Monday, July 30, 2007

Visual Studio 2008

At its TechEd 2007 conference here, Microsoft announced June 4 that the next version of Visual Studio, which has been known by the code name "Orcas," has been dubbed Visual Studio 2008.
In addition, C. Joe Marini, group product manager of developer marketing at Microsoft, said beta 2 of Visual Studio 2008 will become available later this summer and will include a new feature known as the Visual Studio Shell. The Visual Studio Shell enables developers to create and distribute their own custom tools built on top of the Visual Studio IDE (integrated development environment).
"Partners and developers want a way to build their developer tool products on top of Visual Studio as a starting point so they can use the Visual Studio base technologies and services," Martini said in an interview with eWEEK.
The Visual Studio Shell will operate in two different modes. The first is the Integrated Mode, which is for developers creating programming language integration with Visual Studio, Marini said. The second is known as Isolated Mode and is for Microsoft partners and customers who want to take the base technology of Visual Studio and custom brand it, he said.

Visual Studio 2008 is interesting on several levels. First and I think this is very significant is that it works with .NET 2.0 and you can build applications that run on .NET 2.0. This means it’s possible to take advantage of many of the new features in Visual Studio - especially the new designer and the somewhat improved JavaScript support - even for today’s projects. That makes the new tool very palatable to try and play with immediately. I’ve moved several of my internal applications to Orcas and it’s been a pleasure working in VS 2008.

One of the biggest advantages in VS 2008 is the new HTML editor both for markup and design view. It’s based on the same editor that’s in Microsoft Web Expression (which is a great tool BTW and which I use daily!) and provides a ton of improved functionality and much better rendering. However, the biggest bonus that you’ll notice immediately with the new editor is that it is much, much faster than the VS 2005 editor. You know the feeling in VS 2005 as you open a markup or worse a designer page and you wait and wait and wait some more. With VS 2008 that is no longer the case - activating markup or design view happens in a second or two even for complex pages. Not only that but because there’s split view for design and markup you rarely switch views and because both panes stay in sync the whole experience is much more expressive. The editor and speed alone is a big productivity improvement at least for me.




It’s important to remember that the ASP.NET team has already delivered very important support features prior to the Orcas release cycle. Specifically I’m thinking of ASP.NET AJAX and full support for the IIS 7 integrated pipeline, which in my opinion really counts as the ASP.NET 3.0!


Futures


Then there’s also the ASP.NET Futures features, which at this point are still up in the air. Some of the Futures features have been getting kind of stale like the AJAX features that were originally introduced in the ATLAS days. The advanced libraries like effects, drag and drop, basic control features, databinding and JsonConverters haven’t been updated since ASP.NET AJAX 1.0 was released which is a bummer. I maintain that ASP.NET AJAX’s client library is what amounts to an incomplete product and Microsoft should really finish that part of the framework. The Futures features at least bring the library on par with some much smaller JavaScript libraries. Effects functionality and more high level DOM support are supported by just about all JS libraries to date but the ASP.NET AJAX Client library is very light on any sort of client support. Unfortunately it looks like there won’t be much of a change for the Orcas release .
The Futures release also contains a bunch of new functionality that relates to Silverlight and embedding Silverlight and XAML content into pages. Silverlight is getting all the dibs these days and it’s likely that this stuff will find its way into the new runtimes. There are a few other odds and ends in the Futures release such as Rails like dynamic framework that provides rough scaffolding for a database.


It’s unclear at this point what Futures features will make it into the final runtimes as Microsoft is still working out the details of these items at this time

How to retrive the images from Databaase?

this code is used to store the images in database usign stored procedures and this code also proved practically proved

1. go to sqlserver then
create table InsertPhoto(eid int identity(1,1),ename varchar(30),photo image)then excute it
after that write procedues in sql serever only


we should write like that

CREATE PROCEDURE sp_InsertPhoto(@ename varchar(30),@photoclip_IM image )ASINSERT INTO insertphoto ( ename,photo )VALUES ( @ename,@photoclip_IM )GO

then excute it sqlsever only

after that go to asp.net page

go to html controles

in that
take input(file) drop on the asp.net page


go to html source page make it runat="server" beside input file control and then

in that control only we should take input (submit) button

drop on the page

we should include this namespaces

using System.Data.OleDb;
using System.Drawing.Imaging ;
using System.IO;using System.Drawing;

in submit button_click event we write like this

Stream imagestreame = File1.PostedFile.InputStream;

int len = File1.PostedFile.ContentLength;
byte[] imagecontent = new byte[len];
imagestreame.Read(imagecontent, 0, len);

if (cn.State == ConnectionState.Closed)

{ cn.Open();
}
cmd=new OleDbCommand ("sp_InsertPhoto",cn);

cmd.CommandType = CommandType.StoredProcedure;
OleDbParameter pr = new OleDbParameter("@ename", OleDbType.VarChar);

pr.Value = File1.Value;
cmd.Parameters.Add(pr);
OleDbParameter primage = new OleDbParameter("@photoclip_IM", SqlDbType.Image );
primage .Value= imagecontent;
cmd.Parameters.Add(primage);
cmd.ExecuteNonQuery();
Response.Write("image stored");
}}

for retriving the same image from database we should write like this
you must include this name spaces


using System.Data.OleDb;
using System.Drawing.Imaging ;
using System.IO;using System.Drawing;

in button_click event
OleDbDataAdapter adp=new OleDbDataAdapter ();

DataSet ds=new DataSet ();
int i=0;
try{

cn .Open();cmd=new OleDbCommand ("select photo from insertphoto where eid=1",cn);

adp.SelectCommand =cmd ;
ds=new DataSet("st");
adp.Fill(ds);
byte [] bits= (byte [])(ds.Tables[0].Rows[i][0]);

//converting the data to byteMemoryStream memorybits= new MemoryStream(bits);
Bitmap bitm =new Bitmap(memorybits);
Response.BinaryWrite(bits);}catch(Exception ex){Response.Write(ex.Message);
}
finally
{
cn.Close();

}
}

}
}

Search engine optimization (SEO)


Search Engine Optimization [SEO]

is the process of improving the volume and quality of traffic to a web site from search engines via "natural" ("organic" or "algorithmic") search results. Usually, the earlier a site is presented in the search results, or the higher it "ranks", the more searchers will visit that site. SEO can also target different kinds of search, including image search, local search, and industry-specific vertical search engines.

