Computer's Hardware

U.S.B flash driver is a wonderful invention. The U.S.B drivers can store up to 256 G.B of information in a single U.S.B flash driver. Its like a ton of data storage space that fits inside something in the size of your thumb. Technology is a great thing in the world and now a days many peoples use their U.S.B flash drivers.


The size and the cost of the U.S.B flash driver is varied. The cost of the U.S.B flash driver also not higher. The cost of the U.S.B flash driver varies from .99 to 9.00, it may be higher than this price it depends upon the storage size. U.S.B memory is very cheap when compared to an actual Hard disk prices.


Advantage Of The U.S.B Flash Drive


The U.S.B flash drivers have many advantages like it cannot contain any moving parts , moving parts make it break. In the U.S.B flash drivers we can read and write the data's more than 1 million times.

The data's which are store in the U.S.B flash drivers are also very safe because it cannot be affected by dust and scratches. Now a days all the computer's contain a U.S.B port which connects your U.S.B flash driver to the computer. The U.S.B flash driver will work with all computer. All the computers can read and write the flash drive data's by the same command which are using for the disk drive. The U.S.B flash drivers are in very less weight and now a days it comes under key chains to carry easily.

Speed Of The U.S.B Flash Drive


The speed of the U.S.B flash drives as many of them boast transfer speeds of more than 30 Mbps and the reading speed will be 60 Mbps. In this speed the data transferring will made easy and we can finish the work very fast. If you use the U.S.B flash drives for presentations, graphs, music, business charts etc, it will access quickly within a minute.

If the U.S.B flash drives are used for back up the programs or large file size then it would take several minutes or it may take several hours to transfer the data's depending upon your file size.

Uses Of U.S.B Flash Drive


U.S.B flash drives used for store personal information's like music, videos, documents, pictures etc.


System administrator's are using their U.S.B flash drives for transfer recovery and anti virus software's to the affected computer's by the viruses.


Now a days audio players in a car also have an U.S.B port we can listen our favorite music from our U.S.B memory drives.

Computer Science

In 1958, Chaim Pekeris completed a landmark project in computer science. As a physicist at the Weizmann Institute of Technology in Israel, he become fascinated with the relatively new science of quantum mechanics and its potential to explain from first principles the behaviour of atoms.


There was a problem however. The equation developed by Schrodinger that could do the job was too complex for mere mortals to handle. Using it to determine the electronic energy levels of a even a lowly helium atom was seemingly impossible.


Chaim had an idea, however: why not exploit the incipient field of computer science to do the job.


Today, Christoph Koutschan and Doron Zeilberger analyse the work he carried out over several years and compare it to the approach that they would take to the problem today. It makes for interesting reading.


Chaim's task was monumental.

He first had to persuade the Wiezmann Institute and a technical committee including Einstein and Von Neumann, to build a computer. Einstein proved hard to persuade but was eventually won over by Von Neumann.

WEIZAC, Israel's first electronic computer was built between 1954 and 1954. According to Wikipedia, WEIZAC was an asynchronous computer operating on 40-bit words. Instructions consisted of 20-bits: an 8-bit instruction code and 12-bits for addressing. For a memory it had a magnetic drum that could store 1,024 words.


Today you'd get more processing power out of a washing machine.


Before the computer could get involved, Pekeris had to work out how to describe the two atoms and nucleus of a helium atom using the kind of recurring partial differential equations that a computer could handle.

The result was a remarkable 33-term equation which he derived by hand, a single calculation that Koutschan and Zeilberger estimate must have taken 20 person hours.

The computer than had to be programmed--in machine code. That means writing it entirely in 0s and 1s, for which he recruited help from an early self taught programmer called Yigal Accad.


This program then kept WEIZAC busy for months, eventually producing a set of tables describing the energy levels of a helium atom, the first time this had been done accurately..


So how has Moore's Law affected this process, ask Koutschan and Zeilberger.


They repeated Pekeris' project using the modern tools of computer science to see how they compare.


