Sunday, December 21, 2008

Draw the Carol

Things Needed:

  • Sketch Board
  • Pen
  • Make chits of Christmas Carols that can be chosen according to the level of difficulty that you choose
How To Play:
  • Group your guests into two or more teams.
  • One person is designated as the Game Master and manages the game.
  • A representative of the first team is sent to the Game Master and choose a chit.
  • Only the Game Master and that person see the chit and it is then thrown away.
  • Now this representative tries to make his/her team understand which carol he/she has chosen by drawing symbols on the paper.
  • As soon as the team guesses the carol, they sing its first stanza.
  • The game continues with the next team and so on.
  • Each team gets 2 minutes to guess the right carol.
  • The team that guesses the first five carols wins the game.

The Sandwich and Cinderella game

The Sandwich Game: Choose 4 people to compete. Have them wash their hands. In the middle of the room so all can see have a table with plates of different cuts of meat left over from dinner, sauces and garnish? Now blindfold each contestant. Number all plates. Supply each person with plastic cutlery and an apron. Have contestants call out a number and whatever meat graces that plate - have someone be their eyes and pass the plate to them to start making sandwiches. There is no set time on this game. As the host when you see enough sandwiches made to feed all later in the evening, stop the game and thank them for helping out. Sneaky I know but "funny clever" you must agree.

Cinderella Game: Although a time for season of goodwill not everyone see`s it that way and especially more so if they have to give up something, like their time. This game includes a party guest having to give up their time to wash dishes, make coffee for all or whatever you believe a good forfeit. No one wants to skivvy on Christmas day so it will be all systems go to win the game. To make it fair let us not have one Cinderella but several Cinders. Purchase special bingo tickets with the same numbers on 1-90. You be the caller. When the winning number is called all players will shout "house" at the same time, unknown to them at the beginning of the game each had the exact duplicate of each other's bingo ticket. Outcome: dishes disappear in a flash and coffee poured in no time at all.

Name That Item

Ingredients

  • Bag

  • Shaving cream, Black Book, Baseball Cards, TV Remote, Money Clip, Dirty Socks, Baseball Cap, etc.

To Play

  • Place the above items in a bag

  • Seal the bag.

  • Then pass it around the group and have each person feel the items through the bags.

  • Have the guests write down their guesses.

  • Then open the bags to see how many are correct. You might give the person with the most correct guesses the entire bag (of worthless male items). To increase the usefulness of the "bag of prizes", and increase the raunch factor of the game, you might want to substitute sex toys (purchased from your local adult store) for the "male items" in the bag. You could probably even hold each sex toy in the air (without the cover over it), and have a guessing contest as to the name and function of each toy.

Board Game Tournament

Ingredients

  • Monopoly

  • Scrabble

  • Chutes & Ladders

  • Candy Land

  • LIFE

  • Other Board Games

To Play

  • About 20 to 25 folks attend and everyone participates in the various board games. (Usually about 4 or 5 different games). You get points based on where you finish, i.e. 4 points for 1st, 3 points for 2nd, etc.

  • Once all the games are played, a king, or a queen is announced.

  • Complete with pictures and the passing of the crown! It's absolutely a blast! I highly recommend this type of event for someone looking for something out of the ordinary.

Guess Whose Resolution


Ingredients

  • Pieces of Paper

  • Hat

  • Scissors

To Play

  • Cut out slips of paper.

  • Make each of your guests write down 5 resolutions, each on its own slip of paper.

  • Pull one slip of paper out of a hat at a time and read it out loud.

  • Everyone has to write down who they think made each resolution. At the end of the readings, the person who guessed the most correctly wins a prize. Read some of the wrong guesses out loud for fun!

Guess the Month

Ingredients

  • Old Magazines

To Play

  • Go through old magazines from the past year, or to your local library (this is fun research though) to search through old news articles.

  • Find many events that took place in the past year.

  • Make a list of these events, and have your guests guess which month the event took place in. For example- "During what month did Gwynneth Paltrow win her best actress award?" Whoever guesses the most right wins a prize.

Gift Exchange

Ingredients

  • Pieces of Paper

To Play

  • Ask your guests to bring an inexpensive wrapped gift (appropriate for both a man or woman), with no gift tag on it.

  • Have the guests draw numbers and choose a gift in numerical order. For added fun, let the next player have the choice of choosing a new gift, or stealing a gift from someone who has already opened it.

Christmas Bingo

Ingredients

  • Stationery

To Play

  • Make up Bingo cards before the guests arrive. Draw a grid. Then fill in with things related to Christmas, mixing them up for each card. For example, you might include:

"Still hasn't finished shopping."

"Is wearing red tonight."

"Doesn't like eggnog."

"Did the tree trimming."

"Knows what's s/he's getting for Xmas."

"Plans to return at least one gift."

"Ate too much at the last party."

"Bought a new outfit for tonight."

"Knows all the reindeers' names."

"Made figgy pudding once."

"Sang carols this week."

  • Make small cards to match the items on the grid.

  • Gather the guests and hand out the cards, along with a handful of small Christmas candies.

  • Pick a card from the pile and read the statement. If anyone can answer, "yes" to the comment, they get to put a candy in the square. The first person to connect five in a row wins a prize.

Santa in the Lineup

Ingredients

  • Picture of Santa Claus

  • Pencils

  • Paper

To Play

  • Get a picture of Santa Claus that is not the norm and keep it hidden from the guests until game time.

  • Give your guests pencil and paper and have them write down every detail they remember about Santa Claus's appearance.

  • After three minutes, call time. Show the picture of Santa and see how many details they got right. The one with the most wins a prize. For added fun, make them draw a detailed picture of Santa, then hold them up for all to see or tape them to the walls!

Christmas Hunt

Ingredients

  • Paper

  • Markers

To Play

  • Write out a list of Christmas related items on a piece of paper and photocopy enough for each of your guests.

  • Divide guests into teams or couples, and give them a list of Christmas-related items to locate, either in the house or around the neighborhood. Include items like: a candle, a religious Christmas card, some mistletoe, a Christmas cookie, a broken ornament, a burned-out tree light, a Christmas stamp, some tinsel, and a few pine needles.

