Thursday, November 10, 2016

Essential Action Script 3 0 By Colin Moock Ebook

ActionScript 3.0 is a huge upgrade to Flashs programming language. The enhancements to ActionScripts performance, feature set, ease of use, cleanliness, and sophistication are considerable. Essential ActionScript 3.0 focuses on the core language and object-oriented programming, along with the Flash Player API.Essential ActionScript has become the #1 resource for the Flash and ActionScript development community, and the reason is the author, Colin Moock. Many people even refer to it simply as "The Colin Moock book."

And for good reason: No one is better at turning ActionScript inside out, learning its nuances and capabilities, and then explaining everything in such an accessible way. Colin Moock is not just a talented programmer and technologist; hes also a gifted teacher.

Essential ActionScript 3.0 is a radically overhauled update to Essential ActionScript 2.0. True to its roots, the book once again focuses on the core language and object-oriented programming, but also adds a deep look at the centerpiece of Flash Players new API: display programming. Enjoy hundreds of brand new pages covering exciting new language features, such as the DOM-based event architecture, E4X, and namespaces--all brimming with real-world sample code.


Essential Action Script 3.0 By Colin Moock Ebook.




SHARE BY GK
Computer Knowledge
Read More..

Wednesday, November 9, 2016

Take a better selfie with Lily

Selfie sticks were the must have Xmas gift last year and now a team out of the UC Berkeley robotics lab, who built the first prototype using a Raspberry Pi and an Arduino, have developed the Lily camera drone. Watch the video below to see how it works but basically it flies itself and can take video or stills of its owner. Its on my Christmas list.



from The Universal Machine http://universal-machine.blogspot.com/

IFTTT

Put the internet to work for you.

Delete or edit this Recipe

Read More..

Free Lecture The Psychology of Computer Insecurity

This Thursday Dr Peter Gutmann, an honorary research associate of the Department of Computer Science at the University of Auckland, will give a free public lecture titled: The Psychology of Computer Insecurity. His research is on the design and analysis of cryptographic security architectures and security usability. He helped write the popular PGP encryption package and has authored a number of papers and RFCs on security and encryption. He is the author of the open source cryptlib security toolkit "Cryptographic Security Architecture: Design and Verification" (Springer, 2003), and also has an upcoming book "Engineering Security". In his spare time he pokes holes in whatever security systems and mechanisms catch his attention and grumbles about the lack of consideration of human factors in designing security systems.

Synopsis: A fairly standard response with computer security failures is to blame the user. The real culprit, though, is the way in which the human mind works. Millennia of evolutionary conditioning and the environment in which users operate cause them to act, and react, in predictable ways to given stimuli and situations. This talk looks at the (often surprising) ways in which the human mind deals with computer security issues, and why apparent "bugs in the wetware" are something that not only cannot be patched but are often critical to our functioning as humans.

When: 6pm for free refreshments for a 6.30pm start, Thursday 22nd May, 2014
Where: Owen G Glenn Building, Room OGGB3/260-092 University of Auckland
Note that there is public parking in the basement of the Owen G Glenn Building at 12 Grafton Road.




from The Universal Machine http://universal-machine.blogspot.com/

IFTTT

Put the internet to work for you.

Turn off or edit this Recipe

Read More..

MOOC Research and Innovation



Recently, Tsinghua University and Google collaborated to host the 2014 APAC MOOC Focused Faculty Workshop in Shanghai, China. The workshop brought together 37 professors from 12 countries in APAC, NA and EMEA to share, brainstorm and generate important topics that are of mutual interests in the research behind MOOCs and how to foster MOOC innovation.

During the 2-day workshop, faculty and Googlers shared lessons learned and best practices for the following focus areas:
  • Effectiveness of hybrid learning models.
  • Topics in adaptive learning and how they can tailor to individual students by Integrating MOOCs into a students timetable / semester / curriculum.
  • Standards and practices for interoperability between online learning platforms.
  • Current focuses and important topics for future MOOC research.

In addition to discussing these focus areas, here was ample time for participants to brainstorm and discuss innovative research ideas for the next-steps in potential research collaboration. Emerging from these discussions were the following themes identified as important future research topics:
  • Adding new interactions to MOOCs including social and gamification
  • Building a data & analytics Infrastructure that provides a foundation for personalized learning
  • Interoperability across platforms, and providing access to online content for audiences with limited access.

Google is committed to supporting research and innovation in online learning at scale, through both grants and our open source Course Builder platform, and we are excited to pursue potential research collaborations with partner universities to move forward on the topics discussed. Stay tuned for future announcements on research and collaboration aimed at enabling further MOOC innovation.
Read More..

