the header
using the Flow Label fied.It is for handling of QOS.

4] IPv4-Header is of variable length.
IPv6-Base header is of fixed length(40 octets).

5] IPv4-Address Resolution Protocol(ARP) uses brodcast ARP requests to resolve
an IPv4 address to a link layer address.
IPv6-Replaced with multicast Neghbor Solicitation messages by using ICMPv6.

6] IPv4-Internet Group Management Protocol(IGMP) is used to manage local subnet
group membership.
IPv6-Replaced with Multicast Listener Descovery(MLD) messages.

7] IPv4-ICMP Router Descovery is used to derermine the address of the best
default gateway.
IPv6-Replaced with ICMPv6 Router Solicitation and Router Advertisement message.

8] IPv4-ICMP router descovery is optional.
IPv6-Router solicitation is mandatory.

9] IPv4-IP addresses must be configured either manually or through DHCP.
IPv6-Addressare auto configured.

10] IPv4-Minimum size of MTU is 576-byte in the IPv4 networks.
IPv6-Minimum size of MTU to support IPv6 is 1280-byte.

Thursday, April 29, 2010

Difference Between 2G & 3G Technology

History
Launched a decade apart, 2G and 3G technology were both utilized in divergent parts of the world first. 2G first launched in the nation of Finland in 1991, while 3G was first used in Japan in 2001, according to UMTSWorld.com, a website that follows 3G technology.
Function
While 2G networks primarily involve the transmission of voice information, 3G technology provides the additional advantage of data transfer. 3G can download information at 14 Megabits per second, while uploading 5.8 Megabits per second.
Significance
3G technology offers a higher level of security than 2G networks. According to Colin Blanchard of BTexaCT, a UK-based technology firm, 3G networks allow authentication procedures when communicating with other devices.
Considerations
Due to the advancements of 3G technology's data transfers, many additional features are available to those networks utilizing the system, unlike 2G. These features include mobile TV, video transfers and GPS systems.
Considerations
According to the CDMA Development Group, 2G systems use a wide variety of frequencies in both higher and lower ranges. This creates a system in which signals have a harder time reaching cell towers depending on conditions, such as weather. A disadvantage of 3G is that it simply is not being available in certain areas.

Friday, March 12, 2010

A mind-reading computer!

Fri, Mar 12 12:16 PM
British scientists have developed a computer that can read human minds, a key breakthrough which they claim takes telepathy a step closer to reality.

According to them, the computer is able to decipher thought patterns and tell what people are thinking simply by scanning the brain -- in fact, it can delve into memories and differentiate between different recollections.

In fact, this breakthrough follows research last year by the same scientists who used the same technique to track a person's movements around a computer-simulated room.

For the current research, which focussed on the hippocampus, an area at the centre of the brain that plays a crucial role in short term memory, the scientists carried out an experiment involving 10 volunteers.

The subjects were shown three seven-second films featuring different women carrying out an everyday task in a typical urban street such as posting a letter or drinking a cup of coffee from a paper cup.

The volunteers were asked to memorise what they saw and then recall each one in turn whilst inside a magnetic resonance imaging scanner which records the brain activity by measuring changes in blood flow within the brain.

The computer algorithm then studied the electrical patterns and could tell which film the volunteer was recalling with an accuracy of about 50 per cent -- which was well above chance, 'The Daily Telegraph' reported.
from yahoo news

Tuesday, March 2, 2010

Soon, you'll be able to surf the web at the speed of light!

Washington, March 2 (ANI): Scientists from the Massachusetts Institute of Technology (MIT) have created a new infrared laser made from germanium that operates at room temperature, which has made light-speed computing come one step closer to reality.

The research removes the cryogenic cooling systems previously needed for infrared lasers and could lead to powerful computer chips that operate at the speed of light.

"Using a germanium laser as a light source, you could communicate at very high data rates at very low power," said Jurgen Michel of the Massachusetts Institute of Technology, who developed the new germanium laser.

"Eventually, you could have the computing power of today's supercomputers inside a laptop," he said.

The creation of a new laser, even one based on germanium, is not newsworthy; more than 15,000 different lasers, some of which use germanium, have been created since the 1950s.

What makes this particular germanium laser unique is that it creates an infrared beam at room temperature.

Until now infrared germanium lasers required expensive cryogenic cooling systems to operate. The new germanium laser operates at room temperature.

To create the germanium laser, the scientists take a six-inch, silvery-gray disk of silicon and spray it with a thin film of germanium.

These same disks are actually used to produce chips in today's computers.

An electrically powered, room-temperature, infrared laser for laptop computers is still years away, however, cautioned Michel.

If and when those laptops do arrive, they will be powerful - more powerful in fact than even today's supercomputers.

The battery that powers the laptop won't necessarily last any longer, but the power it does hold will make calculations orders of magnitude faster than today.

"We need high-density, low-power solutions," said Kock.

Computer chips are constantly getting smaller and smaller, but they are approaching the fundamental limits of electron-based computing.

Light-based computing is one option to improve the speed and power of computers.

