Friday, 31 August 2012

Acer become first in the world


Acer becomes India‘s leading desktop vendor in Q2 2012

Acer has become the no. 1 notebook vendor in the world, with a market share of 15.35 per cent in the second quarter of 2012 worldwide. The company has re-established its presence in markets like Europe, South East Asia and other emerging countries.

In India, the company holds the second position position, with 13.4 per cent market share in the total PC market (Source: Gartner). It has also become India's leader desktop vendor during the April-June quarter of 2012 .

A number of sizeable government wins and a strong demand from K12 and education verticals has helped Acer maintain its strong position in the desktop, netbook and TFT category. The company also enjoys the pole position in the commercial desktop segment. With a strong QoQ growth of 2.7 percent in the desktop category and 5.35 percent in the netbook category, the company has retained its no. 2 position in the Indian PC market.

Harish Kohli, managing director, Acer India, said, "In spite of extreme market uncertainties and subdued consumer sentiments, we are extremely pleased to have captured the no. 2 position in the overall PC market. We aim to grow at 25% this year and make a significant penetration into categories such as consumer, retail, government, corporate and education."  

Posted By-: Sorabh Maheshwari
http://da.feedsportal.com/r/139263178782/u/53/f/533923/c/33039/s/22d12d4f/a2.imghttp://pi.feedsportal.com/r/139263178782/u/53/f/533923/c/33039/s/22d12d4f/a2t.img

Wednesday, 29 August 2012

Facebook: Deactivation Vs Delete


I often see that people tell me that they have deactivated their Facebook account to delete it permanently. It is just like a shock for me that how Facebook can delete your account permanently if you are asking for deactivation.
Someone said to me that when we deactivate our Facebook account for a long time it doesn't exist.
Just to make it clear that deactivation and deleting account both are not similar. If you think so then how you can activate your Facebook account if it has been deleted permanently by your deactivation. May be you are getting what I am trying to say. Well this post is just to clear the difference between both operations.

Deactivation of your profile is like you are putting your chat messenger offline that means your profile exists but people can't see. Your data exist on the server of Facebook but it is not available for Facebook users until your activate it again.

Deleting your account will remove all your data exist on the Facebook server. As it is deleted permanently then you can not recover your account again as you can do with a deactivated account.

Most of you know about deactivation of your account that can be done by following these steps

Sign in to your Facebook profile > account setting > Security> Deactivate Account
select "This is temporary. I'll be back." option in the reason field and confirm it.

To recover just Sign in as you normally do and you profile will be as it was.

There is no direct delete button or option so to delete your  account permanently. You have to follow this link (It is safe and Facebook's own but before any action please confirm your steps. I will not be responsible for any loss of data) http://www.facebook.com/help/contact.php?show_form=delete_account and follow the instructions.  If this link doesn't work, please let me know.




Posted by : Swetank Rathi

Monday, 27 August 2012

BORRED WITH WINDOWS AND BADA ON YOUR TOUCH MOBILE HERE IS THE SOLUTION

CyanogenMod

CyanogenMod is an open source replacement firmware distribution based on the Android mobile operating system for smart phonesand tablet computers. It offers features and options not found in the official firmware distributed by vendors of these devices.


Features supported by CyanogenMod include native theming support, Free Lossless Audio Codec (FLAC) support, a large Access Point Name list, an OpenVPN client, an enhanced reboot menu, support for Wi-Fi, Bluetooth, and USB tethering, CPUoverclocking and performance enhancements, soft buttons and other "tablet tweaks", toggles in the notification pull-down (such as Wi-Fi, Bluetooth and GPS), apppermissions management, as well as other interface enhancements. According to its developers, CyanogenMod does not contain spyware or bloatware.CyanogenMod is also stated to increase performance and reliability compared with official firmware releases

CyanogenMod is developed as free and open source software based on the official releases of Android by Google, with added original and third-party code.


On 19 July 2012, CyanogenMod 9 Release Candidate 2 was officially announced and released, adding support for more Samsung Galaxy devices.

On August 9th 2012 CyanogenMod released the finished version of Cyanogenmod 9 aka "stable". This will be the final release of CyanogenMod 9 as the Cyanogenmod team has moved onto full development of Cyanogenmod 10.