Candy Cane Connection

Ingredients

  • Candy Canes

  • Christmas Sugar Cookies

To Play

  • Buy a collection of candy canes and break them in half.

  • Mix out the halves and hand them out to your guests.

  • When all have arrived, have them try to find the other half of their candy canes! You can play this game with Christmas sugar cookies, too!

Saturday, December 20, 2008

Christmas Trivia

Ingredients

  • Christmas Tree Cutouts

  • Tape

  • Pencils

  • Paper

To Play

  • Write questions related to Christmas on little green Christmas tree cutouts, number them, and tape them to the walls around the party room.

  • Provide your guests with pencil and paper, and have them write down their answer to the numbered questions throughout the party.

  • At the end of the party, read off the answer and see which guest got the most points for a prize!

Sample Questions:

  • What are the names of Santa's eight reindeer? (Dasher, Dancer, Prancer, Vixen, Comet, Cupid, Donner, and Blitzen.)

  • What is a buche de Noel? (An edible yule log)

  • What do bad little boys get for Christmas? (Switches and lumps of coal)

  • Finish the song line: "All I want for Christmas is . . . (my two front teeth.)

  • Who was caught kissing Santa Claus? (Mommy)

  • How do you say Merry Christmas in Spanish? (Feliz Navidad.) In French? (Joyeux Noel.)

  • What did Frosty the Snowman have for a nose? (A button.)

  • Who wrote "'Twas the Night Before Christmas"? (Clement Clarke Moore.)

  • What is the last line in Moore's poem? ("Happy Christmas to all, and to all a good night.")

  • What is a tannebaum? (Christmas tree in German.)

  • What did the Three Wise Men bring? (Gold, frankincense, and myrrh.)

  • On the twelfth day of Christmas, what did "my true love give to me"? (Twelve fiddlers fiddling, eleven lords a-leaping, ten ladies dancing, nine pipers piping, eight maids a-milking, seven swans a-swimming, six geese a-laying, five golden rings, four calling birds, three French hens, two turtle doves, and a partridge in a pear tree.)

Friday, November 28, 2008

3 Screens Laptop




"Laptop” is somewhat of a misnomer for this thing since it doesn’t look as if it’s capable of functioning on anyone’s lap. It’s got three 15″ 1024×768 monitors, two of which are detachable to fit inside the case, which is the size of a large briefcase. Without worrying about the slim factor, it looks like it could pack some serious hardware inside, although there are no details on this particular model. It is technically portable, or more portable than your desktop and 3 LCDs, and will in fact run on batteries. No specs on the battery life with all 3 monitors playing different video games (which is what I would somehow contrive to do), but I would estimate it to be about twelve minutes (which is eleven and a half minutes longer than my current laptop battery). If this all seems borderline ridiculous, it may not surprise you that it’s manufactured by the Acme (Portable Machines) Corporation, famous for supplying Wylie E. Coyote with things like dehydrated boulders, jet propelled pogo sticks, female roadrunner costumes… I could go on and on.

No price seems to be available on the Acme website as of yet.

Physics For Game Programmers




* Publisher: Apress
* Number Of Pages: 472
* Publication Date: 2005-04-20
* ISBN-10 / ASIN: 159059472X
* ISBN-13 / EAN: 9781590594728
* Binding: Paperback


Book Description:

This book illustrates how to infuse compelling and realistic action into game programmingeven if you dont have a college-level physics background! This book covers the basic physics and mathematical models and then shows clearly how to implement them basics to accurately simulate the motion and behavior of cars, planes, projectiles, rockets, and boats.

This book is neither code heavy or language-specific, and all chapters include unique, challenging exercises to solve. This fun book also includes historical footnotes and interesting trivia. The style will be light and conversational, and all physics jargon will be properly and clearly explained.

Pwd word :

5starsbazaar.com

Dwn :
http://rapidshare.com/files/88368585/physics_for_games_www.5starsbazaar

Saturday, October 4, 2008

Nostradamus- Prediction - Kashmir

This is a image collected from , so called "Lost Book of Nostradamus".

There where lot other images with this image , from that book, which where under scanner but not this one

When i looked at this, i could interpret it in my own way.

This might be my countries influence or the reality

Let me list the things that I could see from the image

1: Mountain

2: Yoga Wand

3: Skull

4: Crescent

The Mountain represents the place Kashmir and Jammu (India)

The wooden wand is used by the Hindu priest a symbol uniquely identifies the Hindu community

Crescent , as you all know represents the Muslim community

Skull is the symbol of death

This painting may illustrate the current war and terrorist activities going around the beautiful Kashmir, making it a place for dead and cremated souls

The fight for Kashmir between India (majority Hindus) and Pakistan (majority Muslims) is clearly depicted in this everlasting picture

Anyone can find this image as a image from the “Lost Book of Nostradamus".



2012 Nostradamus

The most famous doomsday prophet is Nostradamus. He is best known for his book Les Propheties. He wrote his prophecies in a poetic style, in “quatrains.” Many of his prophecies dealt with disaster such as plagues, earthquakes, wars, floods and the coming of three antichrists. However his predictions are vague and people tend to apply his words to many situations. Some examples of his predictions are:

The year 1999, seventh month,
From the sky will come a great King of Terror:
To bring back to life the great King of the Mongols,
Before and after Mars to reign by good luck.

The present time together with the past
Will be judged by the great Joker:
The world too late will be tired of him,
And through the clergy oath-taker disloyal.

The year of the great seventh number accomplished,
It will appear at the time of the games of slaughter:
Not far from the great millennial age,
When the buried will go out from their tombs.

Long awaited he will never return
In Europe, he will appear in Asia:
One of the league issued from the great Hermes,
And he will grow over all the Kings of the East.

