Early IBM Hard Disk Drive





Early IBM Hard Disk Drive





Its a hard disk in 1956. The Volume and Size of 5MB memory storage in 1956.



In September 1956 IBM launched the 305 RAMAC, the first computer with a hard disk drive (HDD). The HDD weighed over a ton and stored 5MB of data.

Sandia computer scientists successfully boot one million Linux kernels as virtual Machines





Demonstrated the ability to run more than a million Linux kernels as virtual machines.



The achievement will allow cyber security researchers to more effectively observe behavior found in malicious botnets, or networks of infected machines that can operate on the scale of a million nodes. Botnets, said Sandia’s Ron Minnich, are often difficult to analyze since they are geographically spread all over the world.



Sandia scientists used virtual machine (VM) technology and the power of its Thunderbird supercomputing cluster for the demonstration.



Running a high volume of VMs on one supercomputer — at a similar scale as a botnet — would allow cyber researchers to watch how botnets work and explore ways to stop them in their tracks. “We can get control at a level we never had before,” said Minnich.



Previously, Minnich said, researchers had only been able to run up to 20,000 kernels concurrently (a “kernel” is the central component of most computer operating systems). The more kernels that can be run at once, he said, the more effective cyber security professionals can be in combating the global botnet problem. “Eventually, we would like to be able to emulate the computer network of a small nation, or even one as large as the United States, in order to ‘virtualize’ and monitor a cyber attack,” he said.



A related use for millions to tens of millions of operating systems, Sandia’s researchers suggest, is to construct high-fidelity models of parts of the Internet.



“The sheer size of the Internet makes it very difficult to understand in even a limited way,” said Minnich. “Many phenomena occurring on the Internet are poorly understood, because we lack the ability to model it adequately. By running actual operating system instances to represent nodes on the Internet, we will be able not just to simulate the functioning of the Internet at the network level, but to emulate Internet functionality.”



A virtual machine, originally defined by researchers Gerald J. Popek and Robert P. Goldberg as “an efficient, isolated duplicate of a real machine,” is essentially a set of software programs running on one computer that, collectively, acts like a separate, complete unit. “You fire it up and it looks like a full computer,” said Sandia’s Don Rudish. Within the virtual machine, one can then start up an operating system kernel, so “at some point you have this little world inside the virtual machine that looks just like a full machine, running a full operating system, browsers and other software, but it’s all contained within the real machine.”



The Sandia research, two years in the making, was funded by the Department of Energy’s Office of Science, the National Nuclear Security Administration’s (NNSA) Advanced Simulation and Computing (ASC) program and by internal Sandia funding.



To complete the project, Sandia utilized its Albuquerque-based 4,480-node Dell high-performance computer cluster, known as Thunderbird. To arrive at the one million Linux kernel figure, Sandia’s researchers ran one kernel in each of 250 VMs and coupled those with the 4,480 physical machines on Thunderbird. Dell and IBM both made key technical contributions to the experiments, as did a team at Sandia’s Albuquerque site that maintains Thunderbird and prepared it for the project.



The capability to run a high number of operating system instances inside of virtual machines on a high performance computing (HPC) cluster can also be used to model even larger HPC machines with millions to tens of millions of nodes that will be developed in the future, said Minnich. The successful Sandia demonstration, he asserts, means that development of operating systems, configuration and management tools, and even software for scientific computation can begin now before the hardware technology to build such machines is mature.



“Development of this software will take years, and the scientific community cannot afford to wait to begin the process until the hardware is ready,” said Minnich. “Urgent problems such as modeling climate change, developing new medicines, and research into more efficient production of energy demand ever-increasing computational resources. Furthermore, virtualization will play an increasingly important role in the deployment of large-scale systems, enabling multiple operating systems on a single platform and application-specific operating systems.”



Sandia’s researchers plan to take their newfound capability to the next level.



