Vampire Moth, Vegetarian Spider and Intel’s i7 and i5 processors

November 7, 2009

vampire-moth
bagheera-spider I know this sounds like something out of a Monty Python movie i.e. ” The Killer man-eating bunnies” but its true! These remarkable creatures change everything about what we thought we knew about their species!
Imagine you are in Siberia, Russia and it’s spring time. The flowers are in bloom, birds are singing and moths and butterflies are fluttering all around you.  Happiness is everywhere ! Then without any fear a few dainty moths alight upon your hands.
Then suddenly you feel a needle like sting as these dainty moths stab you with their sharp barbed and hollow tongues to dine on your blood!

.

Now let’s go to a tropical habitat in Southeastern Mexico and Northwestern Costa Rica where the acacia plants live and the amazing Bagheera Kiplingi jumping spider lives. The acacia plant has a special arrangement with an aggressive ant species that lives within it and protects it. These ants patrol over the whole plant protecting it from other insects and animals. What is specifically guarded is the nutrient rich buds of the acacia. Now comes into the picture the amazing Bagherra Kiplingi jumping spider. Who will jump from thorn to thorn of the acacia just barely escaping the jaws of the patrolling ants untill it finally arrives at an acacia bud to which it buries it’s fangs into it and using it’s full physical strength it extracts the bud and makes it’s get away with it’s vegetarian meal in it’s fangs!

.

Click either icon to watch the videosci7_78

 ci5_78x59

Just like the vampire moth and the vegetarian spider have changed everything about what we thought we knew about their species. So too, the i5 and i7 Intel Processors have changed everything we thought we knew about computers!

Image you are at your computer you have now. Play a DVD video. Now minimize it. Now go to your Internet browser and access a movie on the internet and play it at the same time. What is happening? Your processor has two things to do. So it hops from one to the other dividing its power between the two. Will there be glitches? a little. Now go to your Antivirus program and do a FULL virus scan. Now what is going on? Your processor has three things to do. It must keep hopping from one to the other to keep them going. This brings to my mind a juggler trying to juggle three different things, trying frantically to keep them in the air! You will probably hear your computer’s fans kick in about this time as the processor gets hotter trying to keep the all processes going. Will there be any glitches? The movie will probably freeze for a few seconds then continue as the processor catches up hopping from one to another. Ready for the big one? Now while all this is going on; let’s check your email! You know what will happen don’t you? The processor is going to lose it!  Do the words “freeze up” or “lock up” sound familiar?  You know, where the keyboard or mouse will not respond and the same image is on the screen and nothing changes?   What happens when you have an i5 processor in your computer and duplicate the same actions?  NOTHING!  Everything works and continues to work as if each program was the only program running in the computer!  What is going on?  The processor is not just one with 4 heads, the new design has each core processor act as a separate processor for each application running. It is truly like having 4 computers in 1 ! What is the difference between the i5 Processor and the i7?  Well the design of all the previous computers is  like a juggler with one arm. So with the i5 processors you have 4 jugglers with one arm; but with the i7 Processor you have 4 processors with 2 arms; allowing the computer to be 8 computers in 1! 

 AMAZING!

Advertisements

Most Lethal #4

November 3, 2009

growling-male-lion

What are the 10 most lethal animals to humans and what are the 10 most lethal actions humans do to computers?

Either through ignorance or carelessness millions of humans die by these 10 animals and as well millions of computers are destroyed through ignorance or carelessness by these 10 actions by humans.

4th              

position of the cause of most humans death is:

The Great White Shark (Carcharodon carcharias)

GreatwhiteSharks generally eat fish but this 13–17 ft shark weighing in at 1,500–2,400 lb prefers  dolphins, porpoises, whale carcasses and pinnipeds such as seals, fur seals and sea lions, in other words, prey with high contents of energy-rich fat. Great white sharks’ reputation as ferocious predators is well-earned, yet they are not (as was once believed) indiscriminate “eating machines”. They typically hunt using an “ambush” technique, taking their prey by surprise from below. When hunting Cape fur seals  the shark will ambush them from below at high speeds and hit the seal at mid-body.