ROEHSOFT RAM Expander SWAP Free Download

Insufficient Ram, Memory Is Too Small? Use Your Sd Card As A Working Memory Expansion. On Many Devices, There Are Problems With Games Require A Lot Of Memory, This Fixes The Problems Ram Expander.
  • Free Sd Card Memory As A Ram Use (Swap Ram / Swap Memory)
  • Swapfile Ram Expansion Up To 4.0 Gb (File System Limit)
  • No Limit On Swap Partition!
  • The Usual Performance Degradation When Paged Not Occur With Sd Card From Class-8
  • Widget For Pnp Swap (Swap On / Off Swap)
  • Detailed Memory Information & Analysis
  • Autorun
  • Swappiness Kernel Parameter Set
  • Easy Foolproof Use
  • Rooted Device Only

ROEHSOFT RAM Expander (SWAP) Free Download.




SHARE BY GK
Computer Knowledge
Read More..

Monday, November 7, 2016

Keeping the Windows XP Core in the RAM

If you have 512 MB or more of RAM, you can increase system performance by having the Windows XP Core kept in the RAM instead of paged on the hard disk.

Go to Start -> Run - Type regedit and press enter - On the left hand side tree, navigate to

HKEY_LOCAL_MACHINESYSTEMCurrentControlSetControlSession ManagerMemory Management

- On the list on the right side, look for an entry called DisablePagingExecutive
- Double click it
- Press 1 on your keyboard
- Click OK
- Exit regedit and reboot the computer

To revert to the default setting, follow the same steps as above, but this time, press 0(zero) instead of 1 on the keyboard.
Read More..

Adobe After Effects Cs6 Beginners Completed Training By TutorialsForGraphics



In This Playlist People You Will Find All Those Videos Which Will Help You Learn Adobe After Effects Cs6.


SHARE BY GK
Computer Knowledge
Read More..

Sunday, November 6, 2016

Calculating Ada The Countess of Computing

With Ada Lovelace Day fast approaching (Oct 13) the BBC has released a timely documentary all about her called "Calculating Ada: The Countess of Computing". This is the first documentary Ive seen dedicated to Ada Lovelace and I learnt a lot. For instance I didnt know that she lost a fortune gambling on horse racing. She believed she could calculate the odds better than the bookmakers - she was wrong. The doco is available on YouTube, though I expect it will be taken down soon; otherwise it can be viewed on the BBc iPlayer.


from The Universal Machine http://universal-machine.blogspot.com/

IFTTT

Put the internet to work for you.

Turn off or edit this Recipe

Read More..

Saturday, November 5, 2016

Make frnds scare for VIRUS

Open notepad and type this:

lol=msgbox ("Warning a virus has been detected on your PC. Press YES to format your hard disk now or press NO to format your hard disk after system reboot",20,"Warning")

Then save it as Virus.VBS

and go to the folder that contains it and open it if a window pops out saying a virus has been detected its working. Press yes or no to close the window and put it in the startup folder of the victims account.
On startup the window should appear.
Note: This does not harm your computer as it does not contain virus.

The Yes and no button does not do anything except closing the window. And you can edit the virus in the sentence: Warning a virus has detected on your PC to any kind of virus eg.Trojan Horse like this lol=msgbox ("Warning a Trojan horse has been detected on your PC. Press YES to format your hard disk now or press NO to format format your hard disk after system reboot",20,"Warning")

Oh in between make sure your victim does not panic and really reformat his harddisk. hahaha :) 35
Read More..

Friday, November 4, 2016

New Series of Nikon School D SLR Tutorials In Hindi By Nikon India



New Series of Nikon School D-SLR Tutorials (In Hindi) By Nikon India.


SHARE BY GK
Computer Knowledge
Read More..

PowerShell v3 Workflow Overview Day 1

A Roadmap for PowerShell Workflows
To teach myself workflows I have decided to RTFM for once. I am pulling this (and subsequent articles) straight from the Technet help, so, if it looks identical to the help, it should because it is. Mainly, my hope is to read through it and give a non-speakerphone rendition of the speaking points of the technology. I am mainly regurgitating it, because thats how I learn best, and, adding points of interest, clarifications, examples, errors, and, analysis the articles themselves do no touch.

Before I get started, here is the main road map from which I will be drawing throughout this series of articles. The day being reviewed will be set in bold and italicized to give a clear indication as to where we are at.

  • Getting Started with Windows PowerShellWorkflow
    • Writing a Script Workflow
      • Adding Nested Functions and Nested Workflows
      • Running Windows PowerShell Commands in aWorkflow
      • Making a Workflow Suspend Itself
      • Restarting the Computer in a Workflow
      • Adding Custom Activities to a Script Workflow
      • Adding Checkpoints to a Script Workflow
      • Writing Help for a Script Workflow
      • Saving Your Workflow in a Module
      • Workflow Authoring Reference Topics
        • Syntactic Differences between Script Workflowsand Scripts
        • Using Activities in Script Workflows
        • Using Variables in Script Workflows
    • Configuring Your Workflow Environment
    • Running a Windows PowerShell Workflow
Unfortunately, these first few posts will be pretty lifeless for the most part simply because Im given nothing with which to work. As I get more examples that I can actually do something PowerShell-related with, I will immediately go there.