As a marketing strategy for increasing a site's relevance, SEO considers how search algorithms work and what people search for. SEO efforts may involve a site's coding, presentation, and structure, as well as fixing problems that could prevent search engine indexing programs from fully spidering a site. Other, more noticeable efforts may include adding unique content to a site, ensuring that content is easily indexed by search engine robots, and making the site more appealing to users. Another class of techniques, known as "Black Hat" SEO or spamdexing, use methods such as link farms and keyword stuffing that tend to harm search engine user experience. Search engines look for sites that employ these techniques and may remove their listings.

The initialism "SEO" can also refer to "search engine optimizers", a term adopted by an industry of consultants who carry out optimization projects on behalf of clients, and by employees who perform SEO services in-house. Search engine optimizers may offer SEO as a stand-alone service or as a part of a broader marketing campaign. Because effective SEO may require changes to the HTML source code of a site, SEO tactics may be incorporated into web site development and design. The term "search engine friendly" may be used to describe web site designs, menus, content management systems and shopping carts that are easy to optimize.

Saturday, July 28, 2007

UML






UML for SOC DesignBy Grant Martinhttp://mihd.net/irkqgt




UML for Java ProgrammersBy Robert C. Martinhttp://mihd.net/oa2j8y




UML 2 for DummiesBy Michael Jesse Chonoleshttp://mihd.net/2wqz5b




The UML Profile for Framework ArchitecturesBy Marcus






Software Evolution With UML and XMLBy Hongji Yanghttp://mihd.net/1r3bkx




Secure Systems Development with UMLBy Jan Jürjenshttp://mihd.net/y4ifge


UML Weekend Crash CourseBy Thomas A. Penderhttp://rapidshare.de/files/22034391/0764549103.zip




The Elements of UMLBy Scott W. Amblerhttp://mihd.net/je9qkh




Building Web Applications with UMLBy Jim Conallenhttp://rapidshare.com/files/28901020/bldwappuml2.rar




UML 2.0 in a NutshellBy Dan Pilonehttp://mihd.net/3cqwms




Business Modeling With UML Business Patterns at WorkBy Magnus Penkerhttp://rapidshare.com/files/23186737/busmoduml.rar.html




Mastering UML with Rational RoseBy Wendy Boggshttp://rapidshare.com/files/29406917/mastumlrr2k2.rar




Professional UML with Visual Studio .NETBy Andrew Filevhttp://mihd.net/iapkrf

RFID [Radio Frequency Identification]

Radio frequency identification (RFID) is a method of remotely storing and retrieving data using devices called RFID tags. An RFID tag is a small object, such as an adhesive sticker, that can be attached to or incorporated into a product. RFID tags contain antennae to enable them to receive and respond to radio-frequency queries from an RFID transceiver.

History of RFID tags


Although some people think that the first known device may have been invented by Leon Theremin as an espionage tool for the Russian Government in 1945, the first real usage of RFID devices predates that. During World War II the United Kingdom used RFID devices to distinguish returning English airplanes from inbound German ones. RADAR was only able to signal the presence of a plane, not the kind of plane it was.
Perhaps the first work exploring RFID is the landmark 1948 paper by Harry Stockman, entitled "Communication by Means of Reflected Power" (Proceedings of the IRE, pp1196-1204, October 1948). Stockman predicted that "...considerable research and development work has to be done before the remaining basic problems in reflected-power communication are solved, and before the field of useful applications is explored." It required thirty years of advances in many different fields before RFID became a reality.

Types of RFID tags
RFID tags can be either active or passive.
Passive RFID tags do not have their own power supply: the minute electrical current induced in the antenna by the incoming radio-frequency scan provides enough power for the tag to send a response. Due to power and cost concerns, the response of a passive RFID tag is necessarily brief, typically just an ID number (GUID). Lack of its own power supply makes the device quite small: commercially available products exist that can be embedded under the skin. As of 2004, the smallest such devices commercially available measured 0.4 mm × 0.4 mm, and thinner than a sheet of paper; such devices are practically invisible. Passive tags have practical read ranges that vary from about 10 mm up to about 5 metres.

Active RFID tags, on the other hand, must have a power source, and may have longer ranges and larger memories than passive tags, as well as the ability to store additional information sent by the transceiver. At present, the smallest active tags are about the size of a coin. Many active tags have practical ranges of tens of metres, and a battery life of up to several years.
As passive tags are much cheaper to manufacture and do not depend on a battery, the vast majority of RFID tags in existence are of the passive variety. As of 2004 tags cost from US$0.40. The aim is to produce tags for less than US$0.05 to make widespread RFID tagging commercially viable. However, chip manufacturers supply of integrated circuits is not sufficient and demand is too low for prices to come down soon. Analysts from independent research companies like Gartner and Forrester Research agree that a price level of less than $0.10 is only achievable in 6-8 years.
There are four different kinds of tags commonly in use. They are categorized by their radio frequency: Low frequency tags (between 125 to 134 kilohertz), High frequency tags (13.56 megahertz), UHF tags (868 to 956 megahertz), and Microwave tags (2.45 gigahertz). UHF tags cannot be used globally as there aren't any global regulations for its usage.
See also for some Transponder devices which deliver a similar function, and contactless chipcards.
The RFID System
An RFID system may consist of several components: tags, tag readers, tag programming stations, circulation readers, sorting equipment, and tag inventory wands. Security can be handled in two ways. Security gates can query the ILS to determine its security status or the tag may contain a security bit which would be turned on and off by circulation or self-check reader stations.
The purpose of an RFID system is to enable data to be transmitted by a portable device, called a tag, which is read by an RFID reader and processed according to the needs of a particular application. The data transmitted by the tag may provide identification or location information, or specifics about the product tagged, such as price, color, date of purchase, etc. The use of RFID in tracking and access applications first appeared during the 1980s. RFID quickly gained attention because of its ability to track moving objects. As the technology is refined, more pervasive - and invasive - uses for RFID tags are in the works.