Reference Links

2012 BIBLE PROPHECY

The Holy Bible is filled with prophetic statements. With limited knowledge on the subject, I will narrow the topic to the Book of Revelation, the last chapter in the Bible. The Book of Revelation is filled with strange and awesome imagery that is interpreted by many in different ways. Early in the book, it discusses the state of affairs among seven churches in Asia Minor. Then, the book starts dealing with the prophetic vision John (a servant of Jesus Christ) received from God.

John appears before the seat of God surrounded by angels of depicted in strange ways and one of the angels representing Jesus grabs a scroll with seven seals from the one who is sitting on the right hand of God. Only Jesus is worthy to open the scroll. At that point the prophecies of our future begin to reveal themselves.

From the Book of Revelation
6:1 I looked on when the Lamb opened one of the seven seals, and I heard one of the four living creatures saying with a thunderous voice, “Come!” 6:2 So I looked, and here came a white horse! The one who rode it had a bow, and he was given a crown, and as a conqueror he rode out to conquer.
6:3 Then when the Lamb opened the second seal, I heard the second living creature saying, “Come!” 6:4 And another horse, fiery red, came out, and the one who rode it was granted permission to take peace from the earth, so that people would butcher one another, and he was given a huge sword.
6:5 Then when the Lamb opened the third seal I heard the third living creature saying, “Come!” So I looked, and here came a black horse! The one who rode it had a balance scale in his hand. 6:6 Then I heard something like a voice from among the four living creatures saying, “A quart of wheat will cost a day’s pay and three quarts of barley will cost a day’s pay. But do not damage the olive oil and the wine!”
6:7 Then when the Lamb opened the fourth seal I heard the voice of the fourth living creature saying, “Come!” 6:8 So I looked and here came a pale green horse! The name of the one who rode it was Death, and Hades followed right behind. They were given authority over a fourth of the earth, to kill its population with the sword, famine, and disease, and by the wild animals of the earth.
6:9 Now when the Lamb opened the fifth seal, I saw under the altar the souls of those who had been violently killed because of the word of God and because of the testimony they had given. 6:10 They cried out with a loud voice, “How long, Sovereign Master, holy and true, before you judge those who live on the earth and avenge our blood?” 6:11 Each of them was given a long white robe and they were told to rest for a little longer, until the full number was reached of both their fellow servants and their brothers who were going to be killed just as they had been.
6:12 Then I looked when the Lamb opened the sixth seal, and a huge earthquake took place; the sun became as black as sackcloth made of hair, and the full moon became blood red; 6:13 and the stars in the sky fell to the earth like a fig tree dropping its unripe figs when shaken by a fierce wind. 6:14 The sky was split apart like a scroll being rolled up, and every mountain and island was moved from its place. 6:15 Then the kings of the earth, the very important people, the generals, the rich, the powerful, and everyone, slave and free, hid themselves in the caves and among the rocks of the mountains. 6:16 They said to the mountains and to the rocks, “Fall on us and hide us from the face of the one who is seated on the throne and from the wrath of the Lamb, 6:17 because the great day of their wrath has come, and who is able to withstand it?”

The amazing symbolism runs throughout the rest of the book and of course it is highly debatable as to what is to be taken literally or symbolically. Further judgements are released upon the earth in the form of seven trumpets, two witnesses, a dragon (the devil), the beast (the antichrist) and the false prophet, and seven golden bowls. The judgements passed on to the Earth and it’s inhabitants include:

  • Plague
  • Earthquakes
  • Hailstorms
  • Fire
  • Famine
  • Meteor storm
  • Lack of drinking water
  • And more

Eventually the prophecy leads up to the antichrist assuming world domination with his false prophet overseeing the one-world religion. The antichrist rules the world for a period of time until the battle of Armageddon. At this point, Jesus Christ returns to earth and destroys the armies of the antichrist. Then the false prophet and the antichrist along with the devil are thrown down into the lake of fire. Interestingly enough, the story continues to state that the devil must be released one more time after Christ’s 1000 year reign. At this time a final battle takes place with the devil losing and being vanquished into the lake of fire forever. At this time God’s kingdom is setup for eternity and all who accept Jesus as their savior are allowed access to the kingdom of God.

The summary above is brief and this book alone can be studied over and over in order to digest all the symbolism and meaning behind the words. The book of Daniel and Ezekiel contains many prophecies as well. Bottomline, it all has to do with the battle between good and evil, the sides people pick and the ultimate fate of their choices. Following evil leads to permanent separation from God and accepting the salvation through Jesus Christ gains entry to a eternal life with God.

Bible Resources

2012 CONSPIRACY THEORY

Conspiracy theory or the conspiracy theory of history is not only an interesting topic but one in which should be examined seriously. If the overall theme is true or even parts of it, the freedom and rights of individuals throughout the world are in danger. The conspiracy involves people in high levels of society, the wealthy elite, international bankers, political leaders and secret societies. In general, it involves a long-term master plan to create a one-world system–a global system with one ruling government and one world religion (or no religion depending upon the point of view).

The start of the conspiracy is not truly known but its roots are found within secret societies for over hundreds of years. Again, its up for debate but one view is that it has roots with the Knights Templar. This secret society was formed approximately in 1119 a.d. during the time of the crusades. A handful of European knights were supposedly assigned to protect European travelers on their journey to and from the Middle East. These knights however were more interested in searching for treasure and holy relics than protecting European travelers. They eventually raided King Solomon’s temple and absconded with a variety of religious artifacts. However, It’s not proven but evidence suggests this to be true. Since the Knights Templar were in possession of these valuable items, they suddenly became extremely powerful. So powerful that even royalty relinquished their valuables to the society. This allowed the knights to accumulate a vast amount of wealth. This eventually lead to the establishment of the first international banking system. The society loaned money to monarchs collecting interest adding to their riches. Eventually the society was abolished by the Catholic Church under the orders from the Pope, influenced by King Philip IV of France. The survivors are believed to have joined other societies such as the Free Masons. The Knights Templar were accused of satanic worship and this is a highly contested topic. However, evidence suggests that the Templar leader of France, Jackques de Molay was involved in the occult and established 4 Hermetic Masonry lodges. Regardless, intermingling with the Free Masons of the time allowed the vanquished knights to further conduct their business in secret.