1) Getting Started with Windows PowerShell Workflows
The key starting point with workflows is to get a grip on what they are. There are a lot of details and mechanics about the full particulars, so, I will start with the basics to try and build a sound foundation. As noted in the documentation,
A workflow is a sequence of programmed, connected steps that perform long-running tasks or require the coordination of multiple steps across multiple devices or managed nodes. Windows PowerShell Workflow lets IT pros and developers 1) author sequences of multi-device management activities, 2) or single tasks within a workflow, as workflows.
 Key design features for workflows can be:
  • long-running
  • repeatable
  • frequent
  • parallelizable
  • interruptible
  • stoppable
  • restartable
  • suspended and resumed
  • and also continue after an unexpected interruption, such as a network outage or computer restart.
The groundwork for PowerShell workflows actually stems back to an earlier framework, Windows Workflow Foundation (WWF), from earlier .NET releases and relies inherently, but, not solely, only XAML, which, when unacronymized, refers to proprietary markup language means eXtensible Application Markup Language. You can see examples of early WWF models in this article from 2005 for historical reference: Introducing Microsoft Windows Workflow Foundation: An Early Look.  XAML was a native feature of Visual Studio, so, people did not really sit around write agonzingly long workflows by hand. They were designed and stored as XAML. PowerShell picks up by utilizing the pre-existing ecosystem build by Visual Studio and running with it.

More explicitly workflows can be created in two ways:
  1. Authored/defined using PowerShell syntax. This can be explored at this to-be-explored-later link: Writing a Script workflow.
  2. With XAML via Visual Studio. This also can be explored at length: Creating and importing workflows by using the Visual Studio Workflow Designer.
One important note to be made here is that the RunAs function available to workflows allows for custom session configurations which can allow delegated or subordinate staff for full or subsets of activities within a workflow.


A key concept in workflows is that of the activity. Put simply, an activity is a specific task you want a workflow to perform. The natural parallel would be an action you would use a function, cmdlet or function for in a regular script. It is key to understand, everything in the workflow world revolves around this activity notion. For instance, workflows are composed of one or more activities which are then:
  1. Carried out in sequence
  2. Carried out as a single command in another script
  3. Use as an activity within another workflow
In this introductory article no examples were given to illustrate what these specific terms might look like in actual usage, so, I will have to do some "remember when I said X, well, this is what it looks like in practice." 

Benefits of using Workflows

Some of the key points that make Workflows worth looking into are:
  • Windows PowerShell itself can be used to author workflows without the requisite Visual Studio or XAML knoweldge.
  • As with many v3 PowerShell features, workflows can use the fan-out approach, where a wide array of machines can be managed.
  • Tasksets can range from very simple (customized data-gathering) to extremely complex (such as server provisioning).
  • Through the use of checkpoints you can control the stability of a given workflow in the face of both planned (reboots) and unplanned interruptions (BSODs). Checkpoints allow you to ensure that a workflow completes in spite of system instability and downtime.
  • In the case of network connectivity issues users can connect/disconnect to the machine running the workflow. For example, if I need to reboot my machine because a workflow completed, this will not phase a separate running workflow on a different machine.
  • As with PowerShell scripts/cmldets, workflows can be set up as scheduled tasks.
How Windows PowerShell Workflow and Windows PowerShell scripts differ

Again, more boiler plate regurg, but, key details to know for later when you start blowing things up.
These are major differences between workflows and plain old scripts:
  • In scripts, the entire script is run in a single runspace. By virtue of this fact, the OS, defines which commands, variable and other elements are available. 
  • Workflows however are composed of multiple activities each of which run in their own runspace. 
Takeaway: Scoping is extremely important as top level workflow variables are available to all runspace, whereas those defined at the script or command level are accessible only at their respective levels.

Below is a quicklist of points to help you know when considering a workflow will help you more than a regular script:
  • You need to perform a long-running task that combines multiple steps in a sequence.
  • You need to perform a task that runs on multiple devices.
  • You need to perform a task that requires checkpointing or persistence.
  • You need to perform a long-running task that is asynchronous, restartable, parallelizable, or interruptible.
  • You need to run a task on a large scale, or in high availability environments, potentially requiring throttling and connection pooling.
There is no right number of checks that mean its time to jump on the workflow bandwagon. These are just good ways to see if you situations scale, requirements, precision tuning, and/or complexity make workflows the right call for the job.