In a typical RFID system, individual objects are equipped with a small, inexpensive tag which contains a transponder with a digital memory chip that is given a unique electronic product code. The interrogator, an antenna packaged with a transceiver and decoder, emits a signal activating the RFID tag so it can read and write data to it. When an RFID tag passes through the electromagnetic zone, it detects the reader's activation signal. The reader decodes the data encoded in the tag's integrated circuit (silicon chip) and the data is passed to the host computer for processing.


Current usage
Low -frequency RFID tags are commonly used for animal identification, beer keg tracking, and automobile key-and-lock, anti-theft systems. Pets are often embedded with small chips so that they may be returned to their owners if lost. In the United States, two RFID frequencies are used: 125kHz (the original standard) and 134.5kHz, the international standard.
High-frequency RFID tags are used in library book or bookstore tracking, pallet tracking, building access control, airline baggage tracking, and apparel item tracking. High-frequency tags are widely used in identification badges, replacing earlier magnetic stripe cards. These badges need only be held within a certain distance of the reader to authenticate the holder.
UHF RFID tags are commonly used commercially in pallet and container tracking, and truck and trailer tracking in shipping yards.

Microwave RFID tags are used in long range access control for vehicles, an example being General Motors' OnStar system.
Some toll booths, such as California's FasTrak and Illinois' I-Pass system, use RFID tags for electronic toll collection. The tags are read as vehicles pass; the information is used to debit the toll from a prepaid account. The system helps to speed traffic through toll plazas.
Sensors such as seismic sensors may be read using RFID transceivers, greatly simplifying remote data collection.
In January 2003, Michelin announced that it has begun testing RFID transponders embedded into tires. After a testing period that is expected to last 18 months, the manufacturer will offer RFID-enabled tires to car-makers. Their primary purpose is tire-tracking in compliance with the United States Transportation, Recall, Enhancement, Accountability and Documentation Act (TREAD Act).
Cards embedded with RFID chips are widely used as electronic cash, e.g. Octopus Card in Hong Kong and the Netherlands to pay fares in mass transit systems and/or retails.
Starting from the 2004 model year, a "Smart Key" option is available to the Toyota Prius and some Lexus models. The key fob uses an active RFID circuit which allow the car to acknowledge the key's presence within 3 feet of the sensor. The driver can open the doors and start the car while the key remains in a purse or pocket.

In August 2004, the Ohio Department of Rehabilitation and Correction (ODRH) approved a $415,000 contract to trial the tracking technology with Alanco Technologies. Inmates will wear "wristwatch-sized" transmitters that can detect if prisoners have been trying to remove them and send an alert to prison computers. This project is not the first such rollout of tracking chips in US prisons. Facilities in Michigan, California and Illinois already employ the technology.


Implantable RFID "chips", originally designed for animal tagging are being used and contemplated for humans as well. Applied Digital Solutions proposes their chip's "unique under-the-skin format" as a solution to identity fraud, secure building access, computer access, storage of medical records, anti-kidnapping initiatives and a variety of law-enforcement applications. Combined with sensors to monitor body functions, the Digital Angel device could provide monitoring for patients. The Baja Beach Club in Barcelona, Spain uses an implantable Verichip to identify their VIP customers, who in turn use it to pay for drinks. The Mexico City police department has implanted approximately 170 of their police officers with the Verichip, to allow access to police databases and possibly track them in case of kidnapping

Potential uses

RFID tags are often envisioned as a replacement for UPC or EAN bar-codes, having a number of important advantages over the older bar-code technology. RFID codes are long enough that every RFID tag may have a unique code, while current UPC codes are limited to a single code for all instances of a particular product. The uniqueness of RFID tags means that a product may be individually tracked as it moves from location to location, finally ending up in the consumer's hands. This may help companies to combat theft and other forms of product loss. It has also been proposed to use RFID for point-of-sale store checkout to replace the cashier with an automatic system which needs no barcode scanning.


An organization called EPCglobal is working on a proposed international standard for the use of RFID and the Electronic Product Code (EPC) in the identification of any item in the supply chain for companies in any industry, anywhere in the world. The organization's board of governors includes representatives from EAN International, Uniform Code Council, The Gillette Company, Procter & Gamble, Wal-Mart, Hewlett-Packard, Johnson & Johnson, and Auto-ID Labs. Some RFID systems use alternative standards based on the ISO-classification 18000-6.
In July 2004, the Food and Drug Administration issued a ruling that essentially begins a final review process that will determine whether hospitals can use RFID systems to identify patients and/or permit relevant hospital staff to access medical records.


Also, the FDA recently approved the country's first RFID chips that can be implanted in humans. The 134.2kHz RFID chips, from VeriChip Corp., a subsidiary of Applied Digital Solutions Inc., can incorporate personal medical information and could save lives and limit injuries from errors in medical treatments, according to the company. The FDA approval was disclosed during a conference call with investors.


Some in-home uses, such as allowing a refrigerator to track the expiration dates of the food it contains, have also been proposed, but few have moved beyond the prototype stage.
Another proposed application is the use of RFID as intelligent traffic signals on the road

Friday, July 27, 2007

Java eBOOKS


Java Programming Language HandbookBy Anthony Potts David H., Jr. Friedelhttp://www.megaupload.com/?d=UA74O9I7




Hacking Java: The Java Professional's Resource KitBy Mark Wutkahttp://rapidshare.de/files/31425972/Hacking_Java_-_The_Professiona_sl_Resource_Kit.rar




XML Programming Bible (Bible)By Brian Benzhttp://rapidshare.com/files/18946967/0764538292.rar






password:ebooksclub.orgJava 2 Micro EditionBy David Hemphillhttp://rapidshare.de/files/22587710/1930110332.zip







Java Language Reference, 2nd Edition, 1997-08By Mark Grandhttp://rapidshare.de/files/31220346/Java_Language_Reference.rar



Developing Web Services with Java APIs for XMLBy Robert Hablutzelhttp://www.megaupload.com/?d=4LU3SBORhttp://mihd.net/bsdmny

Genetic Engineering


Genetic Engineering ?

Genetic engineering is the science of modification of genes in cells. Genes are collections of DNA molecules that comprise the code that determines the function and reproductive pattern of cells. Together with hormones and other chemical messengers, developed and naturally recombined over millions of years, genes determine everything about an organism.