The Free Masons are another secret society that is still in existence throughout the world. The origins of free masonry are up for debate but some trace it back to biblical times while others place it in England with the formal establishment of various lodges in medieval times. The society is believed to have a set of beliefs linked to the ancient mystery religions of Egypt and Greece. With this tradition and the association of Templar occultists, an inner circle of Free Masons developed. While most of the membership is unaware of the true nature of the organization’s roots and occult practices, the inner circle of high-level masons are believed to have been responsible for the origins of an evil conspiracy.

From Free Masonry, an inner circle of members formed the Illuminati (the enlightened ones). The founder was Adam Weishaupt who was heavily involved in the occult. The order was founded on May 1, 1776 (May 1st is “Grand Climax,” an important day for Satanists). Weishaupt wrote his philosophy of Illuminism, which called for a one-world government and religion that controls the population. It outlined that private property was to be abolished and that its master plan was to be carried out in secret. Some researchers claim that Weishaupt’s philosophies influenced the writings of the Communist Manifesto. Furthermore, claims are made that members of the Illuminati aided the rise of Communism. It is believed that the Illuminati have infiltrated European and U.S. positions of power and are behind the scenes influencing policies and world events. For example, The Order of Skull & Bones, a secret society based at Yale, is believed to be an American extension of the Illuminati. Members of the order include Averill Harriman, Prescott Bush, George H.W. Bush, George W. Bush, and John Kerry. Yes, our last election was between two Skull & Bones members. What a coincidence.

Other organizations believed to be involved in the conspiracy are the Council on Foreign Relations, The Trilateral Commission, The Bilderbergers and the Federal Reserve. Families that are alleged to be involved include the Rothschilds, Reckefellers, Morgans, DuPonts and the Bush family.

To summarize, again the idea of the conspiracy is total population control by a one-world government. Many people believe it to be religious in nature, as a plan to usher in the antichrist. Interestingly enough, the book of revelations speaks of the antichrist, his one-world government and one-world religion. Events that could possibly lead up to a scenario such as this is a movement by the United Nations or some other global establishment to force control over many nations. Also, the implanted microchip that everyone would be forced to receive. Watch for more surveillance in public areas and the gradual erosion of our freedoms and rights as individuals.

More information will be posted on this topic as the site continues to be developed. Below are links to sites covering this topic.

2012 Mayan Calender

THE MAYAN CALENDAR

The Mayan calendar is not actually a single calendar that westerners are used to referencing today. It is actually a complex system of multiple calendars used in conjunction. Two calendars used in conjunction are the Tzolk’in and the Haab. The Tzolk’in calendar consists of 260 days. The Haab consists of 365 days. The combined use of these calendars creates a cycle of 52 Haabs (52 years) and is referred to as the Calendar Round. Small cycles of 13 days (Trecena) and 20 days (veintena) exist as well.

Another calendar used to track longer periods of time is referred to as the Long Count. This calendar is used to track dates relative to each other on a linear scale and utilizes a numeric decimal system to record dates. For example, the Mayan date for December 21, 2012 is 13.0.0.0.0. The long count cycle referred to as the “Great Cycle” lasts for 5,125.36 years. Correlating that to the Gregorian calendar used by most people in the world today, the starting date of the current long count cycle is August 11, 3,114 B.C.

Another interesting cycle is the precession of the equinoxes lasting approximately 26,000 years. The long count of 5,125 years is 1/5 of that cycle. December 21, 2012 marks the end of the Long Count and Precession Cycle. A fascinating astronomical occurrence will take place that day. The sun will be seen in a conjunction with the crossing point of the galactic equator and the ecliptic which is referred by the Mayans as the Sacred Tree. Since this is due to take place on the winter solstice, this should provide clear evidence that the proper end day of the Mayan calendar is December 21, 2012. Some say December 22,nd, 23rd or even other dates. However, the solstice was an important day to the Mayans and it is logical to think that they would conclude their calendar cycle on this day, coupled with the fact of the rare astronomical occurrence set to take place that day.

Overall, the Mayan calendar system is amazing and complex. It is the most accurate calendar system ever invented by anyone. The complexities go far beyond my capabilities to explain so I have listed links below to serve as excellent resources of information.

Saturday, September 13, 2008

Google patent application reveals plans for floating data centers


The idea of floating data centers is hardly a new one, but Google looks like it might be set to take things a big step further than most, at least if one of its recent patent applications is any indication. Apparently, Google not only plans to take advantage of the sea water for a cooling system, but generate power for the floating platforms using so-called Pelamis Wave Energy Converters as well (you can see it doing its thing in the video after the break). According to the patent application, that would allow the data centers to be moved closer to users to cut down on cross-country latency, and also make them ideally suited to more transient needs for computing power, such as after a natural disaster or when a military presence is needed. Of course, there's no evidence that Google has moved much beyond the sketch above just yet, but we certainly wouldn't put it past 'em to all of a sudden deploy a fleet of data centers when we least expect it.

[Via The Earth Times, thanks Bob]

Wednesday, September 10, 2008

LHC: Top 5 best and worst things that could happen

A few days ago I told you why the world is not going to end on September 10, when the LHC is switched on. So what is going to happen? Here's my list of best and worst things that could happen when the LHC finally starts smashing protons together:

The best

1. Time travellers from the future appear and say hello. Admittedly this isn't very likely, but theorists have shown that it is possible in principle. And it would be rather spectacular.

2. The smart money is on the LHC creating the famous Higgs boson, so we would finally know why things weigh what they do.

3. Special long-lived version of a particle called a gluino could be spat out. These could stick inside one the LHC???s giant detectors and decay when the accelerator is switched off. If this happened it would tell us that our universe is just one of many, many universes.

4. The LHC might show that extra dimensions of space exist. Some physicists believe this would be the LHC???s most profound discovery because it tells us string theory is on the right lines.

5. Nothing happens. If absolutely nothing new turns up at the LHC, it would shake fundamental physics to the core. It would tell us that all our understanding of forces and particles is wrong and we???d have to go back to the drawing board.

