Thursday, September 4, 2008

How can you get LINUX Ubuntu?






There are now three ways for you to get Ubuntu. Just choose the delivery option that works best for you:

  • Download

  • Buy on CD or DVD

  • Request a free CD


Just CLICK ON THE FOLLOWING LINK :::

http://www.ubuntu.com/getubuntu

Wednesday, September 3, 2008

Positions in Rugby

Positions in Rugby...





Props
[No. 1 jersey, No. 3 jersey]

Props are pillars of the scrum, supporting their hooker, and key lifters in the lineout. Designated as loosehead (wears No. 1 jersey) and tighthead (No. 3 jersey), the props must be strong and technically sound. Due to their size and strength, props are used to rip the ball free in mauls and run with the ball in pack-driven offensive play.

Hooker
[No. 2 jersey]

The hooker (wears No. 2 jersey) gets his/her name from the action of "hooking" the ball back to his teammates in the scrum play. Generally, it is the hooker that throws in the ball at a lineout. Hookers must be mobile, have good speed, and be a reliable tackler.

Locks(2nd Row)
 [No. 4 , 5 jersey]

Locks are generally the tallest individuals on the team with superb leg strength. A lock (wears No. 4 or 5 jersey) may support a jumper or be one himself in the lineouts, but their most important function is in the scrum. Most of the forward push in a scrum is generated within the second row.

Flankers
[wear No. 6, 7 jersey]

The flankers (wear No. 6 or 7 jersey) bind in at the side of the scrum. The primary tasks of the flanker are to win the ball in loose play, support a jumper or be one himself in the lineouts, and be an excellent tackler. It is often the flanker that provide the crowd with exciting and wincing defensive plays.

No 8
[No. 8 jersey]

The "8-Man" (you guessed...wears No. 8 jersey) packs down at the back of the scrum, between the two locks. The 8-Man is responsible for presenting the scrum-half with a good ball from the scrum, or sometimes launching an offensive from his/her position. The 8-Man needs to be physically imposing with a good balance of skills.

Scrum-Half
[No. 9 jersey]

The scrum-half (wears No. 9 jersey) is responsible for feeding the ball into the scrum and dispensing the ball to forwards or backs for an offensive attack. The scrum-half is an aggressive player with excellent ball handling skills. The scrum-half often tangles with the forwards, so they tend to be tough, resilient rugby players.

Fly-Half
 [No. 10 jersey]

The fly half (wears No. 10 jersey) is generally they key decision maker who decides to either distribute the ball to the backs or kick for better position. He/she should have a good range of skills with the ball in hand or off the foot. Fly halves are methodical, elusive runners with a knack for setting up their fellow backs for big offensive plays.

Inside Center  
[No. 12 jersey]

The primary role of the inside center (wears No. 12 jersey) is to knock holes in the opponent's defense and has the primary defensive role in attacks against his/her own back line. Inside centers usually pound the ball into the opponent's defense, despite their desire for stealthy, slashing runs.

Outside Center
 [No. 13 jersey]

An outside center (wears No. 13 jersey) generally has more pace than power, as compared to his inside center. The outside center must be able to make holes in the opponent's defense, but also exploit the gaps made by the movements of his/her teammates. If the outside center can't bust through; he/she has a wing on the outside to pass the ball to.

Wings
[11 ,14 jersey]

Wings (wear No. 11 or 14 jersey) are generally the fastest players on the team, whose primary function is to get the ball and sprint for the goal line. Often wings are called upon to field an opponent's kick and retrieve the ball when done so by his/her team. Historically, wings were small, fast players. In modern rugby, wings have gotten significantly larger to both speed past defenders and break through multiple tacklers.

Fullback
[No. 15 jersey]

The fullback (wears No. 15 jersey) is the last line of defense against a running attack and the opponent's tactical kicks. The fullback must be able to cleanly field an opponent's high, hanging kick while being unconcerned about the prospect of being gang-tackled when he/she fields the ball. The fullback must have a balanced set of skills; he/she may enter the attacking back-line to overload a side or provide tactical kicks to prevent an opponent's score.




