Sunday, 31 January 2016

10 best Graphics cards on the planet




10 best Graphics cards on the planet
Best Graphics Cards


Is it accurate to say that you are a PC gamer? At that point trust us on this: there is no other part almost as essential as the Graphics card.

Yes, your screen(monitor) and even your mouse matter. Be that as it may, nothing has more effect on both frame rates and fun than your graphics card. Issue is, at any minute there are scores of cards to browse and they commonly all case to have pixel-pushing flawlessness.

The basic arrangement is to purchase the absolute best. Be that as it may, that likewise implies the most costly. For the majority of us, then, it's about value for-money at a given spending plan. Simply recall to ponder how you coordinate your design card with whatever remains of your PC.

On the off chance that you have a super-high determination monitor, for case, you're going to require a top of the line design card to benefit as much as possible from it. In any case, just as, there's little point emptying on the finest GPU cash can purchase if its being bottle necked by an old CPU or sustaining a weak monitor.

In view of all that, here's our manual for the quickest, as well as the best esteem PC design you can purchase.


10 best Graphics cards on the planet
EVGA GeForce Titan X SuperClock


1. EVGA GeForce Titan X SuperClock

Just the mammoth

Stream Processors: 3072 | Core Clock: 1127MHz | Memory: 12GB | Memory Clock: 7010MHz | Power Connectors: 1 x 6-pin, 1 x 8-pin | Length: 267mm | Outputs: 3 x DisplayPort, 1 x HDMI, 1 x DVI

EVGA GeForce Titan X SuperClock

The most effective shopper GPU 12GB of video memory Hugely expensive Price doesn't legitimize execution

In the event that cash is no article, the Titan X SuperClock offers the most power you can escape a solitary card. Pressing a gigantic 12GB of GDDR5 memory, the most capable buyer GPU around has 3072 shaders and a center clock recurrence of 1216MHz, which outpaces the Titan X's 1075MHz help clock. Opening one of these brutes inside your apparatus sets you up pleasantly for 4K gaming, and you could even attach two or three Ultra HD boards without encountering any stammering in the most recent titles.


10 best Graphics cards on the planet
Zotac 980 Ti


2. Zotac GeForce GTX 980Ti AMP Extreme Edition

Titan X power without Titan X cost

Stream Processors: 2816 | Core Clock: 1253MHz | Memory: 6GB | Memory Clock: 7220MHz | Power Connectors: 2 x 8-pin | Length: 267mm | Outputs: 3 x DisplayPort, 1 x HDMI, 1 x DVI

Zotac GeForce GTX 980Ti AMP Extreme Edition

Nearly as effective as the Titan X Beats Titan X with the OC Still really costly Only justified, despite all the trouble for high-res gaming

Despite the fact that it can't coordinate the Titan X as far as video memory (6GB versus 12GB), the GeForce GTX 980Ti offers a higher clock speed and can regularly beat that card for extensively less cash. Cards with the "AMP" moniker generally mean business, and this card satisfies its name. It'll give you amusement in determination a chance to up to 4K, regardless of the possibility that a few titles push the card as far as possible. The 980Ti AMP Extreme Edition might be preferred quality over the Titan X SuperClock, yet it's a long way from shabby, costing around the same as a financial plan (or passage level mid-range) gaming PC.

10 best Graphics cards on the planet
R9 Fury X


3. Gigabyte Radeon R9 Fury X

Utilizes an all-as a part of one fluid cooling framework and new High-Bandwidth Memory

Stream Processors: 4096 | Core Clock: 1050MHz | Memory: 4GB | Memory Clock: 1000MHz | Power Connectors: 2 x 8-pin | Length: 195mm | Outputs: 3 x DisplayPort, 1 x HDMI

Gigabyte Radeon R9 Fury X

High transfer speed memory Over 4,000 stream processors Only 4GB of HBM, battles at 4K Water-store consumes up room

The main AMD section in our rundown includes an in with no reservations one fluid cooling framework that is like ones that keep PC processors cool. It implies you'll require an extra fan mount inside the case to fit it, however the upside of having one is calmer operation and lower temperatures than what you'd get without such a setup.

The R9 Fury X is AMD's response to the Nvidia GeForce 980 Ti, and despite the fact that it isn't exactly on par as far as execution, its 4096 stream processors, 256 composition units and a gigantic 4068-piece memory transport helps it move more pixels than any other time in recent memory. Gracious, and the card additionally saw AMD make the jump from GDDR5 to quicker HBM memory, in spite of the fact that there's just 4GB of it. That implies the R9 Fury X can battle in case you're playing especially requesting titles in 4K.