Genetic engineers modify gene patterns in cells by implanting genes or DNA from one organism into another organism. For instance, Monsanto Corporation found a gene somewhere that made a plant resistant to a Monsanto weed-killer called Roundup. Monsanto then took that gene and implanted it into soybeans, instantly creating a new species of soybean that could be sprayed with Roundup weed killer without fear of killing the soybean plant. At first glance, this sounds like a great idea, using science to help farmers grow their crops. But this technology has a very dark side.
Why is it an environmental threat?

Over millions of years, a natural order of plant species variation and interbreeding in the wild has developed that has structural boundaries. Normally, the transfer of genes from one species to another is naturally regulated. If it were not, there would be species havoc - tree seeds that would grow into something completely different, grass seed that would grow 20 feet tall (or 20 millimeters tall), 50-leaf clovers, etc. There would be no way for the many forms of life on earth to survive and regenerate.

Genetic engineering has destroyed that natural barrier. The new Monsanto soybeans, called Roundup-Ready Soybeans (RRS), now have non-soybean genes in their cell nucleus. Thus in a tiny instant of time Monsanto crossed a genetic boundary that could not be crossed naturally. We know that these new genes have cross-pollinated to non-genetically-altered crops, and to similar species. We do not know know whether these genes are easily transferrable to other plant species. What Monsanto has created, is a plant "monster" - an unnatural species - that can reproduce through its seeds.
Some scientists in the early days of genetic engineering (about 1975) worried about super-germs (the first genetic engineering was done with E. coli bacteria) and cross-species contamination, but the claim was made that new species would be carefully confined to laboratories where they would be used to generate hormones or life-saving drugs. It was assumed that this containment would prevent cross-species contamination. Agricultural genetic engineering violated that assumption. Concerned scientists and others all over the world worry that this kind of artificial genetic manipulation may indeed cause biological havoc because it exposes the new cells and genes to other plant species.

In the United States, primarily because of the influence of Monsanto and other bio-technology firms in our regulatory agencies and the media, discussion of the topic has been limited, and the labeling of seeds and products with regard to whether they are or contain genetically modified organisms was, until recently, discouraged by threat of lawsuit by Monsanto. The only way for someone in the U.S. to avoid genetically modified grain is to buy products marked organic. The Food and Drug Administration even attempted several years ago to redefine the organic label to include genetically modified organisms, but public opposition prevented this change.

In Europe, and especially in Great Britain, a movement has developed that opposes the development and use of these genetically modified organisms (GMOs). The EEU has passed a regulation requiring that grain containing genetic modifications and products containing such grain that are imported into Europe be labeled as such. Because of the strong opposition to GMOs, this makes the grain and products less saleable. The U.S. Department of Agriculture and the U.S. Export Agency, supporting Monsanto's commercial interests, has threatened trade sanctions against the EEU. In Great Britain, environmental activists have protested agricultural genetic engineering, and some have taken part in civil disobedience, uprooting experimental plots belonging to Monsanto and other biotech firms.
What Can You Do?

If you agree that this technology is dangerous to the environment, call the Food and Drug Administration and the U.S. Department of Agriculture and register your concern. Ask the FDA to require labeling of GMO products and grain. Tell your friends and neighbors about the threat. Join with them and request that your supermarket supply more organically raised food, which is currently the only way to avoid GMO products.

Thursday, July 26, 2007

How to make the CV’s


Writing CVs

You are looking for a job and want to present yourself in the best possible manner to an employer. What do you do? You write a 'CV' (Curriculum Vitae - Latin for 'Life Story' called in some countries as a 'Resume'.CVs are looked at differently depending upon the nature of the employer. Principally, it is important to follow the correct practice of your culture and country but balance it with the employers' needs

What are CVs used for


CVs or Resumes are about presenting an impressive image of you to an employer. Employers look at a hundred CVs for the same job and finally choose only one.So what would make them choose you?

Tips for a writing a CV


Be Innovative!Consider finding out more about the job you are applying for. Analyze your personal skills, talents, education, work experience and compare them with skills required for that job. Do you have enough information about the job?Spend some time researching details about the job(s) that interest you and information about the employer


Personal Details


Include your name, home address, college address, phone number, email address, date of birth and also your gender if it is not obvious form your name! Also include your homepage URL if you have a good one. (It makes an impression)


Education Include the different places where you have studied- (most recent education first). Include subjects, courses taken in each year of study. Include any special project, thesis or other work completed during this period.The Pre-college courses (Junior college, high school, etc.) details should be included.


Work Experience

List out your most recent experience first. Give the name of the employer, job title and your own job function. Part-time work experience should be included.


Interests


Employers will be particularly interested in your leadership qualities and your ability to innovate and contribute to their company's success. They would like to know the various responsibilities you have previously taken up and completed. Personal hobbies do not interest them as much as your role as a leader. Give details if any, of your participation as an organizer for any social event.




Skills

Ability in other languages, computing experience and extra curricular like debates, etc. should be included.


References


Include two names - one from your place of study and one from any work situation you have had. Make sure eligible people who have worked with you or have corresponded with you give these references. Also give their contact numbers.


Length


Try using space as liberally as possible. Do not clog your CV onto one A4 size page. Take two pages but give enough area for your track record!



Style
There are two main styles of CV, with variations in them.Chronological:Information is included under general headings - education, work experience, etc., with the most recent events first.


Skills based


You apply through the necessary skills required for the job. List all your personal details under these skill headings. This is called 'targeting your CV'. But it is best to prepare a CV, which suits the workplace environment and the nature of the people in the organization and country.


Presentation


You can present your CV depending on the company you are applying to. A big company would generally expect a formal CV on a white paper. But if it is a television production job, or a graphic designer, the paper could be less formal and the CV, a bit unconventional.A CV can be constructed on a Word Processor (MS Word, WordPerfect or Lotus). It has to be well laid out and printed on a good quality printer. Do not use bold and/or underline print for headings. Avoid using different font types and sizes. Use plenty of white paper and a good border round the page. Use a spell check on your computer and consider using 'bullets' to start sub-sections or lists.Imagine yourself as an employer and write a CV which is easy to understand, short and attractive.