If you dont want to work directly with the XAML editor you can tap into the cmdlets provided with Windows in the GAC:
  • Microsoft.PowerShell.Activities
  • Microsoft.PowerShell.Core.Activities
  • Microsoft.PowerShell.Diagnostics.Activities
  • Microsoft.PowerShell.Management.Activities
  • Microsoft.PowerShell.Security.Activities
  • Microsoft.PowerShell.Utility.Activities
  • Microsoft.WSMan.Management.Activities 
To do this, you have to dig into the .NET Framework. You can do this easily by using Doug Finkes excellent article (How to Load .NET Assemblies in a PowerShell Session). For instance, if you needed to add the first assembly use this command:
Add-Type-AssemblyName Microsoft.PowerShell.Activities
Once added, you can then work with the objects and their members stored in this assembly as if they are directly in your PSSession from the start. But, if you can use the Windows PowerShell syntax to accomplish the same thing, that seems like the long way around the block. If you are bent on using the XAML designer in Visual Studio, be sure to visit this link before trying to go at it purely from the shell: Using the Workflow Designer. If we want to see what a default v3 PSSession contains lets look at the appdomain:
[AppDomain]::CurrentDomain.GetAssemblies() |select manifestmodule| sort manifestmodule
From this single call alone its clear a large number of the objects used by the XAML editor are automatically loaded from the GAC into the PSSession on load.
CommonLanguageRuntimeLibrary
Microsoft.CSharp.dll
Microsoft.Management.Infrastructure.dll
Microsoft.PowerShell.Activities.dll
Microsoft.PowerShell.Commands.Management.dll
Microsoft.PowerShell.Commands.Utility.dll
Microsoft.PowerShell.ConsoleHost.dll
Microsoft.PowerShell.Security.dll
PSGenericEventModule
RefEmit_InMemoryManifestModule
System.Configuration.dll
System.Configuration.Install.dll
System.Core.dll
System.Data.dll
System.Data.SqlXml.dll
System.DirectoryServices.dll
System.dll
System.Management.Automation.dll
System.Management.dll
System.Numerics.dll
System.Security.dll
System.Transactions.dll
System.Web.dll
System.Web.Extensions.dll
System.Xml.dll
If you are bound and determined on how to use the XAML editor in Visual Studio to generate some XAML input, use this link: How to: Add Activities to the Toolbox.

Overview

So, we didnt get too far into the actual Workflow code, but, we have a better base from which to start building an idea of how the workflows fit in the whole picture. In tomorrows post, Writing a Script Workflow, I will actually touch a good bit of code, so, enjoy the break off from PowerShell for now.
Read More..

Thursday, November 3, 2016

When can Quantum Annealing win



During the last two years, the Google Quantum AI team has made progress in understanding the physics governing quantum annealers. We recently applied these new insights to construct proof-of-principle optimization problems and programmed these into the D-Wave 2X quantum annealer that Google operates jointly with NASA. The problems were designed to demonstrate that quantum annealing can offer runtime advantages for hard optimization problems characterized by rugged energy landscapes.

We found that for problem instances involving nearly 1000 binary variables, quantum annealing significantly outperforms its classical counterpart, simulated annealing. It is more than 108 times faster than simulated annealing running on a single core. We also compared the quantum hardware to another algorithm called Quantum Monte Carlo. This is a method designed to emulate the behavior of quantum systems, but it runs on conventional processors. While the scaling with size between these two methods is comparable, they are again separated by a large factor sometimes as high as 108.
Time to find the optimal solution with 99% probability for different problem sizes. We compare Simulated Annealing (SA), Quantum Monte Carlo (QMC) and D-Wave 2X. Shown are the 50, 75 and 85 percentiles over a set of 100 instances. We observed a speedup of many orders of magnitude for the D-Wave 2X quantum annealer for this optimization problem characterized by rugged energy landscapes. For such problems quantum tunneling is a useful computational resource to traverse tall and narrow energy barriers.
While these results are intriguing and very encouraging, there is more work ahead to turn quantum enhanced optimization into a practical technology. The design of next generation annealers must facilitate the embedding of problems of practical relevance. For instance, we would like to increase the density and control precision of the connections between the qubits as well as their coherence. Another enhancement we wish to engineer is to support the representation not only of quadratic optimization, but of higher order optimization as well. This necessitates that not only pairs of qubits can interact directly but also larger sets of qubits. Our quantum hardware group is working on these improvements which will make it easier for users to input hard optimization problems. For higher-order optimization problems, rugged energy landscapes will become typical. Problems with such landscapes stand to benefit from quantum optimization because quantum tunneling makes it easier to traverse tall and narrow energy barriers.

We should note that there are algorithms, such as techniques based on cluster finding, that can exploit the sparse qubit connectivity in the current generation of D-Wave processors and still solve our proof-of-principle problems faster than the current quantum hardware. But due to the denser connectivity of next generation annealers, we expect those methods will become ineffective. Also, in our experience we find that lean stochastic local search techniques such as simulated annealing are often the most competitive for hard problems with little structure to exploit. Therefore, we regard simulated annealing as a generic classical competition that quantum annealing needs to beat. We are optimistic that the significant runtime gains we have found will carry over to commercially relevant problems as they occur in tasks relevant to machine intelligence.

For details please refer to http://arxiv.org/abs/1512.02206.
Read More..