10 best Graphics cards on the planet
Radeon R9 Nano


4. Sapphire Radeon R9 Nano

Minor graphics card packs a major punch

Stream Processors: 4096 | Core Clock: 1000MHz | Memory: 4GB | Memory Clock: 1000MHz | Power Connectors: 1 x 8-pin | Length: 152mm | Outputs: 1 x DisplayPort, 1 x HDMI, 2 x DVI

See more Sapphire Radeon R9 Nano bargains

Delightfully little Low power utilization Small size doesn't make it less expensive Not exactly as intense as the Fury X

Building a little PC no more means going on force on account of new Graphics cards like the Sapphire Radeon R9 Nano. AMD's dinky video card is sufficiently short to crush into the littlest of PC cases without giving up the crude snort that you get from top of the line cards. Profoundly productive for a Fiji GPU, it has the same 4GB of 4096-piece HBM memory found in the Fury X, with an indistinguishable number of composition units and ROPs. The clock pace is 5% lower, yet on the in addition to side you won't require as enormous power supply to run with it because of the force envelope dropping to only 175W.

Perused the full survey: Sapphire Radeon R9 Nano


10 best Graphics cards on the planet

Palit GeForce GTX 970 Super JetStream


5. Palit GeForce GTX 980 Super JetStream

A potential deal, in spite of just 4GB of memory

Stream Processors: 2048 | Core Clock: 1203MHz | Memory: 4GB | Memory Clock: 7200MHz | Power Connectors: 2 x 6-pin | Length: 269mm | Outputs: 3 x DisplayPort, 1 x HDMI, 2 x DVI

Palit GeForce GTX 980 Super JetStream

Can be found at fair costs Plenty of gaming execution Only 4GB of memory is somewhat mean Heavily OC'd models are expensive

In case you're searching for a card that will handle 4K amusements on Medium quality settings, look no more distant than the Palit GeForce GTX 980 Super JetStream. This card used to be Nvidia's speediest non-Titan offering before the 980Ti tagged along, so it's an expert. Highlighting 2,048 stream processors, a 1,203MHz center clock rate and 4GB of memory, it offers a better than average mix of clout and esteem.


10 best Graphics cards on the planet
Sapphire
6. Sapphire Radeon R9 Tri-X 390X

AMD's card has the GTX 980 in its sights

Stream Processors: 2816 | Core Clock: 1055MHz | Memory: 8GB | Memory Clock: 6000MHz | Power Connectors: 2 x 8-pin | Length: 308mm | Outputs: 1 x DisplayPort, 1 x HDMI, 2 x DVI

Sapphire Radeon R9 Tri-X 390X

Lower cost than GTX 980 Triple-fan cooler from Sapphire GDDR5 memory instead of HBM 375W force utilization

With regards to cost, the Radeon R9 Tri-X 390X sits some place between Nvidia's GTX 970 and 980 cards. It regularly shows signs of improvement of the previous card, however the 970 performs better in a few amusements. The Tri-X 390X produces rankling outline rates at resolutions up to 2,560 x 1,440 with every realistic point of interest dialed up to 10. Including 2,816 stream processors and a center clock velocity of 1,055MHz, it doesn't exactly pack the muscle required for 4K gaming unless you're playing lesser requesting titles.


10 best Graphics cards on the planet
MSI GTX 970


7. MSI GeForce GTX 970 Gaming Edition

Esteem meets execution in Nvidia's competent card

Stream Processors: 1664 | Core Clock: 1140MHz | Memory: 4GB | Memory Clock: 7010MHz | Power Connectors: 1 x 6-pin, 1 x 8-pin | Length: 269mm | Outputs: 1 x DisplayPort, 1 x HDMI, 2 x DVI

MSI GeForce GTX 970 Gaming Edition

Best execution for under £300 Still prepared to handle 1440p Struggles with high detail at 4K Still a mess of money

A variation of a standout amongst the most well known design cards around, the GTX 970 Gaming release is a 1080p creature. You could even escape with gaming at 2,560 x 1,440, however you'll need to temper desires with regards to 4K. Including 1,664 stream processors, a center clock of 1,140MHz and 4GB of memory, the GTX 970 offers the standard execution you might be searching for without burning up all available resources.

10 best Graphics cards on the planet
380X


8. Asus Radeon R9 380X OC STRIX

Reassures be careful, the OC STRIX conveys shocking 1080p execution

Stream processors: 2,048 | Core Clock: 1,030MHz | Memory: 4GB GDDR5 | Memory Clock: 1,425MHz | Power associations: 2x 6-pin | Length: 271mm | Outputs: 2x DVI, 1x DisplayPort, 1x HDMI 1.4

Asus Radeon R9 380X OC STRIX

Incredible 1080p execution Excellent Asus cooling Middling 1440p ability Quicker GPUs aren't much pricier

In a comparable vein to the MSI GTX 970 card over, the Asus Radeon R9 380X OC Strix handles 1080p gaming easily, and can convey noteworthy casing rates at QHD as well. AMD's mid-range card is closer situated to the GTX 960 as far as crude execution, which is noteworthy considering the expense. What's more, since it uses Asus' STRIX cooling outline, the card stays moderately calm while being put through its paces, with the fans just kicking in when it tops 60 degrees C.