Unix and Linux Ebooks


Linux Ebooks:Red Hat Enterprise Linux 4 For DummiesBy Terry ollingshttp://rapidshare.com/files/4701134/Wiley_-_Red_Hat_Enterprise_Linux_4_for_Dummies.pdf.html


Linux Server HacksBy Rob Flickengerhttp://rapidshare.de/files/22589652/O.LSH.rar



Linux in a Windows WorldBy Roderick W. Smithhttp://rapidshare.de/files/13997054/0596007582.zip


Understanding Linux Network InternalsBy Christian Benvenutihttp://rapidshare.de/files/11519246/0596002556.zip



The Linux Development PlatformBy Rafeeq Ur Rehmanhttp://www.phptr.com/content/images/0130091154/downloads/0130091154.zip




Linux for Non-GeeksBy Rickford Granthttp://rapidshare.com/files/14536232/lnx4nongks.rar




ams Teach Yourself Linux in 24 Hours, 1999-05By Bill Ballhttp://kristi.erdves.lt/books/teach_yo.pdf


Linux Shell Scripting with BashBy Ken O Burtchhttp://mihd.net/wqnd1k


Wednesday, July 25, 2007

Biotechnology

Biotechnology
Agricultural BiotechnologyBy Committee on a National Strategy for Biotechnology in ture
http://rapidshare.com/files/4424041/1005.pdfEnvironmental

Biotechnologyhttp://rapidshare.com/files/18186847/EBCA.rarPutting Biotechnology to Work: Bioprocess EngineeringBy National Research

Councilhttp://rapidshare.com/files/230644/Putting_Biotechnology_to_Work_-_NAP.pdfBioinformatics: From Genomes to DrugsBy Thomas






Biotechnologyhttp://rapidshare.com/files/17864782/White.rarEgg Nutrition and






Most Unusual Buildings On Earth

" Triangle Building "

We wonder what type of work goes on inside this kind of a building. The unofficial Triangle Building is just a wonder to look at and to ponder over. But, can this be one of the evil headquarters for Scientology or Starbucks? Does this building have triangle bathrooms? There's so many damn questions!






"135 Degree Angle"
This bizarre house really doesn't have an official name, but it does have a 135 degree angle. So that's what we're going to call it. Unfortunately, the only info we have about this house is that it was built in China or Japan . And that it has a silly pink roof. And if you look real close, you'll notice that it's on a 135 degree damn angle.


" Robot Building "
The Bank of Asia is a very famous building in Bangkok . It was made way back in 1985, and it's robotic appearance is just a symbol of the modernization of banking. It also has the ability to transform into a mega-robot. So, if Godzilla ever decided to show his green face in the land of Bangkok , they would have to fight



The Astra Haus

The strange building is actually a brewery in Hamburg , Germany . The floors can move up or down on it's skinny column core. As of now, the unique building has been destroyed. One of it's more famous beer brands was recently bought by a big refreshment corporation. And that beer brand was called Astra.
















NOKIA Aeon


Nokia's Aeon Full Touch Screen....
Now it’s only a concept mobile phone. Expected to hit markets in 2008.......
The device would probably have one of the longest battery lives as it would be powered by nothing less than fuel cells.
There are too many surprise features in this phone.....like it can transform itself according to your needs.

Tuesday, July 24, 2007

Harry Potter and the Deathly Hallows [Book 7]

Harry Potter and the Deathly Hallows(Book 7)

Harry Potter and the Deathly Hallows, the seventh and final book in J.K. Rowling's magical Harry Potter series, will be released on July 21, 2007. In the February 1 announcement from the book's publisher, Lisa Holton, President of Scholastic Children's Books, said, "We are thrilled to announce the publication date of the seventh installment in this remarkable series. We join J.K. Rowling's millions of readers--young and old, veterans and newcomers--in anticipating what lies ahead." Save the date, and let the countdown begin!

Harry_Potter_the_deathly_hallows.rar



or
http://depositfiles.com/files/801285
or
http://th0q2sxec3q6u55ra7.usercash.com
or
http://sod9jmyphv0p1280p.usercash.com


email to shravan.1258@yahoo.com

William Shakespeare's Works (PDF)

http://rapidshare.com/files/26346224/190D271A-32E2-4269-897B-26CB2C55D1CB.rar


http://rapidshare.com/files/12837385/CA8AC07B-BEC9-432b-9E6F-409028EA0980.rar

http://rapidshare.com/files/15713220/6F4AD827-1132-4d4c-BF7E-592B3FDA363A.rar

http://rapidshare.com/files/22342936/A49DD1A6-9041-4F11-96F7-7EA025045C6A.rar.htm


email to shravan.1258@yahoo.com

Have u ever seen the calendar for September 1752


if you are working in UNIX, try this out. At $ prompt, type: cal 9 1752 Surprised??? ?
See the explanation for what you see.


Isn't the output queer? A month with whole of eleven days missing. This was the time England shifted from Roman Julian Calendar to the Gregorian calendar, and the king of England ordered those 11 days to be wiped off the face of the month of September of 1752. (What couldn't a King do in those days?!) And yes, the workers worked for 11 days less, but got paid for the entire 30 days. And that's how "Paid Leave" was born.

Monday, July 23, 2007

World's Tallest skyscraper

DUBAI, United Arab Emirates - Developers of a 1,680-foot skyscraper still under construction in oil-rich Dubai claimed Saturday that it has become the world's tallest building, surpassing Taiwan's Taipei 101 which has dominated the global skyline at 1,667 feet since 2004.

The Burj Dubai is expected to be finished by the end of 2008 and its planned final height has been kept secret. The state-owned development company Emaar Properties, one of the main builders in rapidly developing Dubai, said only that the tower would stop somewhere above 2,275 feet.
When completed, the skyscraper will feature more than 160 floors, 56 elevators, luxury apartments, boutiques, swimming pools, spas, exclusive corporate suites, Italian fashion designer Giorgio Armani's first hotel, and a 124th floor observation platform.
After North American and Asian cities marked their 20th century economic booms with skyscrapers, the Gulf grew eager to show off its success with ever taller buildings. In Dubai, long an oil-rich Gulf symbol of rapid economic growth, the building reflects the city's hunger for global prestige.
"It's a symbol of Dubai as a city of the world," said Greg Sang, the project director for Emaar Properties.