Worst things:

1. The lights go out in Geneva. The LHC consumes 120 megawatts of power, about the same as Geneva and its environs. CERN gets its electricity from both France and Switzerland, so a blackout is unlikely.

2. The proton beams become unstable and crash uncontrollably into a detector. At full pelt, each beam contains enough energy to melt 500 kilograms of copper. If a beam smashed directly into one the LHC???s giant experiments, it would fry the detectors. Engineers have built several safety systems to stop this happening.

3. Fewer party balloons. The LHC???s superconducting magnets are cooled with 120 tonnes of superfluid helium. Top ups will be needed if there are power cuts or problems with the magnets.

4. Part of the ring breaks. The ring uses superconducting magnets that need temperatures colder than outer space to work. If there is a problem, it will takes five weeks to warm the ring back up to room temperature and another five to cool it back down to 1.9 kelvin.

5. Nothing happens. It may be intellectual dynamite but if nothing new shows up at the LHC, there will be no more money for big physics.

Illustration on what LHC does[VIDEO]

follow this link below

CLICK Here To See The Video

First OF Protons pictures from LHC

Some of the first protons to be accelerated inside the Large Hadron Collider smashed into an absorbing device called a collimator at near light speed, producing a shower of particle debris recorded in this image. About an hour later the beam completed a full circuit of the 27km tunnel, to cheers from physicists (Image: CERN)

The Large Hadron Collider : BIG BANG Theory Re-Created

The Large Hadron Collider is the world's most powerful particle accelerator. Straddling the border between France and Switzerland at the CERN laboratory, the LHC is designed to answer some of the most profound questions about the universe:

What is the origin of mass? Why are we made of matter and not antimatter? What is dark matter made of?

It could also provide important new clues about conditions in the very early universe, when the four forces of nature were rolled into one giant superforce.

Particle smasher

To find out, the LHC will set protons travelling at 99.9999991% of the speed of light around a circular tunnel. It will then smash them together at four points on the ring, each of which are surrounded by huge experiments.

The collision energy produced is 14 teraelectronvolts (TeV), seven times greater than its nearest counterpart � the Tevatron at Fermilab in Batavia, Illinois.

In everyday terms, this energy isn't so great � a flying mosquito has about 1 TeV of kinetic energy. What makes the LHC so special is that this energy is concentrated in a region a thousand billion times smaller than a speck of dust.

The LHC is the latest in a long tradition of particle accelerators used to explore the building blocks of matter and the forces that act between them. Nearly 100 years ago, New Zealand physicist Ernest Rutherford revealed the structure of the atom by firing alpha particles at a thin gold foil.

Similarly, in the 1930s physicists used electromagnetic fields to accelerate protons to high energies inside long vacuum tubes. At very high energies the protons were smashed apart, only for the fragments and collision energy to be transformed into other particles.

Exotic output

So great is the concentration of energy at the LHC that it recreates conditions similar to those 10-25 seconds after the big bang, soon after the particles and forces that shape our universe came into being. With so much energy available, the LHC should be able to create certain massive particles for the first time in the lab.

Among them, physicists hope, will be the Higgs boson, the particle that gives others their masses. They will also be looking for signs of a theoretical supersymmetry that might give us clues about how the forces looked in the early universe.

Supersymmetry predicts that every particle we know has a heavy supersymmetric partner. The lightest supersymmetric particle is also a promising candidate for dark matter, the invisible entity thought to amount to 95% of the universe's mass.

The Higgs and supersymmetry are on firm theoretical footing. Some theorists speculate about more outlandish scenarios for the LHC, including the production of extra dimensions, mini black holes, new forces, and particles smaller than quarks and electrons. A test for time travel has also been proposed.

Building the LHC

The LHC was conceived back in 1979. It is housed 100 metres underground in a circular tunnel once filled by another machine called the Large Electron Positron Collider, which switched off in 2000. Protons are injected into the LHC from a chain of smaller accelerators that whips them up to higher energies.

Every second the protons will make 11,245 laps of the 27-kilometre ring and, at four points on the ring, they are made to collide head-on with protons travelling in the opposite direction.

Surrounding each of these collision points are four giant detectors called ATLAS, CMS, LHCb and ALICE. ATLAS and CMS are designed to look for all kinds of particles created in the collisions, while LHCb and ALICE are specialised detectors.

Results galore

LHCb is designed to make exquisite measurements of particles called B mesons that could reveal subtle differences between matter and antimatter. B mesons live for a short while before decaying, and this process could be influenced by the Higgs, supersymmetric particles, or some other new physics.

ALICE will come into its own starting in November 2009, when the LHC will swap its colliding protons for lead ions for a few weeks. These collisions should create temperatures 100,000 times hotter than the centre of the sun, hot enough to reveal a novel state of matter called the quark gluon plasma. By studying this, physicists hope to understand how the quarks and gluons from the big bang fireball condensed into the protons and neutrons we see today.

In addition there are two smaller experiments called LHCf and Totem, for testing theories of ultra-high-energy cosmic rays and measuring the size of protons. Over 6000 scientists work on the LHC and its experiments, which cost $10 billion.

No worries

Many people are worried by theorists' predictions that the LHC could create microscopic black holes that could inflate and swallow the Earth.

CERN physicists have assessed the risk to be as close to zero as scientists dare to say. If black holes are created at the LHC, they will evaporate within 10-26 seconds, via a process first described by British physicist Stephen Hawking.

Even if Hawking is wrong and black holes do not evaporate, physicists have experimental reasons for feeling safe. Cosmic rays from outer space have far greater energies than the LHC will produce and have been colliding with the solar system's planets for billions of years without problems.

What's more, there are far more cosmic ray collisions than LHC collisions. No black holes have swallowed Jupiter or Saturn.

Accelerator physicists plan to send the first protons around the entire LHC ring on 10 September. If all goes well, collisions will start a few weeks later at a reduced energy of 10 TeV.