Perused the full survey: Asus STRIX R9 380X OC audit

10 best Graphics cards on the planet
GTX 960


9. Asus GeForce GTX 960 DirectCU2 OC Strix

On a financial plan? The reasonable GTX 960 still conveys the merchandise

Stream Processors: 1024 | Core Clock: 1253MHz | Memory: 2GB | Memory Clock: 7200MHz | Power Connectors: 1 x 6-pin, 1 x 8-pin | Length: 215mm | Outputs: 3 x DisplayPort, 1 x HDMI, 1 x DVI

See more Asus GeForce GTX 960 DirectCU2 OC Strix bargains

Totally fine to game at 1080p Short and simple to fit into most cases Lags behind AMD's R9 380X Only 2GB video memory

The GeForce GTX 960 is a reasonable card and an incredible alternative in case you're hoping to amusement on a financial plan. With a short outline that makes it simple to slip into PC cases, the card conveys awesome gaming execution at 1080p on account of its 1,024 stream processors, center clock rate of 1,253MHz and 2GB of video memory. Execution insightful, Nvidia's card falls behind ones in the value section above, so things begin to get rough when you start to raise the determination. Still, you can't turn out badly in case you're hoping to amusement at what is still the most well known determination today.

Perused the full audit: Asus GeForce GTX 960 DirectCU2 OC Strix


10 best Graphics cards on the planet
EVGA


10. EVGA GeForce GTX 750Ti SC


An Graphics chip that is super (and super shoddy) 

Stream Processors: 640 | Core Clock: 1176MHz | Memory: 2GB | Memory Clock: 5400MHz | Power Connectors: None | Length: 170mm | Outputs: 1 x HDMI, 1 x DVI, 1 x VGA 

EVGA GeForce GTX 750Ti SC 

Incredible quality at under £100 Fine to at run 1080p recreations More money spent = more execution 

Can't deal with the most recent amusements 

In view of Nvidia's Maxwell engineering, the GTX 750Ti SC is a reasonable card that still packs the most recent innovation. This section level offering is still up to the errand of playing the most recent amusements in case you're content with playing on Low or Medium quality settings at 1080p determination, and in light of the fact that it's little it's anything but difficult to drop into an essential PC to give it some additional graphical snort. Simply don't anticipate that it will work marvels

Saturday, 30 January 2016

What is PC security?

Computer Security is the procedure of averting and recognizing unapproved utilization of your PC. It includes the procedure of protecting against gatecrashers from utilizing your PC assets for malevolent goals or for their own particular picks up (or notwithstanding accessing them coincidentally). 

PC security is a branch of Information Security and is frequently utilized conversely with the term. It incorporates a few efforts to establish safety, for example, programming programs like hostile to infection suites, firewalls, and client dependant measures, for example, initiating deactivating certain product highlights like Java scripts, ActiveX and being watchful in utilizing the PC and the system assets or the Internet. 

PC Security is worried with four primary zones: 

1. Confidentiality:- Only approved clients can get to the information assets and data. 

2. Integrity:- Only approved clients ought to have the capacity to change the information when required. 

3. Availability:- Data ought to be accessible to clients when required. 

4. Authentication:- are you truly speaking with whom you think you are corresponding with 

Why is PC security so critical? 

Avoidance of information burglary, for example, financial balance numbers, charge card data, passwords, business related reports or sheets, and so on is key in today's interchanges since a large number of our everyday activities rely on upon the security of the information ways. 

Information present in a PC can likewise be abused by unapproved interruptions. An interloper can alter and change the project source codes and can likewise utilize your photos or email records to make defamatory substance, for example, obscene pictures, fake deluding and hostile social records. 

Noxious aims can likewise be a variable in PC security. Interlopers regularly utilize your PCs for assaulting different PCs or sites or systems for making destruction. Wrathful programmers may crash somebody's PC framework to make information misfortune. DDOS assaults can be made to avoid access to sites by slamming the server. 

Worst passwords of 2015: Star Wars references sneak onto list

Worst passwords of 2015: Star Wars references sneak onto list
naseemjumma.blogspot.com
As much as I despise it when a site lets me know my secret key needs to incorporate 25 non-rehashing letters in both capitals and lowercase, with no less than nine exceptional characters, my grandma's original surname and five numbers from an anecdotal dialect, I know the site at any rate has my well being and security at the top of the priority list. Be that as it may, not each bit of innovation requires such an unguessable code and tech clients are as yet relying so as to exploit that reality on completely dreadful passwords. 

Security applications and administrations organization SplashData on Tuesday discharged its yearly rundown of the most exceedingly bad passwords. The 2015 release looks somewhat like the 2014 rendition, yet there are some fascinating new improvements, including an inclining toward Star Wars. 

As hard as it is to accept, "123456" at the end of the day beat the rundown, much the same as a year ago. The second opening is likewise unaltered and holds the really horrendous "secret word." The main hardly better "12345678" comes in third, and the sluggish "qwerty" takes up the fourth position. Things don't generally change much until we take a gander at the seventh opening, which contains "football." The donning leisure activity comes in above "baseball" at No. 10. 

The base of the main 25 rundown is the place things get truly quirky. The secret key "solo" comes in at No. 23 and "starwars" debuts at No. 25. "Princess" comes in at No. 21, however it's difficult to discern whether it's pie in the sky thinking or a reference to Princess Leia. None of these achieved the strong statures of the legendary "winged serpent" at No. 16, a secret word that dropped seven spots subsequent to the 2014 rundown. 

