Thursday, March 06, 2014

NEW RECORD IN DATA TRANSFER

New record set for data-transfer speeds

In the foreground are 2 Chalmers VCSELs. The one on the left has a 6 μm aperture and could operate error free up to 62 Gb/s while the one on the right has a 5 μm aperture and set the equipment limited record of 64 Gb/s. Behind the two VCSELs is IBM's BiCMOS8HP VCSEL driver IC. On either side of the IC are the decoupling capacitors and connecting wirebonds. Image: IBMIn the foreground are 2 Chalmers VCSELs. The one on the left has a 6 μm aperture and could operate error free up to 62 Gb/s while the one on the right has a 5 μm aperture and set the equipment limited record of 64 Gb/s. Behind the two VCSELs is IBM's BiCMOS8HP VCSEL driver IC. On either side of the IC are the decoupling capacitors and connecting wirebonds. Image: IBMResearchers at IBM have set a new record for data transmission over a multimode optical fiber, a type of cable that is typically used to connect nearby computers within a single building or on a campus. The achievement demonstrated that the standard, existing technology for sending data over short distances should be able to meet the growing needs of servers, data centers and supercomputers through the end of this decade, the researchers said.
Sending data at a rate of 64 gigabits per second (Gb/s) over a cable 57-m long using a type of laser called a vertical-cavity surface-emitting laser (VCSEL), the researchers achieved a rate that was about 14% faster than the previous record and about 2.5 times faster than the capabilities of today's typical commercial technology.
To send the data, the researchers used standard non-return-to-zero (NRZ) modulation. “Others have thought that this modulation wouldn't allow for transfer rates much faster than 32 Gb/s,” said researcher Dan Kuchta of the IBM T.J. Watson Research Center in New York. Many researchers thought that achieving higher transmission rates would require turning to more complex types of modulation, such as pulse-amplitude modulation-4 (PAM-4).
"What we're showing is that that's not the case at all," Kuchta said. Because he and his colleagues achieved fast speeds even with NRZ modulation, he added, "this technology has at least one or two more generations of product life in it."
Kuchta will describe these results at the 2014 OFC Conference and Exposition, being held March 9-13 in San Francisco.
To achieve such high speeds, the researchers used the VCSEL lasers developed at Chalmers University of Technology in Sweden and custom silicon-germanium chips developed at IBM Research. “The receiver chip is a unique design that simultaneously achieves speeds and sensitivities well beyond today’s commercial offerings,” Kuchta explained. “The driver chip incorporates transmit equalization, which widens the bandwidth of the optical link. While this method has been widely used in electrical communication, it hasn't yet caught on in optical communication,” he said.
“Researchers typically rely on a rule of thumb that says the usable data-transfer rate is about 1.7 times the bandwidth,” Kuchta explained. “That means that with the VCSEL laser, which has a bandwidth of about 26 GHz, the rate would be only about 44 Gb/s.”
"What we're doing with equalization is we're breaking the historical rule of thumb," Kuchta said.
The fast speeds only worked for a distance of 57 m, so this technology isn't designed for sending data across continents. Instead, it's most suitable for transmitting data within a building, he said. About 80 percent of the cables at data centers and most, if not all, of the cables used for typical supercomputers are less than 50 meters long.
This new technology, Kuchta added, is ready for commercialization right now.
Presentation Th3C.2, titled “64Gb/s Transmission over 57m MMF using an NRZ Modulated 850nm VCSEL,” will take place Thursday, March 14 at 1:30 p.m. in room 121 of the Moscone Center.


30,000-year-old virus from permafrost is reborn

30,000 year old virus from permafrost

30,000-year-old virus from permafrost is reborn


An ultrathin section of a Pithovirus particle in an infected Acanthamoeba castellanii cell observed by transmission electron microscopy with enhancement using the artistic filter "plastic packaging" provided by Adobe Photoshop CS5. Credit: Julia Bartoli and Chantal Abergel, IGS and CNRS-AMU.

