white-code

Tuesday, October 27, 2009

LAMBOBIKER


Recent creative designers are outlaying many different bikes now a days but Lamborbiker seems like crossed everyone’s imagination. The idea of this long desired design was derived from Marcello Gandini, chief designer of Bertone and a freelance designer since 1980, and Osmos wheel and Lamborghini Countach played the key role for inspiration. Flavio, the designer designed this attractive and extremely unique bike by combining Osmos wheel and Countach. If you feel passionate about the brilliant looking Lamborghini or feel an unavoidable attraction about Osmos wheels, then this bike will definitely draw your attention with the luminous look and powerful features.
 

 

Sunday, August 30, 2009

Alan Ray Hacker

Alan Ray Hacker OBE FRAM (born 30 September 1938) is an English clarinettist and professor of the Royal Academy of Music.

Career

London Philharmonic Orchestra.[1] He became a professor of the Royal Academy of Music in 1960 and went on to found the Pierrot Players in 1965 along with Stephen Pruslin and Harrison Birtwistle which in 1972 became the Fires of London.[2] In 1971Matrix.[1] He was also appointed chairman of the Institute of Contemporary Arts Music section and of the British section of the International Society for Contemporary Music. He was one of those credited with reviving the basset clarinet and in 1967 he restored the original text of Mozart's Concerto and Quintet. He played them on an instrument modelled on that for whom Mozart originally wrote them, the Stadler's extended basset clarinet. It was also Hacker who founded the Music Party in 1972, an organisation set up for the authentic performance of classical music. The later establishment of the Classical Orchestra in York was also a vehicle which promoted the performances of the classics on original instruments.[2] he founded his own group,

Among he most acclaimed performances are the six staged performances of Bach’s St John Passion in the Bach/Handel centennial year in Venice and a guest appearance at the Schwetzingen Festival, and British performances of Mozart’s La Finta Giardiniera. He also conducted four Mozart operatic productions in Mozart’s centennial year.[2]
In the 1972-1973 academic year he became the Sir Robert Mayer lecturer at Leeds University.[1] In 1976 he was appointed lecturer in music at the University of York and went on to hold a post of senior lecturer between 1984 and 1987.[2]
He was awarded the OBE for his services to music

 

Google inc.

Google Inc. is an American public corporation, earning revenue from advertising related to its Internet search, e-mail, online mapping, office productivity, social networking, and video sharing services as well as selling advertising-free versions of the same technologies. Google has also developed an open source web browser and a mobile operating system. The Google headquarters, the Googleplex, is located in Mountain View, California. As of March 31, 2009 (2009 -03-31), the company has 19,786 full-time employees. The company is running millions of servers worldwide, which process hundreds of millions of search requests each day and about 1 petabyte of user-generated data every hour.[5]
Google was founded by Larry Page and Sergey Brin while they were students at Stanford University and the company was first incorporated as a privately held company on September 4, 1998. The initial public offering took place on August 19, 2004, raising $1.67 billion, implying a value for the entire corporation of $23 billion. Google has continued its growth through a series of new product developments, acquisitions, and partnerships. Environmentalism, philanthropy and positive employee relations have been important tenets during the growth of Google. The company has been identified multiple times as Fortune Magazine's #1 Best Place to Work,[6] and as the most powerful brand in the world[7].
Google's mission is "to organize the world's information and make it universally accessible and useful".[8] The unofficial company slogan, coined by former employee and Gmail's first engineer[9] Paul Buchheit, is "Don't be evil".[10][11][12] Criticism of Google includes concerns regarding the privacy of personal information, copyright, and censorship.

History

 

