Showing posts with label Internet. Show all posts
Showing posts with label Internet. Show all posts

Thursday, February 14, 2013

The University Of Georgia Swim Team Made An Underwater "Harlem Shake" Video

Don't even try to top this, it's impossible.






The "Harlem Shake" is the newest YouTube phenomenon, which means that it's already played out and you're probably sick and tired of it. The University of Georgia men's swim team, however, won the internet with their rendition. Watch this, then never watch another Harlem Shake video again.





































Happy New Year Facebook chat codes

Wish all of you  a very Happy and Prosper New Year. 
Below are some cool Facebook chat codes to say Happy new year to them on FB :)

1.
 [[348175178622169]] [[348175175288836]] [[348175171955503]] [[348175168622170]] [[348175165288837]] [[348175275288826]]
[[348175268622160]] [[348175261955494]] [[348175271955493]] [[348175265288827]] [[348175381955482]] [[348175371955483]]
[[348175375288816]] [[348175378622149]] [[348175368622150]] [[348175475288806]] [[348175465288807]] [[348175471955473]]
[[348175468622140]] [[348175478622139]] [[348175551955465]] [[348175555288798]] [[348175561955464]] [[348175548622132]]
[[348175558622131]] [[348175648622122]] [[348175651955455]] [[348175655288788]] [[348175641955456]] [[348175645288789]]
2.
 [[228970750573428]] [[228970747240095]] [[228970740573429]] [[228970743906762]] [[228970737240096]] [[228970823906754]]
[[228970833906753]] [[228970830573420]] [[228970820573421]] [[228970827240087]] [[228970953906741]] [[228970967240073]]
[[228970963906740]] [[228970957240074]] [[228970960573407]] [[228971053906731]] [[228971057240064]] [[228971047240065]]
[[228971043906732]] [[228971050573398]] [[228971143906722]] [[228971153906721]] [[228971150573388]] [[228971147240055]]
[[228971140573389]] [[228971260573377]] [[228971250573378]] [[228971253906711]] [[228971257240044]] [[228971263906710]]

3.

[[322188301217545]] [[322188304550878]] [[322188311217544]] [[322188307884211]] [[322188314550877]] [[322188531217522]]
[[322188537884188]] [[322188527884189]] [[322188521217523]] [[322188524550856]] [[322188697884172]] [[322188704550838]]
[[322188691217506]] [[322188694550839]] [[322188701217505]] [[322188861217489]] [[322188871217488]] [[322188867884155]]
[[322188857884156]] [[322188864550822]] [[322188954550813]] [[322188951217480]] [[322188947884147]] [[322188944550814]]



4.

[[348187205287633]] [[348187198620967]] [[348187208620966]] [[348187201954300]] [[348187211954299]] [[348187288620958]]
[[348187298620957]] [[348187291954291]] [[348187285287625]] [[348187295287624]] [[348187425287611]] [[348187441954276]]
[[348187448620942]] [[348187428620944]] [[348187458620941]] [[348187685287585]] [[348187671954253]] [[348187695287584]]
[[348187675287586]] [[348187668620920]] [[348187938620893]] [[348187941954226]] [[348187935287560]] [[348187931954227]]
[[348187928620894]] [[348188201954200]] [[348188195287534]] [[348188198620867]] [[348188211954199]] [[348188208620866]]


5.
 
[[228981703905666]] [[228981707238999]] [[228981710572332]] [[228981713905665]] [[228981700572333]] [[228981783905658]]
[[228981787238991]] [[228981780572325]] [[228981790572324]] [[228981793905657]] [[228981890572314]] [[228981893905647]]
[[228981883905648]] [[228981887238981]] [[228981897238980]] [[228981973905639]] [[228981983905638]] [[228981977238972]]
[[228981980572305]] [[228981987238971]] [[228982070572296]] [[228982080572295]] [[228982073905629]] [[228982083905628]]
[[228982077238962]] [[228982170572286]] [[228982167238953]] [[228982173905619]] [[228982160572287]] [[228982163905620]]