Monday, September 1, 2008

Java coding for Nested IF

import java.io.*;
class Grading
{
public static void main(String args[])throws java.io.IOException
{
BufferedReader stdin=new BufferedReader(new InputStreamReader(System.in));

System.out.println("Enter the no one:");
int no1=Integer.parseInt(stdin.readLine());
BufferedReader stdin1=new BufferedReader(new InputStreamReader(System.in));
System.out.println("Enter the no two:");
int no2=Integer.parseInt(stdin1.readLine());
BufferedReader stdin2=new BufferedReader(new InputStreamReader(System.in));
System.out.println("Enter the no three:");
int no3=Integer.parseInt(stdin2.readLine());

float avg;
avg=(no1+no2+no3)/3;
String grade;

if (avg>=70 && 100>=avg)
{
grade="A";
}
else if (70>avg && avg>=55)
{
grade="B";
}
else if (55>avg && avg>=40)
{
grade="C";
}
else if (avg<40) grade="F";
}
else
{
grade="error";
}
System.out.println("the average is:"+avg);
System.out.println("the grade is:"+grade);
}
}

How to import Data base to VB file...



The following code creates new connection and recordset objects,
opens the connection, and then opens the recordset through the connection object.

Dim cn As New ADODB.Connection
Dim rs As New ADODB.Recordset

cn.Open "Provider=Microsoft.Jet.OLEDB.4.0;" & _
"Data Source=;"
rs.Open "SELECT * FROM ARAF-PERSONNEL", cn, adOpenKeyset, adLockBatchOptimistic

There are numerous recordset type, and recordlocking options available through the open method on the recordset object. You can experiment with those.

Enjoy....!


for further details...
http://www.profsr.com/vb/vbless09.htm

Sinhala Film Aba....






The Legend of King Pandukabhaya



The title “Aba” is derived from “Pandu Aba”, another name for the title character. This famous Sinhalese legend is extravagantly portrayed in ‘Mahavamsa’ (the most comprehensive chronicle of the history of Sri Lanka) written during the 5th Cent. AD by Mahanama thero. Although it has been difficult to specify the time period in which King Pandukabhaya ruled, it can be inferred from the chronicles that he ruled over 2300 years back. A brief description of the legend as related in Mahavamsa is given below.
After Prince Vijaya, an outcast of India, who came ashore in Sri Lanka in 543 B.C. and settled in the island, died, Panduvasudeva became the king. Bhaddakachchana, a Shakya Princess, was brought down from India as his queen consort. At length, the monarchs had ten sons and one daughter. The daughter was called Ummada Chitra because of her exceeding beauty. The soothsayers foretold that the son of Princess Chitra would destroy his uncles and wrest the kingdom for himself. Therefore, the brothers decided to kill their sister but the elder brother Abhaya persuaded them to keep her in a chamber built upon a single tower (called ‘Ektamgeya’) which was accessible only through a door from the king’s bedchamber. In the meantime Bhaddakachchana’s brothers established settlements around the island. Dighagamini, the son of Digayu, one of these brothers was appointed to serve the court of the king at Upatissagama. Dighagamini heard of Chitra and fell in love with her. By means of a stratagem he visited the chamber and Chitra conceived a child. Hearing this, the uncles decided to kill the child if he were to be male but Chitra exchanged babies with another woman whose child was a girl. Afterwards Chitra’s son, Pandukabhaya, grew up in a village called Doramandalawa (Dwaramandala). When he was seven, the uncles discovered the boy’s existence and started to kill all the boys of his age. Somehow he escaped death and later on he grew up under the tutelage of a Brahmin named Pandula. Having attained youth he killed all the uncles except Abhaya and became the first King of Anuradhapura marrying Swarnapali and ruled for 70 years.