CyanogenMod 9 on Galaxy Ace GT-S5830








DEVICES SUPPORTED UNTIL NOW
Google
 Google Nexus One
 Google Nexus S
 Google Nexus S 4G
HTC

HTC Desire GSM
HTC Desire HD / Inspire 4G
HTC Desire S
HTC Droid Eris
HTC Desire Z / G2
HTC Evo 3D
HTC Evo 4G
HTC Hero GSM
HTC Incredible
HTC Incredible 2
HTC Incredible S
HTC Legend
HTC Sensation
HTC myTouch 3G Slide
HTC Wildfire

Samsung
Samsung Captivate
Samsung Galaxy S
Samsung Galaxy S II
Samsung Vibrant





posted by :-paras arora

Saturday, 25 August 2012

How To Connect 2 Computer Using Crossover Cable.


To connect 2 compute using crossover cabel

You only need 1 crossover cable  and 2 network cards .

This is wired connection approach to connect 2 computers directly without involving other network devices, such as network router or switch. It’s effective and simple way if you want to connect the computers temporary. If the network card on computers supports auto MDI/MDIX feature, you could use crossover or straight through network cable to connect both computers. If not, crossover cable is needed!

Let see how to do it here: Plug in network card each to computer and then connect the network cable to both computers’ network card. Yep.. we have finished the physical setup.
Now let’s proceed to install network card driver on each computer if you have not done yet and also make sure the driver is installed properly.

After installing network card driver, here comes the network configuration, let’s create a simple network by assigning following IP address and subnet mask settings to each computer's network card, so that both computers know how to talk to each other:

Computer A:
Connecting 2 computers directly by using crossover network cable
IP Address: 10.1.1.1
Subnet mask: 255.255.255.0
Gateway: [leave-it-blank]
DNS Servers: [leave-it-blank]

Computer B:
IP Address: 10.1.1.2
Subnet mask: 255.255.255.0
Gateway: [leave-it-blank]
DNS Servers: [leave-it-blank]

Since these 2 computers are directly connected, no gateway and DNS servers are required to be configured. If you are not too sure how to configure IP address and subnet mask on computer. check out this step-by-step instructions to assign IP address and other network information in Windows 7 and Windows XP user.
After assigning IP address, try to ping the other computer from command prompt, you should be able to ping each other and then sharing printers or files as you wish.

Posted By: Kaushlendra Yadav

How To Save Your Computer From Hackers.

01: Software Updates

For the protection of your computer from hackers you should get the best and latest version of application which is impossible for the hackers to find it, another thing is also take place that your web browser and other programs are given best upgrades.
02: Window Updates

Another way to protect and save your computer from hackers is that you should keep your operating system up to dates in for minimizing the risk of virus which is very necessary for your computer.

03: Anti-Virus Software

Another way to protect your computer from hackers is that you should install best quality Anti-virus software, because with out antivirus software your computer is in the list of  hackers and it is dangerous for your computer. So for protection of your computer you must do for the best.
04: Anti-Spyware Software

Anti-spyware software is one of the best ways to protect your computer from hackers, Thanks to anti-spyware luminaries like Ad-Aware, the previously crippling spyware infection had dwindled down whole of year.

05: Switch to Macintosh

Another best way for protect your computer from hackers is with the help of Macintosh operating system which is very secure for your computer because this fact only came about because smaller quantity hackers bother to attack this platform in the first place.
06: Hacker-controlled Websites

Another way to avoid your computer from the hackers is that you should avoid for getting snared by doubtful sites committed to porn, free downloads, online games, and so on; this way, there are not as much of chances for you to be hacked.
 
07: Spam Email

Another one of the best way to protect your computer from hacker is that you should avoid to open those websites which are doubtful if the massage is doubtful than delete the message which is useful for your computer.
08: Firewall

Another thing which is very important for your computer avoid to be hacked is to install the firewall if you have not install it than I will recommend to install it. Because there are goods that even filter both incoming and out going data streams.
09: Data Backup

Another thing which is very helpful for your computer to avoid from hacker is that if any data which is in your computer as well as related to computer, you should take backup of this data which is very important to save your data from crashes on internet.
10: Password Polices

Another very important thing which is very helpful to protect your computer from hackers is that your password polices should be of high standard using combinations of letters and numbers, and making sure that your password is as secret as potential without necessarily making it too difficult for you to remember it.

11: Internet Security

Being extra careful while surfing is the best way to protect your computer from hackers. Simple precautions can mean the difference between a secure and vulnerable system. A great way to save yourself from hackers is to avoid visiting hacker controlled sites usually committed to porn, free downloads and online gaming. Also be extra careful while downloading something from an unknown source. Never ignore a security warning about a site. Its better to be safe than sorry.

