When To Buy A New Computer

September 29, 2010

I know you are wondering what a cement block and a bungee cord have to do with buying a new computer, right?

Well they have a lot to do with it.
Let me explain.
Processors and associate hardware double in power every 18 months while it takes on the average 6 years to write software for the new processors and associate hardware. So there is a major gap; how big a gap?
From the Pentium 3 to the Pentium 4 was a doubling of power and from the Pentium 4 to the core 2 was another doubling. Then from the Core 2 to the Dual core was yet another doubling! I know my words just don’t seem to convey the reality.

For illustration purposes lets say the Pentium 3 is a car that travels 20 miles in an hour, can you visualise that?  Great , now then the Pentium 4 travels twice that, doubling the power, going 40 miles an hour. Now the following year the Core 2 comes out and it is double in power and to continue our illustration it is traveling at 80 miles per hour! Now then what is the speed of the Dual-Core processor in this illustration? 160 miles per hour! With the Quad-Core processors what is the speed? 320 miles per hour!

Does this help?

Pentium III

 

 

 

 

Remember this all takes place in less than 6 years!

Now comes the part about the cement block and bungee cord!!

Now remember hardware double every 18 months while it takes about 4 years to write the Operating system that can utilize the new powerful components. So what take place between these four years? Updates and patches.

Picture your Operating system as the cement block and the bungee cable the updates and patches which is tied to the bumper of your car (computer) . As the new hardware comes out they use the older operating system which will require advanced drivers to link with the new processor and chips and major software updates. So as time goes on the core of the operating system doesn’t really change just like the cement block. But the updates and drivers get pulled greater and greater like that bungee cord getting stretched until finally the cement block takes to the air and comes crashing down! Average time to the flying cement block 4 years!

This is why there was Windows NT then Windows 2000 then Windows XP then Windows Vista then Windows 7

Are there alternatives?

Yes, get a different cement block (operating system) with a longer bungee cord (updates and drivers) like Linux but 8 years is the MAX before the flying cement block. 🙂

Did the hexa-core (six core) processors come out yet?

Yep the first months of 2010.

When is Windows 8 coming out?

Late 2012 or 2013 or ….

In the mean time there are going to be a TON of updates  🙂

 

by R. Frank Tulak

 Related articles for further reading:

The Real Beanstalk

Computers in Cars?


The Most Fearless and Ferocious !

December 27, 2009


2009/12/27
The creature in the photo is known by the name of the Black Mamba and is the most feared snake in Africa. The name is referring to it’s ink black mouth. One bite delivers enough poison to kill 20 men; yet to the most fearless and ferocious animal on earth this deadly snake is only dinner!

The African Puff Adder whose venom  contains enough toxin to kill 5 men is no match either for the most fearless and ferocious animal on earth if the Mamba was dinner then the adder was lunch!

The cobra who’s venom will kill a full-grown elephant is no match as well against the most fearless and ferocious animal and in seconds will be a it’s meal.

Even the python with it’s bone crushing coils has it’s body shredded and consumed by the most fearless and ferocious creature.

Have you figured out what who this creature is?

Here is another victim

the young salt water crocodile!

When I say the most fearless and ferocious I am not kidding, our little guy is BAD !

What else does he go after?  Africa’s venomous tarantula !

For an evening snack he will devour scorpions when he finds them.

Nothing can withstand him!

Lions and leopards are the only possible threat to our fearless and ferocious little guy and if they take him it will cost them dearly and usually costs them their lives!

Other creatures on the menu are insect larvae, beetles, lizards, rodents and birds such as vultures and hawks!As well as springhare, polecat and particularly juvenile foxes, jackals, antelope and wild cats.

By the way our most fearless and ferocious little guy eats the honey and larva of the killer bees.  Do they sting him, yes!  But he still eats the hive anyway!

Who is he?   He is known only for eating the hives.  He is the African Honey BADger also known as the African Ratel. 

 

Wait, this Blog is about computers, where is the computer part?

