Sunday, November 14, 2010

Will corruption end in India?

Most of the powerful persons are corrupt and without this quality anyone cannot imagine to become Minister or head of any department. All officers who are on top and vital posts have to learn corrupt practices to survive in the system.

Birds of same feather flock together. Culture of corrupt practice is prevalent in all the departments of the government. Then who will bell the cat?Who will take steps to stop corrupt practice on the ground level?

It is not that system is bad but it is the system which Indians have accepted.

This is why, persons involved in scam of thousands of crores of rupees is least bothered. Politicians after exposure of all scam or scandal make very much hue and cry in a dramatic way and then go for hibernation. Before ending the story they constitute a committee to look into the matter. Such committees are also formed in such a way and manned by such a person that even in two or three decades they cannot decide. They are not provided adequate manpower or infrastructure as happens with judges in courts or officials in Vigilance department or in CBI. In this way Pandora’s Box is closed for ever and lost in dark rooms of the offices. As of now even opposition political parties are very weak and hence congress Party is fearless of any reaction and revolt.

If media men are bold, active and honest they can play a great role in exposure and punishment of corrupt officials and MLAs and MPs. As of now the fact is entirely different. Even media men are dishonest and act as blackmailers and negotiator with criminals. They also act as per money they get from corrupt politicians and officers. This is why most of the news on TV or in print media are related to road accidents, rape, murder etc where some money can be earned by media men if they twist the news as per will of the person who committed such crime.

However this is also true that media men who are honest do not get desired support and safety from police and judiciary. In fact honesty has more often than not become the victim in the hands of dishonesty.

In my opinion politicians and bureaucrats must be tried under the prevention of corruption Act. If persons sitting on top posts are honest they will never allow subordinates to indulge in corruption. If minister or MP of any area is honest, talented, bold, active, disciplined, clever and fearless, there is no power on earth which can stop him stopping his subordinates taking bribe or commission on any work done by them.

On the other hand if a subordinate or junior is honest, loyal and hard worker he or she cannot compel his boss or MP or Minister to be honest without inviting repercussion, torture , frustration, depression, disturbance in peace and even death in some case either for self or his or her family members.
Even judiciary works are affected and manipulated by person who has money or power directly or indirectly. Even police department acts as puppets in the hands of big shots. Then who will save honest persons. Bitter Truth is that position of honest person is always pitiable and miserable.

I therefore feel that , not only apartments handed over to politicians which were allotted originally to Kargil family members be taken back by the government but all those officers and ministers who contributed directly or indirectly in happening of such ugly work must be punished in 30 days . And then only a message will go among corrupt officials that evil doers are punished. This should happen with all evil doers so that even hard core criminal will give a rethought before opting for an act of crime.

Until there is a fear of punishment and humiliation in the minds of evil doers, Indian cannot imagine of getting rid of corruption.

Thursday, November 4, 2010

Hi Guys....

“Let this Diwali burn all your bad times and enter you in good times”  


Best Wishes for a Happy and Prosperous Deepavali, with the Grace and Light's of the Lord!!
 
Smile from Miles,
B.Sakthivicky

BISCUIT ART Nice to seee.......











Thanks & Regards, 
Sakthivicky...........

Saturday, October 23, 2010

May be This is Our Workplace (INFOSYS) Mysore Campus

Arial View Of Whole Campus ,See the Name of Company in Buildings



Workplace Seminar hall


A Pool And restaurent

Main Entrance


Multiplex Theatre

Wednesday, October 13, 2010

Cloud Computing

Cloud computing is all the rage. "It's become the phrase du jour," says Gartner senior analyst Ben Pring, echoing many of his peers. The problem is that (as with Web 2.0) everyone seems to have a different definition.
As a metaphor for the Internet, "the cloud" is a familiar cliché, but when combined with "computing," the meaning gets bigger and fuzzier. Some analysts and vendors define cloud computing narrowly as an updated version of utility computing: basically virtual servers available over the Internet. Others go very broad, arguing anything you consume outside the firewall is "in the cloud," including conventional outsourcing.
Cloud computing comes into focus only when you think about what IT always needs: a way to increase capacity or add capabilities on the fly without investing in new infrastructure, training new personnel, or licensing new software. Cloud computing encompasses any subscription-based or pay-per-use service that, in real time over the Internet, extends IT's existing capabilities.