Friday, September 5, 2008

Google co-founder expects Chrome for Android

MOUNTAIN VIEW, Calif.--Google's new Chrome browser is for PCs today, but company co-founder Sergey Brin expects the technology will make its way to Android, the company's mobile phone operating system and software suite.

Chrome and Android were developed largely separately, Brin said in an interview at the Chrome launch event Tuesday. "We have not wanted to bind one's hands to the other's," Brin said. But you can expect that to change now that both projects are public and nearing their first final releases.

"Probably a subsequent version of Android is going to pick up a lot of the Chrome stack," Brin said, pointing to JavaScript improvements as one area.

And the brand name likely will follow. "My guess is we'll have 'Chrome-like' or something similar," he said.

Chrome and Android's current browser both already employ WebKit, an open-source project for the process of interpreting the HTML code that makes up a Web page and rendering it on a screen.

Click here for full coverage of the Google Chrome launch.

Google co-founder Sergey Brin speaks at the Chrome browser launch event.

Google co-founder Sergey Brin speaks at the Chrome browser launch event.

(Credit: Stephen Shankland/CNET News)

Tuesday, September 2, 2008

Google targets Microsoft with web browser

Search and advertising giant Google will tomorrow launch a trial version of its own web browser in a clear attempt to break Microsoft's dominance over the way people access the web.

Google say their software, called Chrome, is designed to handle the latest web services such as video-rich pages and online office document editing faster and more securely.

A rethink of the browser is needed, says the firm, because existing programs have their roots in an age when the web offered only text and images.

Google confirmed its browser's existence in a company blog post after it mistakenly mailed details of Chrome to a blog.

Comic error

A 38-page comic book sent to the blog – available to view online here – described Chrome and its creators' hopes for the product.

A trial version of Chrome for Windows users will be available from this site on tomorrow. Versions for Apple Mac and Linux users are planned.

Chrome's launch coincides with the introduction last month of Internet Explorer 8 by arch-rival Microsoft last month.

Roughly 75% of all web users access the web using a Microsoft browser, around 18% using the open source Mozilla Firefox and 6% Apple's Safari browsers.

Open source

Google's engineers have used open-source code from a variety of projects including Apple's Web Kit used in Safari, and Firefox.

Chrome's code will itself be open source – available for other developers to enhance and expand.

Google says that Chrome will load pages faster and more securely than rival browsers. It also has a purpose-built engine for loading the interactive JavaScript code behind many of the advanced features of current websites. This is designed to Chrome run the next generation of yet-to-be-invented web applications.

Google stands to benefit from people using the new software. Google's Toolbar already collects information about the pages visited by users, which helps the company tune its search and advertising services. Chrome could collect information in a similar way.

'Porn mode'

Another feature is a privacy mode that lets users create an "incognito" window where "nothing that occurs in that window is ever logged on your computer".

A similar feature, dubbed "porn mode" by bloggers, was recently announced by Microsoft for Internet Explorer 8. Apple's Safari already features a private browsing mode.

John Lilly, chief executive of the non-profit company Mozilla Corp that promotes Firefox, said Google had recently renewed its arrangement to be the largest financial backer of his company until 2011.

Mozilla recently introduced its own upgraded browser, Firefox 3, and has collaborated with Google on technical issues in the past, such as how to make browsers more secure.

Lilly says that Mozilla and Google would continue to collaborate where it made sense for both organisations.

But he acknowledges things have changed: "With [Explorer], Firefox, Safari, Opera, etc – there's been competition for a while now, and this increases that."

Saturday, August 23, 2008

Enumaration .NET

An enumeration is a group of related constants, each of which is given a descriptive name.
Every enumerated value corresponds to a preset integer. In your code, however, you can
refer to an enumerated value by name, which makes your code clearer and helps prevent
errors. For example, it’s much more straightforward to set the border of a label to the enumerated
value BorderStyle.Dashed rather than the obscure numeric constant 3. In this
case, Dashed is a value in the BorderStyle enumeration, and it represents the number 3.

// Define enumaration type called enumType

Enum enumType

{

Admin; //Each value in the enum corresponding have a integer value Starting from 0 (zero)

Guest;

Anonymous;

}

Delegates .Net

Delegates allow you to create a variable that “points” to a method. You can use this variable
at any time to invoke the method. Delegates help you write flexible code that can be
reused in many situations. They’re also the basis for events The first step when using a delegate is to define its signature. A delegate variable can point only to a method that matches its specific signature. In other words, it must have the same return type and the same parameter types. For example, if you have a method that accepts a single string parameter and another method that accepts two string parameters,
you’ll need to use a separate delegate type for each method. To consider how this works in practice, assume your program has the following
function:

private string TranslateEnglishToFrench(string lang)

{

//statments;

}
This function returns a string and accepts a single string argument. With those two
details in mind, you can define a delegate that matches this signature. Here’s how you
would do it: private delegate string StringFunction(string in);

Notice that the name you choose for the parameters and the name of the delegate
don’t matter. The only requirement is that the data types for the return value and parameters
match exactly. Once you’ve defined a type of delegate, you can create and assign a delegate variable at any
time. Using the StringFunction delegate type, you could create a delegate variable like this:

StringFunction functionReference;

Once you have a delegate variable, the fun begins. Using your delegate variable,
you can point to any method that has the matching signature. In this example, the
StringFunction delegate type requires one string parameter and returns a string.
Thus, you can use the functionReference variable to store a reference to the
TranslateEnglishToFrench() function you saw earlier. Here’s how to do it:

FunctionReference=TranslateEnglishToFrench;

Access specifire .Net

Keyword Accessibility
public Can be accessed by any other class
private Can be accessed only by code procedures inside the current class
internal Can be accessed by code procedures in any of the classes in the current
assembly (the compiled code file)
protected Can be accessed by code procedures in the current class or by any class
that inherits from this class
protected internal Can be accessed by code procedures in the current application or by any
class that inherits from this class

Mysteries of the Mind

Much of what we don’t understand about being human is simply in our heads. The brain is a befuddling organ, as are the very questions of life and death, consciousness, sleep, and much more. Here’s a heads-up on what’s known and what’s not understood about your noggin.