In the computer world there are also very deadly programs that will kill your computer and data.  What bad programs?

Viruses, worms, trojan horses, most rootkits, spyware, dishonest adware and  crimeware.

So what is the most fearless and ferocious program that is able to destroy these malicious programs?

According to Anti-virus Comparatives the #1  protection against these deadly programs this year is

Norton Anti-Virus 2010

If you live in the Kalihari of Africa the two things that make you feel comfortable are:

Seeing a Honey BADger in your yard and Norton Anti-Virus on your computer 🙂

 

 

 

by R. Frank Tulak


The Killer Tomato, Potato and Botnet

December 15, 2009

Here are the last few seconds of this fly’s life before the lighting quick jaws of the venus flytrap leaf snaps shut and the plant begins to digest this fly, pulling the life giving nutrients from the fly to the plant. The venus fly trap (Dionaea muscipula) is labeled a carnivorous plant but not all carnivorous plants capture prey the same way. The standard definition would be “any of several unrelated plants modified to capture and digest animals, especially insects, which supply nitrogen that may otherwise be unavailable in their habitat.”

According to the standard definition; if a plant, because of it’s design, characteristics or attributes, captures and or kills an animal for the purpose of extracting nutrients to be used by the plant, it is carnivorous.

Carnivorous plants don’t digest all their victim only the nutrients it needs. Then when it opens only the structure and shell of the victim is left.

Other carnivorous plants  use nectar mixed with a sap and digestive chemicals to lure and capture the animal like the sundew (Drosera) .

While others are more passive like the  pitcher plant (Nepenthaceae and Sarraceniaceae) who lure insects into an opening that forces them to drown in a pool of water in the center of the plant. Thus extracting the nourishment over time as the animal dissolves in the water.

The problem is there are a whole group of plants that still fit the definition of carnivorous plant but because they do it differently they have never been recognized as been carnivorious.

Ladies and gentleman I introduce the covert carnivorous plants, our well-known tomato and potato plants! All this time we never recognized their carnivorous behavior. For those who grow tomatoes they have always recognised the dead insects on the plant or on the ground around the plant but have generally ignored it.  We never thought about it. I guess we all thought the insects just came to the plant to die. 🙂 The truth, recently accepted without controversy, is the tomato and potato plant lure the insects then the insects are trapped by the sticky hairs on the tomato or potato plant THEN (and here is where we missed it) as the sappy lure dries it finally releases the dead victim to dissolve on the soil to feed the roots of the plant just below the surface.

What does this have to do with Computers?

If you look at a computer program as a kind of life form then you see it needs the nutrients that are available from other computers to grow. So if there is a kind of program that can grow outside its own computer it must lure other computers, capture them then extract or assimilate those computers processor and memory to grow and capture other computers.

Is there such a carnivorous program? If so how big is it?

There are carnivorous programs and they are called  botnets!

How many botnets are there? There are hundreds but there are 16 which are the real monsters and have eaten the lions share of the world’s computers.

Are they dangerous to people? Well that depends on how much of your life is dependent on computers. For illustration purposes let’s use automobiles instead of computers. What if someone could take control away from the driver of a car and completely control it remotely? Could they do any damage? What if they could take control of 100 cars at any moment could they do any damage? Look at the size of  top 5 of these carnivorous programs!

  1. Conficker           35 ,000,000 +   computers controlled
  2. Kraken                     495,000       computers controlled
  3. Srizbi                        450,000      computers controlled
  4. Bobax                       185,000      computers controlled
  5. Rustock                    150,000      computers controlled

HOW DID CONFICKER GROW SO BIG!

After it has infected a target computer (by downloading a Trojan), it tries to prevent it’s removal by disabling anti-virus software and blocking access to security-related web sites, as well as stealing personal information by masquerading as an anti-virus product called Spyware Protect 2009. How ?   The worm informs the user that his computer is infected and takes the user to a fake security Web site, asks them to pay $50 for a spyware program that actually is the Conficker worm, then keeps their credit card information, to boot.