Great_White_breaching_with_seal_in_mouthThey go so fast that their body will actually shoot out of the water with the seal in its teeth. California sea lions and Harbour seals are ambushed from below and struck in mid-body before being dragged below and eaten. When hunting Northern elephant seals, which are bout the same size  as the great white and can defend themselves,  the shark immobilizes the prey with a large bite to the hindquarters (which is the main source of the seal’s mobility) and waits for the seal to bleed to death,  following the trail of  blood to the seal.  The great white sharks sense of smell is so keen that it can sense a single  part of blood in 100 million parts of water or better and can as well tell which of its nostrils that part is closest to. Apparently it can detect any body fluid of any animal but its main priority is mammalian blood  specifically pinnipeds such as seals, fur seals and sea lions. When in doubt of what something is the great white will cut it open with its serrated teeth to smell it.  This explains why 67% of the great white’s attack on humans ended with the humans surviving, they smelled bad! 

Precautions: MAJOR SAFETY TIP !Don’t go swimming, surfing, scuba diving or kayaking where seals are; especially if you are bleeding! With all the pinnipeds fluids in the water combined with the traces of your blood he will follow your blood trail to you! Remember if he is in doubt if your a pinniped or not he will want to smell your fluids! Which could ruin your whole day! 🙂

great-white-shark-kayak

4th

position of the cause of most computer destruction is:

WATER or coffee or tea or soda pop or wine or any and all liquid refreshment !

Coffee-and-Computer-

Why? Because habits are hard to break!

Before the notebook computer there was a keyboard that attached to your computer and there was a great distance between the keyboard and the computer. If you spilled what you were drinking on the keyboard you had to get another keyboard. But now the keyboard is just over the mother board of the notebook computer and when you spill your drink into the keyboard it drips down through the keyboard and onto the motherboard and destroys the computer!

computerpool

Look closely at the fool , uh photo, at the left do you see any problems?

I know that the media would never misdirect you BUT WATER AND ELECTRONICS DO NOT MIX!

precautions: MAJOR SAFETY TIP  ! KEEP YOUR NOTEBOOK COMPUTER AWAY FROM WATER! Do NOT believe every image you see. Engage brain and common sense before accepting and believing everything you see.

Here is an example:

shark_helicopter_q This is a FAKE!

It would more so if the diver on the rope ladder had a notebook computer ! 🙂

GO TO

Most Lethal #3 or Most Lethal #5


Most Lethal #5

October 31, 2009

growling-male-lion

What are the 10 most lethal animals to humans and what are the 10 most lethal actions humans do to computers?

Either through ignorance or carelessness millions of humans die by these 10 animals and as well millions of computers are destroyed through ignorance or carelessness by these 10 actions by humans.

5th

position of the cause of most humans death is:

MaleLion

The Lion 

He is called the king of beasts and what makes him able to carry that title is the very thing that will cause them to be extinct in the next 50 years. Though the females do the hunting, it is the males that oppose and attack a perceived threat.  That threat includes other younger lions of the pride that wish to challenge the head of the pride or invading male lions from other prides. If he looses his crown then all his cubs will be killed by the new reigning lion.  Because of them being very territorial, other prides of lions that cross the borders of the prides territory will be attacked and killed. Cape buffalo, who are occasional prey of the lion, when finding the scent of baby lions will stampede toward that scent to kill the cubs and their mothers.  Hyenas and other predators compete for the same prey and will attack a solitary lion though that attack will be very costly.  Lions once roamed most of Africa and parts of Asia and Europe.  Today they are found only in parts of sub-Saharan Africa, except for one very small population of Asian lions that survives in India’s Gir Forest.  Because they are limited in their domain, with no ability to expand, the competition between male lions and the attacks by other predators is unlike anything before so the life expectancy of  male lion after reaching adulthood is 1 to 3 years rather than the 8 to 12 years.  When a human enters the territory of the pride it is taken as a threat and the male lions of the pride will attack to defend the territory.  This has been very detrimental to the health and wellbeing of the refugees from warring african nations who are forced to go across lion territory and consequently  detrimental to the life span of the attacking lions as well.

bewarelionsPrecautions: DON”T GO WHERE LIONS ARE!