French scientists said Monday they had revived a giant but harmless virus that had been locked in the Siberian permafrost for more than 30,000 years.

Wakening the long-dormant virus serves as a warning that unknown pathogens entombed in frozen soil may be roused by global warming, they said.
Dubbed Pithovirus sibericum, the virus was found in a 30-metre (98-foot) -deep sample of permanently frozen soil taken from coastal tundra in Chukotka, near the East Siberia Sea, where the average annual temperature is minus 13.4 degrees Celsius (7.8 degrees Fahrenheit).
The team thawed the virus and watched it replicate in a culture in a petri dish, where it infected a simple single-cell organism called an amoeba.
Radiocarbon dating of the soil sample found that vegetation grew there more than 30,000 years ago, a time when mammoths and Neanderthals walked the Earth, according to a paper published in the US journal Proceedings of the National Academy of Sciences (PNAS).
P. sibericum is, on the scale of viruses, a giant—it has 500 genes, whereas the influenza virus has only eight.
It is the first in a new category of viral whoppers, a family known as Megaviridae, for which two other categories already exist.
30,000-year-old virus from permafrost is reborn
An ultrathin section of a Pithovirus particle in an infected Acanthamoeba castellanii cell observed by transmission electron microscopy. The length of the particle is ~1.5 µm with a 0.5 µm diameter. Credit: Julia Bartoli and Chantal Abergel, IGS and CNRS-AMU.


The virus gets its name from "pithos," the ancient Greek word for a jar, as it comes in an amphora shape. It is so big (1.5 millionths of a metre) that it can be seen through an optical microscope, rather than the more powerful electron microscope.
Unlike the flu virus, though, P. sibericum is harmless to humans and animals, for it only infects a type of amoeba called Acanthamoeba, the researchers said.
The work shows that viruses can survive being locked up in the permafrost for extremely long periods, France's National Centre for Scientific Research (CNRS) said in a press statement.
"It has important implications for public-health risks in connection with exploiting mineral or energy resources in Arctic Circle regions that are becoming more and more accessible through global warming," it said.
"The revival of viruses that are considered to have been eradicated, such as the smallpox virus, whose replication process is similar to that of Pithovirus, is no longer limited to science fiction.
"The risk that this scenario could happen in real life has to be viewed realistically."


Facebook Reveals Who You Love

Facebook graph reveals who you love

The friends of a Facebook user's friends and the links between them. Two heavily linked clusters are obvious at 12 and 3 o'clock - perhaps the user's workplace and college pals. But notice the somewhat isolated person down around 7 o'clock, who shares links to many smaller clusters of the central user's friends. Computer analysis points to this person as the romantic partner.