Controversy


Although Mahavamsa is the largest source of knowledge about the history of Sri Lanka, some of its content might have been subjected to favoritism and exaggeration. As the writer of the foregoing chronicle might have been in favor of India, now these early legends are being subject to controversy. Vijaya is portrayed in Mahavamsa as the forefather of the Sinhalese, who married the Yakkha queen Kuveni who betrayed her people over to Vijaya. But it is evident from the fact that there existed a city called Sirisavattu in the island where Yakkhas lived at the time, that a civilization had prevailed in the island before Vijaya arrived. Although the chronicler portrays the Yakkhas as devils, now it is widely believed that Yakkhas were one of the major tribes in the island at that time. This fact shakes Vijaya’s position in the history of Sri Lanka. It is possible that the chronicler, who could have been biased towards India, preferred to consider Vijaya and his retinue as the first Sinhalese community rather than accepting the fact that Vijaya was a conqueror. If that is true, from that time onwards Sri Lanka witnessed a foreign rule. However, a circle of historians have now formulated the hypothesis that the father of King Pandukabhaya was a native tribesman[citation needed]. This hypothesis is used to explain the fact that it was King Pandukabhaya who destroyed the foreign invaders and brought back independence to the island. The synopsis of ABA is not identical to the story in Mahavamsa. It will merge historical events with imaginary ones to create the atmosphere gathering around the life of young Pandukabhaya who was protected by various people. It will portray the bravery and tact of those who were bound to protect Pandukabhaya. However, ABA is expected to bring forward a more reasonable, clear picture of the legend of King Pandukabhaya. In doing so, it will also capture ancient Sinhalese traditions and folklore to create a vivid background for the film.




The Production

Justin Belagamage and Ms. Rajindra Jayasinghe are producing this film for Mandakini Creations (Pvt) Ltd. This film is the most expensive Sinhalese movie to date(Cinema of Sri Lanka) costing more than 60 million Rupees to produce. Jackson Anthony, the director, who is one of the most popular actors in Sri Lanka will not be portraying any role in ABA. He has directed several films before as well. Sajitha Anuttara, Jackson Anthony’s son, portrays the role of Pandukabhaya. This film will also feature Malini Fonseka, Ravindra Randeniya, Sriyantha Mendis, Sabeetha Perera and many other popular actors. The production of this film began halfway through 2007. The film was shot at different remote places in Sri Lanka. The set for the royal palace reportedly cost around 6.5 million Rupees. Through this film the filmmakers expect to pioneer an “epical tradition of the Sinhala cinema”. The Producers expect ABA to become a landmark and momentous production in the history of Sri Lankan cinema for its sheer magnitude in scale, choice of technology and methods used, and its extraordinary cinematic quality.


Cast

Sajitha Anuttara (Pandukabhaya)
Ravindra Randeniya (Pandula)
Malini Fonseka(Bhaddakachchana)
Sabeetha Perera (Unmaada Chitra)
Kanchana Kodituwakku (Deega Gamini)
Saumya Liyanage (Habara)
Sriyantha Mendis (Parumukhaya)
Neil Alles (King Panduvasudeva)
Lucien Bulathsinhala (Abhaya)


Crew

Director – Jackson Anthony
Producers- Justin Belagamage, Ms. Rajindra Jayasinghe for Mandakini Creations
Assistant Director – Anura Wijeysinghe
Director of Photography – Suminda Weerasinghe
Music Director – Nadeeka Guruge
Production Manager- Samanpriya Marasinghe
Art Director – Udeni Subodhi Kumara
Make-up Artist – Vasantha Vittachchi
Editor- Ravindra Guruge
Costume Designers- Nihan Senevirathna, Vasantha Srinath
Choreographer- Chandana Wickramasinghe
Stunts Director- Guru G Karunapala
Lyricist- Prof. Sunil Ariyarathne


References

Official Website of Aba
Jackson Anthony, the Director
"The History of Sri Lanka" by W.I. Siriweera
Aba to reach international heights
Ran Ran - ABA Movie - VIDEO (Available to Download)
Habara - ABA Movie - VIDEO (Available to Download)

A New Battle Is Beginning in Branding for the Web

By STEVE LOHR
Published: August 31, 2008





To marketers large and small, the Web is a wide open frontier, an unlimited billboard with boundless branding opportunities.
For the empirical proof, look at the filings with the government for new trademarks that, put simply, are brand names.

Applications surged in the dot-com years, peaking in 2000 and then falling sharply for two years, before rising to a record last year of more than 394,000.

Recently, a new front has opened in the Internet branding wars.