How can you tell if your computer is infected with the conficker worm?

There is a test to see if your computer is infected click here 

Where is the infection mostly located?

 

What should everyone do? Keep their antivirus and antispyware up to date and scan regularly.

Hey I’d rather eat a potato or tomato than be eaten by one! 🙂

 

 by R. Frank Tulak


Why is there a Blue Screen of Death?

August 12, 2009

bsod-at-building
Everyday more and more we are seeing the “Windows Blue Screen of Death” not just on our computers but on buildings on airplanes at gas pumps and at the airports. As more and more computers are being integrated into our daily lives the Blue Screen of Death becomes more visible. The other operating systems also have failure screens but because of the brilliant blue of the Microsoft Failure screen we remember it more strongly. Here are the failure screens of other operating systems.
sadMAC The “Sad Mac” of the Macintosh Computer.
ubuntu-linux-kernel-panic-500x375
The “Kernel Panic” of Linux operating system
Now that we are seeing these failure screen more frequently the big question arises;
Why is there a blue screen of death?  The answer is PEOPLE !
I know and your response would be “WHAT?”.
Let me explain.
One of the greatest “AH HA !” moments came when I was at a Programmers Conference, which are called technically a “Developers Conference”. There I had the unique privilege of meeting the people who wrote the programs and operating systems that you and I are so familiar with. What I thought was so amusing was by talking to each person I knew what programs or operating system they wrote by their personalities. It only took a little while but you could tell.  It was as if I already knew them. Then the “AH HA !” moment happened and I understood; the logic of the programs they wrote were modeled after their own logic and way of thinking!
That is the reason there are failures!
To explain it better picture in your mind a big dance party, and that the operating system is like the song or dance tune being played. The male dancers are the hardware, while the female dancers are the software. The beat or timing comes from the band musicians with their instruments, and the dancers are all moving to the beat of the music. All around the room in chairs are men and women ready to get up and dance when there is room on the dance floor.  How many pieces of hardware and software can dance depends on the size of the memory which would be the dance floor.  The faster the musicians play the faster the dancers dance. What happens when dancers collide or step on each others feet?  Then we have a program error and the dancers leave the dance floor (the program must shut down.) What happens when dancers slip and fall into the band or knock down other dancers?  That is when the music stops or a “Blue Screen of Death” everyone has to stop and the music starts over again.
You see the same problems of logic and actions that people have in their lives is the same in their programs. They model their programs after their own way of thinking!
As you watch the video think of what is going on in your computer! Remember programs and operating systems are modeled after the thinking and logic of the programmers that wrote them!

So when will we stop having blue screens?

When people no longer write programs and operating systems!
When the computers write the programs and not people!
Picture in your mind a dance party were the musicians and everyone dancing are robots, no mistakes, the whole dance is flawless!
Wouldn’t that be fun to watch?
So enjoy your blue screens while you can they won’t be around much longer. 🙂


Are the CIA FBI NSA the same thing?

July 1, 2009

bondslarge2

 

Of course not. They server different purposes and are limited in their authority and influence; but they are very vital in this day and time.

What they have in common is that they collect and act on information related to criminal activity or affects national security.
So they are filled with James Bond types right? No!
A James Bond type would never work well in either group. They may have attributes similar to the Mr. Bond of Ian Fleming’s stories but they must be team players, not lose cannons! Sorry if you are a James Bond fan. 🙂
What their focus is and their boundries are are pretty much given in theirs names.
The Federal Bureau of Investigation (FBI ) and Central Intelligence Agency (CIA) and National Security Agency (NSA).
The FBI is primarily a law enforcement agency, collecting intelligence related to domestic security and performing crime investigation.
The CIA is an international intelligence agency which is not responsible for domestic security
In other words the FBI investigates crimes, and the CIA gathers intelligence.

