"This post confirms my ownership of the site and that this site adheres to Google AdSense program policies and Terms and Conditions"

Saturday, October 23, 2010

Molecular Biology software



Visual OMPTM: The industry's most accurate and comprehensive software for secondary structure analysis plus design and simulation of probes / primers, RT-PCR, Taqman, Multiplex PCR, late-PCR, Scorpions, Beacons, allele-specific and FRET assays, microarrays, RNAi, and new formats. Unique is good for PCR buffer additives, fluorophores, quenchers, and plus more ...



OMP Developer EditionTM: This Software brings customizable, command line, high-throughput OMPTM (Oligonucleotide Modeling PlatformTM) software engine to power your big test design project or enterprise application. Fits easily into the existing bioinformatics pipelines.



ThermoBLASTTM: Better than BLAST for the control test designs. Combines the capabilities of BLAST database with the exact thermodynamics of OMPTM. Quickly and accurately scans DNA, RNA, or modified oligonucleotides against large genome databases and found thermodynamically stable hybridization and thus eliminates off-target effects testing and false positives. Available as a module for Visual OMPTM or individual, command line, Developer EditionTM version.



ModifiedsTM: Expanding the power of thermonuclear blast and OMP ™ ™ (in both the Windows and command line version) of modified nucleotides (eg LNA, 5-methylcytosine DNA, 2'-O-methyl RNA, plus many more). Makes (1) to predict secondary structure plus design and simulation of oligos with modified nucleotides, and (2) scanning of modified oligos against genomic hybridization to all sites and databases expandable to identify amplicons.

Stock Exchange Software


The stock market is a lucrative and a fluctuating market. There is no guarantee how the stock market fluctuate. In a moment it can take you on a ride with high, but the next moment it will meet you in a flash. Therefore, it is almost impossible to play with the stock market. It is almost impossible to trust someone, while investment in stocks. It can be storage experts around the world who claim that their predictions are true, and say people around the world that inside information about what the company up to, the direct impact on the nature of stocks in the market. But even if you listen to them, take some risk that significant and unavoidable, if one step in the stock market. Therefore, what you need is a reliable source of information, even if it is impossible to predict the stock market, you are to keep banks safe all the time. You need a constant source of information that a number of calculations can you do and know what works best for you. Sometimes a human advice is simply not enough to kill your money. Therefore, you must split the help of some of this second calculation and can help you put your money in the safe place. You need software that is known as Exchange software. This type of software is used by experts camps all over the world. This software is very useful software that is either used to filter prices or choose the right companies to invest in. It helps the gambling aspect of stock market.


There can be many parameters that you are looking for a company before investing in the company. Investment is a serious business and if they sell a lot of money for something, make sure that you are completely satisfied with your investment in the company. This can only happen if you have enough information to prove that the company is sound and you see the good way, your stock goes up with this company collected. However, there are many companies out there on the market and it is very difficult for you to get the precise company with the exact parameters that you find. So even though you have the right parameters you the precise determination of companies with such parameters will be very difficult. Here is where will exchange software to get help. The trading software ensures that the right company that you are looking for on the exchange. It is through the various companies out there on the market and the screen one by one until you see the list of companies that invest your exact needs and the parameters you have chosen to. This program is much more reliable than the human calculations. You must maintain on human error to take care of everything.

According to the parameters that you can get in the stock exchange software has a long list of companies. Therefore, you should make sure that you set the right parameters to the specific list of companies that you can get your money on. The trading software will work for you non-stop and get the best results if you are sure your parameters. Therefore, they think well before you decide to invest in a company and you will get a variety of results with the stock software. Once your software you run most often end up with a large amount of results. You can continue these results by reducing more and more parameters to the search that will help your results to the company that you invest in. Once you are on a list that is short enough and that the view is filter only has enough company, you can for each of them to help you to finally nail down the research, the company you want to invest in. There is also an option in the trading software for professional opinions about to see the company. You can look at them as the state of the company know in the market.

There are many exchange software on the Internet today. If you are looking for such software, a simple Google search, with many areas, but make sure that if you buy one, use one alleged by a source that will help you get the best investment. have with the right choice in software and in exchange of your shares, you can very successfully in stocks in no time.

Sunday, April 4, 2010

What is antivirus software?
There are a variety of antivirus software packages that are active in many different ways, depending on how the vendor chose to implement their software. What they have in common is that they all look for patterns in files or memory of your computer that the possible presence of a virus in te geven. Antivirus packages know what to look through the use of virus profiles (sometimes called "signatures") provided by the seller.

New viruses are discovered daily. The effectiveness of antivirus software is dependent on the latest virus profiles installed on your computer so they can look for recently discovered viruses. It is important to these profiles up to date.
Data Security
Companies that value their data need a detailed scheme for the recovery backup. This includes on site backups for least amount of time set, a copy of this data off site in case the computer room disaster and contingency plans in place. Unfortunately, an easy way to access a company to retrieve data is to obtain access to backup tapes and delicate prints. Therefore, all sensitive data stored in locked cabinets. Backup tapes should be sent site in containers. Old sensitive printouts and tapes should be destroyed.

To protect the computer from damage due to power outages (and spikes), given to the computers on a UPS. This ensures consistent power, protects against downtime, and protects the computer against power surges. Ideally, a backup generator for production systems. On non-production, there must be an automatic way to shutdown the computer if the power to transfer to the UPS for more than 1 / 2 the time the UPS is rated to supply.
Who wants to break into my home computer?
Intruders (also referred to as hackers, attackers, or crackers) may not care about your identity. Often they want to take control of your computer, so that they can use to launch attacks on other computer systems.

After verifying your computer gives them the opportunity to develop their true location as they often launch attacks against high-profile computer systems such as government or financial systems to hide. Even if you have a computer connected to the Internet just the latest games or to email to friends and family, your computer can be a target.

Intruders may be able to keep all your actions on the computer, or harm your computer by reformatting your hard drive or changing your data view.
Computer Security Do I?
Every organization and individual has certain vital information - a unique formula, specialized customer database, a personal journal, annual financial data, etc. The organization would be compromised when they fall into the wrong hands.
Until a few years ago, the protection of such information is relatively simple. All required a strong one was safe with a single key to access. However, as privacy no longer exists. Encryption is the only way to protect your valuables. Currently, with the exception of a few strong encryption packages, there are no resources for this critical encryption function.

Passwords within most programs (Word, Excel, Access etc.) can be broken by a few beginners without any knowledge of computing. Such password breaking tools are easily found on the worldwide web for as little as $ 5.95, or sometimes even free!

Most companies invest millions of dollars in setting up firewalls and try to secure their networks. Ironically, they have the least amount of money to spend to protect the area where the data actually resides or has made the PC for their employees to use. The costs involved in securing data at the level of the user minimum. They just refuse to pay $ 35 for a security.

Encryption makes your data even if accessed by an unauthorized person, incomprehensible and unusable. By adopting the simple preventive techniques you can ensure complete data privacy.

Hacking no longer requires experts. There are literally thousands of off-the-shelf programs available on the Internet that are as easy as using the software packages that you are so familiar. Anyone, even a child with limited or no computer know-how, these packages can hack into your systems. There is no defined requirement learning curve - or the amount of background knowledge essential to an effective 'hacker' is almost zero.
Simple acts like going online to check your email to expose your machine is hacked. It is a trivial task to 'listen' someone e-mail, so that all future correspondence is now in the inbox of the hacker as well.