"Germanium-based optical computing is an especially attractive material for optical computing because it wouldn't require any change to the existing computer chip industry," Kock said.

The same machines that use silicon could also use germanium to make future chips. (ANI)

f4 yahoo news

Saturday, February 13, 2010

Tom Shannon: The painter and the pendulum | Video on TED.com

Tom Shannon: The painter and the pendulum | Video on TED.com

Blaise Aguera y Arcas demos augmented-reality maps | Video on TED.com

Blaise Aguera y Arcas demos augmented-reality maps | Video on TED.com
Ajax: A New Approach to Web Applications
If anything about current interaction design can be called “glamorous,” it’s creating Web applications. After all, when was the last time you heard someone rave about the interaction design of a product that wasn’t on the Web? (Okay, besides the iPod.) All the cool, innovative new projects are online.
Despite this, Web interaction designers can’t help but feel a little envious of our colleagues who create desktop software. Desktop applications have a richness and responsiveness that has seemed out of reach on the Web. The same simplicity that enabled the Web’s rapid proliferation also creates a gap between the experiences we can provide and the experiences users can get from a desktop application.
That gap is closing. Take a look at Google Suggest. Watch the way the suggested terms update as you type, almost instantly. Now look at Google Maps. Zoom in. Use your cursor to grab the map and scroll around a bit. Again, everything happens almost instantly, with no waiting for pages to reload.
Google Suggest and Google Maps are two examples of a new approach to web applications that we at Adaptive Path have been calling Ajax. The name is shorthand for Asynchronous JavaScript + XML, and it represents a fundamental shift in what’s possible on the Web.
Defining Ajax
Ajax isn’t a technology. It’s really several technologies, each flourishing in its own right, coming together in powerful new ways. Ajax incorporates:
• standards-based presentation using XHTML and CSS;
• dynamic display and interaction using the Document Object Model;
• data interchange and manipulation using XML and XSLT;
• asynchronous data retrieval using XMLHttpRequest;
• and JavaScript binding everything together.
The classic web application model works like this: Most user actions in the interface trigger an HTTP request back to a web server. The server does some processing — retrieving data, crunching numbers, talking to various legacy systems — and then returns an HTML page to the client. It’s a model adapted from the Web’s original use as a hypertext medium, but as fans of The Elements of User Experience know, what makes the Web good for hypertext doesn’t necessarily make it good for software applications.


The traditional model for web applications (left) compared to the Ajax model
This approach makes a lot of technical sense, but it doesn’t make for a great user experience. While the server is doing its thing, what’s the user doing? That’s right, waiting. And at every step in a task, the user waits some more.
Obviously, if we were designing the Web from scratch for applications, we wouldn’t make users wait around. Once an interface is loaded, why should the user interaction come to a halt every time the application needs something from the server? In fact, why should the user see the application go to the server at all?
How Ajax is Different
An Ajax application eliminates the start-stop-start-stop nature of interaction on the Web by introducing an intermediary — an Ajax engine — between the user and the server. It seems like adding a layer to the application would make it less responsive, but the opposite is true.
Instead of loading a webpage, at the start of the session, the browser loads an Ajax engine — written in JavaScript and usually tucked away in a hidden frame. This engine is responsible for both rendering the interface the user sees and communicating with the server on the user’s behalf. The Ajax engine allows the user’s interaction with the application to happen asynchronously — independent of communication with the server. So the user is never staring at a blank browser window and an hourglass icon, waiting around for the server to do something.

The synchronous interaction pattern of a traditional web application (top) compared with the asynchronous pattern of an Ajax application (bottom).
Every user action that normally would generate an HTTP request takes the form of a JavaScript call to the Ajax engine instead. Any response to a user action that doesn’t require a trip back to the server — such as simple data validation, editing data in memory, and even some navigation — the engine handles on its own. If the engine needs something from the server in order to respond — if it’s submitting data for processing, loading additional interface code, or retrieving new data — the engine makes those requests asynchronously, usually using XML, without stalling a user’s interaction with the application.
Who’s Using Ajax
Google is making a huge investment in developing the Ajax approach. All of the major products Google has introduced over the last year — Orkut, Gmail, the latest beta version of Google Groups, Google Suggest, and Google Maps — are Ajax applications. (For more on the technical nuts and bolts of these Ajax implementations, check out these excellent analyses of Gmail, Google Suggest, and Google Maps.) Others are following suit: many of the features that people love in Flickr depend on Ajax, and Amazon’s A9.com search engine applies similar techniques.
These projects demonstrate that Ajax is not only technically sound, but also practical for real-world applications. This isn’t another technology that only works in a laboratory. And Ajax applications can be any size, from the very simple, single-function Google Suggest to the very complex and sophisticated Google Maps.
At Adaptive Path, we’ve been doing our own work with Ajax over the last several months, and we’re realizing we’ve only scratched the surface of the rich interaction and responsiveness that Ajax applications can provide. Ajax is an important development for Web applications, and its importance is only going to grow. And because there are so many developers out there who already know how to use these technologies, we expect to see many more organizations following Google’s lead in reaping the competitive advantage Ajax provides.