RELATED STORIES 

Most exceedingly bad passwords of 2014 are pretty much as terrible as you can envision 

The manual for secret word security (and why you ought to mind) 

How and why to set up and utilize a secret word administrator 

Friday, 29 January 2016

The Top 10 Features of Microsoft Windows 10

Windows 10 has at last been released, bringing what ought to be Microsoft's best operating system to date. Most clients anticipate that the new OS will be head and shoulders over Microsoft's past operating system, Windows 8.1.

With the greater part of the new feaures, there's certain to be something in it for everybody. Here are the main 10 explanations behind you to move up to Windows 10.

1. The New Start Menu
The Top 10 Features of Microsoft Windows 10
New Start Menu

Microsoft has (fortunately) gave back the Start menu to the lower left-hand corner of the client interface, and this time, the menu doesn't concentrate solely on desktop applications. There's a large group of data that can be found in the Start menu, with Microsoft having included a metro-style dash, which joins Windows 8-style tiles into the menu. For the individuals who don't need live tiles, they can be turned off.

2. Windowed Apps

The Top 10 Features of Microsoft Windows 10
Windowed Apps
Windows Store applications have been given a revived look. Rather than being quickly dumped into a full-screen style application, they will be windowed, offering a mouse-accommodating toolbar. These applications will likewise change their interface to best fit the extent of the client's presentation.

3. Cortana

Some won't not be prepared to dig into the utilization of an
The Top 10 Features of Microsoft Windows 10
Cortana
individual colleague, in any case, Cortana is truly persuading for those wavering. This is the first occasion when we have seen Cortana on desktop, and it's an exceptionally pleasant expansion to the product. Cortana will request access to your own data, after which it will utilize that data, combined with cloud-based knowledge, to give you the data you look for.

4. Hi

Hi will help clients sign into their frameworks without typing in a secret key. Rather, clients basically sit before their PC — and the PC will remember them and log in. Android has had a comparative element for various years now, yet Microsoft proposes that its tech is more best in class, with unique camera prerequisites and infrared use. Relatively few PCs can utilize Hello just yet, yet it's certain to show up on more PCs over the long haul.

5. Edge

There will surely be doubters for any Internet program from Microsoft – given Internet Explorer's past – however early surveys recommend that Edge is really a really slick program. It's been totally redesignd, including Cortana support and a note-taking mode that permits clients to draw on site pages. Mention that Edge does not bolster plugins as of now, but rather the element is en route.

6. Activity Center

Move Center makes the notice board in Windows 8.1 to another level. The Action Center is open through a basic swipe from the privilege of the screen, or by tapping on the Action Center symbol in the taskbar. It basically sorts out all warnings from applications and gives access to various settings that are frequently utilized.

7. Virtual Desktops

Virtual desktops have long been a component that clients have requested, and finally, Microsoft has addressed them with Windows 10. Virtual desktops essentially permit clients to sorted out full-screen applications or other "desktops" as they such as, empowering them to switch between these desktops at whatever point they need.

8. Xbox Streaming

Numerous Windows clients are likewise Xbox clients, making this component a colossal stride forward. This is particularly essential for those with different individuals in one family unit, as it permits Xbox players to play notwithstanding when the TV is being used. The element is presently still in beta, yet it works really well over Wi-Fi and permits clients to use the Xbox USB controller. Clients can likewise record up to two hours of their playing to their PC's hard drive.

9. Continuum

One of the greatest components in Windows 10 is Continuum. It permits clients to flawlessly use gadgets that have both desktop and tablet modes, without changing the design of their desktop. On the Surface Pro 3, separating the console will bring about applications and the begin menu to go into full-screen mode.

The element will likewise permit cell phones to be utilized as desktop PCs when joined with the right show.

10. Center Windows Apps

Maps, for example, Mail, Calendar, Photos and Maps have all been patched up, and this time around, the applications are adequate that individuals might really need to utilize them. Aside from the new interfaces, the applications additionally highlight Cortana joining, permitting the individual associate to nourish the client data in light of their messages and date

Thursday, 28 January 2016

Why should not you Type Faster

Why should not you Type Faster
naseemjumma.blogspot.com
You might need to back off your writing so as to enhance your composition as another study recommends so.

The nature of your written work will probably show signs of improvement in the event that you essentially sort slower, as per the scientists from the University of Waterloo, who requested that study members sort expositions utilizing both hands or with one and only.

Utilizing content investigation programming, the group found that a few parts of article composing, for example, modernity of vocabulary, enhanced when members utilized stand out hand to sort. Writing can be excessively familiar or too quick and can really disable the written work process, said lead writer Srdan Medimorec, including that it appears that what we compose is a result of the connections between our musings and the instruments we use to express them.

The outcomes drove the specialists to conjecture that asking so as to back off members' writing them to utilize one and only hand, permitted more opportunity for interior word look, bringing about a bigger assortment of words. Quick typists might have basically composed the principal word that rung a bell.