    
Cloud computing is at an early stage, with a motley crew of providers large and small delivering a slew of cloud-based services, from full-blown applications to storage services to spam filtering. Yes, utility-style infrastructure providers are part of the mix, but so are SaaS (software as a service) providers such as Salesforce.com. Today, for the most part, IT must plug into cloud-based services individually, but cloud computing aggregators and integrators are already emerging.
After talked to dozens of vendors, analysts, and IT customers to tease out the various components of cloud computing. Based on those discussions, here's a rough breakdown of what cloud computing is all about:
1. SaaS:
          This type of cloud computing delivers a single application through the browser to thousands of customers using a multitenant architecture. On the customer side, it means no upfront investment in servers or software licensing; on the provider side, with just one app to maintain, costs are low compared to conventional hosting. Salesforce.com is by far the best-known example among enterprise applications, but SaaS is also common for HR apps and has even worked its way up the food chain to ERP, with players such as Workday. And who could have predicted the sudden rise of SaaS "desktop" applications, such as Google Apps and Zoho Office?
2. Utility computing:
          The idea is not new, but this form of cloud computing is getting new life from Amazon.com, Sun, IBM, and others who now offer storage and virtual servers that IT can access on demand. Early enterprise adopters mainly use utility computing for supplemental, non-mission-critical needs, but one day, they may replace parts of the datacenter. Other providers offer solutions that help IT create virtual datacenters from commodity servers, such as 3Tera's AppLogic and Cohesive Flexible Technologies' Elastic Server on Demand. Liquid Computing's LiquidQ offers similar capabilities, enabling IT to stitch together memory, I/O, storage, and computational capacity as a virtualized resource pool available over the network.
3. Web services in the cloud:            Closely related to SaaS, Web service providers offer APIs that enable developers to exploit functionality over the Internet, rather than delivering full-blown applications. They range from providers offering discrete business services -- such as Strike Iron and Xignite -- to the full range of APIs offered by Google Maps, ADP payroll processing, the U.S. Postal Service, Bloomberg, and even conventional credit card processing services.
4. Platform as a service:            Another SaaS variation, this form of cloud computing delivers development environments as a service. You build your own applications that run on the provider's infrastructure and are delivered to your users via the Internet from the provider's servers. Like Legos, these services are constrained by the vendor's design and capabilities, so you don't get complete freedom, but you do get predictability and pre-integration. Prime examples include Salesforce.com's Force.com,Coghead and the new Google App Engine. For extremely lightweight development, cloud-basedmashup platforms abound, such as Yahoo Pipes or Dapper.net.
5. MSP (managed service providers):            One of the oldest forms of cloud computing, a managed service is basically an application exposed to IT rather than to end-users, such as a virus scanning service for e-mail or an application monitoring service (which Mercury, among others, provides). Managed security services delivered by SecureWorks, IBM, and Verizon fall into this category, as do such cloud-based anti-spam services as Postini, recently acquired by Google. Other offerings include desktop management services, such as those offered by CenterBeam or Everdream.
6. Service commerce platforms:
            A hybrid of SaaS and MSP, this cloud computing service offers a service hub that users interact with. They're most common in trading environments, such as expense management systems that allow users to order travel or secretarial services from a common platform that then coordinates the service delivery and pricing within the specifications set by the user. Think of it as an automated service bureau. Well-known examples include Rearden Commerce and Ariba.
7. Internet integration:            The integration of cloud-based services is in its early days. OpSource, which mainly concerns itself with serving SaaS providers, recently introduced the OpSource Services Bus, which employs in-the-cloud integration technology from a little startup called Boomi. SaaS provider Workday recently acquired another player in this space, CapeClear, an ESB (enterprise service bus) provider that was edging toward b-to-b integration. Way ahead of its time, Grand Central -- which wanted to be a universal "bus in the cloud" to connect SaaS providers and provide integrated solutions to customers -- flamed out in 2005.
Today, with such cloud-based interconnection seldom in evidence, cloud computing might be more accurately described as "sky computing," with many isolated clouds of services which IT customers must plug into individually. On the other hand, as virtualization and SOA permeate the enterprise, the idea of loosely coupled services running on an agile, scalable infrastructure should eventually make every enterprise a node in the cloud. It's a long-running trend with a far-out horizon. But among big metatrends, cloud computing is the hardest one to argue with in the long term.