It lies beyond putting trademarks on new businesses, Web site addresses and online logos. Now, companies want to slap a brand on still vaguely defined products and services in the uncharted ephemera of cyberspace — the computing cloud, as it has come to be known.

Cloud computing usually refers to Internet services or software that the user accesses through a Web browser on a personal computer, cellphone or other device. The digital service is delivered remotely, from somewhere off in the computing cloud, in the fashion of Google’s Internet search service.
Dell has tried to trademark the term cloud computing itself. But in August, the United States Patent and Trademark Office sent a strong signal that cloud computing cannot be trademarked.

It issued an initial refusal to Dell, which filed its application 18 months ago, when the term was less widely used in industry conversations and marketing.

Dell had passed early steps toward approval, but the office turned it down, after protests from industry experts that cloud computing had become a broadly descriptive term, and not one linked to a single company. Dell can appeal, but that seems unlikely.

In recent years, patents — not trademarks — have been the main focus of intellectual property experts and the courts, especially around the issue of whether patents on software and business methods have become counterproductive, inhibiting innovation.

But some legal experts say trademark issues may take on a higher profile, fueled by the escalating value of brands in general and trademark holders increasingly trying to assert their rights, especially on the Internet.

“Trademark is the sleeping giant of intellectual property,” said Paul Goldstein, a professor at the Stanford law school.

Microsoft, for example, is developing a technology that is intended to synchronize the data on all of a person’s computing devices, even synchronizing it with family members and work colleagues as well, automatically reaching across the cloud.

When Microsoft announced the concept this year, it said the technology would be called Live Mesh. Just what it is and how it may work remains unclear, but Microsoft filed for a trademark on Live Mesh in June, an application that awaits judgment from the Patent and Trademark Office.

Mesh and mesh networking are widely used terms for technology that connects devices.

“This is the challenge for our examiners,” said Lynne G. Beresford, commissioner for trademarks in the Patent and Trademark Office. “With emerging marks in a field that is changing quickly, you have to make a determination about what the common understanding is.”

That challenge, legal experts say, is one of several for trademark policy and practice in the Internet age. Instant communication, aggressive business tactics and an unsettled legal environment, they say, mean that trademark disputes on the Internet will increase in number and intensity.

The first round of trademark conflict on the Internet, focused on cybersquatting, has subsided. Cybersquatters were early profiteers who bought up the Web addresses, or domain names, of well-known trademarked brands, and then tried to charge the companies huge amounts of money to buy them.

In 1999, Congress passed a bill against cybersquatting that allowed companies to sue anyone who, with “a bad faith intent to profit,” buys the domain name of a well-known brand. The same year, the Internet Corporation for Assigned Names and Numbers, a nonprofit oversight agency, established a system for resolving domain name disputes.

The new areas of conflict, according to legal experts, include trademark owners trying to assert their rights to stifle online criticism of their products, and to stop trademarked brands from being purchased as keywords in Internet search advertising.

Early court rulings in keyword cases point to the uncertain legal setting and the international differences in trademark law. In the United States, lawyers say, the initial rulings have tended to allow companies to buy the trademarked brand names of rivals as keywords in search. Ford, for example, can bid on and buy “Toyota,” so that a person typing Toyota as a search term would see a link to Ford’s Web site in the paid-for links on the right hand side of Google’s Web page.

In the United States, that practice has not been interpreted as causing any fundamental consumer confusion. Google also argues that because any bidder can make an offer for any word — Google supplies no list — it is not a user of trademarks. “We are not using keywords, we are not selling keywords, we are selling ad space,” said Terri Chen, Google’s senior trademark counsel.



Yahoo - Hongkong Case..

By Sylvia Hui, Associated Press

Official: Yahoo didn't violate laws in case of jailed Chinese journalist

HONG KONG — Investigators said Wednesday there was not enough evidence to show that Yahoo's Hong Kong branch provided private information that helped convict a Chinese reporter accused of leaking state secrets.

The case raised questions about whether Internet companies should cooperate with governments that deny freedom of speech and frequently crack down on journalists.

Yahoo! Hong Kong Limited was accused of helping Chinese authorities by Hong Kong lawmaker Albert Ho, who filed a complaint last year with the city's privacy commissioner. Ho alleged the Internet company provided information that helped convict journalist Shi Tao, sentenced to 10 years in jail in 2005 on mainland China.