Lions smell and see you first long before you see them.

If you are in lion territory DO NOT separate your self from the group.  Lions attack isolated individuals.  If a single lion attacks it will be to defend it’s territory.  If  two or more lions attack it is because they have mistaken you for prey.  Either way it is all over in seconds.  The 300 to 500 lbs expert predators armed with claws that can rip the thick hide of a cape buffalo and fangs that are designed to pierce and tear the strongest necks; there is no escape. Always have a loaded weapon and be a good enough shot not to miss a lighting fast  target or go with someone who does OR don’t go into lion territory!  How do you know you’re near lion territory?  The lions warning roar can be heard over 5 miles. There is nothing to see when you enter their territory but plenty to hear! 

5th

position of the cause of most computer destruction is:

a_scythe_sflex_8db_fan_lg_picFans inside the computer!

Just like the very thing that make the lion fearless against all foes is the very thing that is killing them; so too the very thing that makes your computer operate is the very thing that is killing it.  Without fans the computer would exceed 400 degrees farenheit in minutes, causing massive damage to the CPU, graphics processor, and I/O chipset not to mention the hard drive!  These excellent fans pull all the air in from 6 inches from the front of the computer  through the case and over the hard drives and processors keeping them under 200 degrees.  But somehow it became fashionable to take them from off the desk and place them on the floor!   What happens is these excellently designed technical marvels we call computers have become, on the floor, vacuum cleaners!

dust2So instead of cooling the processors and thermal components the fans blanket them with a coating of dust  and hair, keeping the heat within the component, forcing it to overheat and destroy itself.  Also the dust may have minute pieces of metal that can short circuit the components.

So having your computer on the floor really SUCKS!

Precaution: If it is absolutely necessary to place the computer on the floor place it on something like the UPS or anything that will suspend it at least 4 to 6 inches from the floor; just beyond the pull of the fans.  Also once every 6 months it would be best to take it to where a technician can use an air compressor with demoisturized air to blow out the dust.  Make sure that the air that exits the computer does not get caught in the intake, in other words plenty of airflow.  Other wise there will be nothing to see when you turn it on but plenty to smell!

Go To

Most Lethal #4 or Most Lethal #6


Most Lethal #6

October 23, 2009

growling-male-lion

What are  the 10 most lethal animals to humans and what are the 10 most lethal actions humans do to computers?

Either through ignorance or carelessness millions of humans die by these 10 animals and as well millions of computers are destroyed through ignorance or carelessness by these 10 actions by humans.

6th

position of the cause of most humans death is:
Aust_Crocodile_Attacks_
Crocodylus Porosus The Salt Water Crocodile
Lighting is the only way to describe the speed of being captured by the bone crunching 2500 to 5000 psi jaws of this creature which can reach a length of 20 feet and weighing more than a ton! There is no warning. With the patience of a spider waiting for it’s prey it is virtually undetectable in the environment. Though it breathes air it can hold it’s breath for hours just below the water’s surface at  the river’s bank. When an animal comes to the edge of the water the saltwater crocodile can propel over 50% of its body out of the water to capture his prey. The attack is lethal and it is impossible to react in time to escape. If the bone crushing bite does not kill the victim the quickly following “death-roll” will. With the speed of a striking rattlesnake the victim is snatched from the bank or shore and dragged to the depths of the water to be broken into swallow able pieces by the wildly thrashing and rolling of the crocodile with the victim impaled in its razors sharp teeth. Because the saltwater crocodile is prone to cannibalism it’s hide is nearly impenetrable and resistive to the bites of other crocodiles. Most of the human victims that become prey are fishermen and children. Since the advent of the gun there has been fewer human deaths and consequently fewer saltwater crocodiles. 🙂

Precautions: warningTHIS IS A MAJOR SAFETY TIP! Don’t go fishing or swimming or allow your children to play anywhere near where there are saltwater crocodiles!

