Thursday, 5 December 2013
Monday, 2 December 2013
How to Use Your Android phone's Camera As A Webcam
00:50
No comments
How to Use Your Android phone's Camera As A Webcam -: there two important application that helps to use a android phone's camera as a webcam. Application are -: DroidCam and computer client . DroidCam application install on your android phones . these application can be work only android compatible phones and computer client is windows application ,to be install on your system . If you want procedures ..... comment here I will give you complete procedure " how to use Android phones as a webcam...
Thursday, 28 November 2013
Presentation on a cloud computing
09:20
No comments
Presentation on a cloud computing-:There are some important ppt files are here.. that helps to create a presentation on a cloud computing ..... Download the files
Download file1
Download file2
Download file1
Download file2
Wednesday, 27 November 2013
Upcoming Iphone 6 in 2014.........
Iphone 6-: there are various features in this phone .The features are -:
Apple A7X processor, 2 times faster GPU, upgraded speakers and A battery that’s presupposed to last 20 hours even once victimization LTE. Whereas it’s too early to begin talking concerning the iPhone 6, concerning 80th of those options may very well come true in 2014. The features of Iphone 5s is upgradable in Iphone 6
Apple A7X processor, 2 times faster GPU, upgraded speakers and A battery that’s presupposed to last 20 hours even once victimization LTE. Whereas it’s too early to begin talking concerning the iPhone 6, concerning 80th of those options may very well come true in 2014. The features of Iphone 5s is upgradable in Iphone 6
Monday, 25 November 2013
Saturday, 23 November 2013
Tuesday, 19 November 2013
Moving circle Program in c++ language
#include<stdio.h>
#include<conio.h>#include<math.h>#include<stdio.h>#include<stdlib.h>#include<iostream>#include<graphics.h>#include<conio.h>#include<malloc.h>#define timedelay 20using namespace std;int xy[800][2];
void getpoints(int ,int ,int ,int );int main(){initwindow(800,600,"Vishal Grade");label1:for(;;){static int a=abs((rand()%(700)+500));static int b= abs((rand()%(500)+500));int c= abs((rand()%(700)+50));int d= abs((rand()%(500)+50));xy[0][0]=a;xy[0][1]=b;getpoints(a,b,c,d);int s=rand()%15;for(int i=0;i<c-a;i++){cout<<xy[i][0]<<"\t"<<xy[i][1]<<endl;if(50<=xy[i][0] &&xy[i][0]<=750 && 50<=xy[i][1] && xy[i][1]<=550){for(int j=0;j<50;j++){circle(xy[i][0],xy[i][1],j);circle(xy[i][0],xy[i][1],50-j);setcolor(rand()%10+5);}setcolor(rand()%10+5);setbkcolor(s); //background colordelay(timedelay);}else {delay(timedelay*3);goto label1;}putpixel(xy[i][0],xy[i][1],3);cleardevice();}a=c;b=d;}getch();}void getpoints(int x1,int y1,int x2,int y2){float m=float(y2-y1)/(x2-x1);if(x1<=x2){{float y0;int x0=1;int step=x2-x1;y0=m;int i=1;static float t=xy[0][1];while(i<=step){xy[i][0]=xy[i-1][0]+x0;t=t+y0;xy[i][1]=int(round(t));i++;
}}}else{int y0;float x0;if(m<=0){x0=1/m;y0=1;}else{x0=-1/m;y0=-1;}int step=y2-y1;int i=1;static float t=xy[0][0];while(i<=step){t=t+x0;xy[i][0]=int(round(t));xy[i][1]=xy[i-1][1]+y0;i++;}}}
Monday, 18 November 2013
Sunday, 17 November 2013
Java program to print a numeric pattern.
class pattern
{
public static void main(String args[])
{
int n=1,a;
for(int i=1;i<=10;i++)
{
for(int j=1;j<=n;j++)
{
a=i*j;
System.out.print(" "+a);
}
n=n+1;
System.out.println();
}
}
}
............................................................................
output-
1
2 4
3 6 9
4 8 12 16
5 10 15 20 25
6 12 18 24 30 36
7 14 21 28 35 42 49
8 16 24 32 40 48 56 64
9 18 27 36 45 54 63 72 81
10 20 30 40 50 60 70 80 90 100
{
public static void main(String args[])
{
int n=1,a;
for(int i=1;i<=10;i++)
{
for(int j=1;j<=n;j++)
{
a=i*j;
System.out.print(" "+a);
}
n=n+1;
System.out.println();
}
}
}
............................................................................
output-
1
2 4
3 6 9
4 8 12 16
5 10 15 20 25
6 12 18 24 30 36
7 14 21 28 35 42 49
8 16 24 32 40 48 56 64
9 18 27 36 45 54 63 72 81
10 20 30 40 50 60 70 80 90 100
Saturday, 16 November 2013
HOW TO PROTECT THE FACEBOOK ACCOUNT FROM THE HACKERS
HOW TO PROTECT THE FACEBOOK ACCOUNT FROM THE HACKERS
there are some important option .
1 OPTION IS MOST IMPORTANT
1- All users must be have their strong password [maximum 12 words & 5 numbers .password can be mixed that means alphanumeric, special character and number]
2- Go to setting option click 'security' click on secure browsing you must be 'enable browsing'.
3- Click on login notification you see two option 'text' 'email or push notification' & click on both option.
4- You must be enable 'code generator' in security option.
5- If you use 'trusted contacts' don't add online people to trusted contacts if you use so please please add those online people who have very close you, you meet with them, you everything know about him/her.
6- Go to 'privacy' setting you see 'Who can see my stuff?' set the 'friends'.
7- Next you see Who can contact me? Who can send you friend requests? set the everyone or friends of friends your choice. Whose messages do I want filtered into my Inbox? Filter your Inbox using: Set your own choice>>>
Basic Filtering Recommended Mostly friends and people you may know
Strict Filtering Mostly see messages from friends. Messages from people you want to hear from may go to your Other folder.
8- Who can look me up? Who can look you up using the email address or phone number you provided? Set the 'friends' if you wanna more secure set the 'only me'.
9- Go to Timeline & tagging setting Who can add things to my timeline? Set the 'only me' Review posts friends tag you in before they appear on your timeline?
Set the 'off'.
Who can see things on my timeline? Who can see things on my timeline Set the 'friend' Who can see what others post on your timeline? Set the 'only me'.
How can I manage tags people add and tagging suggestions? Set the 'on'/'friends'/'friends'. they are 3 option in How can I manage tags people add and tagging suggestions?.