The analysts recommend that speed could influence composing quality paying little mind to the instruments, whether they are content to-discourse projects, PCs or a pen and paper, yet future exploration is required to affirm this thought. Also, the scientists note in the paper that past examination has exhibited that backing off writing an excessive amount of could disable written work.

Their one-gave writing condition just eased back composing to about the pace of penmanship. Henceforth, the chase and-peck system won't not be the arrangement.

Wednesday, 27 January 2016

Tuesday, 26 January 2016

Are intelligent agents the beginning of the end for journalism as we know it?

Are intelligent agents the beginning of the end for journalism as we know it?
naseemjumma.blogspot.com
Algorithms are now generating sports reports and financial news, and making fewer errors in the process than human reporters do. Is this the beginning of the end for journalism as we know it?

LMU communication researcher Dr. Andreas Graefe is studying a novel product of the ongoing wave of digitalization – automated journalism. In the following interview he talks about its potential impact on the lives of professional journalists, and assesses the level of writing skill already attained by the algorithmic variety of reporter.
You have just published a study of automated journalism. Does this mean that the reports in my daily newspaper will soon be written by robots?
Andreas Graefe: We haven't got quite that far yet. Automated journalism basically involves the generation of texts from data that are readily available in machine-readable form. At the moment, the approach is used primarily for the coverage of financial and sporting news. In both of these fields, reports are largely based on already structured data. But the strategy will undoubtedly be extended to cover other subject areas and topics.
And where is it now being used?
There are several firms in Germany that produce the required software.

Saturday, 23 January 2016

LiFi Technology With amazing Features

LiFi Technology With amazing Features
Lifi Technology

What is Computer Network, Design and Topology

Computer networking is an engineering discipline that aims to study and analyze the communication process among various computing devices or computer systems that are linked, or networked, together to exchange information and share resources.
A computer network is a set of connected computers. Computers on a network are called nodes. The connection between computers can be done via cabling, most commonly the Ethernet cable, or wirelessly through radio waves. Connected computers can share resources, like access to the Internet, printers, file servers, and others. A network is a multipurpose connection, which allows a single computer to do more
Network Design              
Computer networks also differ in their design approach. The two basic forms of network design are called client/server and peer-to-peer. Client-server networks feature centralized server computers that store email, Web pages, files and or applications. On a peer-to-peer network, conversely, all computers tend to support the same functions. Client-server networks are much more common in business and peer-to-peer networks much more common in homes.
Topology
In communication networks, a topology is a usually schematic description of the arrangement of a network, including its nodes and connecting lines. Essentially, it is the topological structure of a network and may be depicted physically or logically. Physical topology is the placement of the various components of a network, including device location and cable installation, while logical topology illustrates how data flows within a network, regardless of its physical design. Distances between nodes, physical interconnections, transmission rates, or signal types may differ between two networks, yet their topologies may be identical.  The physical topology of a network is the actual geometric layout of workstations. There are several common physical topologies, as described below and as shown in the illustration.

Bus topology:

Alternatively referred to as a line topology, a bus topology is a network setup in which each computer and network device are connected to a single cable or backbone. The following sections contain both the advantages and disadvantages of using a bus topology with your devices.
What is Computer Network, Design and Topology
Bus Topology

Advantages of bus topology

  1. It works well when you have a small network.
  2. Easiest network topology for connecting computers or peripherals in a linear fashion.
  3.  Requires less cable length than a star topology

Disadvantages of bus topology


  1. Difficult to identify the problems if the whole network goes down.
  2. It can be hard to troubleshoot individual device issues.
  3. Not great for large networks.
  4. Terminators are required for both ends of the main cable.
  5. Additional devices slow the network down.
  6. If a main cable is damaged, the network fails or splits into two.

Star Topology:

Star networks are one of the most common computer network topologies. In its simplest form, a star network consists of one central switch, hub or computer, which acts as a conduit to transmit messages. This consists of a central node, to which all other nodes are connected; this central node provides a common connection point for all nodes through a hub. In star topology, every node (computer workstation or any other peripheral) is connected to a central node called a hub or switch.
What is Computer Network, Design and Topology
Star Topology

Advantages of Star Topology

  1. As compared to Bus topology it gives far much better performance, signals don’t necessarily get transmitted to all the workstations. A sent signal reaches the intended destination after passing through no more than 3-4 devices and 2-3 links. Performance of the network is dependent on the capacity of central hub.
  2. Easy to connect new nodes or devices. In star topology new nodes can be added easily without affecting rest of the network. Similarly components can also be removed easily.
  3. Centralized management. It helps in monitoring the network.
  4. Failure of one node or link doesn’t affect the rest of network. At the same time it’s easy to detect the failure and troubleshoot it.

Disadvantages of Star Topology

  1. Too much dependency on central device has its own drawbacks. If it fails whole network goes down.
  2. The use of hub, a router or a switch as central device increases the overall cost of the network.
  3. Performance and as well number of nodes which can be added in such topology is depended on capacity of central device.