Related videos



Monday, October 11, 2010

RF-ID tags

Radio frequency identification (RFID) is a generic term that is used to describe a system that transmits the identity (in the form of a unique serial number) of an object or person wirelessly, using radio waves. It's grouped under the broad category of automatic identification technologies.
RFID is in use all around us. If you have ever chipped your pet with an ID tag, used EZPass through a toll booth, or paid for gas using SpeedPass, you've used RFID. In addition, RFID is increasingly used with biometric technologies for security.

Unlike ubiquitous UPC bar-code technology, RFID technology does not require contact or line of sight for communication. RFID data can be read through the human body, clothing and non-metallic materials.
COMPONENTS
A basic RFID system consists of three components:
  • An antenna or coil
  • A transceiver (with decoder)
  • A transponder (RF tag) electronically programmed with unique information




  • The antenna emits radio signals to activate the tag and to read and write data to it.
  • The reader emits radio waves in ranges of anywhere from one inch to 100 feet or more, depending upon its power output and the radio frequency used. When anRFID tag passes through the electromagnetic zone, it detects the reader's activation signal.
  • The reader decodes the data encoded in the tag's integrated circuit (silicon chip) and the data is passed to the host computer for processing.
The purpose of an RFID system is to enable data to be transmitted by a portable device, called a tag, which is read by an RFID reader and processed according to the needs of a particular application. The data transmitted by the tag may provide identification or location information, or specifics about the product tagged, such as price, color, date of purchase, etc. RFID technology has been used by thousands of companies for a decade or more. . RFID quickly gained attention because of its ability to track moving objects. As the technology is refined, more pervasive - and invasive - uses for RFID tags are in the works.
A typical RFID tag consists of a microchip attached to a radio antenna mounted on a substrate. The chip can store as much as 2 kilobytes of data.

To retrieve the data stored on an RFID tag, you need a reader. A typical reader is a device that has one or more antennas that emit radio waves and receive signals back from the tag. The reader then passes the information in digital form to a computer system.
CURRENT AND POTENTIAL USES OF RFID
Asset Tracking
It's no surprise that asset tracking is one of the most common uses of RFID. Companies can put RFID tags on assets that are lost or stolen often, that are underutilized or that are just hard to locate at the time they are needed. Just about every type of RFID system is used for asset management. NYK Logistics, a third-party logistics provider based in Secaucus, N.J., needed to track containers at its Long Beach, Calif., distribution center. It chose a real-time locating system that uses active RFID beacons to locate container to within 10 feet.

Manufacturing
RFID has been used in manufacturing plants for more than a decade. It's used to track parts and work in process and to reduce defects, increase throughput and manage the production of different versions of the same product.

Supply Chain Management 

RFID technology has been used in closed loop supply chains or to automate parts of the supply chain within a company's control for years.

As standards emerge, companies are increasingly turning to RFID to track shipments among supply chain partners.

Retailing 
Retailers such as Best Buy, Metro, Target, Tesco and Wal-Mart are in the forefront of RFID adoption. These retailers are currently focused on improving supply chain efficiency and making sure product is on the shelf when customers want to buy it.

Payment Systems
RFID is all the rage in the supply chain world, but the technology is also catching on as a convenient payment mechanism. One of the most popular uses of RFID today is to pay for road tolls without stopping. These active systems have caught on in many countries, and quick service restaurants are experimenting with using the same active RFID tags to pay for meals at drive-through windows.