To create your own chat codes click here

How to create facebook Chat codes

Have you seen People sending Smiles and images that are not part of Facebook Traditional chat codes.
Here in this post You will see how easy it is to create these codes and Impress you Facebook friends
Like, The best part is you can create your Unique codes . You can create codes of any image stored in you computer, by following these steps

Follow these Steps :- 
1. Go to Smileyti

2. Click on "Browse" and select The  picture you want to use in facebook chat.

3. Enter captcha code.[If you get one]

4. Click on "Upload Now" .

5. It will generate code in few seconds in This form<< [[512585645451273]] [[512585638784607]] >>
Copy The code
   
6. Paste it in facebook chat and hit enter.
 DONE :D














Windows 8 picture password

Windows 8 Tips.
Use a picture password to log into your computer. Windows 8 includes a new feature called Picture password, which allows you to authenticate with the
computer using a series of gestures that include circles, straight lines, and taps. Enable this feature if you want a new way to access your computer or have a hard time with passwords. Open the Windows Charms. Click Settings and then More PC settings In the PC settings  window click Users and then select Create a picture password.

Wednesday, February 13, 2013

Secure wifi lock box timer

Create a secure wifi timer lock box.  You will be able to control your child from getting on the internet late at night.  You can also control when your child is on X-Box live.  I chose to put my project in a military ammo box that I purchased from a gun show. The purpose in putting the timer in a l...
By: ROD917

Continue Reading »

Webcam and object?

Hello experts, I have this code which works so perfect while detecting square objects from images which are downloaded from internet. However, when I am taking the image of a square object from my webcam and processing, its not turning out to be as expected. I am suspecting, the reason could be due...
By: mania12345

Continue Reading »

Thursday, January 24, 2013

What is Variable (computer science) ?

[caption id="" align="aligncenter" width="600"]This image was selected as a picture of the we... In computer programming, a variable is a storage location and an associated symbolic name (an identifier) which contains some known or unknown quantity or information, a value. The variable name is the usual way to reference the stored value; this separation of name and content allows the name to be used independently of the exact information it represents. The identifier in computer source code can be bound to a value during run time, and the value of the variable may thus change during the course of program execution. Variables in programming may not directly correspond to the concept of variables in mathematics. The value of a computing variable is not necessarily part of an equation or formula as in mathematics. In computing, a variable may be employed in a repetitive process: assigned a value in one place, then used elsewhere, then reassigned a new value and used again in the same way (see iteration). Variables in computer programming are frequently given long names to make them relatively descriptive of their use, whereas variables in mathematics often have terse, one- or two-character names for brevity in transcription and manipulation.[/caption]

A variable storage location may be referred by several different identifiers, a situation known as aliasing. Assigning a value to the variable using one of the identifiers will change the value that can be accessed through the other identifiers.

Compilers have to replace variables' symbolic names with the actual locations of the data. While a variable's name, type, and location often remain fixed, the data stored in the location may be changed during program execution.

[caption id="" align="alignright" width="240"]Tidal computer Tidal computer (Photo credit: awduthie)[/caption]

Actions on a variable


In imperative programming languages, values can generally be accessed or changed at any time. However, in pure functional and logic languages, variables are bound to expressions and keep a single value during their entire lifetime due to the requirements of referential transparency. In imperative languages, the same behavior is exhibited by constants, which are typically contrasted with normal variables.

Depending on the type system of a programming language, variables may only be able to store a specified datatype (e.g. integer or string). Alternatively, a datatype may be associated only with the current value, allowing a single variable to store anything supported by the programming language.

[caption id="" align="alignright" width="270"]An instance that is directionally arc consiste... An instance that is directionally arc consistent according to the order x1 x2 x3 but not arc consistent (no constraint is present between x1 and x3; corresponding edges omitted). Every value of a lower-index variable corresponds to values of higher index variables. Question marks indicate points where the converse does not hold. (Photo credit: Wikipedia)[/caption]

Identifiers referencing a variable


An identifier referencing a variable can be used to access the variable in order to read out the value, or alter the value, or edit the attributes of the variable, such as access permission, locks,semaphores, etc.