10- Notification setting 'How You Get Notifications' On facebook set the 'all notification&sound' Email notification set the 'all notification'
11- What You Get Notified About Activity that involves youView set the 'On'
Close Friends activity set the 'Facebook & email'
Tags set the 'Friends'
Followers On for Friends of Friends
12- Next the mobile option you must be register mobile number for recover or reset password.
13- Add alternative id to reset password [12 & 13 option are required]
14- If you add personal detail in timeline setting go to timeline click about & set the all setting to friends or only me. About You, Work and Education, Relationships and Family, living, basic information set the 'friends'. Mobile Phones
Address, Screen, Email. Facebook they are contact info set the all 'only me'.
15- Others info you see in about (in timeline) set all privacy to 'friends'
16- You must be add twitter id to fb account which your tweets or which you following the people tweets to your news feeds.
17- If you add anu like as youtube se the privacy all app to friends only friends see your app then when you add video to your playlists, like video, favorites video in youtube they also update post in your newsfeed.
18- Do not accept friend request for those people who have not upload real profile photo, their lived in option are not see, in their timeline, do not accept friend request quickly i suggest you accept request after 2 days. When you will send friend request or accept request you must see their timeline their latest update if not do not accept & send friend request
19- Do not upload any files like as software from your pc only upload photos&videos from pc fb don't upload the program file and do not post anonymous link in your fb if you, please scan the URL link
go to WWW.VIRUSTOTAL.COM & scan url if show virus do not post link.
NOTIFICATION & CODE GENERATOR MEANS THAT IF SOMEONE HACK OR ATTACK PHISHING ON YOUR FB, FACEBOOK NOTIFY IN YOUR EMAIL & ON FACEBOOK THEY WILL AUTOMATIC LOGOUT OR REDIRECT TO RESET PASSWORD PAGE.
there are some important option .
1 OPTION IS MOST IMPORTANT
1- All users must be have their strong password [maximum 12 words & 5 numbers .password can be mixed that means alphanumeric, special character and number]
2- Go to setting option click 'security' click on secure browsing you must be 'enable browsing'.
3- Click on login notification you see two option 'text' 'email or push notification' & click on both option.
4- You must be enable 'code generator' in security option.
5- If you use 'trusted contacts' don't add online people to trusted contacts if you use so please please add those online people who have very close you, you meet with them, you everything know about him/her.
6- Go to 'privacy' setting you see 'Who can see my stuff?' set the 'friends'.
7- Next you see Who can contact me? Who can send you friend requests? set the everyone or friends of friends your choice. Whose messages do I want filtered into my Inbox? Filter your Inbox using: Set your own choice>>>
Basic Filtering Recommended Mostly friends and people you may know
Strict Filtering Mostly see messages from friends. Messages from people you want to hear from may go to your Other folder.
8- Who can look me up? Who can look you up using the email address or phone number you provided? Set the 'friends' if you wanna more secure set the 'only me'.
9- Go to Timeline & tagging setting Who can add things to my timeline? Set the 'only me' Review posts friends tag you in before they appear on your timeline?
Set the 'off'.
Who can see things on my timeline? Who can see things on my timeline Set the 'friend' Who can see what others post on your timeline? Set the 'only me'.
How can I manage tags people add and tagging suggestions? Set the 'on'/'friends'/'friends'. they are 3 option in How can I manage tags people add and tagging suggestions?.
10- Notification setting 'How You Get Notifications' On facebook set the 'all notification&sound' Email notification set the 'all notification'
11- What You Get Notified About Activity that involves youView set the 'On'
Close Friends activity set the 'Facebook & email'
Tags set the 'Friends'
Followers On for Friends of Friends
12- Next the mobile option you must be register mobile number for recover or reset password.
13- Add alternative id to reset password [12 & 13 option are required]
14- If you add personal detail in timeline setting go to timeline click about & set the all setting to friends or only me. About You, Work and Education, Relationships and Family, living, basic information set the 'friends'. Mobile Phones
Address, Screen, Email. Facebook they are contact info set the all 'only me'.
15- Others info you see in about (in timeline) set all privacy to 'friends'
16- You must be add twitter id to fb account which your tweets or which you following the people tweets to your news feeds.
17- If you add anu like as youtube se the privacy all app to friends only friends see your app then when you add video to your playlists, like video, favorites video in youtube they also update post in your newsfeed.
18- Do not accept friend request for those people who have not upload real profile photo, their lived in option are not see, in their timeline, do not accept friend request quickly i suggest you accept request after 2 days. When you will send friend request or accept request you must see their timeline their latest update if not do not accept & send friend request
19- Do not upload any files like as software from your pc only upload photos&videos from pc fb don't upload the program file and do not post anonymous link in your fb if you, please scan the URL link
go to WWW.VIRUSTOTAL.COM & scan url if show virus do not post link.
NOTIFICATION & CODE GENERATOR MEANS THAT IF SOMEONE HACK OR ATTACK PHISHING ON YOUR FB, FACEBOOK NOTIFY IN YOUR EMAIL & ON FACEBOOK THEY WILL AUTOMATIC LOGOUT OR REDIRECT TO RESET PASSWORD PAGE.
How to download torrents using Internet Download Manager (IDM)
first of all you need torrent file and the name of a website that helps you to download the torrent file .the website name is Zbigz.com ( .www.zbigz.com) ......how to download the torrent file by the idm downloader manager ..
there are some procedure for downloading the file of a torrent .
1.Find a torrent site (example: thepiratebay.sx) and select the torrent you want to download
2.Right Clik -> View Source
3.Press Ctrl + F and then in the search box type magnet
4.Copy the magnet link and go to {zbigz.com}
5.Paste the url there , click on go, select free
6.download the zip
there are some procedure for downloading the file of a torrent .