From a map of Facebook friends, a computer algorithm developed by Jon Kleinberg, the Tisch University Professor of Computer Science, and Lars Backstrom '04, Ph.D. '09, now at Facebook, will correctly identify a person's spouse, fiancé or other romantic partner about 70 percent of the time.
"We are trying to build up a sort of chemistry kit for finding different elements of a network," Kleinberg said. The team will present their results at the ACM Conference on Computer Supported Cooperative Work and Social Computing, Feb. 15-19 in Baltimore.
As you might guess, the method works best when the couple is married, and works better the longer the relationship has been in force. On the dark side, if the algorithm does not select the person who is the relationship partner, there is a significantly increased chance that in a month or two the couple will break up.
The researchers tested their methods on anonymized data from 1.3 million randomly selected Facebook users aged 20 or older who listed their status as "married," "engaged" or "in a relationship." Along with a list of a Facebook user's friends, the data also show how those friends are linked to one another.
The first guess was that the romantic partner would be "embedded" – that the couple would have many . That works, the researchers found, but not very well, finding the partner about 25 percent of the time. So they introduced a concept they call "dispersion," where the couple's mutual friends are not highly connected among themselves, but rather are scattered over many aspects of the central user's life. In real-world terms, your spouse goes where you go, and knows the people in your office, your church, your bridge club and so on, although those people seldom meet one another across group lines.
"You have to ask, 'How did the relationship get that way?'" Kleinberg said. "Your spouse acts as a sort of time traveler in your life, who went back and met all those people."
Combining embededness with dispersion boosted performance. The researchers then factored in the dispersiveness of the dispersed  – whether the person your romantic partner knows at your office is also connected to some people in your church and your bridge club.
Finally, they added measures of interaction, such as how often people look at each other's profiles, attend the same events or appear together in photos. Ultimately they were able to identify the partner 70.5 percent of the time. Others who might be chosen by the algorithm are most often family members or their partners.
As a spinoff, the researchers were able to determine, 68.3 percent of the time, whether a given user was or was not in a relationship at all, and with 79 percent accuracy if the relationship was a marriage.
There may be other applications for analysis based on dispersion, the researchers said, including grouping people into categories or, for social scientists, finding the person who just doesn't fit a category. Backstrom, who developed Facebook's friend recommender, is looking at ways to evaluate incoming messages to a Facebook user based on the user's relationship with the source.
And identifying people with strong ties to one another may also show where to go to influence a group. "If you're someone who bridges between groups it can be a source of power," Kleinberg explained.
You might also Like:

Sunday, February 23, 2014

HP Next-Generation Workstation

HP's Next-Generation Workstation

Hewlett-Packard’s new Z620 workstation is as screamingly fast as it is easy to service. It is completely redesigned with a two-socket motherboard in a rackable mini-tower. Its top configuration delivers 24 cores across two Intel Xeon E5 2697v2 3.0 GHz CPUs. Its 12 DIMM slots can handle as much as 192 GB of 1,866 MHz eight-channel ECC DDR3 memory with four memory channels per CPU. A six-channel SATA controller can address as much as 12 TB of internal storage and manage RAID 0, 1, 5 or 10 arrays.
There is more to report on the latest workstation, including a reconfigured interior and a Thunderbolt option. Read on for details and performance results from CRN Test Center benchmarks.

Storage

HP has boosted the Z620’s storage-controller options, adding an 8 port LSI 9717 4i4e SAS controller and LSI 9212 4i4 port SAS RAID card. That is on top of the motherboard’s Marvell SATA controller with six channels for RAID 0, 1, 5 and 10, two of which can handle 6.0 Gb/s. For system and booting, the company this year uses Seagate Pro series SSDs instead of Micron.
The test system also sported a pair of Hitachi 7200K 6.0 Gbps spinning drives in a RAID 5 array controlled by a LSI MegaRAID 9260 8i. Against this array, the Z620 turned in a sustained data transfer rate for sequential reads of almost 370 MB/s.
Transaction and throughput performance were measured with IOmeter. For this test, peak performance was found with sequential 4K reads and a queue size of 48.

Thunderbolt too

HP is among just a handful of vendors to fully embrace Intel’s new Thunderbolt spec, which defines a high-speed bus for video and storage. It included a sample of its Thunderbolt 2.0 PCIe card in the test system, and its performance was pretty good. The card delivered a sustained transfer rate of 280 MB/s with sequential reads of 32K, but its IOps was just 8K. By reducing packet size to 4K, testers were able to boost IOps to 70K and still achieve 275 MB/s, or 2.2 Gb/s. In drag-and-drop tests of file transfers, the drive delivered a transfer rate in excess of 3 Gb/s. HP’s Thunderbolt card is scheduled to begin shipping early next year.

IO chops
To measure transaction processing, testers reconfigured IOmeter’s access specifications to use 512 byte packets. A peak sustained transaction performance of 153K IOps was observed with a transaction queue size of 64.
Other I/O gear included in the base Z620 configuration includes dual gigabit Ethernet ports, four USB 3.0 ports—two front and two rear—and FireWire. Options include a 10 GbE NIC. For graphics, HP offers the Z620 equipped with an Nvidia Quadro K4000, K5000, 6000, Tesla C2075 and K20c models, or AMD’s FirePro W7000.