Mohammed Ali Alabbar, chairman of Emaar, said it will be an architectural and engineering masterpiece of concrete, steel and glass. Dubai has "resisted the usual and has inspired to build a global icon," he said.


"It's a human achievement without equal."
The $1 billion skyscraper is in the heart of downtown Dubai, a 500-acre development area worth $20 billion. Construction, which began just 1,276 days ago, has been frenzied — at times, one storey rises every three days.


The tip of the Burj's spire will be seen for 60 miles, developers say. But Sang knows it will not dominate the world's skyline forever.


"It's a fact of life that, at some point, someone else will build a taller building," he said. "There's a lot of talk of other tall buildings, but five years into Burj Dubai's construction, no one's started building them yet," he said.


Previous skyscraper record-holders include New York's Empire State Building at 1,250 feet; Shanghai's Jin Mao Building at 1,381 feet; Chicago's Sears Tower at 1,451 feet; and Malaysia's Petronas Towers at 1,483 feet.


The Burj will let the Middle East reclaim the world's tallest structure. Egypt's Great Pyramid of Giza, built around 2500 B.C., held the title with its 481 feet until the Eiffel Tower in Paris was built in 1889 at a height of 985 feet, or 1,023 feet including the flag pole.


The company says the Burj will fulfill the Chicago-based Council on Tall Buildings and Urban Habitat's four criteria for the tallest building: the height of the structural top, the highest occupied floor, the roof's top, and the spire's tip, pinnacle, antenna, mast or flag pole.
For now, the unattractive brownish concrete skeleton jutting into Dubai's humid skies lacks any aura of a masterpiece. Rising 141 floors with a mass of surrounding cranes and girders, it has no windows, glass or steel yet.


The architects and engineers are American and the main building contractor is South Korean.
Most of the 4,000 laborers are Indian. They toil around the clock in Dubai's sizzling summer with no set minimum wage. Human rights groups regularly protest against labor abuse in Dubai, but local media rarely report such complaints.

____

5 Ways To Stay Focused On Your Goals

No matter how excited you are about your business, with so many distractions and things that may be going on in your life, you can easily find yourself losing focus on your goals and what you want to accomplish. Below you will find 5 things that will help you stay focused on your goals.


FINISH WHAT YOU STARTED
You probably have heard the saying, "So many things to do and not enough time to do them." Even though that may be true, you still have to complete them all, especially if these things help you to reach your goals. To make it easier for you, just take 1 thing you have to do and complete that task until it is done. When it is done, you will feel a sense of accomplishment and it will motivate you to move on to your next task.


ORGANIZE TO MAKE THINGS EASY AND SIMPLE
Take a moment to put things in order. If people write to you or send you orders in the mail, make 3 piles. Put the letters that need to be answered right away in the 1st pile. Letters that can be answered at a later date you can put in the 2nd pile and letters that have orders in them, you can put in the 3rd pile. Doing things like this in other areas of your life will help you keep things in priority and keep you focused on your goals.


CHANGE THE WAY YOU LOOK AT THINGS
If you find yourself at times having a negative attitude, you must realize that the way you look at things can make all the difference when it comes to reaching your goals. Even when obstacles stand in your way, maintaining a positive attitude, not a negative one and knowing that things can and will get better, will help you stay on track in reaching your goals.


UNDERSTAND GOALS WILL TAKE TIME TO REACH
Everything in life, if it is worth it, will take time. This goes for the goals you set for yourself. When you set goals, you should set 2 types of goals. A short term goal such as 6 months and also a long range goal, such as 3 years. You must realize that you are not going to reach your long term goals in 2 weeks. Whatever your goals may be, only through hard work, determination and keeping yourself focused, this is the way you will eventually reach your goals.


STUDY AND READ ARTICLES ON MOTIVATION


Reading articles, books or even listening to cassette tapes on motivation is a must if you want to keep yourself focused on your goals. Many successful people will tell you that even when they wanted to give up and throw in the towel, a paragraph in a book or something a motivational speaker said put them back on the right track and helped them reach their goals. So if you want to stay focused on your goals, take these 5 points and put them into action today.

Funny

School: A place where Papa pays and Son plays.

Life Insurance: A contract that keeps you poor all your life so that you can die Rich.

Nurse: A person who wakes u up to give you sleeping pills.

Marriage: It's an agreement in which a man loses his bachelor degree and a woman gains her masters.

Divorce:
Future tense of Marriage.

Lecture: An art of transferring information from the notes of the Lecturer to the notes of the
students without passing through "the minds of either"

Conference: The confusion of one man multiplied by the number present.

Compromise : The art of dividing a cake in such a way that everybody believes he got the biggest piece.

Dictionary : A place where success comes before work.

Conference Room : A place where everybody talks, nobody listens and everybody disagrees later on.

Father: A banker provided by nature.

Criminal: A guy no different from the rest....except that he got caught.

Boss: Someone who is early when you are late and late when you are early.

Politician : One who shakes your hand before elections and your Confidence after.

Doctor : A person who kills your ills by pills, and kills you by bills.

Classic: Books, which people praise, but do not read.

email to Shravan.1258@yahoo.com



Smile : A curve that can set a lot of things straight.

Office: A place where you can relax after your strenuous home life.

Yawn: The only time some married men ever get to open their mouth.

Etc .: A sign to make others believe that you know more than you actually do.

Committee: Individuals who can do nothing individually and sit to decide that nothing can be done together.

Experience: The name men give to their mistakes.

Atom Bomb : An invention to end all inventions.

Philosopher : A fool who torments himself during life, to be spoken of when dead

Saturday, July 21, 2007

What is Biometrics?


"Biometrics is the development of statistical and mathematical methods applicable to data analysis problems in the biological sciences


With regard to technology Biometrics is the term given to the use of biological traits or behavioural characteristics to identify an individual. Their traits may be fingerprints, hand geometry, facial geometry, retina patterns, iris patterns, voice recognition, handwriting recognition. A Biometrics system is basically a pattern recognition system, including all the hardware and associated software and the interconnecting infrastructure, enabling identification by matching a live sample to a stored pattern in a database. When resolving an individual’s identity there is a distinction between verification and identification and different Biometric systems fall into these two categories. Each sub-category resolves a different question. The first, verification, involves confirming or denying an individual’s claimed identity - ‘Am I who I claim I am?’ The second, identification, involves establishing an individual’s identity - ‘Who am I?’ By resolving these questions using biometrics these systems go beyond traditional security methods, by insisting that the person trying to log on is the actual person. Biometrics is irrevocably tied to the individual.