“It has been estimated that we will need 100 million CPUs (central processing units) by 2018 in order to build a computer that will run at the speeds we want,” said Minnich. “This approach we’ve demonstrated is a good way to get us started on finding ways to program a machine with that many CPUs.” Continued research, he said, will help computer scientists to come up with ways to manage and control such vast quantities, “so that when we have a computer with 100 million CPUs we can actually use it.”







http://www.sandia.gov/news/resources/news_releases/sandia-computer-scientists-successfully-boot-one-million-linux-kernels-as-virtual-machines/

Why Billgates would Decide to Sell Off Microsoft?





Letter from Banta Singh to Mr. Bill Gates

Subject: Problems with my new computer

Dear Mr. Bill Gates,

We have bought a computer for our home and we have found some problems, which I want to bring to your notice:

1. There is a button 'start' but there is no 'stop' button. We request you to check this.

2. One doubt is whether any “re-scooter” is available in system? I find only “re-cycle”, but I own a scooter at my home.

3. There is 'Find' button but it is not working properly. My wife lost the door key and we tried a lot trace the key with this 'find' button, but was unable to trace. Please rectify this problem.

4. My child learnt 'Microsoft word' now he wants to learn 'Microsoft sentence', so when you will provide that?

5. I bought computer, CPU, mouse and keyboard, but there is only one icon which shows 'My Computer': when you will provide the remaining items?

6. It is surprising that windows says 'MY Pictures' but there is not even a single photo of mine. So when will you keep my photo in that.

7. There is 'MICROSOFT OFFICE' what about 'MICROSOFT HOME' since I use the PC at home only.

8. You provided 'My Recent Documents'. When you will provide 'My Past Documents'?

9. You provide 'My Network Places'. For God sake please do not provide 'My Secret Places'. I do not want to let my wife know where I go after my office hours.

Regards,

Banta

Last one to Mr. Bill Gates:

Sir, how is it that your name is Gates but you are selling WINDOWS?

New football Team In Saudia Arabia





New Football Team
In Saudia Arabia





I Think The One Who Have
The Football Is Goal Keeper

Finally CPU Inside Keyboard !!!




















































Listen First before ASSUMING





So...... True
I Have a Drinking
Problem!
DON'T ASSUME TOO MUCH...






















This could happen at work, home or anywhere else where people
jump into conclusions and not listen!


Good COMMUNICATION
is the best solution for many of problems that we might face in our life!

The most seven stage holes in the world





I found this while I was on the net, and I thought sharing this with you guys would be a good idea.





1. Kimberley Big Hole – South Africa




Apparently the largest ever hand-dug excavation in the world, this 1097 meter deep mine yielded over 3 tons of diamonds before being closed in 1914.





2. Glory Hole – Monticello Dam, California



A glory hole is used when a dam is at full capacity and water needs to be drained from the reservoir. This is the ‘Glory Hole’ at Monticello dam, and it’s the largest in the world of this type of spillway, its size enabling it to consume 14,400 cubic feet of water every second..





3. Bingham Canyon Mine, Utah




This is supposedly the largest man-made excavation on earth. Extraction began in 1863 and still continues today, the pit increasing in size constantly. In its current state the hole is ¾ miles deep and 2.5 miles wide.





4. Great Blue Hole , Belize




This incredible geographical phenomenon known as a blue hole is situated 60 miles off the mainland of Belize ..There are numerous blue holes around the world, but none as stunning as this one.





5. Mirny Diamond Mine , Serbia




I’m pretty sure most people have seen this one. It’s an absolute beast and holds the title of largest open diamond mines in the world. At 525 meters deep, with a top diameter of 1200 meters, there’s even a no-fly zone above the hole due to a few helicopters having been sucked in.





6. Diavik Mine, Canada




The mine is so huge and the area so remote that it has its own airport with a runway large enough to accommodate a Boeing 737. It looks equally cool when the surrounding water is frozen..