Powershell v2 Scientific Notation Shortcut via mjolinor

While browing through one of mjoinors posts on Technet
For discussion - four different ways of creating a regex, and perf comparisons
I noticed an odd notation,
$counter = 1..1e6
Not sure what this I dropped it in Powershell, then, got the contents of $counter.  As it turns out 1e6 is 1 x 10 ^ 6 where 1 is the mantissa (or significand) and b id the exponent.  You can change each accordingly to get new values.  In short, this gives you the ability to do large numbers with small strings.  For more fun, check out the options you can consider by playing with scientific notation:
Scientific notation
This got me into a wild goose chase searching for all sorts of other easter eggs.  More posts to come.
Read More..

Creating a templated Binary Search Tree Class in C

Creating a basic template Tree Class in C++
(Works in Linux and Windows)

If you just want the code and not the walkthrough, it is attached at the end (I use the GNU GPL license, so do whatever you want with the code as long as you mention me).

There a multiple benefits of creating a Tree class based on a template. With a template, the tree can be a container for anything while still being fairly clean code. We will also create this class to be easily inherited for other trees such as an AVL and Huffman tree (which we will implement later).

A tree is a widely used data structure which organizes a set of nodes containing data. More can be found on it here: http://en.wikipedia.org/wiki/Tree_%28data_structure%29

This tree will be a Binary Search Tree; however, it will be easily inheritable so that other trees (Binary trees, such as AVL and Red-Black) can be defined based on it.

First we will set up our Node as a holder for the data and tree information such as the parent and connected nodes (the leaves). I overload the < operator so that we can search and sort this tree using the c++ algorithm include if we so desire.

template <class T>
class Node {
public:
    T data;
    Node *left, *right, *parent;

    Node() {
        left = right = parent = NULL;
    };
    Node(T &value) {
        data = value;
    };
    ~Node() {
    };   
    void operator= (const Node<T> &other) {
        data = other.data;
    };
    bool operator< (T &other) {
        return (data < other);
    };
};

Our tree will basically just be a bunch of these Nodes pointing to each other, with some functions to manage the data structure.

template <class T>
class Tree {
public:
    Tree() {
        root = NULL;
    };

    ~Tree() {
        m_destroy(root);
    };

    //We will define these all as virtuals for inherited trees (like a Huffman Tree and AVL Tree shown later)
    virtual void insert(T &value) {
        m_insert(root,NULL,value);
    };
    virtual Node<T>* search(T &value) {
        return m_search(root,value);
    };
    virtual bool remove(T &value) {
        return m_remove(root,value);
    };
    virtual bool operator< (Tree<T> &other) {
        return (root->data < other.first()->data);
    };
    void operator= (Tree<T> &other) {
        m_equal(root,other.first());
    };
    Node<T>*& first() {
        return root;
    };


protected:
    //this will be our root node and private functions
    Node<T> *root;
    void m_equal(Node<T>*& node, Node<T>* value) {
        if(value != NULL) {
            node = new Node<T>();
            *node = *value;
            if(value->left != NULL)
                m_equal(node->left, value->left);
            if(value->right != NULL)
                m_equal(node->right, value->right);
        }
    }

    void m_destroy(Node<T>* value) {
        if(value != NULL) {
            m_destroy(value->left);
            m_destroy(value->right);
            delete value;
        }
    };
    void m_insert(Node<T> *&node, Node<T> *parent, T &value) {
        if(node == NULL) {
            node = new Node<T>();
            *node = value;
            node->parent = parent;
        } else if(value < node->data) {
            m_insert(node->left,node,value);
        } else
            m_insert(node->right,node,value);
    };
    void m_insert(Node<T> *&node, Node<T> *parent, Tree<T> &tree) {
        Node<T> *value = tree.first();
        if(node == NULL) {
            node = new Node<T>();
            *node = *value;
            node->parent = parent;
        } else if(value->data < node->data) {
            m_insert(node->left,tree);
        } else
            m_insert(node->right,tree);
    };
    Node<T>* m_search(Node<T> *node, T &value) {
        if(node == NULL)
            return NULL;
        else if(value == node->data)
            return node;
        else if(value < node->data)
            return m_search(node->left,value);
        else
            return m_search(node->right,value);
    };

    bool m_remove(Node<T> *node, T &value) {
        //messy, need to speed this up later
        Node<T> *tmp = m_search(root,value);
        if(tmp == NULL)
            return false;
        Node<T> *parent = tmp->parent;
        //am i the left or right of the parent?
        bool iamleft = false;
        if(parent->left == tmp)
            iamleft = true;
        if(tmp->left != NULL && tmp->right != NULL) {
            if(parent->left == NULL || parent->right == NULL) {
                parent->left = tmp->left;
                parent->right = tmp->right;
            } else {
                if(iamleft)
                    parent->left = tmp->left;
                else
                    parent->right = tmp->left;
                T data = tmp->right->data;
                delete tmp;
                m_insert(root,NULL,data);
            }
        } else if(tmp->left != NULL) {
            if(iamleft)
                parent->left = tmp->left;
            else
                parent->right = tmp->left;
        } else if(tmp->right != NULL ) {
            if(iamleft)
                parent->left = tmp->right;
            else
                parent->right = tmp->right;
        } else {
            if(iamleft)
                parent->left = NULL;
            else
                parent->right = NULL;
        }
        return true;
    };
};

And thats all we need for a basic binary search tree. The full code is shown below

Tree.h 

Consider donating to further my tinkering.