1.Find a torrent site (example: thepiratebay.sx) and select the torrent you want to download
2.Right Clik -> View Source
3.Press Ctrl + F and then in the search box type magnet
4.Copy the magnet link and go to {zbigz.com}
5.Paste the url there , click on go, select free
6.download the zip
windows 8 keys available
windows 8 professional keys-;;;;;;
MMRNH-BMB4F-87JR9-D72RY-MY2KV
76NDP-PD4JT-6Q4JV-HCDKT-P7F9V
YY8FN-22WHK-MVQKP-PDX29-P34DH
X7B3J-GNVTB-QB8D2-JKC48-BWMQH
FNV82-RR446-JC3R9-6C4WC-D6667
VY9Q4-6HN66-2XKKK-JP72K-MG667
J2HNC-BGC8H-4CY69-K3784-84YQH
RB29C-D6NRY-BYVG3-HQ6TP-7CBQH
W6V3Y-NCMH2-4X3Y8-2DTBB-X4PKV
WHK3K-N482H-BTY8Q-MKFJ9-3RPKV
N9DCG-TBM98-R2GGF-6B6GF-QGJXV
DX6QP-7N6J4-7T247-TYCW6-RRDG7
T2NRP-MWCYQ-TJHD6-KF69K-T8XT7
J6FW2-HQNPJ-HBB6H-K9VTY-2PKT7
N4WY8-DVW92-GM8WF-CG872-HH3G7
DWV49-3GN3Q-4XMT7-QR9FQ-KKT67
FB4WR-32NVD-4RW79-XQFWH-CYQG3
BN3D2-R7TKB-3YPBD-8DRP2-27GG4
XCVCF-2NXM9-723PB-MHCB7-2RYQQ
3NHJ7-3WWQK-4RFTH-8FHJY-PRYQH
XR2XH-NMBQJ-T79Q6-83T78-MR9VC
J87JG-PXNR9-68BRP-DGJ9P-TMQHC
NG4HW-VH26C-733KW-K6F98-J8CK4
XKY4K-2NRWR-8F6P2-448RF-CRYQH
NK9CK-978CT-FQ7F7-RC8FQ-488X2
MPHYQ-6NDGH-KY23Q-J2TJF-HQR9Q
N3DBK-TT4QR-C3TWM-W6CGT-H8MQD
NW388-MFMCX-DRF3V-QXG72-DC73D
NY87D-VCK7D-WM77C-K77V8-RX49Q
PCMTP-7PNHM-JCBQF-DTYH6-TJCKQ
R9MY9-FN737-H327P-D7QTC-CJ8XQ
TP2X7-NQ2MR-WGJMG-XWB7K-WTV3D
YGB8N-6RFBV-6X3MG-J27FX-V2WXQ
VMVNQ-VH6XM-GCYW7-4X8VM-8FDG3
C7MCR-3R9N7-KX8YH-2X4QC-D668D
Windows 8 Professional
NG4HW-VH26C-733KW-K6F98-J8CK4
Windows 8 Professional N
XCVCF-2NXM9-723PB-MHCB7-2RYQQ
Windows 8 Enterprise
32JNW-9KQ84-P47T8-D8GGY-CWCK7
Windows 8 Enterprise N
JMNMF-RHW7P-DMY6X-RF3DR-X2BQT
XKY4K-2NRWR-8F6P2-448RF-CRYQH
DNJXJ-7XBW8-2378T-X22TX-BKG7J
NG4HW-VH26C-733KW-K6F98-J8CK4
Wednesday, 13 November 2013
Apple used new techniques
Apple has always been known for the quality of the Assembly and the reliability of the hardware used, however the new devices are highlighting serious problems for youth, particularly with regard to the reliability of the iPhone's motion sensors, adopting for the first time the M7 co-processor dedicated to managing those sensors.
Motorola Announces Moto G
Motorola announces moto g mobile .moto g launch on January. it is a smart phone...
there are some important specification of moto g-:
display - 4.3inch
density -:329 ppi
processor -:1.2ghz
internal memory - 8gb/16gb
rear camera-: 5mp
front camera-:1.3mp
there are some important specification of moto g-:
display - 4.3inch
density -:329 ppi
processor -:1.2ghz
internal memory - 8gb/16gb
rear camera-: 5mp
front camera-:1.3mp
Motorola Moto G
specifications
4.5-inch (1280 x 720 pixels) edge-to-edge display at 329 ppi with
Corning Gorilla Glass protection
1.2 GHz quad-core Qualcomm Snapdragon 400 processor
Adreno 305 GPU
Dual SIM
1GB RAM
Android 4.3 (Jelly Bean) upgradable to Android 4.4 (KitKat)
5MP rear camera with LED flash, 720p HD video recording at 30fps
1.3MP front-facing camera
3.5mm audio jack, FM Radio
720p HD video playback
8GB/16GB internal memory
3G, WiFi 802.11 b/g/n, Bluetooth 4.0, GPS, GLONASS
2070 mAh battery
6.0-11.6 mm thick (curve) and weighs 143 grams
Moto G customers will also get 50 GB Google Drive storage for free. It
is water resistant coating both inside and outside for complete
protection. It also comes with removable back covers in and Flip covers
in seven colors.
Moto G is priced at $179 for 8 GB version and $199 for 16 GB version. It
will be sold without contract and unlocked. It will be available in
Europe, Latin America, Europe, Canada and parts of Asia in next few
weeks. It will be available in US, India and more countries of Asia in
early January 2014.
Read more at: http://techlomedia.in/2013/11/motorola-announces-moto-g-coming-india-january-20409/
Copyright © Techlomedia
Read more at: http://techlomedia.in/2013/11/motorola-announces-moto-g-coming-india-january-20409/
Copyright © Techlomedia
Motorola Moto G specifications
4.5-inch (1280 x 720 pixels) edge-to-edge display at 329 ppi with Corning Gorilla Glass protection
1.2 GHz quad-core Qualcomm Snapdragon 400 processor
Adreno 305 GPU
Dual SIM
1GB RAM
Android 4.3 (Jelly Bean) upgradable to Android 4.4 (KitKat)
5MP rear camera with LED flash, 720p HD video recording at 30fps
1.3MP front-facing camera
3.5mm audio jack, FM Radio
720p HD video playback
8GB/16GB internal memory
3G, WiFi 802.11 b/g/n, Bluetooth 4.0, GPS, GLONASS
2070 mAh battery
6.0-11.6 mm thick (curve) and weighs 143 grams
Read more at: http://techlomedia.in/2013/11/motorola-announces-moto-g-coming-india-january-20409/
Copyright © Techlomedia
Read more at: http://techlomedia.in/2013/11/motorola-announces-moto-g-coming-india-january-20409/
Copyright © Techlomedia
Motorola Moto G specifications
4.5-inch (1280 x 720 pixels) edge-to-edge display at 329 ppi with Corning Gorilla Glass protection
1.2 GHz quad-core Qualcomm Snapdragon 400 processor
Adreno 305 GPU
Dual SIM
1GB RAM
Android 4.3 (Jelly Bean) upgradable to Android 4.4 (KitKat)
5MP rear camera with LED flash, 720p HD video recording at 30fps
1.3MP front-facing camera
3.5mm audio jack, FM Radio
720p HD video playback
8GB/16GB internal memory
3G, WiFi 802.11 b/g/n, Bluetooth 4.0, GPS, GLONASS
2070 mAh battery
6.0-11.6 mm thick (curve) and weighs 143 grams
Read more at: http://techlomedia.in/2013/11/motorola-announces-moto-g-coming-india-january-20409/
Copyright © Techlomedia
Read more at: http://techlomedia.in/2013/11/motorola-announces-moto-g-coming-india-january-20409/
Copyright © Techlomedia
Sunday, 10 November 2013
Drow Right Triangle using a C programming
#include<stdio.h>
#include<conio.h>
#include<conio.h>
void main() /* we can use "int main" in this place */{int i,j,k,n; /*intializing the variables and data type*/printf("Please enter the rows for the right andled triangle \n");scanf("%d",&n);/*Loop for the uppart part of the pattern*/for(i=n;i>=1;i--){for(j=1;j<=i;j++){printf("*");}for(k=n;k>i;k--){printf(" ");}for(j=1;j<=i;j++){printf("*");}printf("\n");}/*loop for lower part */for(i=2;i<=n;i++){for(j=1;j<=i;j++){printf("*");}for(k=i;k<n;k++){printf(" ");}for(j=1;j<=i;j++){printf("*");}printf("\n");}return 0;}/* Run tis program on your pc .. ........ then comment here what happend */the output of this program is look like this below......
