Web design and_hosting

177 views

Published on

Published in: Art & Photos, Business
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
177
On SlideShare
0
From Embeds
0
Number of Embeds
2
Actions
Shares
0
Downloads
2
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Web design and_hosting

  1. 1. Web_Design_And_Hosting : Part I5 Materials And Technologies That Just Might Eliminate Digital Camera Shutter DelayBob pushed the shutter release button andNOTHING HAPPENED. The football passed intohis sons hands and the actual photo he took was one of a cheerleaders pom-pom. Bobmissed the touchdown too. He resisted an insane urge to slam the camera to the groundand jump on it.This was his first digital camera, and Bob had just experienced an unpleasant surprise. Hehad used film cameras all his life, but when his Yashica went into the shop a friend loanedhim a digital camera. He naively decided to take some action shots and discovered themost maddening "feature" of digital cameras the shutter delay.MADDENING AND FRUSTRATINGArticles on this subject have attributed shutter delay to:1. The cameras focus system2. The time it takes the camera to digitally process the image3. Reaction time of the photographerNumbers one and three are lag times that most people using digital cameras areaccustomed to. Most have used a film camera and know it needs a few milliseconds tofocus.The no-brainer solution is to reduce the aperture of the lens to increase depth of field, oraim the camera at the object you wish to be in focus and depress the shutter button halfway in order to "tell" the camera what to focus on, then move the camera to center theimage and depress it the rest of the way.As far as human reaction time, well, it hasnt really changed much for users of film cameras,and people experienced in taking action shots usually get what they want.So lets look at number 2, the time it takes to process the picture.TIME TO DO THE PROCESSINGProcessing the picture (so the camera can be ready for the next one) comes in severalsteps to move it from the image sensor to flash card storage:1. Color corrections. The camera has to examine each and every Charge Couple Device(CCD) element on the photo sensor. It adds green, blue, and red to achieve the right colorbalance. For a 3 mega pixel camera, the processor has to make 9 million calculations.
  2. 2. 2. Sharpening. This boosts the contrast by detecting and sharpening edges.3. Compression. This process converts the 12 to 14 bits of each CCD sensor to 16 bits by"padding" the information and compressing it to 8 bits. This compresses the file size to 9megabytes.These steps require a tremendous amount of computational time. No wonder Bob missedhis shot!CATCHING THE ACTIONThere are two ways of capturing action:1. The "consecutive mode". If the camera has this mode, you can take a series of rapidshots moving through the event. This requires a camera with a large buffer" to hold photosfor processing.2. Anticipating shots by depressing and holding down the shutter release prior to the event.This requires an ability to predict the future, something most of us dont possess.THE FUTURE OF FASTER SHOOTINGObviously this would all be simplified if micro processing were faster. Even with largebuffers, the speed in which data is transmitted to the processor is prohibited by the rate atwhich data is conveyed from the CCD. Micro processing speed is the next bottleneck.Faster clock rates and data transfer speeds would reduce or even eliminate "shutter lag"time. There are several technologies in the wings that offer hope:1. Nanotube and nanowire technologies. These are both the offspring of "nanotechnology",the ability to make tiny machines at the "nano" level, a billionth of a meter in size rather thana millionth of a meter (micrometer) and offer hope for a 500 GHz clock rate or more.2. DNA Yes, you heard me right. Computing based on DNA strands in which information isstored and processed.3. Other materials Gallium Arsenide with much a faster speed has been used for years for military purposes. Silicon-Germanium chips increase the transfer of light signals to silicon. These traditionallyhave worked best at ultra cold temperatures, but many computer simulations have shownthat they may be made to approach 1000 GHz (1 THz) at room temperature. Indium-antimonide. Much faster than siliconOptical transistors. A glass material known as chalcogenide becomes a switch as its