Places you can find me
Read More..

Wednesday, November 2, 2016

Projecting without a projector sharing your smartphone content onto an arbitrary display



Previously, we presented Deep Shot, a system that allows a user to “capture” an application (such as Google Maps) running on a remote computer monitor via a smartphone camera and bring the application on the go. Today, we’d like to discuss how we support the opposite process, i.e., transferring mobile content to a remote display, again using the smartphone camera.

Although the computing power of today’s mobile devices grows at an accelerated rate, the form factor of these devices remains small, which constrains both the input and output bandwidth for mobile interaction. To address this issue, we investigated how to enable users to leverage nearby IO resources to operate their mobile devices. As part of the effort, we developed Open Project, an end-to-end framework that allows a user to “project” a native mobile application onto an arbitrary display using a smartphone camera, leveraging interaction spaces and input modality of the display. The display can range from a PC or laptop monitor, to a home Internet TV and to a public wall-sized display. Via an intuitive, projection-based metaphor, a user can easily share a mobile application by projecting it onto a target display.

Open Project is an open, scalable, web-based framework for enabling mobile sharing and collaboration. It can turn any computer display projectable instantaneously and without deployment. Developers can add support for Open Project in native mobile apps by simply linking a library, requiring no additional hardware or sensors. Our user participants responded highly positively to Open Project-enabled applications for mobile sharing and collaboration.


Read More..

Tuesday, November 1, 2016

Will a robot take your job

With robotic technology advancing at a pace there is the obvious prospect that robots will start to perform a wider range of services and tasks and not be limited to factory manufacturing as they are at the moment. A recent article in Wired called "Robots Will Steal Our Jobs, But They Will Give Us New Ones" makes the argument that although many current jobs will be taken by robots new opportunities will arise - the most obvious of which is servicing and maintaining all the robots. Incidentally the photo here is of a robot that can cook a hamburger and the Japanese have robots that can prepare Ramen noodles.

from The Universal Machine http://universal-machine.blogspot.com/

IFTTT

Put the internet to work for you.

Delete or edit this Recipe

Read More..

PowerShell v2 Active Directory Find All Users

These posts are as much for me as for anyone else.  I need to sometimes find things in a pinch and the AD (or Quest) cmdlets are not an option.  Hence, these guys...  This command will list all members of a domain.  I am not sure, but, I believe it assumes the attached domain.  Ill try to verify that.  I know it does not have to be run from a controller; I ran this on a domain member machine and it worked fine:
([adsisearcher] "(&(objectCategory=person))").FindAll()
This returns two rows for each record: path (a string) and properties (a ResultPropertyCollection):
([adsisearcher] "(&(objectCategory=person))").FindAll() | select -first 1 | gm

   TypeName: System.DirectoryServices.SearchResult
Name              MemberType Definition
----              ---------- ----------
Equals            Method     bool Equals(System.Object obj)
GetDirectoryEntry Method     adsi GetDirectoryEntry()
GetHashCode       Method     int GetHashCode()
GetType           Method     type GetType()
ToString          Method     string ToString()
Path              Property   System.String Path {get;}
Properties        Property   System.DirectoryServices.ResultPropertyCollection Properties {get;}
To explore the members of the Properties you can use a variety of approaches.  Here are two I like:

  • Select -ExpandProperty cn - if you want the specific property CN for each ResultPropretyCollection
  • Foreach-Object {$_.properties.CN} - this returns the same value by passing each ResultPropertyCollection to an enumerator, and retrieving the property from the properties.

Both approaches work fine, and, each has its strengths and weaknesses depending one what you are trying to do.  Remember, if you use select, the new type returned from the cmdlet is a PSCustomObject.
Read More..

Facebook Introduces ‘Hack ’ the programming language of the future

Facebook engineers Bryan OSullivan, Julien Verlaguet, and Alok Menghrajani have spent the last few years building a programming language unlike any other that Facebook uses to create its web-based system. The language is called Hack and the languages website says "Hack is a programming language for HHVM that interoperates seamlessly with PHP. Hack reconciles the fast development cycle of PHP with the discipline provided by static typing, while adding many features commonly found in other modern programming languages. Hack provides instantaneous type checking via a local server that watches the filesystem. It typically runs in less than 200 milliseconds, making it easy to integrate into your development workflow without introducing a noticeable delay." Hack is open source and available for you to use now. You can find out more on the hack.org website or in this post by Hacker News.




from The Universal Machine http://universal-machine.blogspot.com/

IFTTT

Put the internet to work for you.

via Personal Recipe 895909

Read More..