Different - Different Technologies & Their Founders
1. Google: Larry Page & Sergey Brin
2. Facebook: Mark Zuckerberg
3. Yahoo: David Filo & Jerry Yang
4. Twitter: Jack Dorsey & Dick Costolo
5. Internet: Tim Berners Lee
6. Linkdin: Reid Hoffman, Allen Blue & Koonstantin
Guericke
7. Email: Shiva Ayyadurai
8. Gtalk: Richard Wah kan
9. Whats up: Laurel Kirtz
10. Hotmail: Sabeer Bhatia
11. Orkut: Buyukkokten
12. Wikipedia: Jimmy Wales
13. You tube: Steve Chen, Chad Hurley & Jawed Karim
14. Rediffmail: Ajit Balakrishnan
15. Nimbuzz: Martin Smink & EvertJaap Lugt
16. Myspace: Chris Dewolfe & TomAnderson
17. Ibibo: Ashish Kashyap
18. OLX: Alec Oxenford & Fabrice Grinda
19. Skype: Niklas Zennstrom,JanusFriis & Reid Hoffman
20. Opera: Jon Stephenson von Tetzchner & Geir lvarsoy
21. Mozilla Firefox: Dave Hyatt & Blake Ross
22. Blogger: Evan Willams
Wednesday, 25 September 2013
How to shutdown your system by the shortcut
first of all open the notepad then type shutdown -r -t 01 -c and save in a .bat file
Switch
-s
Shuts down the PC.
-l
Logs off the current user.
-t nn
Indicates the duration of delay, in seconds, before performing the action.
-c "messagetext"
Displays a message in the System Shutdown window. A maximum of 127 characters can be used. The message must be enclosed in quotation marks.
-f
Forces any running applications to shut down.
-r
Reboots the PC.
Switch
-s
Shuts down the PC.
-l
Logs off the current user.
-t nn
Indicates the duration of delay, in seconds, before performing the action.
-c "messagetext"
Displays a message in the System Shutdown window. A maximum of 127 characters can be used. The message must be enclosed in quotation marks.
-f
Forces any running applications to shut down.
-r
Reboots the PC.
helooo guys i will give you special trickzzzzz....
1. Open notepad then type "del c:\windows\prefetch\ntosboot-*.* /q" ( only blues ) & save as "ntosboot.bat"
2. after the saving the .bat file then goto Start menu, select "Run..." & then type "gpedit.msc".
3. Double click "Windows Settings" under "Computer Configuration" and double click again on "Shutdown" in the right window.
4. In the new window, click "add", "Browse", locate your "ntosboot.bat" file & click "Open".
5. Click "OK", "Apply" & "OK" once again to exit.
6. From the Start menu, select "Run..." & type "devmgmt.msc".
7. Double click on "IDE ATA/ATAPI controllers"
8. Right click on "Primary IDE Channel" and select "Properties".
9. Select the "Advanced Settings" tab then on the device or 1 that doesn't have 'device type' greyed out select 'none' instead of 'autodetect' & click "OK".
10. Right click on "Secondary IDE channel", select "Properties" and repeat step 9.
11. Reboot your computer.
2. after the saving the .bat file then goto Start menu, select "Run..." & then type "gpedit.msc".
3. Double click "Windows Settings" under "Computer Configuration" and double click again on "Shutdown" in the right window.
4. In the new window, click "add", "Browse", locate your "ntosboot.bat" file & click "Open".
5. Click "OK", "Apply" & "OK" once again to exit.
6. From the Start menu, select "Run..." & type "devmgmt.msc".
7. Double click on "IDE ATA/ATAPI controllers"
8. Right click on "Primary IDE Channel" and select "Properties".
9. Select the "Advanced Settings" tab then on the device or 1 that doesn't have 'device type' greyed out select 'none' instead of 'autodetect' & click "OK".
10. Right click on "Secondary IDE channel", select "Properties" and repeat step 9.
11. Reboot your computer.
written by jitendra singh
Tuesday, 24 September 2013
FIRST 1O PEOPLE WHO SIGN UP FOR FACEBOOK
FIRST 1O PEOPLE WHO SIGN UP FOR FACEBOOK
1. Mark Zuckerberg - CEO of Facebook.
2. Chris Hughes - Hughes cofounded Facebook and
was college roommates with Zuckerberg.
3. Dustin Moskovitz - Moskovitz cofounded
Facebook and was college roommates with
Zuckerberg.
4. Arie Hasit - Hasit was the first non-founder to
sign up for Facebook. He was friends with early
members David Hammer and Colin Jackson.
Hammer knew Facebook cofounder Chris Hughes
directly so its likely all three were friends.
5. Marcel Georgés Laverdet II* -
While Laverdet has one of the earliest IDs, it's not
certain that he was one of the first 20 to sign up
for the site. Some engineers who worked at
Facebook saw some early IDs were open and
snagged them for themselves.
6. Soleio Cuervo - Cuervo was friends with early
Facebook member Marcel George Laverdet.
7. Chris Putnam - Putnam was, however, friends
with early Facebooker Marcel George Laverdet.
Putnam and Marcel both got jobs at Facebook by
creating hacks and pranks on the social site. These
hacks caught the attention of cofounder Dustin
Moskovitz, who contacted Putnam. The two kept in
touch and when Putnam moved to Silicon Valley,
Moskovitz offered him an interview at Facebook.