Google began in January 1996, as a research project by Larry Page, who was soon joined by Sergey Brin, when they were both PhD students at Stanford University in California.[13] They hypothesized that a search engine that analyzed the relationships between websites would produce better ranking of results than existing techniques, which ranked results according to the number of times the search term appeared on a page.[14] Their search engine was originally nicknamed "BackRub" because the system checked backlinks to estimate the importance of a site.[15][16] A small search engine called Rankdex was already exploring a similar strategy.[17]
Convinced that the pages with the most links to them from other highly relevant web pages must be the most relevant pages associated with the search, Page and Brin tested their thesis as part of their studies, and laid the foundation for their search engine. Originally, the search engine used the Stanford University website with the domain google.stanford.edu. The domain google.com was registered on 15 September 1997,[18] and the company was incorporated as Google Inc. on 4 September 1998 at a friend's garage in Menlo Park, California. The total initial investment raised for the new company amounted to almost $1.1 million, including a $100,000 check by Andy Bechtolsheim, one of the founders of Sun Microsystems.[19]
In March 1999, the company moved into offices in Palo Alto, home to several other noted Silicon Valley technology startups.[20] After quickly outgrowing two other sites, the company leased a complex of buildings in Mountain View at 1600 Amphitheatre Parkway from Silicon Graphics (SGI) in 2003.[21] The company has remained at this location ever since, and the complex has since come to be known as the Googleplex (a play on the word googolplex). In 2006, Google bought the property from SGI for $319 million.[22]
The Google search engine attracted a loyal following among a growing number of Internet users, who liked its simple design and useful results.[23] In 2000, Google began selling advertisements associated with search keywords.[13] The ads were text-based to maintain an uncluttered page design and to maximize page loading speed.[13] Keywords were sold based on a combination of price bid and clickthroughs, with bidding starting at 5 cents per click.[13] This model of selling keyword advertising was pioneered by Goto.com (later renamed Overture Services, before being acquired by Yahoo! and rebranded as Yahoo! Search Marketing).[24][25][26] Goto.com was an Idealab spin off created by Bill Gross, and was the first company to successfully provide a pay-for-placement search service. Overture Services later sued Google over alleged infringements of Overture's pay-per-click and bidding patents by Google's AdWords service. The case was settled out of court, with Google agreeing to issue shares of common stock to Yahoo! in exchange for a perpetual license.[27] Thus, while many of its dot-com rivals failed in the new Internet marketplace, Google quietly rose in stature while generating revenue.[13]
The name "Google" originated from a common misspelling of the word "googol",[28][29] which refers to 10100, the number represented by a 1 followed by one hundred zeros. Having found its way increasingly into everyday language, the verb "google", was added to the Merriam Webster Collegiate Dictionary and the Oxford English Dictionary in 2006, meaning "to use the Google search engine to obtain information on the Internet."[30][31]
A patent describing part of the Google ranking mechanism (PageRank) was granted on 4 September 2001.[32] The patent was officially assigned to Stanford University and lists Lawrence Page as the inventor.

 

Friday, August 28, 2009

Unix Security

System & Network Security, HP-UX

Often the subject of internal security is overlooked. However, often it is fairly easy for someone to get access to systems they are not supposed to have access by simply walking up to a valid users desk. This can be the cleaning staff or a disgruntled (ex)employee making a visit. This is the easiest type of security to implement and should definitely be included in any security plan.
  • Console security
Machines and consoles need to be secure. A person can simply turn off a computer if one has access to it. If they have access to the console, they can often interrupt the boot process to get access to the root prompt. If this doesn't work, they can keep guessing the root password in hopes of compromising the system.

For these reasons (and more), the computers and associated consoles should be kept in a secure room. A limited number of people should have access to this room, of course with a limited number of keys. Some places actually have security guards let people into the computer rooms for guaranteed secure access.

If your data is sensitive, be certain to verify that there are no alternative methods for getting into the room. This includes hidden spare keys in an unsecured place, gaps in the raised floors that go past the locked access point, and space above the ceilings.
  • Data Security
Companies that value their data need a detailed backup recovery scheme. This includes on site backups for least amount of down time, a copy of this data off site in case of computer room disasters, as well as contingency plans in place. Unfortunately, an easy way to get access to a companies data is to gain access to backup tapes and sensitive printouts. Hence, all sensitive information should be stored in locked cabinets. Backup tapes sent off site should be in locked containers. Old sensitive printouts and tapes should be destroyed.

To protect against computer damage from power outages (and spikes), be certain to have your computers on a UPS. This provides consistent power, protects against outages, as well as protects the computer from power spikes. Ideally, there should be a backup generator for production systems. For non-production systems, there should be a automatic way to shutdown the computer if the power has switched to the UPS for more than 1/2 the time the UPS is rated to supply.

To prevent snooping, secure network cables from exposure.
  • Users practice secure measures
Always have users lock their screen when away from their desk. It is best if they log off of their terminal/workstation at night. There should be no written passwords or password hints on a users desk. If users are using X, verify that they are using xauth/xhost to prevent others from reading their screen.