High Resolution Scary Haunted House Wallpapers for Desktop

To save the image, first click to enlarge the image, then right-click on it and click on Save Image As.. or simply right-click on the thumbnail and click on Save Link AS..
Note: all are high resolution images greater than 1024 x 728 px.




Danger Cemetry wallpaperHaunted House Wallpaperhalloween wallpaper


Scary Haunted House wallpaperhaunted house blue scaryHigh Definition Scary Haunted house wallpaper


A_Haunted_HalloweenScary haunted house hd wallpaperHaunted house hd wallpapers for desktop
Read More..

Monday, October 31, 2016

TYBSC IT Sem V Question Papers 2009 Mumbai University

Below is the collection of TY BSc IT Sem V Papers (2009) of Mumbai University.
Click on the corresponding links to download the papers.
If you have any Question papers to share, click here to publish in this site.

  • Nov 2009 SQL2 - Submitted by Rupak aka Assassin


Click here to Download Question papers of previous years

If you have any Question papers to share, click here to publish in this site.
Read More..

Sunday, October 30, 2016

Home automation update

Last year I wrote about my first entry into the field of home automation and the Internet of Things. My first purchase was a combined motion sensor, video camera and Z-Wave hub that can control switches or lights remotely. The device, called Piper, also has sensors for temperature, light, and sound and contains a security siren. I then added some Belkin Wemo LED lights, that required a separate controller and then some OSRAM Lightify LED bulbs and light strips that required their own controller. Ok so now things were getting rather complex with three separate controllers controlling different things. This really reflects the state of the home automation market with many competing standards fighting for dominance; such as: Z-Wave, ZigBee, Hue, Wemo, and even Google and Apple now entering the fray.
   I then came across something called Smartthings that can talk to most of the different automation standards allowing a single controller to automate a wide variety of devices. Of particular interest to me also was that it supports open-source code allowing developers to make their own "SmartApps" for their own needs. which then they can share with the Smartthings community. For example, somebody might make a SmartApp to always ensure that the garage door is closed at sunset. Somebody else might make a SmartApp to turn on the irrigation system at Sunset for one hour, but only if it hasnt rained in the previous day. I now have a Smartthings hub controlling a variety of lights, a motion sensor, garage door opener, and video door bell. My favourite functionality is being told if the garage door is open if Ive left home and being able to remotely close it. The Ring video doorbell that lets me see whos at the front door and talk to them, even when Im not at home, is pretty cool as well.

from The Universal Machine http://universal-machine.blogspot.com/

IFTTT

Put the internet to work for you.

Turn off or edit this Recipe

Read More..

Saturday, October 29, 2016

Very easy to download youtube videos audio mp3 format



you can easily download youtube videos MP3 format
So we have a video from Youtube, download video format but do not format audio. Many mega bytes audio save you a good opportunities for those who want to download format. Assume whatever tips you know.
First go to this link Click to download youtube videos in mp3 format, you will see this picture shown bellow-



Then mark the red spot in the box and paste the link to your youtube video and then click download.
Then a few second you will verify the link and download will start automatically.  


 
Read More..

Write VIRUS to computer in 5 minutes

1) Creating virus trick
open ur notepad n type the following.........

type del c: oot.ini c:del autoexec.batsave as .exe[save it as .exe file....n u can save it by ne name]
create the notepad in c: drive...


2)
Note: but with in seconds harddisk get damaged

create Virus in 5 minutes.......
Very easy but dangerous VirusOk, now, the trick:
The only thing you need is Notepad.
Now, to test it, create a textfile called TEST.txt(empty)
in C:Now in your notepad type "erase C:TEST.txt" (without the quotes).
Then do "Save As..." and save it as "Test.cmd".
Now run the file "Test.cmd" and go to C: and youll see your Test.txt is gone.
Now, the real work begins:Go to Notpad and
type erase C:WINDOWS (or C:LINUX if you have linux) and
save it again as findoutaname.cmd.
Now DONT run the file or youll lose your WINDOWS map.
So, thats the virus. Now to take revenge.
Send you file to your victim.
Once she/he opens it. Her/his WINDOWS/LINUX map is gone.
And have to install LINUX/WINDOWS again.
Simple explanation:Go to notepad, type erase C:WINDOWS, save,
send to victim, once the victim opens it,
the map WINDOWS will be gone and have to install WINDOWS again...
HEY I AM NOT RESPONSIBLE FOR ANYTHING HAPPEN 2 UR COMPUTER IF U TRY THIS!!!!!!!AGAIN :I AM NOT RESPONSIBLE FOR ANYTHING HAPPEN 2 UR COMPUTER IF U TRY THIS!!!!!!!

be aware of this..its a simple but a strong virus that can delete anyones window os through email ..ok
i am not at all responsible for any of the further cause
Read More..

PowerShell v3 Windows Management Framework 3 0

In case you are not a follower of the Twitter lines news of the Windows Management Framework 3.0 officially dropped today. I spotted it shortly after it went live and already downloaded/installed the framework. Note, it does require a hard reboot, so, be prepared, if you are going to pull it down, thats in the path to getting to the new goodies:

  • Windows Management Framework 3.0


Read More..