On http://www.cs.auckland.ac.nz/ ~ pgut001/pubs/secure_del.html find a scientific study made by Peter Gutmann, from Department of Computer Science at the University of Auckland, which is explained in full technical details of the principles of magnetic order principle and which methods can be used to recover files after they have been overwritten several times with data. You can also find a ton of references to other scientific paper on the same subject.
What is cable modem?
A cable modem allows a single computer (or network of computers) to connect to the Internet via cable TV network. The cable modem usually has an Ethernet LAN (Local Area Network) connection to the computer, and is capable of speeds exceeding 5 Mbps.

Typical speeds are generally lower than the maximum, but since cable services by all districts in LANs that share the same bandwidth. Because of this "shared-medium" topology, cable modem users can access the network slightly slower experience during periods of peak demand, and perhaps more susceptible to risks such as packet sniffing and unprotected Windows users to share than other forms of connectivity
How is broadband different from the network I use at work?
Corporate bonds and government networks are typically protected by many layers of security, ranging from network firewalls to encryption. Moreover, they usually have support staff who maintain the security and availability of these network connections.

Although your ISP is responsible for maintaining the services they provide to you, you probably will not have dedicated staff on hand to manage and operate your home network. You are ultimately responsible for your own computers. As a result, it is up to you to take reasonable precautions to make your computers from accidental or intentional abuse secured.
Computers and hardware mechanisms to protect data
Hardware-assisted or computer security provides an alternative to software-only computer security. Devices such dongles can be regarded as more secure due to the physical access needed to be compromised.
While many software-based security to encrypt the data to data from being stolen, a malicious program or hacker can corrupt data in order to irreparable or unusable. Also, encrypted systems are corrupted by a hacker or a malicious program, making the system unusable. Hardware-based security solutions can prevent read and write access to data and therefore provides very strong protection against tampering and unauthorized access. [Edit]
Works of hardware-based security: a device allows the user to log in and log on different levels of duty by doing manual operations. The device uses biometric technology to prevent malicious users to log on, log off, and changing privilege levels. The current state of a user of the device is both read by a computer and peripheral controllers such as hard disks. Illegal access by a malicious user or a malicious program is suspended based on the current state of a user hard drive and DVD controllers enable illegal access to data impossible. Hardware-based access control is safer than using login and log out of OS operating system are vulnerable to malicious attacks. Since the software can manipulate the user privilege levels, it is impossible for a hacker or a malicious program to access data protected by the hardware safely or to perform illegal acts to gain privileged. The hardware protects the image of the operating system and file system privileges tampering. Therefore, a completely secure system should be created using a combination of hardware-based security and systems security policy.
Secure operating systems
One use of the term refers to computer security technology to implement a secure operating system. Much of this technology is based on science in the 1980s developed and used to produce what some of the most impenetrable besturingssystemen ever. While still valid, the technology is in limited use today, especially since a number of changes in the management of the system imposes and also because not much understood. This ultra-strong secure operating systems are based on the operating system kernel technology that can guarantee that certain security policies are absolutely enforced in an operational environment. An example of such a computer security is the Bell-La Padula model. The strategy is based on a coupling of special microprocessor hardware features, often involving the memory management unit, special correctly implemented operating system kernel. This forms the basis for a veilig operating system, where certain key components are designed and correctly, the absolute impossibility of penetrating hostile van elementen guarantee. This capability is enabled because the configuration not only imposes a security policy, but in theory completely protects itself from corruption. Simple systems, on the other hand, not the features that assure you that this maximum level of security. The design methodology to produce such secure systems are accurate, deterministic and logical.

Systems are designed with a similar method with the state of the art [Clarification Needed] computer security although products using such security are not well known. In sharp contrast to most types of software, they meet specifications with verifiable certainty comparable to specifications for size, weight and strength. Secure operating systems designed this way are used primarily for national security information, to protect military secrets, and the data from the international financial institutions. These are very powerful security tools and very few secure operating systems are certified at the highest level (Orange Book A-1) to work on the scope of the "Top Secret" to "unclassified" (including Honeywell SCOMP , USAF SACDIN, NSA Blacker and Boeing MLS LAN.) The assurance of safety depends not only on the soundness of the draft strategy, but also to ensure the accuracy of performance, and therefore there are degrees of security force defined for COMPUSEC. The Common Criteria quantifies security strength of products in terms of two components, security functionality and assurance level (EAL, such as mirrors), and these are described in a Protection Profile for a Security Target and requirements for product descriptions. None of these ultra-high assurance secure general purpose operating systems are produced for decades or certified under Common Criteria.