  3. 3. refracting properties are changed. No need to translate those photons into anything else. Coated Viruses. The latest research involves coating viruses with a conducting material.Much higher speeds at the molecular level can be obtained. This will give a new meaning tothe term "computer virus".4. Parallel Processing. As weve noticed lately with the war between Intel and AMD over thenumber of parallel processors crammed into a CPU, digital camera processing wouldbenefit from parallel processors handling the focussing, sharpening and squeezing.5. Improvement in instructional efficiency by reducing the lines of code would make thewhole process more efficient.HOLD ON AND WAIT FOR THE FUTUREThe REAL solution to this maddening shutter delay appears to be in the material theprocessor is constructed of, as well as advancements in the software.But weve got awhile to wait for it. Although a few alternate materials have been around forawhile, everything else is still in the research and development phase. Even when it finallytrickles out of the labs, it will probably make your future digital camera cost around $10000 -$15000.Quite a price tag for the ability to take pictures as fast as a film camera! StillExcept for the lag, the digital camera has it all over film cameras, once the photo is capturedby the memory card. The new technology will be worth the wait.Digital camera owners are known for their ability to waitas they desperately punch theshutter release trying to grab the fleeting smile of their new baby, or the football that lands inhis hands eighteen years later, when he scores the winning touchdown.Hiring a web designer to come up with the custom solution that you need can set you backa few thousand bucks. But you can do the whole thing yourself and make it drag and dropsimple for mere pennies with a tool like Breezy Websites. See http://breezywebsites.comfor details!WEB_DESIGN_AND_HOSTING : End of Part IWeb_Design_And_Hosting : Part IIHow To Secure Your PC, Software And Data
  4. 4. The role of the personal computer has taken a whole new meaning ever since theintroduction of the Internet. There are scores of Internet surfers who use the Internet fromshopping to banking to investing and much more and the Internet today, is a buzzing,throbbing center of activity. But theres some bad news the Internet is also swarming withquite a few elements from the dark side and they are called hackers and phishers.Hackers try to break into your computer to steal or corrupt your important data, whilephishers try to obtain your personal identification using dubious methods. You have nochoice but to protect your computer from these elements and here a few, easy, cost-effective steps you must take to make your computer almost as secure as Fort Knox:1. Take a backup of important data regularly preferably, daily. Buy another hard drive forthe backup, but do not permanently plug it into your computer. The idea is to keep yourbackups away from your computer just in case it is hacked into.2. Always update your operating system. All developers of operating systems (Windows,Apple OS and Linux) regularly release patches and updates when they discover holes intheir programs. So, remember to keep the "automatic update" feature on always. MicrosoftTip: Windows users can go to www.windowsupdate.microsoft.com and download the latestupdates.3. Your web browser (Internet Explorer, Opera, Mozilla Firefox, etc.) too must be updated forthe same reasons stated above. All you have to do is visit the browser developershomepage and download the latest version or update. If you are using the Microsoft OfficeSuite, then you must make it a point to visit www.officeupdate.microsoft.com and update it,as this software suite is a hackers favorite.4. Next, install a firewall on your computer. A firewall turns your computer invisible on theInternet and hackers, phishers, virus/Trojan developers, malware and adware cannot breakinto it. You can visit www.zonealarm.com and download a personal edition, which comesfree. However, if your data security needs are critical, then you must consider investing in a100% hack-proof firewall.4. Hackers mostly employ Active-X and JavaScript for planting malicious programs intocomputers. Also, cookies are regularly planted on your computer to track your browsingpreferences but cookies are relatively harmless. To stay away from malicious programs,you need to tweak your web browsers security settings Set your security setting for theInternet zone to High, and for your trusted sites zone to Medium-Low.5. Now, you need virus protection and therefore, need to install anti-virus software. AVGanti-virus is free software that is updated regularly and you can download a personal editionby visiting its developers website http://www.grisoft.com/.6. Never ever open mail attachments that come from unknown sources. They are sure tocontain a virus or a Trojan. Also, never run a program located at an unknown origin, on awebsite that does not have a security certificate such programs will plant a Trojan on your