Security and Access Control
RFID has long been used as an electronic key to control who has access to office buildings or areas within office buildings. The first access control systems used low-frequency RFID tags. Recently, vendors have introduced 13.56 MHz systems that offer longer read range. The advantage of RFID is it is convenient (an employee can hold up a badge to unlock a door, rather than looking for a key or swiping a magnetic stripe card) and because there is no contact between the card and reader, there is less wear and tear, and therefore less maintenance.

As RFID technology evolves and becomes less expensive and more robust, it's likely that companies and RFID vendors will develop many new applications to solve common and unique business problems.

Saturday, October 9, 2010

Water Cooled CPU

Water cooling

Water cooling is a method of heat removal from components. As opposed to air cooling, water is used as the heat transmitter. Water cooling is commonly used for cooling internal combustion engines in automobiles machine guns, cooling of lubricant oil in pumps; for cooling purposes in heat exchangers; cooling products from tanks or columns, and recently, cooling of various major components inside high-end personal computers. The main mechanism for water cooling is convective heat transfer. and large electrical generators.

Advantages

The advantages of using water cooling over air cooling include water's higher specific heat capacity, density, and thermal conductivity. This allows water to transmit heat over greater distances with much less volumetric flow and reduced temperature difference.
For cooling CPU cores its primary advantage is that its tremendously increased ability to transport heat away from source to a secondary cooling surface allows for large, more optimally designed radiators rather than small, inefficient fins mounted directly on the heat source.
The "water jacket" around an engine is also very effective at deadening mechanical noises, which makes the engine quieter. However, the primary disadvantage is that it costs significantly more than an air cooled engine system.

Pressurization

Modern automotive cooling systems are slightly pressurized. This raises the boiling-point of the coolant and reduces evaporation.

Antifreeze

The use of water cooling carries the risk of damage from freezing. Automotive and many other engine cooling applications require the use of a water and antifreeze mixture to lower the freezing point to a temperature unlikely to be experienced. Antifreeze also inhibits corrosion from dissimilar metals and can increase the boiling point, allowing a wider range of water cooling temperatures. Its distinctive odor also alerts operators to cooling system leaks and problems that would go unnoticed in a water-only cooling system. The heated water can also be used to warm the air conditioning system inside the car, if so desired.
 

Other additives

Other less common chemical additives are products to reduce surface tension. These additives are meant to increase the efficiency of automotive cooling systems. Such products are used to enhance the cooling of underperforming or undersized cooling systems or in racing where the weight of a larger cooling system could be a disadvantage.

Video

http://www.youtube.com/watch?v=Sjlg-K4mN-I

 