In the United States usage, the term High Assurance usually suggests the system has appropriate security features that are robust enough to DoD and DOE to protect classified information out. Medium suggests that security can protect less valuable information, such as income tax information. Secure operating systems designed for medium robustness levels of security functionality and reliability to meet have seen wider use within both government and commercial markets. Medium robust systems may provide the same functions as a high security assurance secure operating systems, but doing so at a lower assurance level (such as Common Criteria EAL4 levels or EAL5). Lower levels mean we are less certain that the safety functions are performed flawlessly, and therefore less reliable. These systems can be found in use on web servers, guards, database servers and the management of hosts and are used not only to the data stored on these systems to protect, but also a high level of network and routing services.
THE FIRST THREE CHIPS
The first three press time, three groups have been claiming to have put the first computer chip: Central Air Data Computer (CADC), Intel ® 4004, and Texas Instruments TMS 1000 naval insignia Cadca system "combat aircraft in 1970" is eventually. Often exemption, since it is a CPU chip and off. TMS 1000 as a calculator Tiwari was the first in the market, but - the difference between the Intel 4004 independent image, now as before, because often cited (guilt, was a one in four of being in chips). In fact, it is not what it was before. Parents, lamp, radio - and many before and after - say it was in the ether, how could it be enough with other innovations, their time had come
RISC USE OF TECHNOLOGY
RISC stands for "Reduced Instruction Set Computing, or a humorous vein, the exile" of the important things that a translator, "and also known as the architecture of the burden of the store. In the 1970s research at IBM was the result surprising is that some action is indeed slower than several smaller operations in the same thing. A famous example of this was the VAX's INDEX instruction, which ran slower than the execution of a cycle the same code. RISC began to be adopted in a big way during the 1980s, but many of the projects before the ethics embodied in this design. A notable example is the 1964 CDC 6600 by Seymour Cray Supercomputer, who sports designer, load-store architecture , addressing modes and a lot of two pipelines of arithmetic and logic functions (more pipelines are necessary when you are coming and going task instructions and the CPU in parallel rather than linearly). Most RISC machines only have around five simple ways to deal - with fewer addressing modes, reduced instruction set (the IBM 360 system, only three modes). Easier to design a processor pipeline, if you use a simple addressing modes.
Earlier Intel: 4004, 8008, and 8080
Intel all its only 4 a bit - in the chip end Intel 4004 in November 1971. It is a clock frequency of 108 kHz and Rome, RAM, and ports for 2300 with transistors / A was originally developed for use on a computer with an Intel had his contract as a stand-negotiate new market for single processor can. It was inspired by Jesus in December PDP -8. Intel was introduced in April 8008 1972, and was nothing more than a farce about a 4004th 8 bits The principal claim was that his own fame a. C. - Computer Terminal Corporation (CTC), the chip provided by the Commission - are the basis for 8080, with 8086 and later (and therefore also for x86) architecture. At the moment around 4040 includes Intel's password, bewitched the instructions were logical and 4004 and add 32-bit Intel Intel 432nd put the 8080, which is considered one of the first 8008 to teach at the map and is generally considered the first truly usable microprocessor used. 8080 16-bit address bus and a bus 8-bit data, a 16-bit memory, the 8008 internal rate of 8 lot lot had changed, and a program counter 16-bit. These 256 I / O ports, I / O address space of the device or path can be added without the intervention. This is an indication that a separate bank of memory capture PIN was possible that a lot. These qualities made him a truly modern microprocessor. The Altair 8800, one of the first popular computer to use (the other applicants that MIT Lincoln in 1963 with the title bit "to 12 laboratories LINC / laboratory equipment, including computer components and December 1965-8 December PDP created himself). Although 4004 was the first company, it's really 8080, that their future is going to win - was clear and that in 1974 the company changed its phone number for the last four digits will be 8080th
SOME FACTS ABOUT MICROPROCESSORS
Originally, Intel was the first microprocessor called 4040. This is a 4-bit processor that can process means that only 4 bits at a time. Then it was revised to a better version called the 8080 which is 8-bit processors. Then came the Intel 8085 processor.This creates attraction worldwide for its architecture and processing power. But after that really steal the scene for both 8086 and 8088. These processors are 16-bit capacity and really revolutionized the way people consider microprocessor.Many devices to start with the microprocessor and thus was born the computer by connecting the appropriate devices. 8086 is the first processor that can be used commercially as a computer processor. This is the birth of the legendary 8086 x86 series includes 80,186, 80,286, and then calls the Pentium series
INFORMATION 8-bit Intel
Intel 4004 was followed in 1972 by the Intel 8008, first 8-bit world. According to the History of Modern Computing (MIT Press), pp. 220-21, Intel has signed a contract with Computer Terminals Corporation, later called Datapoint, of San Antonio TX, for a chip for a terminal that was designed. Datapoint later decided not to use the chip, and Intel marketing and in April 8008, 1972. This was the first chip 8-bit world. This was the basis for the famous game of "Mark-8 computer is advertised in the magazine Radio-Electronics in 1974. 8008 was the precursor of the highly successful Intel 8080 (1974), Zilog Z80 (1976), and secondary processors Intel in 8-bits. Competitive 6800 Sony Ericsson was launched in August 1974 and related to MOS Technology 6502 in 1975 (mostly the same people). Z80 6502 rivaled in popularity during the 1980s. A generally low cost, small packaging, simple computer bus applications, and sometimes otherwise provided by the external security hardware (Z80 has a built-in refresh your memory) allowed the home computer "revolution" to accelerate significantly to early 1980, eventually sending cheap car such as Sinclair ZX-81, which sold for $ 99. Western Design Center, Inc. (WDC) introduced the CMOS 65C02 in 1982 and licensed the design to several companies. The used as the CPU in the Apple IIc and IIe personal computers, as well as medical grade implantable defibrillators, heart stimulants, automotive, industrial and consumer devices. WDC pioneered licensing chip designs, followed later by ARM and other microprocessor Intellectual Property (IP) providers in the 1990s. MC6809 Motorola introduced in 1978, an ambitious design sources and the thought of 8-bit compatible with 6800 and executed by the simple use of wired logic. (microprocessors of 16 - microcode bit general purpose to some extent, as the design requirements are too complex for simple hard-wired logic only.) Another 8-bit microprocessor was the Signetics early 2650, has enjoyed a surge in short interest because a powerful new architecture and instruction set. A seminal microprocessor in the world of spaceflight was RCA RCA 1802 (aka CDP1802, RCA COSMAC) (introduced in 1976), which is used in NASA's Voyager probes Viking space of the 1970s, as well as on board the Galileo probe to Jupiter (launched 1989, arrived in 1995). COSMAC RCA was the first to implement CMOS technology. CDP1802 was used because it can run on very low power and because its production process (Silicon on sapphire) to ensure better protection against cosmic radiation and electrostatic discharges than any other processor time. Thus, 1802 is said to be the first chip of radiation toast. RCA 1802 had what is called a static design, which means that the clock frequency can be arbitrarily low, even at 0 Hz, a total stop condition. This leaves the Voyager / Viking / Galileo spacecraft use minimum electrical energy over long travel periods without problems. timers and / or sensors would awaken / improve processor performance in time of important tasks, such as updates navigation, attitude control, data acquisition, and radio communication.
Intel's first microprocessor
Intel 4004 microprocessor is generally regarded as the first and cost thousands of dollars. The first contest known for 4004 is the date of November 1971, she appeared on the news. The project has generated 4004 Born in 1969, when Busicom, a Japanese calculator manufacturer, asked Intel to create a set of calculator chips for high-performance desktop. Busicom original design includes a programmable chip that consists of 7 different cards, three of them of a special purpose CPU in its program stored in ROM and data stored in shift register read / write memory. Ted Hoff, Intel engineer assigned to evaluate the project, believed Busicom design can be simplified by using dynamic RAM for storing data, instead of logging memory change, and a more traditional CPU architecture general purpose. Hoff came up with a proposed architecture of four chips: one chip ROM for program storage, a classification of dynamic RAM chip data, a simple drive E / S and a central processing 4-bit (CPU), who considered that they could be integrated into a single chip, although not a designer of chips. This chip later said the 4004 chip. Architecture and specifications of 4004 were the result of interaction with Stanley Mazor Intel Hoff, a software engineer reporting Busicom Hoff Engineering and Masatoshi Shima. In April 1970, Intel hired Federico Faggin led the design of seven four chips. Faggin, who originally developed the silicon gate technology (sergeant) at Fairchild Semiconductor in 1968 [10] (and also designed the first shopping mall in the world using integrated Sergeant - Fairchild 3708), has the background necessary to implement the project after the sergeant was allowed to design a CPU on a chip with the correct speed, power dissipation and cost. Faggin also developed a new methodology for the design of random logic gate based on silicon, making possible 4004. The production of 4004 units were delivered for the first time in March 1971 and sent to other customers Busicom late 1971.

Friday, March 26, 2010

Creation and production of memory chips


Intel has been on 18 Founded in July 1968 by Gordon E. Moore and Robert Noyce as the Moore-Noyce Electronics in Mountain View, California, after they had left Fairchild Semiconductor. Soon afterwards, was also recruited Andy Grove, who led the company in the 1980s and 1990s. The company's aim was to develop semiconductor-based memory for your computer and bring it to market. The highly integrated (Very Large Scale Integration, VLSI) of transistors on silicon was in the year 1968 still in its infancy, and Intel developed the MOS process for the manufacture of semiconductors.

The first product the company was a 64--Bit Schottky Bipolar RAM. It was introduced in April 1969 under the name "Intel 3101". Only in July 1969 with the Intel 1101 was the first SRAM chip, which was produced by MOS process, put on the market. But it was in October 1975 - yet after only half the originally estimated time - managed the first major leap forward: Intel released under the name "1103" before the first DRAM memory chip, which was based on the MOS process and the benefits of had to offer highly integrated. During the bipolar process only at high-speed devices the advantage enjoyed emerged as the preferred technology for MOS semiconductor manufacturing technology.

As farsighted integration strategist Gordon Moore was recognized as early as 1965 a trend that later as Moore's Law not only the history of Intel, but the development of the entire semiconductor technology decisively influenced.