They say that the numeric computation--the work done by WEIZAC--can be completed in a fraction of a second on any laptop such as Pavilion dv9000(Hp dv9000 battery) and Hp PB991A.


They also point out that the programming is much easier too, thanks to the many high level programming languages available today. Few people these days have to mess around with machine code, thankfully.


But perhaps the most surprising thing is that the algebra for working out the differential equations can also be done much faster today using computer algebra programs such as Mathematica and Maple.


Koutschan and Zeilberger say they were able to condense this part of the project, which took Pekeris at least 20-hours, into a 2-hour session.


That's a fascinating study and counterintuitive in some ways too. While it's easy to see the many orders of magnitude improvement that has improved hardware, it's clear from this work that the speed up from software is more limited.


In particular, an order of magnitude improvement--from 20 hours to 2 hours--in the time it takes to do the algebra for this problem is a surprisingly small improvement over a 50 year period.


But given the nature of the problem, it's hard to imagine how further order of magnitude improvements can be possible. What kind of computer algebra software could allow a human to program it work out these kind of differential equations in minutes or seconds.


Of course the limiting factor here is not the software but the 'wetware'. Which means that the next generation of improvements will either have to focus on improving the wetware or taking it out of the loop entirely.

Stars in wearable technology

Wearable technology is clothing and accessories incorporating computer and advanced electronic technologies which enables functions far beyond conventional ranges of applications. Lots of people turn to celebrities for their fashion inspiration and many celebrities become living trending topics. The following are images of celebrities and their outstanding styles with wearable tech ranging from a realtime-tweeting "Twitdress", flashing LED-embedded gowns, to an illuminating scarf and shade set.


 



Imogen Heap, a Grammy Award-winning British singer, who is known for her work as part of the musical duo Frou Frou, became a living trending topic especially in February for her realtime-tweeting "Twitdress" to the Grammys. She was trendy in a giant Twitter ticker served as necklace and accessorized her getup with iPod Touch.


 





Imogen Heap in her realtime-tweeting "Twitdress" to the Grammys


 



Singer Katy Perry, who became known for wearing unconventional style of dress, often combining colors and vintage fashion, caught great attention when she arrived at the Met Gala in a pulsating LED gown by CuteCircuit.


 




Katy Perry in a pulsating LED gown by CuteCircuit


 



Kanye West, who first rose to fame as a producer for Roc-A-Fella Records, wore a flashing LED jacket-and-scarf combo and a pair of illuminated shades at the 2008 Grammys.


 




There were LED lights on his jacket, on the sunglasses and his scarf.


 



Bono, the lead singer of the Irish rock band U2, slipped on a black leather jacket when the band performed "Ultraviolet (Light My Way)" for its 360° Tour in 2009.


 




Moritz Waldemever, the jacket's designer said that that created an electrifying sense of the performer reaching out to his audience spiritually, visually, and audibly.


 



Lady Gaga, an American recording artist, wore one of her most outrageous outfits at a Liverpool engagement in February. The dress was inspired by Hussein Chalayan's animatronic clothing.


 




Lady Gaga in her outrageous outfit at a Liverpool engagement in February


 



Rihanna, a Barbadian R&B recording artist and model, who has achieved six number-one singles on the Hot 100 chart, the most for a female artist since the start of the 2000s decade, dons an LED gown for her Last Girl on Earth Tour at the Gelredome in Arnhem.


 




Rihanna at the Gelredome in Arnhem, Holland, in April.


 



Fergie, the female vocalist for the hip hop group the Black Eyed Peas, wore shoes whose heels flash whenever their wearer applies pressure to the front of the footbed.


 




Shoes' heels flash when there is pressure to the front of the footbed.


 


Related links:


Hollywood celebrities make the trendsetting “phenomena”


Bag Styles of Hollywood celebrities


Wearable Technology Helps Victims of Brain Injury, Stroke

What is Cloud Computing Technology - Should Businesses Switch Over?

First, we start outsourcing on business services. Then we continue on with our information technology division.