With regard to computer networks, Biometrics can be used to automatically authenticate an individual using their distinguishable traits. This security offers increased confidence levels for users of the network, providing the system is correctly implemented and utilized. The Network can be exploited fully without fear of a security breach. Biometric secure Systems on the web would make the popular targets of banking data, business intelligence, credit card numbers, medical information and other personal data transactions on the web more secure and thus increase the populations confidence in using these methods, increasing e-commerce confidence and thus enabling it to reach its full potential.


Biometrics is also being called upon in the Cellular phone industry, where the companies are vulnerable to cloning, where new phones are created using a stolen number, and new subscription fraud, where a phone is obtained using a false identity. Here Biometrics could be used on the handheld set to recognise ownership, and a biometric trait could be taken at authentication.


Biometrics can be used to secure transactions at automatic teller machines, no longer requiring the presentation of an ATM card (a biometric is hard to steal). It could also be used for transactions at point of sale. Other markets include telephone banking and Internet Banking. Biometrics can be used in any Network where the utmost security is needed. It doesn’t just provide security because the physiological traits between people are unique (PIN numbers should also be unique), but also because these traits cannot be interchanged between people.
The fundamental argument for using Biometrics for Network authentication is the increase in security while eliminating the extras such as PIN, passwords and smart cards, which can get into the wrong hands and do a lot of damage to a network, which is then not able to run at its full capacity until the security breach has been amended.


In the workplace passwords and logins are often passed between co-workers, written down for convenience or reused multiple times for different networks. Biometric logins would make it unfeasible for anyone, other than the intended login, to login to the network. So for every worker, if they were to use the network an account must be set up for them. The workers cannot forget their password, which may be one of several passwords, because their password into the system is a physiological trait.


There are of course security issues with Biometrics that must be addressed. Where will the data be stored? Are you authenticating an actual live sample or just authenticating a message? Can the same Biometric be used for multiple different systems? Will the system be securely implemented? These questions will be addressed in this paper. If Biometrics for network authentication is accepted into society, in the future we may be paying for our groceries at the supermarket on credit with a laser scan of the iris - physical method of access and payment may become a thing of the past.



How are biometrics used in networks


The most obvious use of biometrics for network security is for secure workstation logons for a workstation connected to a network. Each workstation requires some software support for biometric identification of the user as well as, depending on the biometric being used, some hardware device. The cost of hardware devices is one thing that may lead to the widespread use of voice biometric security identification, especially among companies and organizations on a low budget. Hardware device such as computer mice with built in thumbprint readers would be the next step up. These devices would be more expensive to implement on several computers, as each machine would require its own hardware device. A biometric mouse, with the software to support it, is available from around $120 in the U.S. The advantage of voice recognition software is that it can be centralized, thus reducing the cost of implementation per machine. At top of the range a centralized voice biometric package can cost up to $50,000 but may be able to manage the secure log-on of up to 5000 machines.


The main use of Biometric network security will be to replace the current password system. Maintaining password security can be a major task for even a small organization. Passwords have to be changed every few months and people forget their password or lock themselves out of the system by incorrectly entering their password repeatedly. Very often people write their password down and keep it near their computer (on a post-it note attached to the underside of the keyboard is a frequently seen favourite). This is of course completely undermines any effort at network security. Biometrics can replace these. For example the city of Glendale in Los Angeles county California replaced its password system with fingerprint scanners that use biometrics. The cities employees had the usual password problems. The passwords had to be changed every 90 days and no dictionary words were allowed, only 8-digit alphanumeric strings. The vast majority of users failed to change their passwords and as a result got locked out of the system. The only way for them to get back in the system was a call to the IT helpdesk, which became swamped with calls. The help desk staff ended up spending a disproportionably large amount of time fixing problems with passwords. This is the hidden cost of using passwords, the helpdesk admin costs that always result when people get locked out of the system. The use of biometric identification stops this problem and while it may be expensive to set up at first, these devices save on administration and user assistance costs.

Database and SQL Related Ebooks

SQL for MySQL Developers: A Comprehensive Tutorial and ReferenceBy Rick F. van der
Lans

http://rapidshare.com/files/34861054/Addison.Wesley.SQL.for.MySQL.Developers.Apr.2007--0131497359.rar



Excel as Your DatabaseBy Paul Cornellhttp://rapidshare.com/files/34864354/Apress.Excel.as.Your.Database.Jan.2007__1590597516.rar



OCA: Oracle 10g Administration Study Guidehttp://depositfiles.com/en/files/329198

Database Design for Mere MortalsBy Michael J. Hernandezhttp://rapidshare.com/files/35104441/_0201752840.rar


Encyclopedia of Data Warehousing and MiningBy John Wanghttp://rapidshare.com/files/20814716/encdatawm.rar.html


Data MiningBy Jaideep Vaidyahttp://rapidshare.com/files/28000596/gigapedia.org_PrivPresDatMin.rar.html


email to shravan.1258@yahoo.com

Artificial Intelligence

.Here some eBooks this may be help full to you

http://www.flazx.info/scBvvBKz/0137903952.zip.htm




What is artificial intelligence?
A. It is the science and engineering of making intelligent machines, especially intelligent computer programs. It is related to the similar task of using computers to understand human intelligence, but AI does not have to confine itself to methods that are biologically observable.


Q. Yes, but what is intelligence?
A. Intelligence is the computational part of the ability to achieve goals in the world. Varying kinds and degrees of intelligence occur in people, many animals and some machines.

Q. Isn't there a solid definition of intelligence that doesn't depend on relating it to human intelligence?
A. Not yet. The problem is that we cannot yet characterize in general what kinds of computational procedures we want to call intelligent. We understand some of the mechanisms of intelligence and not others.

Q. Is intelligence a single thing so that one can ask a yes or no question ``Is this machine intelligent or not?''?
A. No. Intelligence involves mechanisms, and AI research has discovered how to make computers carry out some of them and not others. If doing a task requires only mechanisms that are well understood today, computer programs can give very impressive performances on these tasks. Such programs should be considered ``somewhat intelligent''.