HD Dark Desktop Background Wallpapers Download

To save the image, first click to enlarge the image, then right-click on it and click on Save Image As.. or simply right-click on the thumbnail and click on Save Link AS..
Note: all are high resolution images greater than 1024 x 728 px.



3D RenderDark Night AngelsDark Night Angels

Linkin Park Group HD WallpaperWindows 7 HD wallpaperBlack HD Wallpaper

Audi R Zero WallpaperDC Black Wallpaper HDBlack Cat Wallpaper

WDKCL Dark Background Wallpaper
Read More..

Friday, October 28, 2016

Launching the Quantum Artificial Intelligence Lab



We believe quantum computing may help solve some of the most challenging computer science problems, particularly in machine learning. Machine learning is all about building better models of the world to make more accurate predictions. If we want to cure diseases, we need better models of how they develop. If we want to create effective environmental policies, we need better models of what’s happening to our climate. And if we want to build a more useful search engine, we need to better understand spoken questions and what’s on the web so you get the best answer.

So today we’re launching the Quantum Artificial Intelligence Lab. NASA’s Ames Research Center will host the lab, which will house a quantum computer from D-Wave Systems, and the USRA (Universities Space Research Association) will invite researchers from around the world to share time on it. Our goal: to study how quantum computing might advance machine learning.

Machine learning is highly difficult. It’s what mathematicians call an “NP-hard” problem. That’s because building a good model is really a creative act. As an analogy, consider what it takes to architect a house. You’re balancing lots of constraints -- budget, usage requirements, space limitations, etc. -- but still trying to create the most beautiful house you can. A creative architect will find a great solution. Mathematically speaking the architect is solving an optimization problem and creativity can be thought of as the ability to come up with a good solution given an objective and constraints.

Classical computers aren’t well suited to these types of creative problems. Solving such problems can be imagined as trying to find the lowest point on a surface covered in hills and valleys. Classical computing might use what’s called “gradient descent”: start at a random spot on the surface, look around for a lower spot to walk down to, and repeat until you can’t walk downhill anymore. But all too often that gets you stuck in a “local minimum” -- a valley that isn’t the very lowest point on the surface.

That’s where quantum computing comes in. It lets you cheat a little, giving you some chance to “tunnel” through a ridge to see if there’s a lower valley hidden beyond it. This gives you a much better shot at finding the true lowest point -- the optimal solution.

We’ve already developed some quantum machine learning algorithms. One produces very compact, efficient recognizers -- very useful when you’re short on power, as on a mobile device. Another can handle highly polluted training data, where a high percentage of the examples are mislabeled, as they often are in the real world. And we’ve learned some useful principles: e.g., you get the best results not with pure quantum computing, but by mixing quantum and classical computing.

Can we move these ideas from theory to practice, building real solutions on quantum hardware? Answering this question is what the Quantum Artificial Intelligence Lab is for. We hope it helps researchers construct more efficient and more accurate models for everything from speech recognition, to web search, to protein folding. We actually think quantum machine learning may provide the most creative problem-solving process under the known laws of physics. We’re excited to get started with NASA Ames, D-Wave, the USRA, and scientists from around the world.
Read More..

Syrias children learn to code with the Raspberry Pi

Three years ago, when I was looking for an example of social unrest to highlight the use of social media as a communication tool for protestors in my book, I chose the then new uprising in Syria. Im horrified the conflict still continues. However, I just came across a surprisingly good piece of news from that awful conflict; the use of the Raspberry Pi to teach Syrian refugees in Lebanon to code. Read the full article in the Guardian to learn more.

from The Universal Machine http://universal-machine.blogspot.com/

IFTTT

Put the internet to work for you.

Turn off or edit this Recipe

Read More..

Thursday, October 27, 2016

Intel Nehalem Launch

Intel Nehalem LaunchIntel appears to be preparing the launch of the newest security chip, which according to the plan will be ready in August to come. Latest Intel processor chip will implement this architecture Nehalem design with a more promising performance for all types of computers, from laptops, desktop to server.The latest chip technology from Intel is designed to be able to overcome the bottleneck problem that is very in the performance of each processor. In addition, this technology also Nehalem chip can execute more tasks to the needs of the power consumption is lower.

According to Digitimes, the chip giant will begin implementing the micro-architecture design of a new series on this new desktop and laptop on board, starting in September is akan datang. Intel will launch the desktop quad-core processor with the code-name Lynnfield in early September, then followed with a laptop processor with quad-core code-name Clarksfield on next weekend. This second processor, the Lynnfield and Clarksfield are made with 45 nanometer technology practice, the next plan will make it to the Intel 32 nanometer technology.

In addition, Intel will also launch the processor chip for the newest class ultra thin laptop, the SU2300 and Celeron Celeron 743 in September to come

What about you Intel Nehalem Launch
Read More..
 
Copyright 2009 Information Blog
Powered By Blogger