Dreams
If you were to ask 10 people what dreams are made of, you’d probably get 10 different answers. That’s because scientists are still unraveling this mystery. One possibility: Dreaming exercises brain by stimulating the trafficking of synapses between brain cells. Another theory is that people dream about tasks and emotions that they didn’t take care of during the day, and that the process can help solidify thoughts and memories. In general, scientists agree that dreaming happens during your deepest sleep, called Rapid Eye Movement (REM).

Slumber Sleuth
Fruit flies do it. Tigers do it. And humans can’t seem to get enough of it. No, not that. We’re talking about shut-eye, so crucial we spend more than a quarter of our lives at it. Yet the underlying reasons for sleep remain as puzzling as a rambling dream. One thing scientists do know: Sleep is crucial for survival in mammals. Extended sleeplessness can lead to mood swings, hallucination, and in extreme cases, death. There are two states of sleep—non-rapid eye movement (NREM), during which the brain exhibits low metabolic activity, and rapid eye movement (REM), during which the brain is very active. Some scientists think NREM sleep gives your body a break, and in turn conserves energy, similar to hibernation. REM sleep could help to organize memories. However, this idea isn’t proven, and dreams during REM sleep don’t always correlate with memories.

Phantom Feelings
It’s estimated that about 80 percent of amputees experience sensations, including warmth, itching, pressure and pain, coming from the missing limb. People who experience this phenomenon, known as “phantom limb,” feel sensations as if the missing limb were part of their bodies. One explanation says that the nerves area where the limb severed create new connections to the spinal cord and continue to send signals to the brain as if the missing limb was still there. Another possibility is that the brain is “hard-wired” to operate as if the body were fully intact—meaning the brain holds a blueprint of the body with all parts attached.

Mission Control
Residing in the hypothalamus of the brain, the suprachiasmatic nucleus, or biological clock, programs the body to follow a 24-hour rhythm. The most evident effect of circadian rhythm is the sleep-wake cycle, but the biological clock also impacts digestion, body temperature, blood pressure, and hormone production. Researchers have found that light intensity can adjust the clock forward or backward by regulating the hormone melatonin. The latest debate is whether or not melatonin supplements could help prevent jet lag—the drowsy, achy feeling you get when “jetting” across time zones.

Memory Lane
Some experiences are hard to forget, like perhaps your first kiss. But how does a person hold onto these personal movies? Using brain-imaging techniques, scientists are unraveling the mechanism responsible for creating and storing memories. They are finding that the hippocampus, within the brain’s gray matter, could act as a memory box. But this storage area isn’t so discriminatory. It turns out that both true and false memories activate similar brain regions. To pull out the real memory, some researchers ask a subject to recall the memory in context, something that’s much more difficult when the event didn’t actually occur.

Brain Teaser
Laughter is one of the least understood of human behaviors. Scientists have found that during a good laugh three parts of the brain light up: a thinking part that helps you get the joke, a movement area that tells your muscles to move, and an emotional region that elicits the “giddy” feeling. But it remains unknown why one person laughs at your brother’s foolish jokes while another chuckles while watching a horror movie. John Morreall, who is a pioneer of humor research at the College of William and Mary, has found that laughter is a playful response to incongruities—stories that disobey conventional expectations. Others in the humor field point to laughter as a way of signaling to another person that this action is meant “in fun.” One thing is clear: Laughter makes us feel better.

Nature vs. Nurture
In the long-running battle of whether our thoughts and personalities are controlled by genes or environment, scientists are building a convincing body of evidence that it could be either or both! The ability to study individual genes points to many human traits that we have little control over, yet in many realms, peer pressure or upbringing has been shown heavily influence who we are and what we do.

Mortal Mystery
Living forever is just for Hollywood. But why do humans age? You are born with a robust toolbox full of mechanisms to fight disease and injury, which you might think should arm you against stiff joints and other ailments. But as we age, the body’s repair mechanisms get out of shape. In effect, your resilience to physical injury and stress declines. Theories for why people age can be divided into two categories: 1) Like other human characteristics, aging could just be a part of human genetics and is somehow beneficial. 2) In the less optimistic view, aging has no purpose and results from cellular damage that occurs over a person’s lifetime. A handful of researchers, however, think science will ultimately delay aging at least long enough to double life spans.

Deep Freeze
Living forever may not be a reality. But a pioneering field called cryonics could give some people two lives. Cryonics centers like Alcor Life Extension Foundation, in Arizona, store posthumous bodies in vats filled with liquid nitrogen at bone-chilling temperatures of minus 320 degrees Fahrenheit (78 Kelvin). The idea is that a person who dies from a presently incurable disease could be thawed and revived in the future when a cure has been found. The body of the late baseball legend Ted Williams is stored in one of Alcor’s freezers. Like the other human popsicles, Williams is positioned head down. That way, if there were ever a leak in the tank, the brain would stay submerged in the cold liquid. Not one of the cryopreserved bodies has been revived, because that technology doesn’t exist. For one, if the body isn’t thawed at exactly the right temperature, the person’s cells could turn to ice and blast into pieces.

Consciousness
When you wake up in the morning, you might perceive that the Sun is just rising, hear a few birds chirping, and maybe even feel a flash of happiness as the fresh morning air hits your face. In other words, you are conscious. This complex topic has plagued the scientific community since antiquity. Only recently have neuroscientists considered consciousness a realistic research topic. The greatest brainteaser in this field has been to explain how processes in the brain give rise to subjective experiences. So far, scientists have managed to develop a great list of questions

Assembley Lang to find smallest number

Program for finding Smallest Number from given Block of data.

Algorithm :-

1. Declare block of five numbers into data segment & smallest variable.
2. Initialise data segment.
3. Load counter into CL register.
4. Clear AX register.
5. Load effective address of block into SI register.
6. Move first number into AL register.
7. Increment SI register.
9. Compare first number with second number. If carry flag is reset then move second number to AL register, else go to step 10.
10. Increment SI register.
11. Decrement counter.
12. Go to Step 9, if zero flag reset.
13. Store result at smallest veriable.
14. Stop.