Q. Isn't AI about simulating human intelligence?
A. Sometimes but not always or even usually. On the one hand, we can learn something about how to make machines solve problems by observing other people or just by observing our own methods. On the other hand, most work in AI involves studying the problems the world presents to intelligence rather than studying people or animals. AI researchers are free to use methods that are not observed in people or that involve much more computing than people can do.

Q. What about IQ? Do computer programs have IQs?
A. No. IQ is based on the rates at which intelligence develops in children. It is the ratio of the age at which a child normally makes a certain score to the child's age. The scale is extended to adults in a suitable way. IQ correlates well with various measures of success or failure in life, but making computers that can score high on IQ tests would be weakly correlated with their usefulness. For example, the ability of a child to repeat back a long sequence of digits correlates well with other intellectual abilities, perhaps because it measures how much information the child can compute with at once. However, ``digit span'' is trivial for even extremely limited computers.
However, some of the problems on IQ tests are useful challenges for AI.

Q. What about other comparisons between human and computer intelligence?
Arthur R. Jensen [Jen98],
a leading researcher in human intelligence, suggests ``as a heuristic hypothesis'' that all normal humans have the same intellectual mechanisms and that differences in intelligence are related to ``quantitative biochemical and physiological conditions''. I see them as speed, short term memory, and the ability to form accurate and retrievable long term memories.
Whether or not Jensen is right about human intelligence, the situation in AI today is the reverse.
Computer programs have plenty of speed and memory but their abilities correspond to the intellectual mechanisms that program designers understand well enough to put in programs. Some abilities that children normally don't develop till they are teenagers may be in, and some abilities possessed by two year olds are still out. The matter is further complicated by the fact that the cognitive sciences still have not succeeded in determining exactly what the human abilities are. Very likely the organization of the intellectual mechanisms for AI can usefully be different from that in people.
Whenever people do better than computers on some task or computers use a lot of computation to do as well as people, this demonstrates that the program designers lack understanding of the intellectual mechanisms required to do the task efficiently.


Q. When did AI research start?
A. After WWII, a number of people independently started to work on intelligent machines. The English mathematician Alan Turing may have been the first. He gave a lecture on it in 1947. He also may have been the first to decide that AI was best researched by programming computers rather than by building machines. By the late 1950s, there were many researchers on AI, and most of them were basing their work on programming computers.

Q. Does AI aim to put the human mind into the computer?
A. Some researchers say they have that objective, but maybe they are using the phrase metaphorically. The human mind has a lot of peculiarities, and I'm not sure anyone is serious about imitating all of them.

Q. What is the Turing test?
A. Alan Turing's 1950 article Computing Machinery and Intelligence [Tur50]
discussed conditions for considering a machine to be intelligent. He argued that if the machine could successfully pretend to be human to a knowledgeable observer then you certainly should consider it intelligent. This test would satisfy most people but not all philosophers. The observer could interact with the machine and a human by teletype (to avoid requiring that the machine imitate the appearance or voice of the person), and the human would try to persuade the observer that it was human and the machine would try to fool the observer.

The Turing test is a one-sided test. A machine that passes the test should certainly be considered intelligent, but a machine could still be considered intelligent without knowing enough about humans to imitate a human.
Daniel Dennett's book Brainchildren [
Den98] has an excellent discussion of the Turing test and the various partial Turing tests that have been implemented, i.e. with restrictions on the observer's knowledge of AI and the subject matter of questioning. It turns out that some people are easily led into believing that a rather dumb program is intelligent.

Q. Does AI aim at human-level intelligence?
A. Yes. The ultimate effort is to make computer programs that can solve problems and achieve goals in the world as well as humans. However, many people involved in particular research areas are much less ambitious.

Q. How far is AI from reaching human-level intelligence? When will it happen?
A. A few people think that human-level intelligence can be achieved by writing large numbers of programs of the kind people are now writing and assembling vast knowledge bases of facts in the languages now used for expressing knowledge.
However, most AI researchers believe that new fundamental ideas are required, and therefore it cannot be predicted when human level intelligence will be achieved.

Q. Are computers the right kind of machine to be made intelligent?
A. Computers can be programmed to simulate any kind of machine.
Many researchers invented non-computer machines, hoping that they would be intelligent in different ways than the computer programs could be. However, they usually simulate their invented machines on a computer and come to doubt that the new machine is worth building. Because many billions of dollars that have been spent in making computers faster and faster, another kind of machine would have to be very fast to perform better than a program on a computer simulating the machine.

Q. Are computers fast enough to be intelligent?
A. Some people think much faster computers are required as well as new ideas. My own opinion is that the computers of 30 years ago were fast enough if only we knew how to program them. Of course, quite apart from the ambitions of AI researchers, computers will keep getting faster.

Q. What about parallel machines?
A. Machines with many processors are much faster than single processors can be. Parallelism itself presents no advantages, and parallel machines are somewhat awkward to program. When extreme speed is required, it is necessary to face this awkwardness.

Q. What about making a ``child machine'' that could improve by reading and by learning from experience?
A. This idea has been proposed many times, starting in the 1940s. Eventually, it will be made to work. However, AI programs haven't yet reached the level of being able to learn much of what a child learns from physical experience. Nor do present programs understand language well enough to learn much by reading.

Q. Might an AI system be able to bootstrap itself to higher and higher level intelligence by thinking about AI?
A. I think yes, but we aren't yet at a level of AI at which this process can begin.

Q. What about chess?
A. Alexander Kronrod, a Russian AI researcher, said ``Chess is the Drosophila of AI.'' He was making an analogy with geneticists' use of that fruit fly to study inheritance. Playing chess requires certain intellectual mechanisms and not others. Chess programs now play at grandmaster level, but they do it with limited intellectual mechanisms compared to those used by a human chess player, substituting large amounts of computation for understanding. Once we understand these mechanisms better, we can build human-level chess programs that do far less computation than do present programs.
Unfortunately, the competitive and commercial aspects of making computers play chess have taken precedence over using chess as a scientific domain. It is as if the geneticists after 1910 had organized fruit fly races and concentrated their efforts on breeding fruit flies that could win these races.


email to Shravan.1258@yahoo.com