12:Educate Yourself

When working for an offensive against hackers, the most important step is to educate yourself. Hacking is a dynamic topic with developments arising every moment. Hackers are intelligent and innovative and you should be prepared for it.
Computers are vulnerable. No matter what you do, its impossible to be 100% save. Important data like personal detail and credit card information should never be saved directly on a computer. A password protector is a great way to protect this data.
Another great way to secure your computer is to use a password on your computer. Well, it can't really save you if your computer gets stolen (in case of a laptop) but can save you from unauthorized people who can reach to your computer.


 Posted By: Kaushlendra Yadav

Friday, 24 August 2012


Symantec reports a new malware for Mac  



Symantec has reported a new malwarefor Mac called OSX.Crisis. Crisis malware has functionality to spread to four different environments: Mac, Windows, virtual machines, and Windows Mobile, a statement issued by the company said.
It is an advanced threat not only in function, but also in the way it spreads. The threat uses three methods to spread itself: one is to copy itself and an autorun.inf file to a removable disk drive, another is to sneak onto a VMware virtual machine, and the final method is to drop modules onto a Windows Mobile device. Specifically in virtual environments, the threat searches for a VMware virtual machine image on the compromised computer and, if it finds an image, it mounts the image and then copies itself onto the image by using a VMware Player tool, the statement said.
The release said that it does not use vulnerability in the VMware software itself. It takes advantage of an attribute of all virtualization software: namely that the virtual machine is simply a file or series of files on the disk of the host machine. These files can usually be directly manipulated or mounted, even when the virtual machine is not running as is the case above.
"This may be the first malware that attempts to spread onto a virtual machine," said Shantanu Ghosh, vice president and managing director, India product operations, Symantec. "Many threats will terminate themselves when they find a virtual machine monitoring application, such as VMware, to avoid being analyzed, so this may be the next leap forward for malware authors," he said.



Posted By -Saurabh Maheshwari

fastest data cable system

Asia gets its fastest undersea data cable system


A new 7,800 km undersea data cable has opened to traffic in Asia linking Japan, Malaysia,Singapore and the Philippines which could aid in financial trade.

The Submarine-cable Express (ASE) transfers data via an optical fibre system at 40 gigabits per second, and is three milliseconds faster than any other cable between Singapore and Tokyo, the BBC News reported.

The gain in speed may sound small, but could prove critical to financial trades made out of the region.

So-called "high frequency trades", controlled by computers, involve making what may be hundreds of thousands of transactions in less than a second - all determined by a program that tracks market conditions.

With banks and hedge funds competing against each other, the size of the profit or loss can come down to a matter of beating the competition by a fraction of a second, explained Ralph Silva, a strategist at Silva Research Network.

"High frequency trading is basically computer trading - you program a set of rules and as events happen - the computer decides buy or sell commands," he was quoted as saying by the BBC.

"As all incoming data is received by all banks at the same time, and because the computers are all the same with the same speed of processors, the length of time the command takes to get to the exchange makes a big difference," he said.

"Three milliseconds in computer time is an hour in human time," he added.

The route for the new cable was chosen to be as straight as possible, reducing the time to get information from one end to the other to 65 milliseconds.

The data transfer capacity of 40 Gbps is the equivalent of downloading a high-resolution DVD in about two seconds.

The new facility adds to a web of undersea cables in the waters around Japan.

These include ones run by Australian operator Telstra International; Taiwan's largest phone operator Chunghwa Telecom; and the global telecommunications service provider Pacnet, based in Singapore and Hong Kong.

Many were damaged by a powerful earthquake near Japan's northeast coast in March 2011.

The problems helped influence where the new cable was laid, said Japan's biggest telecommunications provider.

"We avoided the area around Taiwan, where earthquakes are common, and laid the route near the Philippines instead, making the cable very safe and reliable," Hiroyuki Matsumoto, senior director of network services at NTT, one of the four partners involved in the project said.

Posted By -Saurabh Maheshwari

Microsoft New Logo


   Microsoft launches new logo after 25 years



Microsoft will use a new logo for the first time in over two and a half decades. The software titan has created a new logo which has been heavily inspired by the emblem of Windows operating system. This change in the logo also shows the company's focus on the tile-centric Metro interface, which it uses in the Windows Phone platform, XBOX 360 and the upcomingWindows 8 and Office suite.


On the Microsoft Blog on TechNet, Jeff Hansen, the general manager of brand strategy at the company, said that this step will ensure that a consistent user experience can be delivered across all platforms, from PCs and phones to tablets and television.