Until the mid 1980s, DRAM was the main business of Intel. The growing competition from Japanese semiconductor manufacturers and the resulting decline in sales but led 1983 at the re-orientation of the business model. The success of the personal computer from IBM led Intel to focus now on microprocessors and DRAMs abandon production. One of the main suppliers of Intel owns the Taiwanese company Foxconn.

Application of supercomputers


The cost of a supercomputer from the TOP10 now stands at a very high double digits, often already digit million euro amount. Upwards are no limits. Planning for the new standing in the field by 10 supercomputer PFLOPS are currently almost 700 million euros budgeted. These huge amounts of investment is inevitably the question of what these are needed very expensive equipment and whether the investment in the development of such a device, except for pure prestige, profitable.

Today's supercomputers are used mainly for simulation purposes. The more realistic a simulation of complex relationships, the more processing power is needed in the rule. The advantage of the supercomputer is also that they can take account of their extremely fast and large computing power ever more interdependent. This then allows the inclusion of wider still, often inconspicuous secondary or boundary conditions for the actual simulation, and also guarantee a more meaningful overall.

The current main areas of the supercomputer encompass the areas of biology, chemistry, geology, aerospace, medicine, weather and climate research, military, and physics.

Except for the military, which operates mainly military simulations to identify the areas in that we are dealing with very complex systems or subsystems that are linked to each other far-reaching measure. Thus, changes in one subsystem, usually more or less strong impact on adjacent or connected systems. Through the use of supercomputers, it is always easier to take into account many of these consequences, or even to predict, which could already far ahead of any countermeasures are taken. This applies for example in simulations of climate change, the predictions of earthquakes or volcanic eruptions, as well as in medicine in the simulation of new drugs on the organism. (However, logically, such simulations are only as accurate as it allow the programmed parameters and models for the calculation.) The huge amounts of investment in the steady increase in FLOPS and thus the development of ever-faster supercomputers, especially with the use benefit and the possible " knowledge advantage "is justified for humanity, not from the aspects of the general technological progress.

Construction of super computers



Since can not build any fast processors, are all high-performance parallel computers. A parallel computer is a computer that will be distributed simultaneously in the operations on multiple CPUs to increase the operating speed. Be tuned for optimal utilization of a supercomputer, the programming so as closely as possible on the individual parallel processors.

Supercomputers are now generally conceived as a vector or Skalarrechner calculator. They are based on different processor architectures. Vector processors (or vector computers, array processors called) perform a calculation simultaneously on many data (in a vector or array) from. Skalarprozessoren other hand, can process only a Operandenpaar per command. Skalarrechner therefore often based on thousands of standard processors that are networked together) (computer cluster.

Originally, the outstanding performance by maximum utilization of available technology was achieved by designs were chosen that were too expensive for large volume production (eg, liquid cooling, exotic materials and components, compact design for short signal paths), the number of processors was rather low. For a long time to establish more so-called clusters that are interconnected in which a large number of (mostly cheap) individual computers to a large computer. Compared to a vector computer nodes in a cluster have their own peripherals and only its own local memory. Clusters use standard components, so they initially offer cost advantages over vector computers. But they require a far higher programming costs. It is examined whether the established programs lend themselves to being distributed across many processors. Used programming languages include Fortran and C.

Closely associated with the term, the Cray supercomputer. It is named after its founder, Seymour Cray, and made the first supercomputer in the 1970s. The first Cray-1 supercomputer installed officially abolished 1976 130 mega-flops. (For comparison, a normal PC can now run multiple GigaFLOPS.)

Supercomputer or a super computer is a high performance computer is working at the time of its introduction in the top performance range achievable. It does not matter, based on which construction of the machine. A typical feature of a modern supercomputer is its large number of processors that can access to shared peripherals and a partially shared memory.

Saturday, March 6, 2010

Various ways to open a task manager







>click ctrl+alt+del

>click shift+ctrl+esc

>right click task bar and select task manager

>in run type taskmgr.exe to open task manager

Increase The Amount of Virtual Memory Used by XP





Virtual memory is a small portions of a hard drive space is converted to RAM. This is useful for computers which use more physical RAM than is available. Windows XP allow the user to change the amount of virual memory used. By default, the system determines the amount automatically. It is possible to change this to a set amount. It can be a good idea to do this for better performance. Here are the instructions setp by step, along with suggested settings


► Click 'Start'

► Click 'My Computer'

►Click 'View System Information' under 'System Tasks' (If you can not see this option then click 'System Tasks' to collapse the menu). This will open the System Properies window. Alternatively, you can go to Control Panel and open 'System'.

► Click the 'Advanced' tab

► Click the 'Settings' button under 'Performance'. This opens the Performance Options window.

► Click the 'Advanced' tab.

► Click the change button under 'Virtual Memory'

► Under 'Paging file size for selected drive' select the 'custom size' option.

► In the box next to where it says 'Intial size (MB) the best number to enter is 2X the amount of physical memory currently in your system. For example, if you have 512 MB of RAM you would enter 1024 in this box.

► In the box next to where it says 'Maximum size (MB)' enter the same number

► Click 'OK'

► Click 'Apply' on the previous window

► Click 'OK'

► Click 'OK' on the previous window

If any program crashed in windows XP it will show error report


We can avoid the error report to show by following simple steps.

What is error report(A box appears with a option send report or dont send options when software did'nt closed properly)
Open control Panel

Open Performance and maintenance(available in category view)

Then open system

Slect advanced tab

Error report button will be available there(button box at bottom of advanced tab)

Open it and select disable error reporting

click ok

Here after if any software trashes no error report will be shown to you

RUN COMMANDS AND THIER FUNCTIONALITIES



►msconfig - for configuring system and v can change the start up entry

►joy.cpl - to configure joystick

►%temp% - it will open the folder contains temporary files which we hav opened and also web temporary files

►clipbrd - the files we copy gets temporarily located in this folder


►nusrmgr.cpl - open user account of the computer v can manage our user accounts here

►dxdiag - we can easily find the graphical card memory of our system many of them does'nt know how to see graphical memory

Notepad fun:

► Open notepad

►type "bush hid the facts"(without quotes and facts not fact)

►save it and close it.. ..

► then open it again.. .. and see the changes.. ..

Create hidden user account



►This trick allows an account that is normally displayed on the Welcome screen to be hidden from view. To log on using the account it is necessary to use the Log On To Windows dialog box similar to the one in Windows 2000 i.e. press CTRL+ALT+DEL twice.

►Start-> Run-> Regedit

►Go to: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsNT\CurrentVersion\Winlogon\SpecialAccounts\UserList

►MODIFY/Create DWORD Value of Data type REG_DWORD Named [Type Name of Account to be Hidden]
Setting for Value Data: [0 = Account is Hidden / 1 = Enabled]

►Exit Registry / Reboot

►While the account is hidden on the Welcome screen, note that the account profile will be visible in C:\Documents and Settings or wherever user profiles are stored as well as in Local Users and Groups.

Useful Tips for your computer:



►"at time shutdown -s" - we can shutdown computer without scheduling software
just replace time by some time such as 08:00(Railway time so dont use am or pm or change setting of ur time in ur pc to 24 hours from 12 hours) and see the magic
example:- type following in run "at 08:00 shutdown -s" then computer will be turn off at 08:00

►"shutdown -a" - to abort the scheduled time

►If u want to abort u shud do it before scheduled time which you have set.