What does the National Security Agency handle? The NSA handles domestic intelligence in coordination with the FBI. In addition, the CIA often cooperates with international intelligence agencies to exchange information. The CIA may pass information regarding domestic security on to the FBI.

The FBI also handles domestic law enforcement issues. The FBI coordinates national efforts to track down missing persons, complex investigations which local law enforcement cannot handle, processing of criminal evidence, and support for victims of crime. FBI agents frequently assist in the collection of evidence in major criminal cases, especially those involving a substantial amount of money or multiple homicide cases.

The CIA does not handle law enforcement. Agents working within the United States are primarily stationed at CIA headquarters in Washington. Domestically based agents interpret information and create intelligence briefings for the President and White House staff. If directed, these agents may supervise overseas agents in carrying out covert actions on behalf of the United States. (more like Mission Impossible then like James Bond 🙂 )

What does this have to do with computers? EVERYTHING!

You see foriegn unfriendly nations and groups can and do gather information through the use of your computer by way of implanting spyware and malware. This method is almost totally impercievable and very destructive. Not only can they gather intelligence from your computer but use your computer to commit crimes with out you being aware that anyone else is using your computer.
Some recent examples are the Cyber attacks on the World Bank right before the economic world crash. The attack on the White House computers. But ones that can trigger the greatest damage are the botnets.
They are malware that allows someone else to take change of your computer from a distance. As a mild threat they are use to send spam email but as a greatter threat they can be combined to crash any and all networks! Which is about what everything runs on!
Picture if you will traffic any traffic, cars down a highway, water through a pipe, phone calls through a router or just your family coming and going through your house front door. Now instantly jump that incoming traffic to 10.5 million! What would happen to our communications network, our hospital’s network or our defence and police networks? This is the concern of our agancies that guard our nation! What botnet has 10.5 million computers under its control?
The confiker worm! Here is the distributions of control the botnet has.
conficker_world_map
Picture 10.5 million computers awaiting the command of their master!

In the world of your computer it needs protection! You and your computer are part of our nations security!
Your computer needs to have virus protection (like the FBI for our nation) and anti-spyware (like our nations CIA) and it needs to be more strengthed and upadated against attacks with the operating system updates (like our nations NSA).

YOUR MISSION IF YOU DESIDE TO ACCEPT IT IS TO KEEP YOUR COMPUTER’S
ANTIVIRUS UP TO DATE AND CHECK ITS OPERATION EVERY WEEK
UPDATE AND CHECK AND RUN YOUR ANTISPYWARE EVERY WEEK
CHECK AND RUN UP DATES FOR YOUR OPERATING SYSTEM EVERY WEEK.
THIS MESSAGE WILL NOT SELF-DESTRUCT.
GOOD LUCK 🙂


Cloud Computing Going Forward to the Past

June 16, 2009

image0When is the last time you were in the clouds?  No, I’m not talking being in love 🙂

You know, when you did the “take off the shoes” and “walk through the scanner” thing? No, I’m not talking about being arrested, I’m talking about when you got a flight at the airport. Remember just before that, when you got your tickets? Remember the person behind the counter? What was she typing on? A computer terminal. (bear with me I’m not being facetious 🙂 )

gettingtickets Well the program on the terminal screen isn’t in the terminal, the program is on a server which may not be in the same state!

I know what you thinking ” this technology is over 40 years old!”  You are right! Millions of terminals could connect to a few servers at the same time and it was called Master -Slave but since then for Political Correctness sake it was changed to Client-Server. Well what if you repackaged it and the terminal did some real cool stuff and could run multiple programs on several distant servers, what would you call it?

It already has a name; it’s called Cloud Computing!

The story of civilization is taking the individual from Independence to dependence from privacy to being fully exposed. An example would be water. Before, everyone had their own well for water, now it’s a utility, everyone shares and you have to use ONLY what they want you to have and how they want you to have it. So you pay for that utility of receiving water and still buy bottled water! It is the same with food! Now the last bastion of independence and privacy; what interests us, what we write and how we run our business; will be totally naked and accessible by anyone with perceived reasonable authority.