Rather than the previous emblem, which only had the name of the company, this new logo has 'Microsoft' written in Segoe font on the right and square with four tiles, reminiscent of the Metro UI, on the left.

The new Microsoft logo is already on the company website and in retail stores in Boston, Seattle and Bellevue. It will be seen heavily in advertisements as well as intra-organisation communications.          


Posted by - Ankit Lodhi

Wi-Fi Alliance starts certifying tunnel technology for better wireless performance



Tunneled Direct Link Setup can improve performance for applications such as media streaming.

The Wi-Fi Alliance has launched a program to certify products that support TDLS (Tunneled Direct Link Setup), a technology that allows devices to automatically create a link between each other after accessing a wireless network, removing the need to transmit data through the access point, and avoiding delays caused by congestion, the organization said on Thursday.
The new TDLS certification program can improve performance for applications such as media streaming, without requiring user intervention, according to Wi-Fi Alliance.
A direct link between wireless devices may sound reminiscent of the functionality offered by Wi-Fi Direct.
But the two technologies are complimentary, according to Wi-Fi Alliance. TDLS operates in the background of a Wi-Fi network to optimize performance, while Wi-Fi Direct devices can connect to one another while on the go, even when there is no wireless network available. Also, TDLS can operate within a Wi-Fi Direct network.
Many products will be certified for both TDLS and Wi-Fi Direct, but the two technologies will be used in different situations, Wi-Fi Alliance expects.

The certification program is available for TVs, smartphones, tablets, cameras, printers, PCs, projectors, and gaming devices. It won't be necessary to buy a new access point or wireless router for TDLS to work.

TDLS is based on the IEEE 802.11z standard, and the automatic link configuration is done in a couple of steps. The discovery process begins when one device sends a discovery request to another device, via the network they are connected to. If the target device is also TDLS compliant, then it sends a response directly to the initiator, providing information on its capabilities, including supported rates and channels.
The communication between the two devices -- for example, a TV and a tablet -- can also measure the relative signal strengths of the access point and the TDLS device and decide whether a direct link would be beneficial or not.

Besides streaming video and audio, TDLS can also be used to improve the performance of wireless data back-up, printing and file transfers.
Certified products can operate over a 802.11n network, as well as previous wireless standards.

The Wi-Fi standard used to communicate is the fastest available on both products, even if the network's access point only supports a lower-bandwidth version of Wi-Fi. The same goes for security; the most secure option is chosen irrespective of what the network is capable of.

TDLS also has integrated power saving mechanisms to improve performance on battery-operated devices such as smartphones and tablets.
The first products to be approved are part of a test suite which includes wireless chipsets from Broadcom, Marvell, Ralink and Realtek.

Posted By:Yogendra pratap singh

Wednesday, 22 August 2012

NVIDIA TEGRA 3 :A SUPER MOBILE PROCESSOR


NVIDIA TEGRA MOBILE PROCESSORS

 WORLD FIRST QUAD CORE PROCESSOR

KEY FEATURES  

Super 4-PLUS-1™ Quad Core with 5th Battery Saver Core - Four plus one refers to Tegra 3’s quad CPU cores, plus the 5th, battery-saver CPU core. This Variable SMP architecture enables four performance cores to be used for max burst, when needed, with each core independently and automatically enabled and disabled based on workload. The single battery-saver core (or companion core) handles low-power tasks like active standby, music, and video, and is transparent to the OS and applications. 

NVIDIA DirectTouch™ - This is a patent-pending architecture that improves touch responsiveness and reduces power consumption by offloading a portion of the touch processing onto the NVIDIA® Tegra® 3 processor.

3D Stereo Gaming - This capability leverages NVIDIA’s award-winning NVIDIA 3D Vision® technology to automatically, and in real-time, convert OpenGL based games and apps into Stereo 3D.

NVIDIA PRISM Display Technology - PRISM (or Pixel Rendering Intensity and Saturation Management) reduces a mobile device’s backlight power while simultaneously enhancing the pixel color to deliver the same visual quality with substantially extended battery life.