Shows your pc processor name as you want:

►GO TO START>RUN>TYPE REGEDIT

►HKEY_LOCAL_MACHINE->HARDWARE->DISCRIPTION->SYSTEM->CENTRAL PROCESSOR

►RIGHT HAND SIDE RIGHT CLICK ON PROCESSOR NAME AND STRING AND THE CLICK ON

►EDIT AND WRITE WHAT EVER YOU WANT OR NAME IT as LATEST processor OR MORE

►HEY FRNDS DO REPLY IF U LIKE THIS TRICK

Browser Trick for you:


Move between tabs in google chrome fastly when you are working with multiple tabs

Just press ctrl+tab to move to other tab to move between tabs in google chrome browser

Hope this might be helpful when you want to hide your job from others when suddenly they come.

ctrl+t - new chrome tab

ctrl+n - new chrome window

Wednesday, February 24, 2010

Samsung LD220 - world’s first USB monitor


Samsung presents three new LCD monitors with the UbiSync, a seamless multi-display technology, including SyncMaster 2243QW, LD220 and LD190X. Samsung’s UbiSync technology allows users to extend thier visual workspace by connecting up to six displays to a PC via USB cable.
Samsung LD220 and LD190X have 1920 x 1080 and 1366 x 768 resolution respectively. They boh feature 1000:1 contrat ratio, 250cd/m2 brightness, 5ms response time and come with VGA and USB DisplayLink interfaces. The LD190X is also eco-friendly with a 2-lamp low power consumption.

Pricing details are yet to be revealed, but the LD220 will certainly not be world’s only USB monitor for very long, these gadgets should become much more popular as time comes as they are definitely very convenient to have.
USB monitors are not new to us. We’ve seen quite a number of them before, including Mitsubishi’s, D-Link’s and of course Samsung’s. We believe many will follow the foot steps, producing more USB monitors.

Intel Processors, the History

Intel was one of the pioneering Microprocessor manufacturers when it created the 4004 processor in 1971. This was followed by the 8080 processor in the late 70's, which was developed into the 8086 and 8088 processors in 1979. It was only when, in 1981 IBM selected the 8086 processor for its new Personal Computer, the IBM PC, did the Intel processor design gain its opportunity to be used widely.
The Intel 8086/8088 range of processors were based upon Complex Instruction Set Computing (CISC) which allows the number of bytes per instruction to vary according to the instruction being processed. This is unlike Reduced Instruction Set Computing (RISC) which has fixed length instructions (typically set at 32 bits each). The architechture pioneered by Intel has become known as "x86" due to the early naming system where processors were called 8086, 80186 (not used in PC's), 80286, 80386, and 80486.
In 1982 Intel introduced the 80286 (or 286) processor. This featured significant enhancements over the 8086/8088 line, mainly by introducing protected mode and the ability to address up to 16 megabytes of memory. The 286 processor was used in the IBM XT range.
1985 saw the introduction of the 80386 (or 386), which was the first processor to use 32 bit addressing, allowing it to utilise up to 4 Gigabytes of memory. A cut down version of the 386 known as the 386SX was introduced which had a lower memory throughput, as it could only access 16 megabytes of memory. The 386 processor was manufactured in many different versions and ran at speeds from 16 Mhz through to 40 Mhz.
The 80486 processor family was introduced in 1989. It featured little enhancements over than the 386 other than the fact that it had more transistors and could run at higher clock speeds. Like its predecessor the 386, the 486 was offered in budget (486 SX, minus the math co-processor) and standard (486 DX) versions. The 486 initially ran at clock speeds of 25 MHz (SX only) and 33 MHz. As it was developed the 486 was enhanced with a clock doubled processor core (486 DX-2) allowing it to run at speeds of 50, 66 and 75 MHz, and then tripled (DX-4) which ran up to 100 MHz.
1993 saw the introduction of the Pentium processor, first at speeds of 60 and 66 MHz. This was the first Intel processor not to use the x86 naming system. This processor was enhanced with MMX instructions in January 1997 and ran up to speeds of 233 Mhz.
Intel's 6th generation processor was introduced as the Pentium Pro in 1995. This ran at speeds of 166, 180 and 200 MHz. What was significant was the integration of the processors 2nd level cache memory onto the processor module itself. This processor was enhanced with MMX instructions in 1997 with its development into the Pentium II. This marked a departure for Intel as it moved away from the old socket method of mounting processors with the introduction of Slot 1. The Pentium II runs at speeds from 233 to 450 MHz. 1998 saw the development of this familiy into the Celeron and Xeon families for the budget and server/workstation markets respectively.

AMD launches dual-core Phenom, Athlon CPUs


AMD has announced two new dual-core desktop processors that should allow PCs to take advantage of faster memory standards, creating faster models.
The processor maker's Phenom II X2 550 Black Edition processor, introduced on Tuesday, is its first ever dual-core version of its Phenom II CPU. It is aimed at the more hard-core user, such as professional users, games enthusiasts and other breeds of overclockers.

Also released on Tuesday, the new 45nm AMD Athlon II X2 250 processor aims to boost the performance of mainstream consumer PCs. AMD said the key improvement is that the dual-core processors in its Phenom range can make use of better standards of memory. Until recently, they were limited to working with DDR2, but now they can work with the newer, faster memory standard DDR3. The improvement stems from being able to support both AM2+ and AM3 boards for DDR2 and DDR3 memory, according to AMD.

The Athlon II X2 250 has doubled the previous model's amount of L2 cache for each core, creating a total L2 cache of 2MB. This will provide 3GHz performance in affordable PCs, according to AMD.
Another performance boost comes from the optimization with Windows 7, AMD said.
Though the semiconductor market is proving a difficult source of profits for chipmakers, according to Jonathan Cassell, analyst at market researcher iSuppli, the processor market has never been more buoyant. Strong competition is being created by new CPU releases at all levels, from computers for high-end professional users to budget PCs.

One UK-based system builder put the launch into perspective. "AMD will boast about dual-core architecture and efficiency achievable through 45nm technology," said Richard Marsden, sales director at RealTime Distribution, a UK distributor which supplies AMD chips to system builders. "But the bottom line is that an AMD machine will give them 3GHz performance at an affordable price."

The AMD Athlon Processors History


Amd Athlon Processors History began with the original Athlon Classic, which is the first seventh-generation x86 processor and since it is the first, it remained to be the first performance lead over Intel for a couple of years.
It showed a lot of promise as it showed superior performance compared to the Pentium 3 which was the champion at that time. The second generation Athlon called The Thunderbird came along in year 2000. It had a speed ranging from 600 to 1400 MHz. AMD replaced the 512 KiB external reduced speed cache used by the Athlon Classic with 256 KiB of on-chip, full speed exclusive cache. The Thunderbird at this time, won over rival Pentium 3 but AMD did not stop there. AMD released The Palomino or the Athlon XP. XP meaning "Extreme Performance". Then AMD released The Thunderbird which is at 1.8 GHz. Then the fifth generation Athlon came along, Barton core processors, running at the same speed as the Thoroughbred predecessors.
Finally, the Mobile Athlon XP was introduced. It has lower power consumption, and lower heat production which is basically used for the notebook. AMD is not stopping and is still continuing to improve its processors as to beat it's rival Intel. See cpu-lab.com for more details on the AMD Processor.
AMD ex CEO Jerry Sanders vision was to create a "virtual gorilla" that would equip AMD to compete with Intel. A couple of years later, AMD released Athlon K7 processor. AMD got lots of benefits working with Motorola as AMD was able to refine copper interconnect manufacturing to the production stage one year earlier than Intel