7. Sinkhole in Guatemala


Know the immense potential of renewable energy





Renewable energy news reports are often based on four major renewable energy resources - solar, wind, tidal and biomass energy. These resources never run out and hence they are highly reliable than fossil fuels. Among the above said renewable energy resources there are two which are of the highest demand. They are solar and wind energy.

Solar energy is maximum exploited renewable energy resource these days. Solar energy is captured with the help of solar panels, and is used for lighting houses and office premises. It has helped people in reducing their energy bills to a considerable level.

Wind power has a very high potential for development, there by attracting more and more investors to the field. Government and private companies are equally interested in wind energy resource due to its cost effectiveness in the production of electricity.

Wind turbines, used to extract wind energy, are often mounted on very high towers. This helps in capturing wind easily, using the blades of turbines. Often there are 3 blades in a turbine. As wind blows, a low pressure is formed below these blades turning the rotor below the turbine, capturing the wind energy.

Renewable energy resources are chosen in place of traditional energy resources as they are highly cost effective and pollution free. In present situation, where we face a lot of pollution and harmful impacts of global warming, using clean energy is extremely important. Clean energy not saves environment, it also saves a lot of money.

Microsoft confirms 17-year-old Windows vulnerability





Microsoft confirms 17-year-old Windows vulnerability



One day after a Google security researcher released code to expose a flaw that affects



every release of the Windows NT kernel — from Windows NT 3.1 (1993) up to and including



Windows 7 (2009) — Microsoft dropped a security advisory to acknowledge the issue and



warn of the risk of privilege escalation attacks.



Microsoft warns that a malicious hacker could exploit this vulnerability to run arbitrary code



in kernel mode. For an attack to be successful, the attacker must have valid logon



credentials.



The flaw does not affect Windows operating systems for x64-based and Itanium-based



computers, Microsoft said.



According to Tavis Ormandy, the Google researcher who released the flaw details,



Microsoft was notified about the issue in June 2009. After waiting several months and not



seeing a patch, he decided it was in the best interest of everyone to go public.



As an effective and easy to deploy workaround is available, I have concluded that it is in the



best interest of users to go ahead with the publication of this document without an official



patch. It should be noted that very few users rely on NT security, the primary audience of



this advisory is expected to be domain administrators and security professionals.



Ormandy’s advisory includes instructions for temporarily disabling the MSDOS and



WOWEXEC subsystems to prevent an attack from functioning. This can be done via Group



Policy.



The mitigation in Microsoft’s advisory mirrors the advice from Ormandy.



If you believe you may be affected, you should consider applying the workaround

described below.



Temporarily disabling the MSDOS and WOWEXEC subsystems will prevent the attack

from functioning, as without a process with VdmAllowed, it is not possible to

access NtVdmControl() (without SeTcbPrivilege, of course).



The policy template "Windows Components\Application Compatibility\Prevent

access to 16-bit applications" may be used within the group policy editor to

prevent unprivileged users from executing 16-bit applications. I'm informed

this is an officially supported machine configuration.



Administrators unfamiliar with group policy may find the videos below

instructive. Further information is available from the Windows Server

Group Policy Home



http://technet.microsoft.com/en-us/windowsserver/grouppolicy/default.aspx

MORE & SOURCES:



http://blogs.zdnet.com/security/?p=5307&tag=nl.e589
http://seclists.org/fulldisclosure/2010/Jan/341
http://www.microsoft.com/technet/security/advisory/979682.mspx

France's new internet piracy law comes in





The world wonders if it will work

France's surrender to the Entertainment industry by creating a “three strikes and you are out” law against pirates comes into force today.



The law was passed after a long struggle in parliament opposition from groups opposed to internet restrictions. Illegal downloaders will be sent a warning e-mail, then a letter if they continue, and finally must appear before a judge if they offend again.The judge can impose a fine, or suspend their access to the internet.



The movie and music industry claim that the law will mean about two thirds of the people will stop their illegal usages of the internet after the first warning. After the second message more than 95% will finish with that bad usage.



