Thursday, 13 October 2011

CONFUSED BETWEEN CORE 2 DUO AND DUAL CORE?


INTEL CORE 2 DUO-
  • THE CORE 2 BRAND REFERS TO A RANGE OF INTEL'S CONSUMER 64-BIT x86-64 SINGLE, DUAL, QUAD CORE CPU'S BASED ON INTEL CORE MICRO TECHNOLOGY
  • CORE 2 DUO ARE MUCH POPULAR THESE DAYS
  • IT HAS A VERY POWERFUL DUAL CORE CHIP
  • IT ALSO CONSUMES LESS POWER THAN ANY OTHER CPU
  • NO OVERHEATING ISSUES
  • IT RUNS COOL AND PERFECT




INTEL PENTIUM DUAL CORE-

  • EXCELLENT CHOICE FOR OVERCLOCKERS ON A LOW BUDGET
  • IT IS BASED ON THE POPULAR CORE 2 DUO ARCHITECTURE.
  • THE NUMBER OF CORES ARE SAME
  • BUT THE CPU COMES WITH ONLY 1 MB L2 CACHE INSTEAD OF 2MB OR EVEN 4 MB.
  • IN ADDITION, SOME FEATURES, SUCH AS INTEL'S VIRTUALIZATION TECHNOLOGY (VT) ARE DISABLED.
  • THE RESULT IS A CASTRATED CORE 2 DUO PROCESSOR, USING THE SMALL CACHE SIZE AND LIMITED TO 1.6 TO 2 GHZ CLOCK SPEED AT FSB 800 SYSTEM SPEED



THE FINAL CONCLUSION




OR




  • INTEL DUAL CORE PROCESSORS ARE DOWNGRADED VERSION OF CORE 2 DUO
  • LESS EXPENSIVE
  • BUT STILL ADEQUATE FOR GENERAL MAINSTREAM COMPUTER USE.
  • IN TERMS OF PERFORMANCE ITS MORE OR LESS EQUAL TO CORE 2 DUOS.
  • INTEL LAUNCHED IT WITH VERY LOW COST TO GRAB THE LOWER END MARKET. 



O\




Friday, 7 October 2011

A TRIBUTE TO STEVE JOBS


STEVE JOBS WAS A LEGEND, HE WAS A VISIONARY AND A CREATIVE GENIUS, NOT TO FORGET AN AMAZING HUMAN BEING. HE STARTED THE COMPANY WHICH CHANGED THE WORLD, WHICH WE CALL "APPLE".


WHY DID HE NAME THE COMPANY APPLE?
STEVE JOBS WORKED SUMMER JOBS AT A CALIFORNIA APPLE FARM. HE ALSO LIKED BEATLES AND THEIR LABEL, APPLE RECORDS.
WHEN HE AND STEVE WOZNIAK TRIED TO COME UP WITH A COMPANY NAME, THEY DECIDED THAT IF THEY COULDN'T THINK OF ANYTHING BETTER BY THE END OF THE DAY, THEY'D GO WITH THE NAME "APPLE". AND THEY COULDN'T, SO THEY DID.


APPLE COMPUTERS WAS FOUNDED ON APRIL 1, 1976


HIS ACCOMPLISHMENTS


APPLE CO-FOUNDER STEVE JOBS WAS A LIVING LEGEND IN SILICON VALLEY, THE MAN WHO CHANGED MODERN CULTURE WITH THE iPOD, iPHONE, AND iPAD.
APPLE I

1976: THE APPLE 1, WAS THE ORIGINAL APPLE PERSONAL COMPUTER.

APPLE II

1977: APPLE II WAS DESIGNED TO LOOK LESS LIKE A PIECE OF ELECTRONIC EQUIPMENT AND MORE LIKE A HOME APPLIANCE.


APPLE LISA

1983: THE APPLE LISA WAS CONSIDERED A COMMERCIAL FAILURE BECAUSE OF ITS HIGH PRICE TAG ($10,000). IN 1982, STEVE JOBS WAS FORCED OUT OF THE LISA PROJECT AND JOINED THE MACINTOSH INSTEAD.


THE MACINTOSH


1984: THE MACINTOSH WAS LAUNCHED WITH THE HELP OF A RIDLEY SCOTT TELEVISION COMMERCIAL THAT AIRED DURING  THE SUPERBOWL. THE MACHINE WAS CONSIDERED CHEAPER THAN LISA.


NEXT

1989: NEXT WAS FOUNDED IN 1985 BY STEVE JOBS AFTER HE RESIGNED FROM APPLE. APPLE THEN PURCHASED NEXT IN LATE 1996


THE iMAC
1998: THE iMAC, THE DESKTOP COMPUTER BUILT BY APPLE, HAS TAKEN MANY SHAPES SINCE THE ORIGINAL WAS LAUNCHED IN 1998


THE iPOD
2001: THE iPOD CHANGED HOW PEOPLE ALL AROUND THE WORLD CONSUME MUSIC


iTUNES


iPHONE
2007: THE iPHONE IS AN INTERNET AND MULTIMEDIA- ENABLED SMARTPHONE. THERE ARE NOW FIVE GENERATIONS OF THIS DEVICE, AND EACH NEW MODEL IS GREETED WITH ENORMOUS LINEUPS AT APPLE STORES ALL AROUND THE WORLD.


iPAD
2010: THE iPAD ONCE AGAIN CHANGED HOW PEOPLE INTERACT WITH TECHNOLOGY. THE TABLET COMPUTER IS A PLATFORM FOR MANY DIFFERENT TYPES OF MEDIA INCLUDING BOOKS, GAMES, MOVIES AND WEB CONTENT.
TO KNOW MORE ABOUT STEVE JOBS, DO   
WATCH THE MOVIE- PIRATES OF THE SILICON VALLEY



Steve Jobs bio: Jobs told author, ‘I wanted my kids to know me’.


STEVE WE ALL HOPE YOU REST IN PEACE.












Wednesday, 5 October 2011

WHAT IS WINDOWS FIREWALL AND HOW DOES IT PROTECT YOU?

  • As the name suggests, its a wall against any harmful activity online.
  • A firewall helps to keep your windows more secure
  • It restricts information that comes to your computer from other computers, giving you more control over the data on your computer and providing a line of defense against these programs(viruses and worms) that try to connect to your computer without information



    • You can think of a firewall as a barrier that checks information (often called traffic) coming from the Internet or a network and then either turns it away or allows it to pass through to your computer, depending on your firewall settings.

    NOW YOU CAN VERY WELL IMAGINE HOW INSECURE YOUR PC WOULD BE WITHOUT A FIREWALL