Intel vs Amd

We have conducted plenty of CPU reviews in our time, but we just can't bring ourselves to slow things down. The release of Windows Vista and a round of price cuts by AMD prompted us to hatch a devious plan involving Vista, a new test suite full of multithreaded and 64-bit applications, fifteen different CPU configurations, and countless hours of lab testing. That plan has come to fruition in the form of a broad-based comparison of the latest processors from AMD and Intel, ranging from well under $200 to a cool grand, from two slow CPU cores to four fast ones, from the lowly Athlon 64 X2 4400+ and Core 2 Duo E6300 to the astounding Athlon 64 FX-74 and Core 2 Extreme QX6700.
So, how do the latest processors stack up in Windows Vista? Will a sub-$200 CPU suffice for your needs? Have price cuts allowed the Athlon 64 to catch up to the Core 2 Duo in terms of price-performance? What about power consumption and energy efficiency? Can any of these processors stand up under the weight of killer new games like Supreme Commander? Can I possibly squeeze any more questions into one paragraph? Keep reading for answers to all of these questions and more.
The matchups
The setup for this one is fairly simple. We're directly comparing processors from Intel at AMD at a range of price points. Intel has had a lock on the overall performance lead since the Core 2 Duo first hit the scene, but AMD has made clear its intention to maintain a competitive price-performance ratio. To do so, AMD will have to meet or beat each of the processors in Intel's current desktop lineup, which looks like so:
Model Clock speed Cores L2 cache (total) Fab process TDP Price
Core 2 Duo E6300 1.83GHz 2 2MB 65nm 65W $183
Core 2 Duo E6400 2.13GHz 2 2MB 65nm 65W $224
Core 2 Duo E6600 2.4GHz 2 4MB 65nm 65W $316
Core 2 Duo E6700 2.66GHz 2 4MB 65nm 65W $530
Core 2 Extreme X6800 2.93GHz 2 4MB 65nm 75W $999
Core 2 Quad Q6600 2.4GHz 4 8MB 65nm 105W $851
Core 2 Extreme QX6700 2.66GHz 4 8MB 65nm 130W $999
Intel does offer lower cost options like the Core 2 Duo E4300 and its Celeron value-oriented processors, but our list includes the meat of the lineup.
AMD, on the other hand, offers a dizzying array of Athlon 64 X2 models, from 3600+ to 6000+, generally in increments of 200 (or is it 200+?). Not only that, but AMD often sells multiple products under the same performance-related model number, just to keep smug members of the general public from becoming overconfident. For instance, the Athlon 64 X2 4400+ comes in a 90nm "Toledo" flavor that runs at 2.2GHz, has 1MB of L2 cache per core, and is intended for Socket 939 motherboards. The X2 4400+ also comes in the form of a 65nm chip code-named "Brisbane" that runs at 2.3GHz, has 512K of L2 per core, and slips into Socket AM2 mobos. Several of these features—fab process, clock frequency, cache size, and socket/memory type—may vary within the same model number.
With that said, we've chosen the following members of the Athlon 64 lineup as the most direct competitors to their Core 2 counterparts. Because we live in the now, all of these are newer-style Socket AM2 processors:
Model Clock speed Cores L2 cache (total) Fab process TDP Price
Athlon 64 X2 4400+ 2.3GHz 2 1MB 65nm 65W $170
Athlon 64 X2 5000+ 2.6GHz 2 1MB 65nm 65W $222
Athlon 64 X2 5600+ 2.8GHz 2 2MB 90nm 89W $326
Athlon 64 X2 6000+ 3.0GHz 2 2MB 90nm 125W $459
Athlon 64 FX-70 2.6GHz 4 4MB 90nm 125W x 2 $599
Athlon 64 FX-72 2.8GHz 4 4MB 90nm 125W x 2 $799
Athlon 64 FX-74 3.0GHz 4 4MB 90nm 125W x 2 $999
As you can see, AMD has a fairly direct answer for most members of the Core 2 range. Things start to get shaky at the high end, where the Athlon 64's lower performance takes its toll. The Athlon 64 X2 6000+ sells at a discount versus the Core 2 Duo E6700, and AMD has no answer to the Core 2 Extreme X6800, Intel's fastest dual-core processor. If you match up the two product lines against one another, the results look something like this:
Model Price Model Price
Core 2 Duo E6300 $183 Athlon 64 X2 4400+ $170
Core 2 Duo E6400 $224 Athlon 64 X2 5000+ $222
Core 2 Duo E6600 $316 Athlon 64 X2 5600+ $326
Core 2 Duo E6700 $530 Athlon 64 X2 6000+ $459
Core 2 Quad Q6600 $851 Athlon 64 FX-72 $799
Core 2 Extreme QX6700 $999 Athlon 64 FX-74 $999
So the comparisons are remarkably direct, by and large.
These things are never entirely simple, though, so we should roll out some caveats. One of the big ones involves those FX-series processors. You'll need two of them in order to populate a Quad FX motherboard, so they're priced (and listed above) in pairs. However, there's currently only one Quad FX motherboard available, and it costs about $350, which throws the value equation out of whack.
The value equation sometimes goes off-kilter the other way when AMD employs guerrilla price-war tactics like selling the Athlon 64 X2 4600+ for $125.99 on Newegg, well below the slower 4400+. AMD has several of these "Crazy Hector" deals going at Newegg right now, and none of them seem to involve the Athlon 64 models we've identified as direct competitors to specific Core 2 Duo models. That's probably an intentional facet of AMD's strategy. This practice throws a wrench in our nice, neat comparsion, but there's little we can do other than tell you about it.
One other thing we should tell you about is why we've included two versions of the Athlon 64 X2 5000+ in our testing. Regular readers may recall that we've already tested the 65nm version of the 5000+ against its 90nm predecessor and found that the 65nm one had lower power consumption. But the 65nm version also has a slower L2 cache, so we've tested the 65nm and 90nm chips head to head to see

Intel® IXP2325 Network Processor

The Intel® IXP2325 network processor extends Intel's fully programmable architecture to new, lower cost/performance points for access and edge applications, including broadband access devices, wireless infrastructure systems, routers and multi-service switches.
To meet today's and tomorrow's demanding dataplane performance requirements, the IXP2325 network processor provides a powerful, integrated control plane processor in the same chip. The high-speed core (900 MHz) incorporates advanced I/O and memory features, enabling customers to eliminate an external control plane processor in many applications. Additional hardware-assisted features in the IXP2325 network processor increase performance and simplify development.
Features and benefits


Two integrated programmable microengines (MEv2) with 8K instruction program stores running at 600 MHz Flexible multi-threaded RISC processors can be programmed to deliver intelligent transmit and receive processing, with robust software development environment for rapid product development
Integrated Intel XScale® core:

32 Kbytes - Instruction cache

32 Kbytes - Data cache

At 900 MHz
Embedded 32-bit RISC core for high performance processing of complex algorithms, route table maintenance and system-level management functions. Lowers system cost by eliminating external host processor.
Integrated 512 Kbytes L2 push cache performance Improves CPU performance and MEv2 to Intel XScale core and PCI to Intel XScale core communication
Two unidirectional 32-bit media interfaces (Rx and Tx) programmable as SPI-3 or UTOPIA
Each path configurable for 4x8-bit, 2x16-bit, 1x32-bit or combinations of 8- & 16-bit data paths Supports industry standard cell and packet interfaces to media and fabric devices; simplifies design and interface to custom ASIC devices
Supports up to 127 ports using a 16-bit UTOPIA-2 MPHY mode
Two integrated Gigabit Ethernet MACs Lowers system cost, power and board real estate
Two integrated 10/100 Ethernet MACs Can be used as debugging ports or control signal ports. Lowers system cost, power and board real estate.
Integrated high speed serial controller:

256 HDLC channel controller
(64 channels when configured with dynamic timeslot remap)

ATM-TC

Up to 16xT1/E1/J1 TDM links
Performs inverse multiplexing over ATM (IMA), which provides lower system cost, power and board real estate
Integrated cryptography accelerator Provides up to 200 Mbps bulk encryption (DES/SHA-1) capability. Supports AES, DES and 3DES encryption algorithms as well as SHA-1 and MD5 hashing algorithms.
Two industry standard DDR DRAM interfaces:

One 64-bit + ECC DDR300 low latency channel (up to 2GB) optimized for microengine use

One 32-bit + ECC DDR300 low latency channel (up to 1GB) optimized for the Intel XScale core
Memory subsystem supports the network processor store-and-forward processing model. Separate memory channels for Intel XScale core and microengines improves data plane and control plane performance.
I/O coherency for Intel XScale core DRAM Improves performance through accelerated control plane/data plane communications
One industry standard QDR SRAM interface Provides industry standard interface for memory subsystem for look-up tables and access lists, or co-processors (such as CAM/TCAM)
Asynchronous control interface supports 8- or 16-bit slow port devices via 16-bit expansion bus Provides control interface for connecting to microprocessor port of PHY devices and flash memory. Provides a direct connection to DSP via HPI.
Hardware support for memory access queuing Simplifies application development and reduces system cost
JTAG support Improves hardware debug ability
Intel® IXA Software Development Kit (SDK)
Intel® Hardware Development Platform Industry standard AdvancedTCA* form factor hardware reference design and state of the art development tools improves time to market via robust hardware and software development tools
1752 ball FCBGA 42.5 mm x 42.5 mm package Minimizes board layers, providing easier board layer routing and lower cost

2.93GHz Mobile Core 2 Duo


2.93GHz Mobile Core 2 Duo
2.93GHz Mobile Core 2 Duo
Leading chip maker Intel is expected to release a new Core 2 Duo CPU for portable computer systems sometime in Q1 next year. According to details currently made available, the Santa Clara, California-based company is going to deliver a faster-running mobile CPU, raising the performance level of its current high-speed Core 2 Duo processor, the T9600, which was just released last month.

The upcoming Core 2 Duo mobile CPU is said to deliver a core speed of 2.93GHz, up from the 2.8GHz on the company's current Core 2 Duo T9600. According to Fudzilla, chip maker Intel will release the T9800 CPU at a yet unannounced date in Q1 2009, by which time some users should have already gotten a chance at Intel's next-generation desktop CPUs, the Core i7.As with any officially unreleased product, details on the upcoming Intel mobile processor are rather scarce, but we can tell you that, aside from the higher clock rate, the new T9800 CPU is rather similar to Intel's T9600, as it features the same 1066MHz FSB and 6MB of cache. This means that there's going to be just a slight difference in performance between the two processors. Even so, some users out there might go the extra mile and choose the upcoming T9800 over the current T9600, despite an expected price tag of $530 at launch.

Unfortunately, this sums up just about every detail that is currently available on Intel's upcoming Core 2 Duo mobile processor. Further info should most likely emerge as the official unveiling is drawing near. However, most users will probably be more interested in the company's next-generation Core i7 processors, built on the Nehalem architecture. These new CPUs are said to deliver a new level of performance for upcoming desktop computer systems, and thus further increase Intel's market advantage over competitor AMD.

Acer Aspire


Acer’s Timeline range of notebooks spans the gamut from 13.3-inch ULV ultraportable to 15.6-inch mainstream laptop, promising prolonged battery life with an affordable price tag. The company sent over their Aspire Timeline 3810T, a 13.3-inch 1.4GHz ULV machine with heady runtime estimates and an $899 sticker, for SlashGear to try out; check out the full review after the cut.
The display is an LED-backlit 13.3-inch panel, running at 1366 x 768. It’s a crisp, readable screen with less glare than you’d imagine from when the Timeline is switched off, but – like with other ultraportables we’ve used lately – we found ourselves wishing it offered a slightly higher resolution. When you can get the same number of pixels in an 11.6-inch netbook for a few hundred dollars less, you find yourself asking for more.
Still, what the Timeline 3810T did deliver on is runtime. Acer claim you can manage a full eight hours on the standard battery, and much to our surprise with moderate use and sensible backlight settings it lasted for roughly six hours. Shut off the WiFi, turn the brightness right down and limit yourself to the most basic of Office tasks and you’ll probably see that eight hours.
Performance won’t light any fires, with the 1.4GHz Intel Core 2 Duo SU9400 and 2GB of DDR3 memory primed for prolonging runtime rather than heavy crunching, but the Timeline is still capable of multitasking with a few browser windows and an Office document or two open. It scores fairly well on GeekBench 64-bit with total score of 2281, comparable to Lenovo T400s (2864).This isn’t the machine for graphically intensive tasks, however, as the integrated Intel GMA 4500MHD falls short of anything approaching reasonable gaming performance. Still, the 500GB hard-drive is impressively capacious, and goes some way to making up for the absence of any sort of optical drive.Build quality overall is reasonably high, with the aluminum lid and creak-free plastics impressing. It’s a demure machine stylistically, compared to rivals such as MSI’s X-Slim X340, but the Timeline delivers a sturdier typing experience with no flex from the flat, well-spaced chiclet keys. The trackpad supports basic multitouch gestures such as rotation and pinch-zooming, but we were disappointed by the single, centrally-hinged mouse button bar that proved unduly stiff.
Connectivity is for the most case good, with both VGA and HDMI outputs, three USB 2.0 ports, an SD card reader, audio in/out and gigabit ethernet, but there’s no standard Bluetooth to go along with the WiFi a/b/g/n. That’s an option, as is integrated WWAN or WiMAX connectivity.
The Acer Aspire Timeline 3810T is a decent, portable notebook, that offers business or home users a fair balance of size and capabilities. We liked the standard gigabit ethernet and the HDMI port – though we might be tempted to swap it for standard Bluetooth if we had the choice – and appreciated the battery life, even if you do have to dial down your expectations in order to achieve it.
As with all of these ULV ultraportables, the Timeline 3810T hovers in-between CULV netbooks and full-sized notebooks, and it’s arguable whether you’re getting significant functionality over the cheaper models. Still, for its highly usable keyboard and sturdy build, the Timeline 3810T does at least feel as though you’re getting something solid for your money

Saturday, February 20, 2010

Intel® Core™2 Extreme Processor


For extreme computing. Enjoy revolutionary levels of performance enabling vivid, high-definition experiences and multi-tasking responsiveness from state-of-the-art Intel dual-core and quad-core technologies.

Intel® Core™2 Extreme quad-core processor
with four processing cores the Intel Core 2 Extreme processor delivers unrivaled performance for the latest, greatest generation of multi-threaded games and multimedia apps.