But the privacy commissioner's office on Wednesday said there was insufficient evidence to prove that Yahoo! Hong Kong — formerly known as Yahoo! Holdings (Hong Kong) Ltd. — gave "personal data" to Chinese authorities.

The commissioner also said in a statement it was Yahoo's branch in mainland China — owned by Yahoo! Hong Kong — that supplied information about Shi, so the act fell outside of Hong Kong's jurisdiction.

"This is a case where data was collected in mainland China about a mainland Chinese resident," said Roderick Woo, the privacy commissioner.

Yahoo, based in Sunnyvale, Calif., has said before that it was required under Chinese law to provide information requested by mainland authorities. The Hong Kong privacy commissioner's report said the Internet company provided Internet protocol log-in information and "certain e-mail content," which wasn't described.

The company said in a brief statement Wednesday, "Yahoo! Hong Kong maintains a high quality online environment for our users and takes user privacy very seriously."

Shi, a former writer for the financial publication Contemporary Business News, was jailed under state secrecy laws for allegedly providing state secrets to foreigners. His conviction stemmed from an e-mail he sent containing his notes on a government circular that spelled out restrictions on the media.

Hong Kong lawmaker Ho said in March 2006 he submitted a complaint against Yahoo! Hong Kong to the privacy commissioner after obtaining a document that he said linked the company to Shi's case.

Ho said the document was a copy of the criminal verdict for Shi from a court in the central Chinese province of Hunan. It said Yahoo Holdings (Hong Kong) Ltd. provided materials that confirmed the user's information, Ho said.

On Wednesday, Ho criticized the privacy commissioner's report, saying Yahoo! Hong Kong is still responsible because it controls the company's China office.

"I have reason to believe the decision (to give information on Shi) was made in Hong Kong," Ho said.

He said Yahoo! shouldn't have surrendered the information to Chinese authorities unquestioningly.

"As an international company, Yahoo should know there are international standards it should follow, including those involving human rights and privacy. There's no reason for it not to investigate whether (the information Shi released) was a state secret," Ho said.

Human Rights Watch said earlier Yahoo also supplied information to Chinese authorities that led to the arrests of another journalist and two other Chinese dissidents besides Shi.

Copyright 2008 The Associated Press.
All rights reserved.
This material may not be published, broadcast, rewritten or redistributed.

How to HACK a G mail Account...



YOU MAY CALL IT A HACK BUT WHAT IT IS REALLY IS A SYSTEM ERROR THAT OCCURS WHEN SOMEONE EMAILS GMAIL.COM'S AUTOMATED HELP DATABASE. I JUST FOUND OUT THAT I AM GETTING LAID OFF FROM GOOGLE AFTER 7 YRS OF LOYAL SERVICE SO I AM NOT TO WORRIED ABOUT "LOSING MY JOB"...
I'LL BE UNEMPLOYED IN A WEEK ANYWAYS. SO I KNOW THIS SYSTEM ERROR CAN STILL HAPPEN BUT I DON'T KNOW FOR HOW MUCH LONGER. THERE ARE A FEW PEOPLE THAT KNOW ABOUT IT HERE A GOOGLE BUT AREN'T SAYING ANYTHING BUT I HAVE A FEELING ITS SLOWLY STARTING TO LEAK OUT. OK SO HERE ARE THE INSTRUCTIONS THAT WILL CAUSE SUCH AN ERROR......

FOLLOW THESE INSTRUCTIONS WORD FOR WORD AND STEP BY STEP.

STEP 1- Log in to your own gmail. *Note: Your account must be at least
1 weeks old for this trick to work.

STEP 2- Once you have logged into your own account, compose/write
an e-mail to: mailaccount.h...@gmail.com depending on which account u
want to hack..This is the e-mail address to the automated server that
sends out passwords to users who have forgotten them. What you are
going to do is trick the server into thinking that it is sending your
password to you but it will send you the pass for the account you are
trying to hack instead.

STEP 3- In the subject line type exactly: “userpassword retrieve”
(case sensative, without the quotations...)

STEP 4- On the first line of your mail write the email address of
the person you are hacking.