Another latest development in business at present is the sourcing of information technology (IT) services from a third party to the business transaction which is technically known as cloud computing. Instead of businesses creating an IT department for its technological and communication needs, what they can do is to resort to cloud computing service providers. Among the popular forms of cloud computing are the social networking, web-based e-mail, and the document, spreadsheet, and other hosting services. One of the most popular among the cloud computing services now is Google's google docs.


How it Works
Most businesses deal with problems on administering their IT system due to the cost it incurs when they need to administer their private websites and servers.To solve it, what businesses must have are database service providers with low cost.

Cloud computing comes as the best solution for businesses to overcome issues like budget management, accounting, and data protection.

These virtual computing resources are provided through online servers and data centers to users with access to the system. They are connected to each other via the Internet. By being connected with the Internet, front and end users can avail of this cloud computing system.


Let's have Google as an example. Google Docs is the back end which runs on a shared data center with your business which is the front end. You use Google docs to go and utilize the stored data any time you need to work on them. You can access your files even when you are away from your work provided that you're connected on the Internet.

Cloud computing is also applied in computer games and data processing applications like the game applications we have on Facebook.

Majority businesses normally use this innovative development for services which are related to data storage. Small business are becoming more industrious at work as they use cloud computing for their database work. There is no need for business owners to establish an expensive IT department just to keep their business going. These services bring a handful of cloud computing benefits to your businesses. Let us glance at the benefits businesses may get by resorting into it.


Relevance to your Business
Most businesses are absolutely concerned at systems back-ups and updates. They might have difficulties on updating the files and keeping those already stored. With cloud computing, you do not need to be bothered about these because it reflexively do those two for you.


You and your workers can have easy access on the data and other things relevant to the business at anytime and anywhere when you need them. They can also communicate with their superior even if away from the office because the system connects them via the Internet.


Further, you get to reduce budget on holding a new group to run your business' database wing with cloud computing. And since the system involved in it is not complex, you save your time to focus on other responsibilities. Now you can concentrate more on the other aspects of your business.


You have a qualified IT source right at your fingertips. You don't have to be so much worried about the administrative things in your business. Let your cloud computing service provider make it for you.

Computer Fraud

Computer Fraud


Before the advent of computers, confidence schemes and other types of fraud often required the criminals to meet with their victims face-to-face, deal with them over the phone, or by mail. These methods often put the criminal at risk of being identified and apprehended later by a positive identification.


Many crimes committed over the internet are perpetrated by nameless, faceless attackers that can commit their crimes and fraudulent acts from anywhere in the world. Because of the relative simplicity of fraud and internet crimes, criminals have been able to devise many ways of bilking people out of money and property.


Types of Fraud:


There are many different types of fraud, but common cases often include:


•  Online confidence schemes
•  Internet investment fraud
•  Computer hacking
•  Account and credit card number theft
•  Theft of personal information
•  Hacking into computer systems to alter or delete information


It is important for people to be aware of the potential for computer fraud and to protect themselves and their property from theft.

Although most people are aware that they should be wary of their actions on the internet and should set up some sort of protection, many do not know the right steps to take.

Protecting Against Computer Fraud


People can follow several steps to protect themselves against computer fraud including:


•  Install and use anti-spyware programs to avoid the theft of personal information
•  Password protect valuable documents and computer files
•  Do not give anyone your personal passwords and do not use the same password for every file


•  Make sure to change passwords frequently and do not use commonly known information like first, middle, or last names, birthdates or other information that would be easy to decipher.
•  Use firewall software to provide extra protection against hackers and outside threats.
•  Make sure to double-check account balances and immediately report suspicious activity on any accounts.
•  Do not make online purchases through websites that do not have security settings.
•  Do not divulge personal information online to anyone that you do not know or trust.

Computer Fraud and Criminal Defense


Computer fraud is a serious crime and can result in criminal prosecution, fines, and jail time if an individual is found guilty.  If you have been wrongly accused of computer fraud, visit the website of the Milwaukee criminal attorneys of Kohler & Hart, LLP.