 

Tegra 3 Specifications

 

Processor
CPU Quad-Core, with 5th battery-saver core
Max Frequency Up to Single Core 1.5 GHz /Quad-Core 1.4 GHz
L2 Cache 1 MB
L1 Cache (I/D) (32KB / 32KB) per core
Memory
Frequency DDR3-L 1500
LPDDR2-1066
Memory Size Up to 2 GB
GPU
Architecture ULP GeForce
3D Performance Relative to Tegra 2* Up to 3x
Cores 12
3D Stereo Yes
Full Programmability Yes
OpenGL ES Version 2.0
OpenVG 1.1
EGL 1.4
Video (1080p)
Decode H.264 (HP @ 40Mbps)
VC-1 AP
MPEG2
MPEG-4
DivX 4/5
XviD HT
H.263
Theora
VP8
WMV
Sorenson Spark
Real Video
VP6
Encode H.264
MPEG4
H.263
VP8
Video Teleconference (VTC) H.264
MPEG4
H.263
VP8
Audio
Decode AAC-LC
AAC+
eAAC+
MP3
MP3 VBR
WAV/PCM
AMR-NB
AMR-WB
BSAC
MPEG-2 Audio
Vorbis
WMA 9
WMA Lossless
WMA Pro
G.729a *
G.711 *
QCELP *
EVRC *

* Through third party
Encode AAC LC
AAC+
eAAC+
PCM/WAV
AMR-NB
AMR-WB
Imaging
Primary Camera 32 MP
Secondary Camera 5 MP
Mpixel/s 300
Digital Zoom Up to 16x
JPEG Decoding/Encoding 80MP/sec
Still Image Stabilitization Yes
Video Stabilization Yes
Features Auto Exposure
Auto White Balance
Auto Focus
Lens Shading 9th order
De-Mosaic
Sharpening
Programmable De-Noise
MIPI CSI Yes
Display
Display Controllers 2 simultaneous
HDMI (1920x1080)
LCD 2048x1536
CRT 1920x1200
MIPI DSI Yes
Mobile introduced
HTC One X
LG Optimus 4X HD

LG Optimus Vu
Google Nexus 7






POSTED BY:- PARAS ARORA



Monday, 20 August 2012

FLEXIBLE OLED FUTURES OF SCREEN


OLED:organic light-emitting diode

emissive electroluminescent layer is a film of organic compound which emits light in response to an electric current


There are two main families of OLEDs

  • based on small molecules
  • based on   polymers
TYPES OF SCREEN TECHNOLOGY USED
  1. LED :LIGHT EMITTING DIODE 
  2. PMOLED : PASSIVE MATRIX ORGANIC LIGHT EMITING DIODE
  3. AMOLED :  ACTIVE MATRIX ORGANIC LIGHT EMITING DIODE
METRIAL USED IN LEDs TECHNOLOGY
  1. POLYMER LIGHT EMITING DIODE
  2. PHOSPHORECENT LIGHT EMMITING DIODE

Working principle

A typical OLED is composed of a layer of organic materials situated between two electrodes, the anode and cathode, all deposited on a substrate. The organic molecules are electrically conductive as a result of delocalization of pi electrons caused by conjugation over all or part of the molecule. These materials have conductivity levels ranging from insulators to conductors, and therefore are considered organic semiconductors. The highest occupied and lowest unoccupied molecular orbitals (HOMO and LUMO) of organic semiconductors are analogous to the valence and conductionbands of inorganic semiconductors.
Originally, the most basic polymer OLEDs consisted of a single organic layer. One example was the first light-emitting device synthesised by J. H. Burroughes et al., which involved a single layer of poly(p-phenylene vinylene). However multilayer OLEDs can be fabricated with two or more layers in order to improve device efficiency. As well as conductive properties, different materials may be chosen to aid charge injection at electrodes by providing a more gradual electronic profile, or block a charge from reaching the opposite electrode and being wasted. Many modern OLEDs incorporate a simple bilayer structure, consisting of a conductive layer and an emissive layer. More recent developments in OLED architecture improves quantum efficiency (up to 19%) by using a graded heterojunction. In the graded heterojunction architecture, the composition of hole and electron-transport materials varies continuously within the emissive layer with a dopant emitter. The graded heterojunction architecture combines the benefits of both conventional architectures by improving charge injection while simultaneously balancing charge transport within the emissive region

ADVANTAGES

  1. LOW RUNNING COST IN FUTURE
  2. LIGHT WEIGHT
  3. FLEXIBLE GLASSY SUBSTANCE
  4. IMPROVED BRIGHTNESS
  5. WIDER ANGLE VIEW
  6. BETTER POWER EFFICIENCY
  7. QUICK RESPONSE TIME
POSTED BY: PARAS ARORA
SOURCE : WIKIPEDIA ,www.oled-info.com/flexible-oled

How to access the files when Windows is damage

  You Need An optical drive (CD,DVD or Blu-Ray) drive on the computer you wish to repair. An  burning capable  optical drive on your working...