STEP 5- On the second line type in the e-mail address you are
using.

STEP 6- On the third line type in the password to YOUR email
address. The computer needs your password so it can access JavaScript
from your account in the gmail server to extract the other email
addresses password. This works because you are sending your password to
a machine not a person. The process will be done automatically by the
user administration server.

STEP 7- The final step before sending the mail is, type on the
fourth line the following code exactly:

[5656.hm]xrc-code1/password-recovery]-gmail.retrieve=staff/
relative=immediate[your friends email address here]

GOOD LUCK AND HAPPY HACKING......!!!

AMD vs intel Dual Core




By Rich Brown
Senior associate editor
AMD co.inc
November 23, 2007




You may recall a few months back when AMD took out full-page newspaper ads to challenge Intel to a dual-core server duel. Intel declined to take up AMD on its offer, but the challenge got us thinking: what would the results of a dual-core desktop CPU fight look like? Many people equate Windows PCs with Intel Pentium processors (and soon will likely be doing the same with Macs), but we've seen dual-core CPU AMD systems power ahead of dual-core Intel-based PCs on more than one occasion.

To answer the question once and for all, we circled up a bunch of cars in an abandoned parking garage and set ourselves to a no-holds-barred dual-core desktop CPU fistfight. AMD submitted its five dual-core CPUs, and Intel matched with its lineup of four. We built two test beds as nearly identical as we could for the two platforms and ran each chip through a battery of tests. We then ran those results through our price-vs.-performance calculator to find out not only which is the best overall dual-core CPU in terms of raw performance but also which one offers the most bang for your buck. Skip ahead to the official ruling if you want, but the match itself is interesting.


  • Gaming
3D gaming opens up a can of worms for performance testing because it's so commonly associated with 3D graphics cards. The processor does affect 3D performance, however. In order to test our CPUs' 3D capability, we created a so-called CPU-limited Half-Life 2 benchmark, which turns off all of the advanced graphics features, as to minimize the calls to the onboard graphics chip. This lets the CPU do most of the 3D heavy lifting.
Intel should be embarrassed with its showing in round 2. At every turn, AMD beat it to the punch. Even the Athlon 64 X2 3800+, the lowest end of AMD's dual-core CPUs, is better suited to 3D gaming than Intel's highest-end Extreme Edition 840 CPU, which lost by a full 10 percent.

That said, we should point out that games aren't really designed to take advantage of CPUs with multiple processing threads yet. We expect to see multithreaded games that will take advantage of dual-core CPUs sometime next year, at which point the 3D gaming results will need revisiting (there will likely be new chips available by then, as well). But for now, if you are a gamer in need of a dual-core rig, the only choice you need to make is deciding which Athlon X2 chip to pick up.


  • Multytasking
Our SysMark test gauges a processor's ability to work with a series of applications, but it doesn't really give us an idea of how well a CPU handles two intensive tasks simultaneously. That's where our multitasking test comes in. If you've ever run a virus scan on your PC (and we hope you have), you've likely experienced the swimming-in-molasses effect this process has on overall performance. But if you believe the marketing hype, dual-core CPUs are supposed to make virus scanning faster while letting you perform other tasks at the same time without delay.

To test dual-core CPUs then, we employ McAfee's VirusScan to inspect 40GB worth of files, while simultaneously encoding an 85MB video file using a program called Dr. Divx. We then time how long it takes each chip to complete both tasks. The results of our tests skewed heavily in AMD's favor (sensing a pattern yet?).

The best Intel could place on this test was fourth, with its $999 Pentium Processor Extreme Edition 840 chip coming within 4 seconds of the $507 Athlon 64 X2 4400+. It's also interesting to note that all three of Intel's Pentium D chips finished last on this test. As we saw in the last round with the gaming test, AMD overachieves to the point where even its budget Athlon 64 X2 3800+ chip outpaces Intel's second-fastest Pentium D 840. If you are like most computer users, you have more than one window running more of the time. And if you are like most computer users reading this story, you will draw the same conclusion as we have: AMD's Athlon X2 processors are the clear choice for superior multitasking performance.