  5. 5. system.8. The Windows operating system is set to hide file extensions for known file types. Turningoff this option will help you see files with unusual extensions which, in all probability, will beviruses/Trojans/Keyloggers.9. When you are working offline, disconnect your computer from the local area network.That way, a hacker will not be able to attack your computer.10. Build a boot disk just in case a malicious program crashes your system.11. Finally, you need to install an anti-spyware program. Ad-Aware SE Personal is anaward-winning tool that can help you detect and eliminate spyware effectively.These are the basic steps required to secure your computer. Always remember to keep youranti-virus, anti-spyware and firewall programs up-to-date. So, use our guide and turn yourcomputer into a virtual Fort Knox. Good Luck!Hiring a web designer to come up with the custom solution that you need can set you backa few thousand bucks. But you can do the whole thing yourself and make it drag and dropsimple for mere pennies with a tool like Breezy Websites. See http://breezywebsites.comfor details!WEB_DESIGN_AND_HOSTING : End of Part IIWeb_Design_And_Hosting : Part IIIHow To Secure Your PC, Software And DataThe role of the personal computer has taken a whole new meaning ever since theintroduction of the Internet. There are scores of Internet surfers who use the Internet fromshopping to banking to investing and much more and the Internet today, is a buzzing,throbbing center of activity. But theres some bad news the Internet is also swarming withquite a few elements from the dark side and they are called hackers and phishers.Hackers try to break into your computer to steal or corrupt your important data, whilephishers try to obtain your personal identification using dubious methods. You have nochoice but to protect your computer from these elements and here a few, easy, cost-effective steps you must take to make your computer almost as secure as Fort Knox:1. Take a backup of important data regularly preferably, daily. Buy another hard drive forthe backup, but do not permanently plug it into your computer. The idea is to keep your
  6. 6. backups away from your computer just in case it is hacked into.2. Always update your operating system. All developers of operating systems (Windows,Apple OS and Linux) regularly release patches and updates when they discover holes intheir programs. So, remember to keep the "automatic update" feature on always. MicrosoftTip: Windows users can go to www.windowsupdate.microsoft.com and download the latestupdates.3. Your web browser (Internet Explorer, Opera, Mozilla Firefox, etc.) too must be updated forthe same reasons stated above. All you have to do is visit the browser developershomepage and download the latest version or update. If you are using the Microsoft OfficeSuite, then you must make it a point to visit www.officeupdate.microsoft.com and update it,as this software suite is a hackers favorite.4. Next, install a firewall on your computer. A firewall turns your computer invisible on theInternet and hackers, phishers, virus/Trojan developers, malware and adware cannot breakinto it. You can visit www.zonealarm.com and download a personal edition, which comesfree. However, if your data security needs are critical, then you must consider investing in a100% hack-proof firewall.4. Hackers mostly employ Active-X and JavaScript for planting malicious programs intocomputers. Also, cookies are regularly planted on your computer to track your browsingpreferences but cookies are relatively harmless. To stay away from malicious programs,you need to tweak your web browsers security settings Set your security setting for theInternet zone to High, and for your trusted sites zone to Medium-Low.5. Now, you need virus protection and therefore, need to install anti-virus software. AVGanti-virus is free software that is updated regularly and you can download a personal editionby visiting its developers website http://www.grisoft.com/.6. Never ever open mail attachments that come from unknown sources. They are sure tocontain a virus or a Trojan. Also, never run a program located at an unknown origin, on awebsite that does not have a security certificate such programs will plant a Trojan on yoursystem.8. The Windows operating system is set to hide file extensions for known file types. Turningoff this option will help you see files with unusual extensions which, in all probability, will beviruses/Trojans/Keyloggers.9. When you are working offline, disconnect your computer from the local area network.That way, a hacker will not be able to attack your computer.10. Build a boot disk just in case a malicious program crashes your system.11. Finally, you need to install an anti-spyware program. Ad-Aware SE Personal is anaward-winning tool that can help you detect and eliminate spyware effectively.These are the basic steps required to secure your computer. Always remember to keep your
  7. 7. anti-virus, anti-spyware and firewall programs up-to-date. So, use our guide and turn yourcomputer into a virtual Fort Knox. Good Luck!Hiring a web designer to come up with the custom solution that you need can set you backa few thousand bucks. But you can do the whole thing yourself and make it drag and dropsimple for mere pennies with a tool like Breezy Websites. See http://breezywebsites.comfor details!WEB_DESIGN_AND_HOSTING : End of Part III

×