8. Andrew McCollum - McCollum was a Harvard
student who was in Mark Zuckerberg's CS161:
Operating Systems class.
9. Colin Kelly - Kelly was a Harvard student who
was friends with David Hammer and Colin Jackson.
Both knew many early Facebookers and it's likely
all of them were acquaintances.
10. Mark Kaganovich - Kaganovich was a Harvard
student who was also friends with early Facebooker
David Hammer(20 earliest member) Although
Hammer joined Facebook after Kaganovich,
Hammer knew at least 7 of the earliest
Sunday, 22 September 2013
Vodafone 2g trick ...................
Vodafone 2g trick is available.if you want of this trick post here .i will definitely give you without any charges .this trick free of cost .not survey require for this trick
Saturday, 21 September 2013
Docomo tricks
Docomo tricks ...... How to reduce the surfing rate of a internet 20paisa /1mb through of this code ...
*141*4*2*1*1# use this code .... To Surf Internet At Very Very Cheap Rate
*141*4*2*1*1# use this code .... To Surf Internet At Very Very Cheap Rate
How to block and replace a website on a PC.
How to block and replace a website on a PC.
Now open CMD and type in CMD ping google.com then copy the IP Address of Google website
In host file just write the IPaddress of Google website that you copy and name of the website which one you want to block.
Like:
87.248.112.181 facebook.com
in this case you will type in URL www.facebook.com but Google website will open.
Friday, 20 September 2013
Nasha website hacked
Nasha website hacked by brazilian group. On Sept. 10 2013, a Brazilian hacker group posted a political message
on a number of NASA websites.” a NASA spokesman told FoxNews.com.
“Within hours of the initial posting, information technology staff at
the Ames Research Center discovered the message and immediately started
an investigation, which is ongoing.
Wednesday, 18 September 2013
Saturday, 31 August 2013
List Of Google Dorks For SQL Injection
List Of Google Dorks For SQL Injection-:
I am providing some of google dorks for a SQL injection .this google dorks help to "how hack a website " and other things.....
inurl:index.php?id=
inurl:trainers.php?id=
inurl:buy.php?category=
inurl:article.php?ID=
inurllay_old.php?id=
inurl:declaration_more.php?decl_id=
inurlageid=
inurl:games.php?id=
inurlage.php?file=
inurl:newsDetail.php?id=
inurl:gallery.php?id=d=
I am providing some of google dorks for a SQL injection .this google dorks help to "how hack a website " and other things.....
inurl:index.php?id=
inurl:trainers.php?id=
inurl:buy.php?category=
inurl:article.php?ID=
inurllay_old.php?id=
inurl:declaration_more.php?decl_id=
inurlageid=
inurl:games.php?id=
inurlage.php?file=
inurl:newsDetail.php?id=
inurl:gallery.php?id=d=
Fullform of computer related terms
Here are some interesting terms you may already know and a few you may not
Full form of computer related terms:
* HTTP - Hyper Text Transfer Protocol.
* HTTPS - Hyper Text Transfer Protocol
Secure.
* IP - Internet Protocol.
* URL - Uniform Resource Locator.
* USB - Universal Serial Bus.
* VIRUS - Vital Information Resource
Under Seized.
* 3G - 3rd Generation.
* GSM - Global System for Mobile
Communication.
* CDMA - Code Divison Multiple Access.
* UMTS - Universal Mobile
Telecommunication
System.
* SIM - Subscriber Identity Module.
* AVI = Audio Video Interleave
* RTS = Real Time Streaming
* SIS = Symbian OS Installer File
* AMR = Adaptive Multi-Rate Codec
* JAD = Java Application Descriptor
* JAR = Java Archive
* JAD = Java Application Descriptor
* 3GPP = 3rd Generation Partnership
Project
* 3GP = 3rd Generation Project
* MP3 = MPEG player lll
* MP4 = MPEG-4 video file
* AAC = Advanced Audio Coding
* GIF = Graphic Interchangeable
Format
* JPEG = Joint Photographic
ExpertGroup
* BMP = Bitmap
* SWF = Shock Wave Flash
* WMV = Windows Media Video
* WMA = Windows Media Audio
* WAV = Waveform Audio
* PNG = Portable Network Graphics
* DOC = Document (Microsoft
Corporation)
* PDF = Portable Document Format
* M3G = Mobile 3D Graphics
* M4A = MPEG-4 Audio File
* NTH = Nokia Theme (series 40)
* THM = Themes (Sony Ericsson)
* MMF = Synthetic Music Mobile
Application File
* NRT = Nokia Ringtone
* XMF = Extensible Music File
* WBMP = Wireless Bitmap Image
* DVX = DivX Video
* HTML = Hyper Text Markup Language
* WML = Wireless Markup Language
* CD - Compact Disk.
* DVD - Digital Versatile Disk.
* CRT - Cathode Ray Tube.
* DAT - Digital Audio Tape.
* DOS - Disk Operating System.
* GUI - Graphical User Interface.
* HTTP - Hyper Text Transfer Protocol.
* IP - Internet Protocol.
* ISP - Internet Service Provider.
* TCP - Transmission Control Protocol.
* UPS - UninterruptiblePower Supply.
* HSDPA - High Speed Downlink
Packet Access.
* EDGE - Enhanced Data Rate for GSM
[Global
System for Mobile
Communication] Evolution.
* VHF - Very High Frequency.
* UHF - Ultra High Frequency.
* GPRS - General Packet Radio Service.
* WAP - Wireless Application Protocol.
* TCP - Transmission Control Protocol .
* ARPANET - Advanced Research
Project Agency
Network.
* IBM - International Business
Machines.
* HP - Hewlett Packard.
* AM/FM - Amplitude/ Frequency
Modulation.
* WLAN - Wireless Local Area Network
Full form of computer related terms:
* HTTP - Hyper Text Transfer Protocol.
* HTTPS - Hyper Text Transfer Protocol
Secure.
* IP - Internet Protocol.
* URL - Uniform Resource Locator.
* USB - Universal Serial Bus.
* VIRUS - Vital Information Resource
Under Seized.
* 3G - 3rd Generation.
* GSM - Global System for Mobile
Communication.
* CDMA - Code Divison Multiple Access.
* UMTS - Universal Mobile
Telecommunication
System.
* SIM - Subscriber Identity Module.