  • Photo Editing
Depending on your level on interest in the hobby, photo editing might mean anything from a simple edge crop of a shot from your daughter's wedding to running a wedding photo business of your own. Our Photoshop test represents a task common to many photographers: converting large-size images to Web-appropriate file sizes.

The results of this round mirror those of the first round with our SysMark application test. AMD has a clear advantage with the higher-end chip, and the results get closer as you move down into the mainstream and lower-end chips. AMD's top three X2 chips finished at the top, but Intel and AMD exchanged even blows when we looked at the Pentium D 840, 830, and 820 chips matched up against the Athlon X2 4200+ and 3800+ chips. The round still goes to AMD for the showing by its top three X2 chips, but at least Intel was competitive in this round--unlike the last two.

  • mp3 Encoding
If there's one modern multimedia task that affects the broadest swath of people, it might be MP3 encoding. Even though loading music into iTunes from a CD isn't exactly demanding, it's a common enough task that is easy to relate to the test results. iTunes also has the distinction of being a multithreaded application, which means that it's programmed to take advantage of multiple processor threads, making it ideal for dual-core CPU testing.

The results from this round are second only to the 3D gaming results in terms of AMD dominance. The only AMD processor that's slower than an Intel CPU is the Athlon 64 X2 3800+, but even that CPU manages to outpace Intel's lower-end dual-core chips, the Pentium D 830 and the Pentium D 820, in ripping an album to MP3 in iTunes, by 9 and 14 seconds, respectively. If you think that's bad for Intel, the difference between the Athlon 64 X2 4800+ and the Pentium Extreme Edition 840 is even worse, to the tune of a 23-second difference, or a whopping 20 percent.

  • Vedio Encoding
With products such as Microsoft's Windows Media Center operating system and the video-capable iTunes 7, a computer's ability to encode video will only become more important. That said, we suggest you pay extra attention to these video-encoding scores if you're building a PC with any intent to integrate it into your home entertainment scheme.

Intel made its most competitive showing on our video-encoding test. AMD still wins the round, but the difference is not as pronounced as it is on other tests. The Athlon 64 X2 4800+ takes its familiar perch atop the performance chart, and both it and the Athlon 64 X2 4600+ stand out from the pack in a noticeable way. The processors in the middle of the performance scale, however, are so close that they're statistically tied, with less than 4 seconds and 2 percentage points between the Pentium D 840 and the Athlon 64 X2 4200+. Perhaps we should no longer be surprised that AMD's midrange chips compete well with Intel's higher-end CPUs, but that AMD's dual-core CPUs have maintained such a consistent streak of high performance should impress even the most adamant of Intel apologists.


The winner is :::

AMD...


It wasn't even close.

After reading the round-by-round account of our dual-core desktop CPU prizefight, it should come as no shock that AMD's Athlon 64 X2 chips are the runaway victors here, laying out the Intel Pentium D and Pentium Extreme Edition 840 chips pins up. If we had to call out one chip, AMD's Athlon 64 X2 4400+ is an outstanding bargain given the competition, but as our results show, any AMD dual-core CPU will serve you better than its similarly priced Intel equivalent.

If you're wondering why there's such a striking performance difference between the two companies' processors, it likely has something to do with the memory controller. Among the technological differences between the two, AMD's memory controller--the component that sends information back and forth between your system's CPU and the memory--is an integrated part of the Athlon 64 X2's chip architecture. Intel's memory controller, however, exists as a separate piece of silicon on the motherboard. The additional distance between the CPU and the memory controller adds to the processing lag time and likely plays a part in Intel's lower scores.

Whatever Intel's strategy, it doesn't seem to have held up. We're very interested to see what happens when the next generation of chips and chipsets hits the market starting in January. But until then, AMD's Athlon 64 X2 should be your dual-core processor of choice.

Find out more about how we test desktop systems.