Computer usage

In the past few years, water cooling is being realized for cooling computer components, especially the CPU. Water cooling usually consists of a CPU water block, a water pump, and a heat exchanger (usually a radiator overclocking, but with improved heat handling capabilities hotter processors can be supported. Less commonly, GPUs, Northbridges, hard drives, memory, VRM, and even power supplies are water cooled. with a fan attached). Water cooling not only allows for quieter operation and improved
Water coolers for computers (other than mainframes) were, up until the end of the '90s, homemade. They were put together using car radiators (or more commonly, a car's heater core), aquarium pumps and home made water blocks. In conjunction with these automotive items users would pair laboratory-grade PVC and Silicone tubing and various reservoirs (home made using plastic bottles, or constructed using cylindrical acrylic or sheets of acrylic, usually clear) and or a T-Line. More recently a growing number of companies are manufacturing pre-made, specialised components, allowing water cooling to be compact enough to fit inside a computer case. This, coupled with the growing amount of heat coming from the CPU has greatly increased the popularity of water cooling. However, it is still a very niche market.
Dedicated overclockers will occasionally use vapor-compression refrigeration or thermoelectric coolers in place of more common standard heat exchangers. Water cooling systems in which water is cooled directly by the evaporator coil of a phase change system are able to chill the circulating coolant below the ambient air temperature (an impossible feat using a standard heat exchanger) and, as a result, generally provide superior cooling of the computer's heat-generating components. The downside of phase-change or thermoelectric cooling is that it uses much more electricity and antifreeze must be added due to the low temperature. Additionally, insulation, usually in the form of lagging around water pipes and neoprene pads around the components to be cooled, must be used in order to prevent damage caused by condensation of water vapour from the air on the surfaces at below ambient temperature. Common places from which to borrow the required phase change systems are a household dehumidifier or air conditioner.
An alternative cooling system, which enables components to be cooled below the ambient temperature, but which obviates the requirement for antifreeze and lagged pipes, is to place a thermoelectric device (commonly referred to as a 'Peltier junction' or 'pelt' after Jean Peltier, who documented the effect) between the heat-generating component and the water block. Because the only sub-ambient temperature zone now is at the interface with the heat-generating component itself, insulation is required only in that localized area. The disadvantage to such a system is that pelts typically draw a large amount of power, and the water cooling system is required to remove this power, in addition to the heat generated by the component. Another possible danger is condensation, resulting from the ambient air right around the pelt being cold. This condensation could cause a short-circuit, shutting the computer down or possibly permanent damage. A proper installation requires that the Peltier be "potted" with silicone epoxy. The epoxy is applied around the edges of the device, preventing air from entering or leaving the interior.
Apple's Power Mac G5 was the first mainstream desktop computer to have water cooling as standard, and Dell later followed suit by shipping their XPS computers with liquid cooling, using thermoelectric cooling to help cool the liquid. Currently, Dell's only computers to offer liquid cooling are their Alienware desktops.

Industrial usage

Most industrial cooling towers use river water or well water as their source of fresh cooling water. The large mechanical induced-draft or forced-draft cooling towers in industrial plants such as power stations, petroleum oil refineries, petrochemical plants and natural gas processing plants continuously circulate cooling water through heat exchangers and other equipment where the water absorbs heat. That heat is then rejected to the atmosphere by the partial evaporation of the water in cooling towers where upflowing air is contacted with the circulating downflow of water. The loss of evaporated water into the air exhausted to the atmosphere is replaced by "make-up" fresh river water or fresh cooling water. Since the evaporation of pure water is replaced by make-up water containing carbonates and other dissolved salts, a portion of the circulating water is also continuously discarded as "blowdown" water to prevent the excessive build-up of salts in the circulating water.
High grade industrial water (produced by reverse osmosis) and potable water is sometimes used in industrial plants requiring high-purity cooling water.
Some nuclear reactors use heavy water as cooling. Heavy water is employed in nuclear reactors because it is a weaker moderator of the nuclear chain reaction. This allows for the reactor core size to be smaller, or for the use of less enriched fuel. For the main cooling system, normal water is preferably employed through the use of a heat exchanger as heavy water is much more expensive. Reactors that use other materials for moderation (graphite) may also use normal water for cooling.
 

Environmental impacts

On very large rivers, but more often at coastal and estuarine sites, "direct cooled" systems are often used instead. These industrial plants do not use cooling towers and the atmosphere as a heat sink but put the waste heat to the river or coastal water instead. These once-through cooling (OTC) systems thus rely upon a good supply of river water or sea water for their cooling needs. The warmed water is returned directly to the aquatic environment, often at temperatures significantly above the ambient receiving water. Thermal pollutionbiocide to prevent fouling in heat exchangerscondensers and other equipment, but in some instances such control can be exercised instead through frequent cleaning, antifouling paints (both toxic-release and non-toxic), or heat treatment. of rivers, estuaries and coastal waters is an issue which needs to be addressed when considering the siting of such plants. Other impacts include "impingement" (the capture of larger organisms such as fish and shrimp on screens protecting the small bore tubes of the heat exchangers from blockage) and "entrainment" (the combined effects of temperature, pressure, biocide residual and turbulence/shear on smaller organisms entrained with the cooling water and then expelled back to the aquatic environment in the effluent). The cooling water in such heat exchange cycles is often treated with a like.