Ring Topology:

A ring network is a network topology in which each node connects to exactly two other nodes, forming a single continuous pathway for signals through each node - a ring. Data travel from node to node, with each node along the way handling every packet.
What is Computer Network, Design and Topology
Ring Topology

Advantages of Ring Topology

  1. This type of network topology is very organized. Each node gets to send the data when it receives an   empty token. This helps to reduces chances of collision. Also in ring topology all the traffic flows in only one direction at very high speed.
  2. Even when the load on the network increases, its performance is better than that of Bus topology.
  3. There is no need for network server to control the connectivity between workstations.
  4.  Additional components do not affect the performance of network.
  5. Each computer has equal access to resources.

Disadvantages of Ring Topology

  1. Each packet of data must pass through all the computers between source and destination. This makes it slower than Star topology.
  2. If one workstation or port goes down, the entire network gets affected.
  3. Network is highly dependent on the wire which connects different components.
  4. MAU’s and network cards are expensive as compared to Ethernet cards and hubs

Mesh Topology:

A network setup where each computer and network device is interconnected with one another, allowing for most transmissions to be distributed, even if one of the connections go down. This topology is not commonly used for most computer networks as it is difficult and expensive to have redundant connection to every computer. However, this topology is commonly used for wireless networks. Below is a visual example of a simple computer setup on a network using a mesh topology.
What is Computer Network, Design and Topology
Mesh Topology

Advantages of Mesh Topology

  1.  Each connection can carry its own data load.
  2. It is robust.
  3. Fault is diagnosed easily.
  4. Provides security and privacy.

Disadvantages of Mesh Topology

  1. Installation and configuration is difficult.
  2. Cabling cost is more.
  3. Bulk wiring is required

Friday, 22 January 2016

What should be the role of computer games in education?

What should be the role of computer games in education?
Role of Games in education
Game advocates are calling for a sweeping transformation of conventional education to replace traditional curricula with game-based instruction. But what do researchers have to say about this idea and what is the role of policymakers? A new study out today discourages an educational revolution based on gaming and encourages adding promising features to games in schools including heightened use of explanative feedback in games and relevant pregame activities. This article is part of a new issue of Policy Insights from the Behavioral and Brain Sciences (PIBBS), a Federation of Associations in Behavioral & Brain Sciences (FABBS) journal published by SAGE.
Researcher Richard E. Mayer surveyed research on game features that improve learning. He found five game features that substantially improve student performance including:
  • Putting words in conversational style rather than formal style
  • Putting words in spoken form rather than printed form
  • Adding prompts to explain key points in the game
  • Adding advice or explanations at key points in the game
  • Adding pregame activities that describe key components of the game

Wednesday, 20 January 2016

Gene editing swats at mosquitoes

New technology keeps some of these insects, which spread malaria, from reproducing

BY TINA HESMAN SAEY 7:19AM, DECEMBER 18, 2015

Gene editing swats at mosquitoes
Anopheles gambiae, one of the mosquito species known to transmit the germ that causes malaria.

A new genetic tool may help wipe out Africa’s main malaria-carrying mosquitoes.  It’s known as a “gene drive.” In tests, it sterilized Anopheles gambiae mosquitoes. In other words, it kept them from reproducing.

A gene is the basic package of genetic instructions that tells cells how to build some protein. Proteins are the chemicals that do much of the work of cells. Gene drives are pieces of DNA that have been tweaked by scientists. These snippets of DNA have been designed to find a target gene, slice into it and then insert themselves. This cut-and-paste system alters the function of the original gene. And it is self-propagating, which means that it makes more of itself.

Other human-tweaked (or engineered) genes don’t reproduce themselves. A gene drive’s ability to make more of itself helps it get into more mosquitoes than would a regular inserted gene.

This is the second gene drive aimed at knocking out malaria. The first, announced two weeks earlier, works quite differently. It stops mosquitoes from transmitting the parasite that causes malaria. The newer gene drive instead eliminates the mosquitoes themselves by making it impossible for females to make new baby mosquitoes.

Scientists reported their achievement December 7 in the journal Nature Biotechnology.

Technique appears potent
Most genes come in two copies. One copy comes from the mother. The other comes from the father. So each of a parent’s genes has only a 50-50 chance of getting passed on to a kid.

Tuesday, 19 January 2016

Robots play with Nature

Robots play with Nature
Robot

China's economic growth slumps to 25-year low

BUSINESS & ECONOMY


World's second-largest economy grew 6.9 percent in 2015 with further declines expected as global tumult continues.
19 Jan 2016 04:30 GMT | Business & Economy, China, Asia Pacific
The October-December growth figure was the lowest quarterly expansion since the aftermath of the global financial crisis [Reuters/China Daily]
China's economy grew 6.9 percent in 2015, GDP figures released on Tuesday showed, the lowest level of growth in 25 years.


China's economic growth slumps to 25-year low
China's Economic
Chinese leaders are trying to reduce reliance on trade and investment by nurturing slower, more self-sustaining growth based on domestic consumption and services.



But the unexpectedly sharp decline over the past two years prompted fears of a politically dangerous spike in job losses. Beijing responded by cutting interest rates and taking other steps to shore up growth.

Full-year growth for 2015 was the lowest since sanctions were imposed on Beijing following its crackdown on the Tiananmen Square pro-democracy movement caused growth to plummet to 3.8 percent in 1990.