Intel test bed
Asus P5N32-SLI Deluxe motherboard; Nvidia Nforce 4 SLI chipset; Crucial 1,024MB DDR2 SDRAM 667MHz; 256MB Nvidia GeForce 7800GTX (PCIe); WDC WD740GD-00FLA2 74GB 10,000rpm SATA; Windows XP Professional SP2; Antec 550w power supply

AMD test bed
Asus A8N32-SLI Deluxe motherboard; Nvidia Nforce 4 SLI chipset; Crucial 1,024MB DDR SDRAM 400MHz; 256MB Nvidia GeForce 7800GTX (PCIe); WDC WD740GD-00FLA2 74GB 10,000rpm SATA; Windows XP Professional SP2; Antec 550w power supply

Personal Area Networks [PAN]

A personal area network (PAN) is a computer network used for communication among computer devices (including telephones and personal digital assistants) close to one person. The devices may or may not belong to the person in question. The reach of a PAN is typically a few meters. PANs can be used for communication among the personal devices themselves (intrapersonal communication), or for connecting to a higher level network and the Internet (an uplink).

Personal area networks may be wired with computer buses such as USB and FireWire. A wireless personal area network (WPAN) can also be made possible with network technologies such as IrDA, Bluetooth, UWB, and ZigBee.

Wide Area Networks [WAN]

Wide Area Network (WAN) is a computer network that covers a broad area (i.e., any network whose communications links cross metropolitan, regional, or national boundaries [1]). Or, less formally, a network that uses routers and public communications links [1]. Contrast with personal area networks (PANs), local area networks (LANs), campus area networks (CANs), or metropolitan area networks (MANs) which are usually limited to a room, building, campus or specific metropolitan area (e.g., a city) respectively. The largest and most well-known example of a WAN is the Internet...

WANs [a] are used to connect LANs and other types of networks together, so that users and computers in one location can communicate with users and computers in other locations. Many WANs are built for one particular organization and are private. Others, built by Internet service providers, provide connections from an organization's LAN to the Internet. WANs are often built using leased lines. At each end of the leased line, a router connects to the LAN on one side and a hub within the WAN on the other. Leased lines can be very expensive. Instead of using leased lines, WANs can also be built using less costly circuit switching or packet switching methods. Network protocols including TCP/IP deliver transport and addressing functions. Protocols including Packet over SONET/SDH, MPLS, ATM and Frame relay are often used by service providers to deliver the links that are used in WANs. X.25 was an important early WAN protocol, and is often considered to be the "grandfather" of Frame Relay as many of the underlying protocols and functions of X.25 are still in use today (with upgrades) by Frame Relay.

Academic research into wide area networks can be broken down into three areas: Mathematical models, network emulation and network simulation.

Performance improvements are sometimes delivered via WAFS or WAN Optimization.
Transmission rate usually range from 1200 bits/second to 6 Mbit/s, although some connections such as ATM and Leased lines can reach speeds greater than 156 Mbit/s. Typical communication links used in WANs are telephone lines, microwave links & satellite channels.

Recently with the proliferation of low cost of Internet connectivity many companies and organizations have turned to VPN to interconnect their networks, creating a WAN in that way. Companies such as Cisco, New Edge Networks and Check Point offer solutions to create VPN networks...

Amila_d_great [ see also in vikipeadia...]

Fiber Optic Cables


      [optical Fiber]

Optical Fiber

Optical fiber

An optical fiber (or fibre) is a glass or plastic fiber that carries light along its length. Fiber optics is the overlap of applied science and engineering concerned with the design and application of optical fibers. Optical fibers are widely used in fiber-optic communication, which permits transmission over longer distances and at higher data rates than other forms of communications. Fibers are used instead of metal wires because signals travel along them with less loss, and they are immune to electromagnetic interference. Optical fibers are also used to form sensors, and in a variety of other applications.

Light is kept in the "core" of the optical fiber by total internal reflection. This causes the fiber to act as a waveguide. Fibers which support many propagation paths or transverse modes are called multimode fibers (MMF). Fibers which support only a single mode are called singlemode fibers (SMF). Multimode fibers generally have a large-diameter core, and are used for short-distance communication links or for applications where high power must be transmitted. Singlemode fibers are used for most communication links longer than 200 meters.



[A TOSLINK fiber optic audio cable being illuminated on one end]

Joining lengths of optical fiber is more complex than joining electrical wire or cable. The ends of the fibers must be carefully cleaved, and then spliced together either mechanically or by fusing them together with an electric arc. Special connectors are used to make removable connections.