For instance, a variable might be referenced by the identifier "total_count" and the variable can contain the number 1956. If the same variable is referenced by the identifier "x" as well, and if using this identifier "x", the value of the variable is altered to 2009, then reading the value using the identifier "total_count" will yield a result of 2009 and not 1956.

If a variable is only referenced by a single identifier that can simply be called the name of the variable. Otherwise, we can speak of one of the names of the variable. For instance, in the previous example, the "total_count" is a name of the variable in question, and "x" is another name of the same variable.

Scope and extent


The scope of a variable describes where in a program's text the variable may be used, while the extent (or lifetime) describes when in a program's execution a variable has a (meaningful) value. The scope of a variable is actually a property of the name of the variable, and the extent is a property of the variable itself.

A variable name's scope affects its extent.

Scope is a lexical aspect of a variable. Most languages define a specific scope for each variable (as well as any other named entity), which may differ within a given program. The scope of a variable is the portion of the program code for which the variable's name has meaning and for which the variable is said to be "visible". Entrance into that scope typically begins a variable's lifetime and exit from that scope typically ends its lifetime. For instance, a variable with "lexical scope" is meaningful only within a certain block of statements or subroutine. Variables only accessible within a certain functions are termed "local variables". A "global variable", or one with indefinite scope, may be referred to anywhere in the program.

Extent, on the other hand, is a runtime (dynamic) aspect of a variable. Each binding of a variable to a value can have its own extent at runtime. The extent of the binding is the portion of the program's execution time during which the variable continues to refer to the same value or memory location. A running program may enter and leave a given extent many times, as in the case of aclosure.

[caption id="" align="alignright" width="300"]C language example. Illustrates difference bet... C language example. Illustrates difference between variables and arrays. (Photo credit: Wikipedia)[/caption]

Unless the programming language features garbage collection, a variable whose extent permanently outlasts its scope can result in a memory leak, whereby the memory allocated for the variable can never be freed since the variable which would be used to reference it for deallocation purposes is no longer accessible. However, it can be permissible for a variable binding to extend beyond its scope, as occurs in Lisp closures and C static local variables; when execution passes back into the variable's scope, the variable may once again be used. A variable whose scope begins before its extent does is said to be uninitialized and often has an undefined, arbitrary value if accessed (see wild pointer), since it has yet to be explicitly given a particular value. A variable whose extent ends before its scope does may become a dangling pointer and deemed uninitialized once more since its value has been destroyed. Variables described by the previous two cases may be said to be out of extent or unbound. In many languages, it is an error to try to use the value of a variable when it is out of extent. In other languages, doing so may yield unpredictable results. Such a variable may, however, be assigned a new value, which gives it a new extent.

For space efficiency, a memory space needed for a variable may be allocated only when the variable is first used and freed when it is no longer needed. A variable is only needed when it is in scope, but beginning each variable's lifetime when it enters scope may give space to unused variables. To avoid wasting such space, compilers often warn programmers if a variable is declared but not used.

It is considered good programming practice to make the scope of variables as narrow as feasible so that different parts of a program do not accidentally interact with each other by modifying each other's variables. Doing so also prevents action at a distance. Common techniques for doing so are to have different sections of a program use different name spaces, or to make individual variables "private" through either dynamic variable scoping or lexical variable scoping.

Many programming languages employ a reserved value (often named null or nil) to indicate an invalid or uninitialized variable.

 

Source

Creative Commons Attribution-ShareAlike License

 
Enhanced by Zemanta

Tuesday, January 22, 2013

Agent Network Topology

Network Topologies

Topological theory of intelligent agent networks provides crucial information about the structure of agent distribution over a network. Agent network topologies not only take agent distribution into consideration, but also consider agent mobility and intelligence in a network. Current research in the agent network topology area adopts topological theory from the distributed system andcomputing network fields, such as LAN without considering mobility and intelligence aspects. Moreover, current agent network topology theory is not systematic and relies on graph-based methodology, which is inefficient in describing large-scale agent networks.