Others say that serious pirates will just work out a way around the law and only ordinary people will be caught. Either way the world will be watching France to see if the law reduces pirating or is just yet another attempt to govern the ungovernable.

iPhone Software Update now free





Apple appears to now be offering the iPhone 3.0 Software Update free to iPod touch users running the iPhone 2.0 Software Update.

Pocket Gamer's Tracy Erickson notes that an older iPod touch updated without the request for a fee. Apple had charged customers £5.99 at launch last year, and then £2.99.

Syncing a second generation iPod touch today with an older version of the software prompted me to accept the free upgrade. How exciting," Tracy writes.

"Just as when asked to download and install the latest firmware on an iPhone, iTunes simply asks for confirmation - no signing in to pay for the software."

As Pocket Gamer notes, this is good news for iPod touch gamers reluctant to upgrade due to the additional fee, which iPhone users didn't have to pay.

The Chinese Car is coming soon, will beat all the low fuel consumption cars





The Chinese Car is coming soon !



This will beat all the low fuel consumption cars in the world!





NEW CAR- FOR $600------- New Single Seat VW







If you could go to Shanghai for a vacation, buy two or more of these

cars, one for your wife and one for yourself, and one for each of your

kids, have them shipped to Canada and still spend less money than if you

bought a car in Canada. Getting the car(s) into USA , still an ordeal.



This is not a toy, not a concept car. It is a newly developed single

seat car in highly aerodynamic tear-shape road-proven real car. It is

ready to be launched as a single-seater for sale in Shanghai in 2010 for

a mere RMB 4,000 (US$600)!



Interested? Wait till you learn that it will cruise at 100-120 Km/Hr

with an unbelievable 0.99litre/100Km (258 miles/gallon)!



Impressed? Totally, after you have read all the details below about the

hi-tech and space-age material input into this car!



The Most Economic Car in the World will be on sale next year











Better than Electric Car - 258 miles/gallon: IPO 2010 in Shanghai



This is a single seated car



From conception to production: 3 years and the company is headquartered

in Hamburg , Germany .



Will be selling for 4000 yuan, equivalent to US$600..



Gas tank capacity = 1.7 gallons



Speed = 62 - 74.6 Miles/hour



Fuel efficiency = 258 miles/gallon



Travel distance with a full tank = 404 miles

Software Development Life Cycle - Emotions





Microsoft fixes 17 year old bug !!





A 17-year-old bug in Windows will be patched by Microsoft in its latest security update.

The February update for Windows will close the loophole that dates from the time of the DOS operating system.

First appearing in Windows NT 3.1, the vulnerability has been carried over into almost every version of Windows that has appeared since.

The monthly security update will also tackle a further 25 holes in Windows, five of which are rated as "critical".

Home hijack

The ancient bug was discovered by Google security researcher Tavis Ormandy in January 2010 and involves a utility that allows newer versions of Windows to run very old programs.

Mr Ormandy has found a way to exploit this utility in Windows XP, Windows Server 2003 and 2008 as well as Windows Vista and Windows 7.

The patch for this vulnerability will appear in the February security update. Five of the vulnerabilities being patched at the same time allow attackers to effectively hijack a Windows PC and run their own programs on it.



STAYING SAFE ONLINE

Use security software that can tackle viruses and spyware

Use a firewall

Apply operating system updates as soon as they become available

Be suspicious of unsolicited e-mails bearing attachments

Keep your browser up to date

As well as fixing holes in many versions of Windows, the update also tackles bugs in Office XP, Office 2003 and Office 2004 for Apple Macintosh machines.