How a Hard Drive works in Slow Motion

 Your technology associated with magnetism will be difficult. However if you've previously hoodwinked all-around using a magnetic and some nails, you will understand that this technology—the technology throughout action—is quite easy. Metal nails start off unmagnetized but, in the event you caress a new magnetic forwards and backwards around all of them, you possibly can make all of them permanent magnet so they keep to each other. Magnetism has many straightforward, realistic utilizes. For example, junkyards work with electromagnets (huge magnets which can be changed on / off together with electricity) to get and move around hemorrhoids associated with steel small bit.

Horseshoe magnetic

Magnetism has another extremely important work with. Guess you should leave some text for just a friend and can be as easy is really a magnetic and an unmagnetized metal toenail. Guess this communication will be a very simple just one: sometimes you will notice your own friend afterwards of which day time or even definitely not. You may organize with all your friend that you're going to decline a new toenail by way of his or her letterbox. If the toenail will be magnetized, this means you will notice all of them afterwards; in the event the toenail will be unmagnetized, you'll not. Your own friend obtains throughout coming from university and confirms a new toenail around the doormat. They will take it on the dining table and try out to get a new paperclip. If the show attaches on the magnetic, the item should be magnetized—and the item should necessarily mean you propose to discover all of them afterwards. It is just a fairly unusual solution to leave some text for someone, but it demonstrates some thing extremely important: magnetism can often shop details.

How a disk drive functions

Within your pc's disk drive, right now there are certainly not definitely any in terms of iron toenails. There may be only a significant bright, circular "plate" associated with permanent magnet stuff named any platter, split straight into vast amounts of small areas. Each one of those areas may be at home magnetized (to keep any 1) or perhaps demagnetized (to store any 0). Magnetism is needed inside laptop or computer hard drive because it continues storing facts even if the power is actually powered down. When you magnetize any toe nail, this stays magnetized until you demagnetize this. Within much the same means, the particular electronic facts (or data) saved within your PC disk drive or perhaps mp3 player stays right now there even if a person move the power away from.

Say HaLow to the Future of WiFi at CES 2016

by Jim Rapoza


CES2016:
Say HaLow to the Future of WiFi at CES 2016
naseemjumma.blogspot.com

The Consumer Electronics Show (CES) is one of the most anticipated events of the year for true gadget nerds. Outside of company-specific events such as Apple’s WWDC or Google I/O, CES is where we see the future of the technology that we will all use in the near future.



However, when it comes to technology for business and the enterprise, CES can sometimes be a hit-or-miss affair. On the surface, that does seem to be the case for CES 2016, this week in Las Vegas, as most of the focus seemed to be on smart cars and homes, virtual reality, and drones. That’s not exactly technology that’s in the enterprise IT sweet spot.

But there was one announcement at this year’s show — one that flew a bit under the radar — that will have a huge impact on everyone, from business to consumers to the Internet of Things, and it wasn’t even a product announcement.

CES 2016 saw the debut of 802.11ah, or WiFi HaLow. This will be the next version of the wireless networking technology that we all rely on to connect our devices to the Internet, and it has the potential to be the most important new wireless networking standard in a long time.

That’s because, along with the expected improvements in network speed and coverage, 802.11ah “HaLow” is also expected to greatly reduce the power requirements of a wireless network connection. And this could be a huge development for the growth of the Internet of Things.

Think about it. Everyone knows that the one of the best ways to save the battery on your smartphone is to turn off WiFi. Leave WiFi on overnight, and by morning, your phone battery will be nearly dead. Turn it off, and you probably only lose a couple of percentage points in battery life.

If 802.11ah can deliver on the reduced power consumption (and its much greater range capabilities), it will be a big boost for wearables, sensors, and other Internet of Things devices, which will be able to connect to high-speed networks without the need for direct power connections or hefty battery requirements.

Monday, 18 January 2016

Tips for Computer Science for Freshmen

Today let’s begin with the topic of Computer Science while what is computer science and how get relation with the Computer Science. Here are some point about Computer Science and a short video clip with tells about Computer science.
The Computer Science is the study of computing, programming, and computation in correspondence with computer systems. This field of study utilizes theories on how computers work to design, test, and analyze concepts. Computer science usually has a stronger mathematical foundation than a scientific one and on some occasions may not focus directly on computers and their systems.
Moreover, the study of computers, including both hardware and software design. Computer science is composed of many broad disciplines, including artificial intelligence and software engineering. Most universities now offer bachelor, master, and doctorate degrees in computer science.


Best Smart Phones of 2015


Sunday, 17 January 2016

Drones for Art, Not for War

Drones for Art, Not for War
naseemjumma.blogspot.com

Drones are more commercial than ever, but many people still associate them with war. Yes, UAVs are used in warfare, but a group of students in Nashville, TN, show they can also be used for good.

According to a blog post by Michael D Mitchell, a Maplewood High School art teacher, MHS students are using drone technology to explore ways to create rather than destroy.


With the help of Maha Chishty and Addie Wagenknecht’s artwork, students are learning to think of UAVs as expressive rather than oppressive, explains Mitchell’s post.