* AVI = Audio Video Interleave
* RTS = Real Time Streaming
* SIS = Symbian OS Installer File
* AMR = Adaptive Multi-Rate Codec
* JAD = Java Application Descriptor
* JAR = Java Archive
* JAD = Java Application Descriptor
* 3GPP = 3rd Generation Partnership
Project
* 3GP = 3rd Generation Project
* MP3 = MPEG player lll
* MP4 = MPEG-4 video file
* AAC = Advanced Audio Coding
* GIF = Graphic Interchangeable
Format
* JPEG = Joint Photographic
ExpertGroup
* BMP = Bitmap
* SWF = Shock Wave Flash
* WMV = Windows Media Video
* WMA = Windows Media Audio
* WAV = Waveform Audio
* PNG = Portable Network Graphics
* DOC = Document (Microsoft
Corporation)
* PDF = Portable Document Format
* M3G = Mobile 3D Graphics
* M4A = MPEG-4 Audio File
* NTH = Nokia Theme (series 40)
* THM = Themes (Sony Ericsson)
* MMF = Synthetic Music Mobile
Application File
* NRT = Nokia Ringtone
* XMF = Extensible Music File
* WBMP = Wireless Bitmap Image
* DVX = DivX Video
* HTML = Hyper Text Markup Language
* WML = Wireless Markup Language
* CD - Compact Disk.
* DVD - Digital Versatile Disk.
* CRT - Cathode Ray Tube.
* DAT - Digital Audio Tape.
* DOS - Disk Operating System.
* GUI - Graphical User Interface.
* HTTP - Hyper Text Transfer Protocol.
* IP - Internet Protocol.
* ISP - Internet Service Provider.
* TCP - Transmission Control Protocol.
* UPS - UninterruptiblePower Supply.
* HSDPA - High Speed Downlink
Packet Access.
* EDGE - Enhanced Data Rate for GSM
[Global
System for Mobile
Communication] Evolution.
* VHF - Very High Frequency.
* UHF - Ultra High Frequency.
* GPRS - General Packet Radio Service.
* WAP - Wireless Application Protocol.
* TCP - Transmission Control Protocol .
* ARPANET - Advanced Research
Project Agency
Network.
* IBM - International Business
Machines.
* HP - Hewlett Packard.
* AM/FM - Amplitude/ Frequency
Modulation.
* WLAN - Wireless Local Area Network
Design and analysis of computer algorithm notes -
I am providing only one notes of (DAA)design and analysis of computer algorithm. .I will provide another notes of the DAA .But if you comment here then I will provided.
I have a simple notes for M.C.A then all user can easily to understand my Notes and I have all notes of each subject which are in a M.C.A. If you want
Sunday, 25 August 2013
WHAT IS ENTITY ?
WHAT IS ENTITY-: An entity may be object with physical existence or it may be object with conceptual existence .Each Entity has an Attributes.for example - Employee is an entity and the name ,id ,address etc are the attribute of the employee .that means entity can be connected their attributes.
Saturday, 24 August 2013
DATABASE LANGUAGES -
DATABASE LANGUAGES -Database system provide a Data Definition language to specify the database schema and Data Manipulation Language to express the database query and updates.The data Definition and the data manipulation language are not two separated language ,Instead they simply form parts of a database languages such as widely used in SQL language .
Data Manipulation Language -Data Manipulation language are language that enables user to access the data and manipulate the data as organized by appropriate model.the type of access are -;
1 Retrieval of information stored in the database .
2 Insertion the new information into the database .
3 Deletion of information from the database .
4 Manipulation of information stored in the database.
There are two types of Data Manipulation language -;
1 Procedural DML -; require a user to specify what data are needed .how to get those data .
2 Declarative DML -: require a user to specify what data are needed without specifying hoe to get those data .
Data Definition Language-; We specify database schema by the set of definition expressed by a special language called Data Definition Language .The DDL is used to specify additional property of the data .
We also specify the storage structure and access method by database system by a set of statement in special type of DDL called a Data storage and Data definition Language . These statement define the implementation detail of the database schema ,which are usually hidden from the users.
The data value stored in the database must be satisfy certain consistency constraints
Data Manipulation Language -Data Manipulation language are language that enables user to access the data and manipulate the data as organized by appropriate model.the type of access are -;
1 Retrieval of information stored in the database .
2 Insertion the new information into the database .
3 Deletion of information from the database .
4 Manipulation of information stored in the database.
There are two types of Data Manipulation language -;
1 Procedural DML -; require a user to specify what data are needed .how to get those data .
2 Declarative DML -: require a user to specify what data are needed without specifying hoe to get those data .
Data Definition Language-; We specify database schema by the set of definition expressed by a special language called Data Definition Language .The DDL is used to specify additional property of the data .
We also specify the storage structure and access method by database system by a set of statement in special type of DDL called a Data storage and Data definition Language . These statement define the implementation detail of the database schema ,which are usually hidden from the users.
The data value stored in the database must be satisfy certain consistency constraints
DATA INDEPENDENCE
DATA INDEPENDENCE -: Data independence is define to as capacity to change the schema at one level of the database without having to change schema at next level of the database. It can be classified into two ways-;
1-logical independence
2-physical independence
Logical data independence-:Logical independence is define as capacity to change the logical schema without having to change external schema or application program .we may changes the conceptual schema to expand the database to change constraints or reduce the database .Only view information and mapping need be changed in DBMS that supported
Physical data independence -:physical data independence is define as capacity to change the internal schema without having to change conceptual schema .therefore external schema need to be changed
as well.
1-logical independence
2-physical independence
Logical data independence-:Logical independence is define as capacity to change the logical schema without having to change external schema or application program .we may changes the conceptual schema to expand the database to change constraints or reduce the database .Only view information and mapping need be changed in DBMS that supported
Physical data independence -:physical data independence is define as capacity to change the internal schema without having to change conceptual schema .therefore external schema need to be changed
as well.
DATABASE USERS AND DATABASE ADMINISTRATOR
DATABASE USERS AND DATABASE ADMINISTRATOR
The primary goal of the database is to retrieve information from and store a new information into the database .people who work with the database that can be categorized as database users and database administrator.
DATABASE USERS -:
There are four types of database users -;
1-Naive user-
2-Application programmer -
3-Sophisticated user-
4-Specialized user-
Naive users-; Naive user is unsophisticated user ,who interact with the system by invoking on of the application program that have been written previously .for example - clerk of the university .who need to add new instructor in the department (a) .invoke program "new_hire" .Program ask the clerk for the name of the instructor and his id ,department and salary .The typically user interface for the naive user is form interface .the user fill the information on the appropriate field in the form .
Application programmers -: Application programmer is a computer professional .who write the application program .Application programmer can choose from many tools to developed for the user interface .Rapid application development tools are the tools that enables the application programmer create form and report with minimal programming effort.