Where are Saltwater Crocodiles? Anywhere there is an inlet waterway from the ocean; from Cambodia to Australia and from Philipines to India.  Is there anyway to tell a saltwater crocodile is near by? If you are near the water and still alive that is one indication that there is none, at the moment, near by.  If there are white chalky rocks on the ground about the size of your fist that break apart easily then leave quickly. Two animals leave white feces hyenas and crocodiles. The white color comes from the calcium in the bones of their victims. Still there? Examine the water, is it disturbed and muddy so much so that you can not see into it? Crocodiles will constantly disturb the sediment in the water to conceal their bodies in the water.  Examine the bank and it’s vegetation. Does it look like someone tried to paddle a canoe from the bank down to the water? Is there a part of the bank that looks as if someone kept sliding a large boat into the water? If your answer is yes to all of these and you are still there; what are you doing outside the walls of the institution without professional supervision! 🙂

6th

position of the cause of most computer destruction is:
stock-photo-electrical-spark-6242860

VOLTAGE!

Yes the very thing that it needs to exist and operate is the very thing that will destroy it!  There are deadly hidden fangs and claws within the voltage flowing from any electrical outlet.  

What are these fangs and claws? They are  surges, spikes, transient spikes, power failures, brown outs or under voltage, noise, frequency variation ; though other electrical appliances are immune to them they are deadly and lethal to modern day computers.

Just like at the zoo there is a wall between you and the saltwater crocodile so too there should be a wall between your computer and raw voltage.

 
Precautions:  MAJOR SAFETY TIP ! DON’T PLUG YOUR COMPUTER INTO AN UNPROTECTED POWER SOURCE !

If you still want to try, make sure there are no appliances connected to the same circuit. If an air conditioner or any large appliance or copier is on the same voltage line then every time you turn your appliance on or off your computer will be having what would be similar to a major heart attack!  Electricity will jump from its path and go where it shouldn’t and do some very nasty things to your hardrive (which holds your data!), your computer’s motherboard and it’s memory cards.

Still want to plug your computer into raw power? Travel to the location of each home and address within ten blocks of where you are plugging in your computer. Is there arc welding going on? Perhaps an auto body repair shop? Or construction with steel beams that are being welded? Anyone using heavy equipment that is electrical or have a backup generator that they test once a month? If the answer is yes to these questions don’t plug-in your computer!

Still want to plug-in your computer to raw voltage? Check you light bulbs. Do they suddenly get real bright or dim for no reason? Has there been a time where two or more light bulbs burned out at the same time? Don’t plug your computer into the wall socket!

You still want to do it?  Okay, turn your stereo on. Put it in AM and select a frequency between stations so there should be silence. Do you here sizzles and whoosh sounds? That is EMP sounds. Don’t plug your computer into that same socket where the stereo is plugged into, there is no ground! You will loose your data and crash your hard drive and possibly the longer you stay connected to the power the greater the damage to your computer’s memory and motherboard.

Still want to plug it into raw voltage? Switch the selection on your stereo from radio to phono and increase the volume. What do you hear?  Do you hear crackling and popping sounds?  That is the sound of spikes!  That big pop was the audio of a 50+ volt spike, which would have been the equivalent of being shot with a bullet!  Would the computer have survived?  Maybe yes maybe no it would depend on where the spike went when it shot through your computer. 