Related Work


The term, agent network topology, is derived from mathematical topological theory. This concept overlaps with topological theory in data communications and distributed systems areas.

Existing topological theories in the computing field have been mainly applied to data communications and distributed systems areas. These theories have made some extraordinary contributions. However, as an emerging discipline, topological theory in multi-agent systems is inadequate. Existing topological theory cannot fulfill the needs of an agent network because an agent network has its specific characteristics, which include mobility, intelligence, and flexibility. Agent network topologies take not only agent distribution into consideration but also consider agent mobility in a network. Most of the current research work in the agent network topology area adopts topological theory from the distributed system and computing network fields without considering mobility and intelligence aspects.

Current research work in the agent network topology area is also not systematic and relies on graph-based methodology. Graph-based topological analysis of a network topology is often based on the network graph provided and sometimes lacks precise measurements of each agent. Moreover, existing agent network topologies are incapable of providing detailed information about each agent and its relationship with other agents on a network. This increases the difficulty of agent communication and cooperation, such as agent searching or matching, over a network. Thus, the research direction of agent network topologies needs to follow these three characteristics based on some concrete network performance analysis.

Source

Creative Commons Attribution-ShareAlike License
Enhanced by Zemanta

Sunday, January 20, 2013

Mashable

mashable


Mashable (Mashable Inc.) is a Scottish-American news website and Internet news blog founded by Pete Cashmore. The website's primary focus is social media news, but also covers news and developments in mobile, entertainment, online video, business, web development, technology, memes and gadgets. Mashable was launched by Pete Cashmore from his home in Aberdeen, Scotland in July 2005.

With a reported 50+ million monthly pageviews and an Alexa ranking under 300, Mashable ranks as one of the world's largest websites. Timenoted Mashable as one of the 25 best blogs in 2009, and has been described as "one stop shop" for social media.[10] As of March 2012, it has over 2,775,000 Twitter followers and over 838,400 fans on Facebook.

Mashable Connect conference


Mashable Connect is an annual invite-only conference. It was held on 12 May – 14 May, 2011, with 300 attendees. Speakers included Scott Belsky, Founder & CEO, Behance Rohit Bhargava, SVP, Global Strategy & Marketing, Ogilvy. Sabrina Caluori, Director of Social Media & Marketing, HBO, and Greg Clayman, Publisher, The Daily.


Themes discussed included content curation, the democratisation of content, social media, social television, and helping consumers deal with content overload.

Acquisition


Various news related to the acquisition of Mashable has already been on the web, with AOL being the main name coming out every time. But recently[when?] various sites including Reuters have reported that the site would soon be acquired for $200 million by CNN, which also provided a video.


Softwarelint compares mashable over Cnet

 

Source

Creative Commons Attribution-ShareAlike License

Mashable



 

Friday, January 11, 2013

Megan Fox Quits Twitter – Less Than a Week After Joining

megan_fox_quit_twitter


There is no denying it – Megan Fox is just more of a Facebook kind of girl! Less than a week after joining Twitter, the 26-year-old actress had already had her fill of 140-character count posts – and announced that she has quit the social media site.

"Some of you may, or may not have noticed by now that my Twitter account has been shut down," the "This Is 40" star wrote Thursday on Facebook. "I thought that 2013 might be the year I finally blossomed into a social networking butterfly… but as it turns out I still hate it. Love you guys but I can never be that girl. Facebook is as much as I can handle." Read the entire story

Thursday, January 10, 2013

Amazon Steps Up digital Music Competition With Apple

apple-vs-amazon

SAN FRANCISCO (Reuters) - Amazon.com Inc unveiled a service that increases competition with Apple Inc's dominant iTunes store.

Amazon launched Amazon AutoRip, which gives customers free digital versions of music CDs they purchase from the world's largest Internet retailer.


The digital music files are automatically stored in customer libraries in remote datacenters run by Amazon, where they are available to play or download immediately through the company's Cloud Player service, the company said.

Amazon customers who have bought AutoRip-eligible CDs at any time since the company started selling discs in 1998 will also get digital versions of that music stored in their Cloud Player libraries for free, the company added...Read the entire story