Sophisticated users -:Sophisticated users are the user ,who interact with the system without writing a program.they form their request either using a database query languages or by using a tools such as data analysis software .
Specialized users-: Specialized users can be work on specialized database program .that do not fit into the traditionally data processing frame work .
DATABASE ADMINISTRATOR-
One of the main reason for using DBMS has central control for both data and the program that access those data .A person who has such central control over the System that is called Database Administrator .The function of Dba include -;
Schema definition-; The dba creates a original database schema by executing a set of data definition statement in DDL.
Storage structure and access method definition -;it is responsibility of dba for creating a structure of the database .
Schema and physical organisation modification-: The dba carries out changes to the schema and physical organisation to reflect the changing need of the organisation .
Granting of authorization for data access-: By granting there are different types of authorization .dba can be regulate which part of the database various users can access.
The dba can be create update and delete file from the database .
It is responsibility for the security and protection of the database from the an authorized users.
The primary goal of the database is to retrieve information from and store a new information into the database .people who work with the database that can be categorized as database users and database administrator.
DATABASE USERS -:
There are four types of database users -;
1-Naive user-
2-Application programmer -
3-Sophisticated user-
4-Specialized user-
Naive users-; Naive user is unsophisticated user ,who interact with the system by invoking on of the application program that have been written previously .for example - clerk of the university .who need to add new instructor in the department (a) .invoke program "new_hire" .Program ask the clerk for the name of the instructor and his id ,department and salary .The typically user interface for the naive user is form interface .the user fill the information on the appropriate field in the form .
Application programmers -: Application programmer is a computer professional .who write the application program .Application programmer can choose from many tools to developed for the user interface .Rapid application development tools are the tools that enables the application programmer create form and report with minimal programming effort.
Sophisticated users -:Sophisticated users are the user ,who interact with the system without writing a program.they form their request either using a database query languages or by using a tools such as data analysis software .
Specialized users-: Specialized users can be work on specialized database program .that do not fit into the traditionally data processing frame work .
DATABASE ADMINISTRATOR-
One of the main reason for using DBMS has central control for both data and the program that access those data .A person who has such central control over the System that is called Database Administrator .The function of Dba include -;
Schema definition-; The dba creates a original database schema by executing a set of data definition statement in DDL.
Storage structure and access method definition -;it is responsibility of dba for creating a structure of the database .
Schema and physical organisation modification-: The dba carries out changes to the schema and physical organisation to reflect the changing need of the organisation .
Granting of authorization for data access-: By granting there are different types of authorization .dba can be regulate which part of the database various users can access.
The dba can be create update and delete file from the database .
It is responsibility for the security and protection of the database from the an authorized users.
3 LEVEL OF DATABASE SYSTEM ARCHITECTURE
3 LEVEL OF DATABASE SYSTEM ARCHITECTURE -:
The major purpose of database system is to provide the user with abstract view of data .that is ,system hides certain thing like how the data is stored and maintained,but on the other hand the data must be retrieve efficiently in order for system is to be useful . Since database end users are not be computer trained ,the complexity hidden from them in order to simplify their interaction with the systems through the three level of Architecture .
The three level of Architecture is known as three schema architecture .The purpose of three level of architecture is to separate the user application and the physical database .The purpose of the separation .,different users needed different view of same data .It can be classified into three level-:
1-view level
2-conceptual and logical level
3-internal and physical level
Internal and physical level -:It is a lowest level of abstraction that describe the how the data are actually stored . Internal level refer to as Physical level .It can be working within a DBMS and operating system .Internal schema written in DDL statement .
Conceptual level- The next higher level of abstraction describe the what data are needed .what are the relationship among the those data .Conceptual level thus describe the entire of the database in the term of small number of relatively simple structure .Although implement of simple structure at the logical level involves complex physical level structure ,the user of the logical level does not need to aware the complexity .it refer to as physical data in-dependency.
view level -:The highest level of abstraction describe only part of the entire database .Even though the logical level uses the simple structure ,complexity remain because the variety of information stored in large database .many user of the database does not need to access all information ,instead of they need to access only part of the database .The system may provide many view of the database..
The major purpose of database system is to provide the user with abstract view of data .that is ,system hides certain thing like how the data is stored and maintained,but on the other hand the data must be retrieve efficiently in order for system is to be useful . Since database end users are not be computer trained ,the complexity hidden from them in order to simplify their interaction with the systems through the three level of Architecture .
The three level of Architecture is known as three schema architecture .The purpose of three level of architecture is to separate the user application and the physical database .The purpose of the separation .,different users needed different view of same data .It can be classified into three level-:
1-view level
2-conceptual and logical level
3-internal and physical level
Internal and physical level -:It is a lowest level of abstraction that describe the how the data are actually stored . Internal level refer to as Physical level .It can be working within a DBMS and operating system .Internal schema written in DDL statement .
Conceptual level- The next higher level of abstraction describe the what data are needed .what are the relationship among the those data .Conceptual level thus describe the entire of the database in the term of small number of relatively simple structure .Although implement of simple structure at the logical level involves complex physical level structure ,the user of the logical level does not need to aware the complexity .it refer to as physical data in-dependency.
view level -:The highest level of abstraction describe only part of the entire database .Even though the logical level uses the simple structure ,complexity remain because the variety of information stored in large database .many user of the database does not need to access all information ,instead of they need to access only part of the database .The system may provide many view of the database..
DATABASE SYSTENM VS FILE SYSTEM
DATA BASE SYSTEM VS FILE SYSTEM-:
Database system arose in response to early method of computerized management of commercial of data .for example -: In university organisation ,keeping information abut the instructor,student ,department and offering course .Once way to kept the information on the computer is store it ,in operating system files . The user able to manipulate the data using a various application program.
The typically file processing system is supported by the an operating system .The system store the permanent record in the various file and it need to extract the data from and add to it .keeping the organisation information in the file processing system has the number of disadvantages -:
1-redundancy of the data -
2-Difficult to access the data -
3-Isolation of the data -
4-Security problem-
5-Integrity problem-
6-Atomicity problem-
Database system arose in response to early method of computerized management of commercial of data .for example -: In university organisation ,keeping information abut the instructor,student ,department and offering course .Once way to kept the information on the computer is store it ,in operating system files . The user able to manipulate the data using a various application program.
The typically file processing system is supported by the an operating system .The system store the permanent record in the various file and it need to extract the data from and add to it .keeping the organisation information in the file processing system has the number of disadvantages -:
1-redundancy of the data -
2-Difficult to access the data -
3-Isolation of the data -
4-Security problem-
5-Integrity problem-
6-Atomicity problem-
What is DBMS ?