“They both have been gracious in their willingness to engage with MHS young artists to push the idea of using drones to create instead of destroy and to fuel thinking and questioning so that students might arrive at strong driving questions that will yield great art and viable solutions that they will present to a public audiences,” Mitchell said in the blog post.

A Parrot Bebop Drone was donated to the art department and will be altered to hold paint brushes, drawing utensils and other items students deem essential. According to the blog post, a student owned UAV has been used thus far.

MHS students and Chishty will collaborate via Skype to create a sculpture, which will be displayed at an East Nashville art gallery in February. The sculpture will be accompanied by a video projection crafted by Chishty questioning the use of drone warfare, said Mitchell’s post.

Urdu poetry | Ujoom Lakh Sahe!

Ujoom Lakh Sahee Zindagi Ke mele mein
Mere Wajood Mein Ik Aadami Akela Hia
Urdu poetry | Ujoom Lakh Sahe!
Urdu poetry

urdu poety | Masoom hote hain

Ik pal mein jo barbad kr dete hain dil ki basthi ko "Faraz"
Wo log dekhne mein aksar masoom hote  hain...

Saturday, 16 January 2016

Thursday, 14 January 2016

Types of Computer viruses and malwares.

Well, today I'm here to have a post about computer viruses and threats which can affect the computer systems harmfully. Don't be worry about it I'll make it clear to how to remove and prevent your computer operating system from these malwares.

Before going further, firstly I define the "Viruses" and "Malwares" so the viruses are the small but insidious piece of programming-code that attacks computer and network systems through 'contaminated' (infected) data files, introduced into a system via disks or internet. As a digital equivalent of biological microorganisms,
it attaches itself to the target computer's operating system or other programs, and automatically replicates itself to spread to other computers or networks. Invented in 1960s as a prank, viruses come in thousands of types and versions with new ones being invented every day, each requiring a different cure for the viruses and malwares. Malware, short for malicious software, is any software used to disrupt computer operations, gather sensitive information, gain access to private computer systems, or display unwanted advertising

There are many types of viruses and malware mentioned under.

Trojan Horses:

The Trojan virus gets its name from an incident that occurs in Homer's Iliad. Similar to how the Greeks in Homer's poem sent an army of men, hidden in a wooden horse, to the Trojans to get into the wall of the city. A Trojan horse appears to be nothing more than an interesting computer program or file, such as "saxophone.wav file" on the computer of user who's interested in collecting sound samples. The Trojan virus once on your computer, doesn't reproduce, but instead makes your computer susceptible to malicious intruders by allowing them to access and read your files.

Worms:

A worm is technically not a virus, but a program very similar to a virus; it has the ability to self-replicate, and can lead to negative effects on your system.  Worms utilize networks to send copies of the original code to other computers, causing harm by consuming bandwidth or possibly deleting files or sending documents via email. Worms can also install backdoors on computers.

Worms are often confused with computer viruses; the difference lies in how they spread. Computer worms self-replicate and spread across networks, exploiting vulnerabilities, automatically; that is, they don’t need a cybercriminal’s guidance, nor do they need to latch onto another computer program. As such, computer worms pose a significant threat due to the sheer potential of damage they might cause.A worm enters a computer through a vulnerability in the system and takes advantage of file-transport or information-transport features on the system, allowing it to travel unaided.

Spyware:

Spyware is any technology that aids in gathering information about a person or organization without their knowledge. On the Internet (where it is sometimes called a Spybot or tracking software), spyware is programming that is put in someone's computer to secretly gather information about the user and relay it to advertisers or other interested parties. Spyware can get in a computer as a software virus or as the result of installing a new program.
Once installed, the spyware monitors user activity on the Internet and transmits that information in the background to someone else. Spyware can also gather information about e-mail addresses and even passwords and credit card numbers. Spyware is similar to a Trojan horse in that users unwittingly install the product when they install something else. A common way to become a victim of spyware is to download certain peer-to-peer file swapping products that are available today.

Logic Bomb:

Logic bombs are small programs or sections of a program triggered by some event such as a certain date or time, a certain percentage of disk space filled, the removal of a file, and so on. For example, a programmer could establish a logic bomb to delete critical sections of code if she is terminated from the company. Logic bombs are most commonly installed by insiders with access to the system.

Trap Door/ Back door:


A trap door is a secret entry point into a program that allows someone that is aware of the trap door to gain access without going through the usual security access procedures. Trap doors have been used legitimately for many years by programmers to debug and test programs. Trap doors become threats when they are used by unscrupulous programmers to gain unauthorized access. It is difficult to implement operating system controls for trap doors. Security measures must focus on the program development and software update activities.

 Because it is most commonly appearing new browser versions to suppress the starvation due to workload on browser.
After All now I will tell you how to prevent your computer operating system from these kind of malicious. feel easy and click the links below and download the Anti-Virus software, Anti-spyware definitions and anti-malware software.
For removing and preventing from the spywares click the link below to download the anti-spyware software.
For preventing and removing from the malwares and viruses and trapdoor and other kinds of threats from your computer please click the links below.