Why would anyone want to lose their Independence? The answer is one word COST!  The average person is after enjoyment, fun and communication. If they bought a computer it was for that purpose. If not, it was because it was too expensive and usually the cell phone, though limited, would suffice. But now that is about to change. Two years ago a computer notebook cost around $2500 with software. Now a net-book (the net part of the word for interNET) costs you $400, using the Intel Atom Processor (a midget Pentium 4 on steroids) and you can use applications such as wordprocessing, spreadsheets, databases and acounting from off a distant server (Really big computer). Next year Intel will cut the cost of the processor almost in half ! While Arm, who makes the processor for the cellphones, is coming out with their own prosessor called snapdragon for the NET book (slave side of Master-Slave, oops I mean Client-Server). The snapdragon configured computer (NETbook) is taunted to be $100 or free with signup, like with a cellphone. What about the really cool stuff part? Well since you are not running any programs on the unit itself but on a distant server, you can have full communication with someone right on the netbook. What I mean is full audio and VISUAL! IF you wanted to show him/her something on your netbook you could show your screen image to them, wherever they are. Or they could just see and hear you. Each one is scheduled to have a video camera with microphone focused on you when you open the lid. Where?  Right above the screen.

The battle for your privacy has already begun. Just like in chess. The board is set and the pieces are in motion. Who are the pieces? The king for the white is Intel Corp. for the black is ARM. The queen for the white is AT&T the queen for the black is Verizon. The bishops are Intel’s communication branch while on the black side Qualcom.The knights are the technologies of voice over the internet (voice over IP) or internet over voice lines which encompasses the router companies like Cisco and Juniper. The  rooks (castles) these are the applications that are to be run from servers. This is still in progress as to which side they are to take. Those who are positioning themselves are Amazon, Ebay, Microsoft, Google, Oracle and Apple, just to name a few.  

 Who are the naked and vulnerable pawns? Why,  those who use the netbook,  of course.  Except we are not naked and vulnerable we do have a little experiance in computers 🙂

Need help choosing and setting up your NETbook give us a call.

With our help you will be like the Cheshire cat,

talking and writing and crusing the NET
with the only thing seen in the cloud is your  smile!

 cheshirecatwithsmile

 We are here for you !


The Worlds Most Powerful Midget!

June 10, 2009

FuzzyCupid

Imagine   if  you will the image of two words powerful and midget, it makes your head turn sideways and your eyebrows mesh together. Why? Because POWERFUL and MIDGET appears to be an oxymoron, but it’s not!

The worlds most powerful midget is not a person but a processor!
Which processor?

Processor with a grain of rice !

Processor with a grain of rice !

The   ATOM   Processor

 
Two years ago Intel Corporation introduced to the world this tiny powerhouse and everyone has built an architecture around it. Now it’s ready for prime time!
In your mind picture the old Pentium 4 processor.
Pentium4Now shrink it down to the size of a piece of rice but enhance its speed and architecture. In other words put it on steroids! THEN add the Dual Core processor’s I/O chip set (a computer’s equivalent to a musle car’s transmission 🙂 ) What do you have? A miniature version of the “governator” of California in computer form.
 The ATOM Processor!
With its small size it consumes only a fraction of the power of the original .45 watts to .75 watts!
How about the price?
Between $45 and $75  compared to the old $350 price.
So now its in a miniature notebook called a net-book.
What is the operating system? Windows XP Home.
Memory? 1 gigabyte.
How long does the battery last? 10.5 Hours!
How much does it weight? 2.2 to 3.2 pounds depending on configuration.
How big is the screen? Corner to corner, 10.1 inches.
Here is a review of one net-book from Asus.


What is the cost? Around $400

Next year the ATOM goes into cell phones!

Imagine a miniature Govenator in your Cellphone!

What will happen to our present cell phones?

Hasta la Vista, BABY!