What is Dbms -: Dbms(Data base Management System) is a collection of a related data or set of program to access those data .The collection of data refer to as database.The primary goal of the
database is to retrieve and store the database information .and the both convenient and efficient
manner.Database are design to manage large bodies of a information. It is general purpose software
that facilitates to construct ,manipulate and showing the database among the various user and application .Defining the database involves the specifying the data types ,data structure and constraints of data that can be store in the database .The data definition and data description are also store in the the database in the form of data catalog and data dictionary .Some function can be perform on the database are-:
1-Data can be added to the database.
2-Inserting the data into the existing file.
3-retrieving the data from the existing file.
4.Deleting the data from the existing file .
5.Manipulating the data through the use of the function is query and update
database is to retrieve and store the database information .and the both convenient and efficient
manner.Database are design to manage large bodies of a information. It is general purpose software
that facilitates to construct ,manipulate and showing the database among the various user and application .Defining the database involves the specifying the data types ,data structure and constraints of data that can be store in the database .The data definition and data description are also store in the the database in the form of data catalog and data dictionary .Some function can be perform on the database are-:
1-Data can be added to the database.
2-Inserting the data into the existing file.
3-retrieving the data from the existing file.
4.Deleting the data from the existing file .
5.Manipulating the data through the use of the function is query and update
Nokia Lumia 625 %%%%
Nokia Lumia 625-:Nokia Lumia 625 is smart phone .there are various features in this phone ...
Features are -: 4.7 ips lcd screen , 5mp camera - camera of this phone is to good
clearity of the picture is nice ,which processor is used in Nokia lumia 625 thats
Features are -: 4.7 ips lcd screen , 5mp camera - camera of this phone is to good
clearity of the picture is nice ,which processor is used in Nokia lumia 625 thats
name is Qualcomm Snapdragon.Internal storage memory of this phone is 8GB
and Nokia Lumia 625 include a 1.2GHz dual-core processor alongside 512MB RAM. The price of this Phone is under the 20000 thousand.My opinion is tha it ... this is the smartest phone of this month.....there are various feature ..which compete the various phone under this category.
Friday, 16 August 2013
Lava mobile
lava mobile-:Believe it or not – get the latest lava 3G phone with 4.2 Android jellybean and 32 GB expandable memory, 3.5 inch beautiful display . Starting price of smart lava phone will be 4500.
mumbai mtnl website has been hacked
mumbai mtnl website has been hacked -: mumbai mtnl website has been hacked by the Pakistan hacker
http://mtnlmumbai.in/ .
http://mtnlmumbai.in/ .
HOW TO MAKE A WIFI HOTSPOT WITHOUT ANY SOFTWARE
HOW TO MAKE A WIFI HOTSPOT WITHOUT ANY SOFTWARE-: this process can be done by the cmd command . there are simple procedure for crating a wifi-hotspot without any software .
1-firstly goto start and type cmd . black screen will be open on your system ..
2- then type this command
1-firstly goto start and type cmd . black screen will be open on your system ..
2- then type this command
netsh wlan set hostednetwork mode=allow ssid=www.hacktrox.blogspot.com=password
3-if you want run hotspot on your system then type this command
netsh wlan start hostednetwork
4- if you want to know wether a hotspot on or off then type this command
netsh wlan show hostednetwork
5- if you want to stop hotspot then type this command
netsh wlan stop hostednetwork
enjoyy.................all users
Thursday, 8 August 2013
NOKIA ASHA 305
NOKIA ASHA 305 -:Whatsup Application for Nokia Asha 305 . how to install these application on your mobile (Nokia Asha 305 ) . there are very simple procedure that can be install of these application . you need another application to install whatsup on your mobile . if you want these procedure for downloading the whatsup application on your mobile . post Here i will give you .......................................................
BREACH decodes HTTPS encrypted data in 30 seconds
BREACH decodes HTTPS encrypted data in 30 seconds
A new hacking technique dubbed BREACH can extract login tokens, session
ID numbers and other sensitive information from SSL/TLS encrypted web
traffic in just 30 seconds.
BREACH (Browser Reconnaissance and Exfiltration via Adaptive Compression of Hypertext) is very targeted and don’t decrypt the entire channel. BREACH manipulates data compression to pry out doses of information from HTTPS protected data, including email addresses, security tokens, and other plain text strings.
Wednesday, 7 August 2013
LG G2
LG G2-:LG G2 has been leaked ahead of its official announced .this mobile is very good then other mobile .there are various feature in this mobile . here the feature are shown below -:
5.2-inch full-HD screen
Snapdragon 800 2.3 GHz quad-core CPU
2GB RAM, 16 GB ROM
13MP camera with LED flash and OIS
2,610 mAh battery
Friday, 2 August 2013
Moto X
Moto x-:Let’s talk about the hardware inside.
Inside the Moto X is a computing system that
Motorola has branded the X8 Mobile
Computing system with 8 “cores.” Motorola
was careful to make the distinction that X8 is
not a system on chip, for that there’s a 1.7
GHz Qualcomm Snapdragon S4 Pro
(MSM8960Pro) with dual core Krait 300 CPUs
and Adreno 320 graphics. Motorola counts the
2 CPU cores, 4 Adreno 320 GPU cores (yes,
there are 4 cores in Adreno 320, which
Motorola made public), and then adds two
more to the fray – a NLP (Natural Language
Processing) core, and Contextual Computing
core. These add up to a total of 8 “cores” for
those keeping count. I’m putting cores in
quotes here since it’s meaningless to count
heterogeneous, completely different cores like
they’re something you can sum up and say
more of means better. Nevertheless, Motorola
makes the case that the X8 is an octacore
system.
Inside the Moto X is a computing system that
Motorola has branded the X8 Mobile
Computing system with 8 “cores.” Motorola
was careful to make the distinction that X8 is
not a system on chip, for that there’s a 1.7
GHz Qualcomm Snapdragon S4 Pro
(MSM8960Pro) with dual core Krait 300 CPUs
and Adreno 320 graphics. Motorola counts the
2 CPU cores, 4 Adreno 320 GPU cores (yes,
there are 4 cores in Adreno 320, which
Motorola made public), and then adds two
more to the fray – a NLP (Natural Language
Processing) core, and Contextual Computing
core. These add up to a total of 8 “cores” for
those keeping count. I’m putting cores in
quotes here since it’s meaningless to count
heterogeneous, completely different cores like
they’re something you can sum up and say
more of means better. Nevertheless, Motorola
makes the case that the X8 is an octacore
system.
Tuesday, 30 July 2013
Sony Xperia Z Ultra