Geekbench

This score was a bit of a head scratcher. Using the 64 bit version of Primate Labs’ Geekbench 2.3, the Z620 turned in a top score of 35,040. That is an extremely high score in its own right, but it falls well short of the 41,348 turned in by last year’s Z620 workstation, the fastest PC we have ever tested.
That machine had slower processors (2.9 GHz) and slower memory (1,600 MHz), yet delivered a far higher Geekbench score.

The bottomline

HP has kept much of what the CRN Test Center liked about prior versions of its venerable workstation, namely its ease of service. The lockable side panel is removed with the flip of a lever to expose processors, DIMM slots, storage, expansion cards, power supply and many other internal components that can be serviced without tools. As before, the second processor slot is implemented as a daughtercard—complete with memory and fan—but it is now far easier to remove and more precise to reinstall. The Z620’s internals truly are a masterpiece of engineering.
Despite its anomalous Geekbench results, the latest Z620 workstation delivers outstanding performance benchmarks overall. This machine is built to be easy to service and upgrade and delivers consistent performance for video production, computer-aided design and any application that demands ultra-high performance from a small footprint PC. List prices start at $1,689 with a three-year warranty.


You might also Like:

GTA Vice City Cheats

How to login Windows without password

Professional JavaScript for Web Developers



Facebook buys WhatsApp for $19 billion


WhatsApp with Facebook's $19B offer?

In a play to dominate messaging on phones and the Web, Facebook has acquired WhatsApp for $19 billion.

That's a stunning sum for the five-year old company. But WhatsApp has been able to hold its weight against messaging heavyweights like Twitter (TWTR)Google (GOOG,Fortune 500) and Microsoft's (MSFTFortune 500) Skype. WhatsApp has upwards of 450 million users, and it is adding an additional million users every day.
Referring to WhatsApp's soaring growth, Facebook CEO Mark Zuckerberg said on a conference call, "No one in the history of the world has done anything like that."
WhatsApp is the most popular messaging app for smartphones, according to OnDevice Research.
Buying WhatsApp will only bolster Facebook's already strong position in the crowded messaging world. Messenger, Facebook's a standalone messaging app for mobile devices, is second only to WhatsApp in its share of the smartphone market.
Related: 5 key moments that changed Facebook
Similar to traditional text messaging, WhatsApp allows people to connect via their cellphone numbers. But instead of racking up texting fees, WhatsApp sends the actual messages over mobile broadband. That makes WhatsApp particularly cost effective for communicating with people overseas.
That kind of mobile messaging services have become wildly popular, with twice as many messages sent over the mobile Internet than via traditional texts, according to Deloitte. But most of the messaging industry's revenue is still driven by text messaging.
On the conference call, Facebook said it is not looking to drive revenue from WhatsApp in the near term, instead focusing on growth. Zuckerberg said he doesn't anticipate trying to aggressively grow WhatsApp's revenue until the service reaches "billions" of users.
WhatsApp currently charges a dollar a year after giving customers their first year of use for free. WhatsApp CEO Jan Koum said on the conference call that WhatsApp's business model is already successful.
That indicates Facebook bought WhatsApp to add value to its existing messaging services, as well as for the long-term potential of the company.
Facebook bought Instagram for $1 billion in 2012 for similar reasons: As young social network users gravitated towards photo-sharing, Facebook wanted to scoop up what could have eventually become a big rival.
Like Instagram, WhatsApp will function as an autonomous unit within Facebook, with all the existing employees coming in as part of the deal.
Facebook (FB, Fortune 500) said it will pay WhatsApp $4 billion in cash and $12 billion in stock. WhatsApp's founders and staff will be eligible for for another $3 billion in stock grants to be paid out if they remain employed by Facebook for four years. Koum will also join Facebook's board of directors.

