Wednesday, June 27, 2012

Watch Samsung Galazy S III Features

Samsung Galaxy S3 features in TV Commercial




Samsung Galaxy S3 features
The Samsung Galaxy S3 features innovative new technology to see if you're looking at it and keep the screen on if you are.

Here's a brief look at the year's most hotly anticipated phone.


Galaxy S 3 available in two colors:


Marble White and Marble Blue














Tuesday, June 19, 2012

Types Computer According to Design


1. Supercomputer – computer which performs special functions, fast and powerful computer, outperforming most mainframes, and used for intensive calculation, scientific simulations, animated graphics and other work that requires sophisticated and high-powered computing.

2. Mainframe – large computer and expensive powerful computer that can handle thousands of connected users simultaneously and process up to millions of instructions per seconds.
3. Minicomputer – medium-sized computer usually used as a terminals
4. Microcomputer - personal or desktop computer is designed in such a way that the system unit, input devices, output devices and all other devices fit conveniently on or under a desk or table.
5. Laptop – handy computer; also known as computer notebook. It is small, lightweight computer that you can easily transport from one place to another.
6. Palmtop it can fit the size of a breast pocket, refers to a hand-held computer the popular type is a Personal Digital Assistant (PDA).



Monday, June 18, 2012

New Trends in Computer Technology


New Trends in Computer Technology

What is the RDIMM standard? Well, once upon a time, there was a memory standard that Intel was dying to promote as it was optimized for its own line of Pentium 4 processors. Unfortunately for Intel and most fortunate for the rest of us, the DDR memory standard made a much bigger splash and managed 
So the RDIMM memory standard died quietly, as even Intel realized that it was overpriced and with a very slight performance improvement. Now it seems that the RDIMM technology is trying for a second time to gain some market in the form of microbuffers, a concept that will be used by both AMD and Intel.


Until now, Intel said nothing about its plans concerning the microbuffer concept, while its rival, AMD was willing to share some general purpose information. The AMD approach seems to be quite a bright idea, one that could simplify the desktop or server memory make-up. One microbuffer discrete chip will be mounted between every two DIMM slots, practically driving them. This solution should allow each RAM channel to support twice the number of DIMMs in use now, allowing DDR3 to be a convenient server memory standard. This approach to use a single RDIMM chip for every two DIMM slots is sometimes called "Buffer on Board" or BoB for short.

According to most hardware gossipers around, Intel is working on a similar design too and it even showed a prototype about a year ago. Because of some differences between the designs employed by the two chip makers, it is possible to be talking about separate technologies using the same type of memory and having the same general goals. Just like always, when we are talking about Intel and AMD, AMD claims that Intel is copying them, while Intel is saying that they invented it first.

All things considered, there will probably be a small memory buffer integrated into the mainboard and not into the DIMM module itself. The advantage would be an increased maximum memory capacity for a given motherboard, with the only downside being the slightly more expensive motherboards because of the added circuitry.



Top 10 Computer Viruses


A round-up to the 10 worst computer viruses of all time.


Malicious software, worms, Trojans and computer viruses are on the increase, say security experts, as hackers, spammers and identity thieves seek new ways to steal information that can be used to empty bank accounts or spread electronic mayhem. Here, we present a look back at the 10 worst computer viruses of ever made:
1. The Morris worm
In 1998 Robert Morris, a university student, unleashed a worm which affected 10 per cent of all the computers connected to the internet (at the time the net was estimated to consist of 60,000 computers), slowing them down to a halt. Morris is now an associate professor at MIT.
2. The Concept virus
The Concept virus, accidentally shipped on a CD-ROM supplied by Microsoft in 1995, was the first virus to infect Microsoft Word documents. Within days it became the most widespread virus the world had ever seen, taking advantage of the fact that computer users shared documents via email.
3. CIH
The Chernobyl virus (also known as CIH) triggers on April 26 each year, the anniversary of the Chernobyl nuclear disaster. It overwrites a chip inside PCs effectively paralysing the entire computer. Its author, Chen Ing Hau, was caught by the authorities in Taiwan.
4. The Anna Kournikova worm
The Anna Kournikova worm posed as a picture of the tennis player, but was in fact a virus written by Jan de Wit, an obsessed admirer from the Netherlands. He ended up receiving a community service sentence.
5. ILOVEYOU
The Love Bug flooded internet users with ILOVEYOU messages in May 2000, forwarding itself to everybody in the user's address book. It was designed to steal internet access passwords for its Filipino creator.
6. The Melissa virus
The Melissa virus, written by David L Smith in homage to a Florida stripper, was the first successful email-aware virus and inserted a quote from The Simpsons in to Word documents. Smith was later sentenced to jail for causing over $80 million worth of damage.
7. The Blaster Worm
The Blaster worm launched a denial of service attack against Microsoft's website in 2003, and infected millions of computers around the world by exploiting a security hole in Microsoft's software. Its author has never been found.
8. Netsky and Sasser
Sven Jaschan, a German teenager, was found guilty of writing the Netsky and Sasser worms. Jaschan was found to be responsible for 70 per cent of all the malware seen spreading over the internet at the time, but escaped prison and was eventually hired by a security company as an "ethical hacker".
9. OSX/RSPlug Trojan
In November 2007, the first example of financially-motivated malware for Apple Macs was discovered in the wild. The launch of the OSX/RSPlug Trojan increased fears that Apple's platform may be targeted more by hackers in the future.
10. Storm worm
The Storm worm, originally posing as breaking news of bad weather hitting Europe, infected computers around the world in 2007. Millions of infected PCs were taken over by hackers and used to spread spam and steal identities.
Information courtesy of Sophos