Now with a new version based on Intel's cutting edge 45nm technology utilizing hafnium-infused circuitry to deliver even greater performance and power efficiency. The Intel® Core™2 Extreme processor QX9770 running at 3.2 GHz delivers the best possible experience for today's most demanding users.

* 12 MB of total L2 cache
* 1600 MHz front side bus

Features and benefits:

Intel® Wide Dynamic Execution, enabling delivery of more instructions per clock cycle to improve gaming execution time and energy efficiency

Intel® Deep Power Down Technology, designed to deliver extreme energy-efficient performance

Intel® Smart Memory Access, improving system performance by optimizing the use of all available data bandwidth

Intel® Advanced Smart Cache, providing a higher-performance, more efficient cache subsystem. Optimized for industry leading multi-threaded games

Intel® Advanced Digital Media Boost, accelerating a broad range of applications, including ultra-realistic game physics and human-like artificial intelligence for an intense gaming experience unlike any other. Now improved even further on 45nm versions with Intel® HD Boost utilizing new SSE4 instructions for even better multimedia performance

Intel® Core™2 Quad Processor


Multimedia enthusiasts, prepare to enthuse. Bring quad-core performance to your desktop with the Intel® Core™2 Quad processor. It's the ideal engine for highly threaded entertainment applications and highly productive multitasking.

Introducing the Intel® Core™2 Quad processor for desktop PCs, designed to handle massive compute and visualization workloads enabled by powerful multi-core technology. Providing all the bandwidth you need for next-generation highly-threaded applications, the latest four-core Intel Core 2 Quad processors are built on 45nm Intel® Core™ microarchitecture enabling faster, cooler, and quieter desktop PC and workstation experiences.

Plus, with optional Intel® vPro™ technology, you have the ability to remotely isolate, diagnose, and repair infected desktop and mobile workstations wirelessly and outside of the firewall, even if the PC is off, or the OS is unresponsive.

Features and benefits:

With four processing cores, up to 12MB of shared L2 cache and 1333 MHz Front Side Bus the Intel Core 2 Quad desktops processor delivers amazing performance and power efficiency enabled by the all new hafnium-based circuitry of 45nm Intel Core microarchitecture.

Whether you're encoding, rendering, editing, or streaming HD multimedia in the office or on the go, power your most demanding applications with notebooks and desktops based on the Intel Core 2 Quad processor.

Plus, with these processors you get great Intel® technologies built in:

Intel® Wide Dynamic Execution, enabling delivery of more instructions per clock cycle to improve execution time and energy efficiency

Intel® Intelligent Power Capability, designed to deliver more energy-efficient performance

Intel® Smart Memory Access, improving system performance by optimizing the use of the available data bandwidth

Larger Intel® Advanced Smart Cache, optimized for multi-core processors, providing a higher-performance, more efficient cache subsystem.

Intel® Advanced Digital Media Boost, accelerating a broad range of multimedia, encryption, scientific and financial applications by significantly improving performance when executing Intel® Streaming SIMD Extension (SSE/SSE2/SSE3) instructions.

Intel® HD Boost³, implementing new Intel® Streaming SIMD Extension 4 (Intel SSE4) instructions for even greater multimedia performance and faster high definition video editing and encoding.

Intel® Virtualization Technology (Intel® VT)², enabling greater security, manageability, and utilization.

Future ready, designed to perform in highly threaded programs with powerful Intel® multi-core technology.

Intel® Core™2 Duo Processor


The power to perform. With power-optimized enabled dual-core technology and exceptional energy efficiency, the Intel® Core™2 Duo processor excels running the most intense applications.

Investing in new PCs with Intel® Core™2 processor family can mean big savings for your business. Delivering faster performance, greater energy efficiency, and more responsive multitasking, desktop PCs with Intel® Core™2 processor family can help your whole company be more productive.

Features and benefits:

Get the best overall performance with Intel® Core™2 Duo processor you'll get an arsenal of performance-rich technologies, including up to 6MB of shared L2 cache and up to 1333 MHz Front Side Bus.

Enjoy 3X faster multitasking performance with multi-core processing combines two independent processor cores in one physical package. Processors run at the same frequency and share up to 6MB of L2 cache and up to 1333 MHZ Front Side Bus for truly parallel computing with over.

Improve execution time and energy efficiency with more instructions per clock cycle enabled by Intel® Wide Dynamic Execution.

Get smarter, more energy-efficient performance enabled by Intel® Intelligent Power Capability.

Improve system performance enabled by Intel® Smart Memory Access, optimizing the use of the available data bandwidth.

Get higher-performance, more efficient cache subsystem enabled by Intel® Advanced Smart Cache, optimized for multi-core and dual-core processors.

Accelerate a broad range of applications, including video, speech and image, photo processing, encryption, financial, engineering and scientific applications, enabled by Intel® Advanced Digital Media Boost.

Intel® Pentium® Processor E6500 (2M Cache, 2.93 GHz, 1066 FSB)

Essentials
StatusLaunched
Launch DateQ3'09
Processor NumberE6500
# of Cores2
Processor Base Frequency2.93 GHz
L2 Cache2 MB
Bus/Core Ratio11
FSB Speed1066 MHz
EmbeddedYes
Supplemental SKUNo
Lithography45 nm
Max TDP65 W
VID Voltage Range0.85V – 1.3625V
1ku Bulk Budgetary Price$84.00

Package Specifications
TCASE71.4°C
Die Size82 mm2
# of Transistors228 million
Sockets SupportedLGA775
Halogen Free Options AvailableYes

Intel® Celeron® Processor


The Intel® Celeron® processor-based desktop platforms offer a robust computing experience together with the outstanding quality and reliability you expect from Intel.

Systems based on the Intel® Celeron processor are ideal for day-to-day computing, whether in the home, classroom, or office.

Take basic computing to new levels with dual-core processing. The Intel® Celeron® processor, with 512 KB of shared L2 cache and 800 MHz Front Side Bus, has two independent processor cores in one physical package running at the same frequency, delivering superior energy efficient dual-core performance.

The Intel® Celeron® processor is also an exceptional value for single-core desktop computing delivering a balanced level of proven technology.

Intel® Pentium® Processor

The Intel® Pentium® processor delivers great desktop performance, low power enhancements, and multitasking for everyday computing.

The Intel® Pentium® processor with Intel® dual-core technology delivers great desktop and mobile performance, low power enhancements, and multitasking for everyday computing.

Features and benefits:

Go beyond everyday computing
The Intel Pentium processor delivers enhanced performance for everyday computing needs such as listening to digital music and editing digital photography and improved responsiveness with office applications.

Smarter, more efficient designs
Intel® Smart Cache enables smarter, more efficient cache and bus design for enhanced performance, responsiveness and power savings.

Intel® Pentium® Processor E6500 (2M Cache, 2.93 GHz, 1066 FSB)

Essentials
StatusLaunched
Launch DateQ3'09
Processor NumberE6500
# of Cores2
Processor Base Frequency2.93 GHz
L2 Cache2 MB
Bus/Core Ratio11
FSB Speed1066 MHz
EmbeddedYes
Supplemental SKUNo
Lithography45 nm
Max TDP65 W
VID Voltage Range0.85V – 1.3625V
1ku Bulk Budgetary Price$84.00

Package Specifications
TCASE71.4°C
Die Size82 mm2
# of Transistors228 million
Sockets SupportedLGA775
Halogen Free Options AvailableYes