The bumper update is not the largest that Microsoft has ever released. The security update for October 2009 tackled a total of 34 vulnerabilities. Eight of those updates were rated as critical - the highest level...



http://news.bbc.co.uk/1/hi/technology/8499859.stm

Windows 7 warning : Pirates beware





]Windows Activation Technologies Update for Windows 7

In the coming days, we’ll be deploying a new update for Windows Activation Technologies, the set of built-in activation and validation components built into Windows 7. Called Windows Activation Technologies Update for Windows 7, this update will detect more than 70 known and potentially dangerous activation exploits. Activation exploits are sometimes called “hacks”, and attempt to bypass or compromise Windows’ activation technologies. This new update is further evidence of Microsoft’s commitment to keeping customers and partners secure. The update will determine whether Windows 7 installed on a PC is genuine and will better protect customers’ PCs by making sure that the integrity of key licensing components remains intact.

So, what are the risks of activation exploits? Searching for, downloading, or installing activation exploits or counterfeit software on the Internet is risky, because sites that advertise these pirated products often contain malware, viruses, and Trojans, which are found bundled with or directly built into the activation exploit or counterfeit software. A study by research firm IDC, The Risks of Obtaining and Using Pirated Software, shows that one in four Web sites offering counterfeit software attempted to install unwanted or malicious code upon downloading. And this rate is rising. Media Surveillance, an anti-piracy solutions company based in Germany, recently downloaded more than five hundred pirated copies of Windows 7 (and Windows activation exploits) and found that 32% contained malicious code. These are very disturbing figures – especially when considering that resellers may be using these downloads to claim that the PCs they sell include genuine Windows. Buyers of new PCs should always check for the Certificate of Authenticity (COA) to verify that the PC they are purchasing contains only genuine Windows. A quick visit to our How to Tell website tells buyers what a genuine COA should look like.

The Update is designed to run on all editions of Windows 7, although we will distribute first to the Home Premium, Professional, Ultimate and Enterprise editions. It will be available online at www.microsoft.com/genuine beginning February 16 and on the Microsoft Download Center beginning February 17. Later this month, the update will also be offered through Windows Update as an ‘Important’ update.

Although the Update will not be directly offered through Windows Server Update Services (WSUS), which is used by enterprise customers to manage the distribution of software updates in their IT environment, a WSUS administrator can import this update into WSUS through the Microsoft Update catalog. I’d like to stress that the Update is voluntary, which means that you can choose not to install it when you see it appear on Windows Update. I also want to stress that installing this update will not jeopardize your privacy; although the update contacts Microsoft’s servers to check for new threats as I outline below, the information we receive from PCs during these checks does not include any personally identifiable information or any other information that Microsoft can use to identify or contact you. This update follows the same stringent and secure set of privacy principles and policies as other downloads. The update can also be uninstalled at any time.

How does it work? Once installed, the Update protects customers by identifying known activation exploits that may affect their PC experience. If any activation exploits are found, Windows will alert the customer and offer options for resolving the issue – in many cases, with just a few clicks. Machines running genuine Windows 7 software with no activation exploits will see nothing – the update runs quietly in the background protecting your system. If Windows 7 is non-genuine, the notifications built into Windows 7 will inform the customer that Windows is not genuine by displaying informational dialog boxes with options for the customer to either get more information, or acquire genuine Windows. The desktop wallpaper will be switched to a plain desktop (all of the customer’s desktop icons, gadgets, or pinned applications stay in place). Periodic reminders and a persistent desktop watermark act as further alerts to the customer.

It is important to know that the customer will see no reduced functionality in their copy of Windows – a customer’s applications work as expected, and access to personal information is unchanged. The Update will run periodic validations (initially every 90 days). During validation, Windows will download the latest ‘signatures’ that are used to identify new activation exploits – much like an anti-virus service. When tampering, disabling, or missing licensing files are discovered, the WAT Update runs a check and repair weekly to ensure that the licensing files are properly repaired.

Joe Williams
General Manager, Genuine Windows.

Source

Worst effect of power failure in Delhi





Result of Love Marriage !











It's ALWAYS the kids that suffer!!

His Name is Zonkey!!!!!! !

Innovation which leads to Green Revolution's !!!