Program :-

DATA SEGMENT

SER1 DB 10H,02H,20H,04H,0AH
SM DB 00H
DATA ENDS

CODE SEGMENT

ASSUME CS:CODE,DS:DATA

MOV AX,DATA
MOV DS,AX
MOV CL,04H
MOV AX,0000H
LEA SI,SER1
MOV AL,DS:[SI]
INC SI
UP: CMP AL,DS:[SI]
JC DOWN
MOV AL,DS:[SI]
DOWN:INC SI
DEC CL
JNZ UP
MOV SM,AL
INT 3H

CODE ENDS
END

Assembley Lang Findding larges number

Program for finding Largest Number from given Block of data.

Algorithm :-

1. Declare block of five numbers into data segment & largest variable.
2. Initialise data segment.
3. Load counter into CL register.
4. Clear AX register.
5. Load effective address of block into SI register.
6. Move first number into AL register.
7. Increment SI register.
9. Compare first number with second number. If carry flag is set then move second number to AL register, else go to step 10.
10. Increment SI register.
11. Decrement counter.
12. Go to Step 9, if zero flag reset.
13. Store result at largest veriable.
14. Stop.

Program :-

DATA SEGMENT

SER1 DB 10H,02H,20H,04H,0AH
LR DB 00H
DATA ENDS

CODE SEGMENT

ASSUME CS:CODE,DS:DATA

MOV AX,DATA
MOV DS,AX
MOV CL,04H
MOV AX,0000H
LEA SI,SER1
MOV AL,DS:[SI]
INC SI
UP: CMP AL,DS:[SI]
JNC DOWN
MOV AL,DS:[SI]
DOWN:INC SI
DEC CL
JNZ UP
MOV LR,AL
INT 3H

CODE ENDS
END

OSI Reference Model

OSI Reference Model :-
• Architecture :-

Application Layer
Presentation Layer
Session Layer
Transport Layer
Network Layer
Data Link Layer
Physical Layer

• Introduction :-

• The International Standard Organization (ISO) is a multinational body decided to worldwide agreement on international standards .

• An ISO standard that covers all network communications is the Open System Interconnection model.

• It was first introduced in the late 1970s.

• An open system is a set of protocols that allows any two different systems to communicate regardless of their underlying architecture.

• OSI model is a layered architecture. It has following layers :-

1. Physical Layer
2. Data Link Layer
3. Network Layer
4. Transport Layer
5. Session Layer
6. Presentation Layer
7. Application Layer

• Functions of Layers :-

1. Physical Layer :-

• Physical characteristics of interfaces and medium :-
The physical layer defines the characteristics of the interface between the devices and the transmission medium. It also defines the type of transmission medium.
• Representation of bits :-
The physical layer data consist of a stream of bits with no interpretation. To be transmitted, bits must be encoded into signals. The physical layer defines type of encoding.
• Data Rate :-
It defines the number of bit sent per second.
• Synchronization of bits :-
The sender and receiver not only must use same data rate but also must be synchronizes at the bit level. Sender and receiver clocks must be synchronized.
• Line configuration :-
The physical layer is concerned with connection of devices to media.
• Physical topology :-
The physical topology defines how devices are connected to make network. Devices can be connected using Bus, Star, Mesh, Ring, Tree topologies.

• Transmission mode :-
The physical layer also defines the direction of the transmission between two devices. i.e. Simplex, Half-Duplex or Full-Duplex.

2. Data Link Layer :-

• Framing :-
The data link layer divides the stream of bits received from the network layer into manageable data units called frames.
• Physical Addressing :-
Data link layer adds a header to the frame to define the sender and/or receiver.
• Flow control :-
If the rate of data received is by receiver is less than the rate at which data is send by sender, the data link layer imposes flow control mechanism to avoid overwhelming of receiver.
• Error control :-
The data link layer adds reliability to the physical layer by adding mechanism to detect and retransmit damaged or lost frames.
• Access control :-
When two or more devices are connected to same link, data link layer protocols are necessary to determine which device has control over the link at any given time.

3. Network layer :-
• Logical addressing :-
Physical addressing implemented by data link layer handles addressing problem locally. For global addressing logical addressing is implemented by network layer.
• Routing :-
When independent networks are connected to create internetworks, the connecting devices (router or switches) route the packet to their final destination. Network layer provides this function.

4. Transport Layer :-

• Service-point addressing :-
Source to destination delivery means delivery not only from one computer to another computer but also from specific process running on one computer to process running on another computer.
The transport layer header must therefore include a type of address called a service point address (or port address).
• Segmentation and reassembly :-
The message is divided into transmittable segments, with each segment containing a sequence number. These number enable the transport layer to reassemble the message correctly upon arriving at the destination.
• Connection control :-
Transport layer can be connectionless or connection oriented.
• Flow control :-
Like data link layer, the transport layer is responsible for flow control.
• Error control :-
Like data link layer, the transport layer is responsible for error control.

5. Session layer :-
• Dialog control :-
The session layer allows to two systems to enter into dialog. It allows the communication between two processes to take place in either half-duplex or full-duplex mode.
• Synchronization :-
The session layer allows a process to add checkpoints, or synchronization points, to a stream of data.

6. Presentation layer :-
• Translation :-
In exchanging of data between two processes, it is needed to maintain the form of data correct. The presentation layer is responsible for this.
• Encryption :-
To carry sensitive information the system must be able to ensure a privacy. Encryption means the sender transfer the information to another form and sends the resulting message over the network. Decryption is takes place at receiver end.
• Compression :-
Data compression reduces the number of bits contained within the information. It becomes important in transmission of multimedia such as text, audio, video.

7. Application layer :-

• Network virtual terminal :-
It is a software version of physical terminal, and it allows a user to logon on remote host.

• File transfer, access and management :-
It allows a user to access a file from remote host, control file from remote host.
• Mail services :-
It provides basis for e-mail forwarding and storage.
• Directory services :-
It provides distributed database sources and access for global information about various objects and services.