Monday, January 06, 2014

How to Block Senders in Gmail


                    While you can't currently block messages from specific addresses or domains in Gmail, you can set up filters to send those unwanted messages directly to the Trash, never to be seen. Follow these easy steps to banish all unwanted mail,




1. Open Gmail, determine which sender you no longer wish to receive messages from.
     and then select "More" option in the top near right. Click the down arrow,From the drop-
     down box, select "Filter messages like this".

2.  Click the triangle on the right-hand side of the search bar at the top of the screen. A window will appear. Ensure “All mail” is selected in the Search drop-down at the top left of the window.




3. Enter in the criteria for your search. In the From space, type in the email address of the sender you’d like to filter.
  • To be sure the search worked properly, click the blue search button at the bottom left of the window. Re-click the down arrow in the search bar to return to the search window.

4. Click the “Create filter with this search” hyperlink at the bottom right of the search window. A new window will appear containing a number of possible actions to be applied to your search criteria.



5. Select “Delete it” by clicking the check box to the right. All messages received from this sender will automatically be sent to the Trash.


You have some another method to block mails from a sender see the link:
http://technicalideas.blogspot.in/2014/01/how-to-block-mails-from-sender.html


You might also Like:

MS OFFICE 2010 Free Download

How to Stop Emails From Facebook

Hoe to increase my Internet Speed

Mobile Security for Android

HOW TO BLOCK MAILS FROM A SENDER


Blocking a Sender

                  Some e-mail providers have a system to block or blacklist specific senders. In most cases it's simply an easy-to-use front-end to a filter system: you provide an e-mail address and it builds a filter for you to auto-delete any messages from that sender. The exact same form of blocking is available in Gmail* except that you explicitly create the filter, which of course allows you more control over how it works and what it does with the messages. The down-side is it take more effort than just entering an e-mail address in some field.

Typically you will simply want to delete the messages. But there may be a case where there is some personal or legal reason you need to save these "blocked" messages. In such a situation you might label the messages, archive them (so they are not in the Inbox), and mark them as read. This is an example of why having full control over the filter is important.

So to create a simple blocking filter, do the following:
  1. Go to Settings -> Filters
  2. Click the "Create a new filter" link towards the bottom of the page.
  3. Enter the sender's e-mail address in the From field
  4. Click the "Create filter with this search" link.
  5. Check the box for "Delete it".

and you have same optional steps in this are as,
  1. [optimal] Check the box for "Skip the Inbox (Archive it)".
  2. [optinal] Check the box for "Apply the label" and select one from the drop-down list.
  3. Check the box for "Send canned response" and select one from the drop-down list.
  4. [optional] Check the box for "Mark as read".

Note 1. and this is important, you can not check the box to delete the message because the system will not send a canned response for a deleted message.

Note 2. the optional steps are basically to keep these messages out of your Inbox by placing them in a label of your choice. You can then decide to save them if needed, or every so often go and delete all the messages in that label.

Clearly this system isn't perfect. The biggest problem being that you can't delete the message and also send the canned response. Still, it's a reasonable work-around given that Gmail doesn't have the ability to bounce a messages. And it will satisfy the needs some users have to block a sender with a message so they know they are blocked.

Of course, as already mentioned, it may not fool a more knowledgeable e-mail user. But what can they do about it? If they send a message saying "I know it's fake" all they'll get is another failure report.


Summary

It's unfortunate that there are reasons why one may want or need to block a sender from e-mailing to your account. But fortunately Gmail provides the tools to keep such messages out of your Inbox. It may take some self-control to not look at them in Trash if the content may be disturbing. But they can be deleted permanently without opening.

And the workaround for simulating a bounced error return is pretty easy to setup and use. It should work for most cases, and help provide one a level of protection from unwanted contact.