Still want to plug-in your computer to raw voltage?  No ?  Then get that wall between your computer and the raw voltage and remove it’s claws and fangs!  Buy a UPS!  If your answer yes that you want to kill your computer by plugging it into raw vottage then I am sure that when someone asks for your cell number you  are thinking of your padded room at the institution. 🙂

Need help selecting a UPS ?

Give us a call 619-464-4249

ibexlight3

We are here for you.

GO TO

Most Lethal #5 or Most Lethal #7


Most Lethal #7

October 11, 2009

growling-male-lion

What are the 10 most lethal animals to humans and what are the 10 most lethal actions humans do to computers?

Either through ignorance or carelessness millions of humans die by these 10 animals and as well millions of computers are destroyed through ignorance or carelessness by these 10 actions by humans.

7th

position of the cause of most humans death is:

Bull ElephantLoxodonta africana and the Elephas maximus known as the African elephant and the Asian elephant, respectively. From these gentle beasts are probably where Robert Louis Stevenson got the idea for his novel a Strange Case of Dr Jekyll and Mr Hyde.

Because when these gentle giants go into MUSTH they become 10 tons + of fury and destruction. 

Musth is from hindi which means “madness” it’s a condition when the temporal glands swells and secretes it’s dark fluid down the side of its face to its mouth.African-elephant-bull-in-musth The rage begins to grow rather fast as the temporal glands swell behind the eyes and the testosterone levels jump to 60 times the normal amount in his body.  He may begin to sway from side to side then begin flinging his trunk, then he goes into a destructive fury that destroys everything in his path!  Even the obstinate rhinoceroses when he stands his ground will be killed. In India, male elephants attack villages at night, destroying homes and killing people regularly. In the Indian state of Jharkhand, 300 people were killed by elephants between 2000 and 2004, and in Assam, 239 people have been killed by elephants since 2001.

Precautions: Musth only occurs in elephants older than 15 years of age. If you see a  large older elephant  that is not chained down and he has temporin flowing from his temporal glands, you are way too close to him; do what you would do for the polar bear and cape buffalo; RUN!   Or he might give you similar characteristics to a used tube of toothpaste and ruin your whole day! 🙂

7th

position of the cause of most computer destruction is:

homo angrius empleus and the homo angrius pcownerus also known as the angry employee and the angry pc owner 🙂   When the computer is locked up because of spyware or when it is doing updates or networking is temporarily disabled; the over stressed employee or pc owner will attempt to keep pressing the same buttons expecting a result. When there is no response the finger is replaced with a fist and the pressing becomes pounding ! Then the fury is released!

Precautions: Always keep their antispyware and antivirus programs up to date and run them regularly. Make sure that their windows and antispyware and antivirus are not scheduled to do updates while they are working. Give them a wide berth sometime it easier to face an elephant in musth.   🙂

Most Lethal #6 or Most Lethal #8


Most Lethal #8

October 7, 2009

growling-male-lion

What are the 10 most lethal animals to humans and what are the 10 most lethal actions humans do to computers?

Either through ignorance or carelessness millions of humans die by these 10 animals and as well millions of computers are destroyed through ignorance or carelessness by these 10 actions by humans.

8th

position of the cause of most humans death is:

Polar Bear JawsThe polar bear (Ursus maritimus) is the world’s largest carnivore species found on land. What does it eat?  Most of its diet consists of Ringed and Bearded Seals. The Arctic is home to millions of seals, which become prey when they surface in holes in the ice in order to breathe, or when they haul out on the ice to rest.

The polar bear’s most common hunting method is called still-hunting: The bear uses its excellent sense of smell to locate a seal breathing hole, and crouches nearby in silence for a seal to appear. When the seal exhales, the bear smells its breath, then with lighting speed locks his fish-hook like paws into the seal in the  the hole  and drags it out onto the ice. The polar bear then kills the seal by biting its head to crush its skull. The polar bear also hunts by stalking seals resting on the ice: Upon spotting a seal, it walks to within 100 yd (91 m), and then crouches. If the seal does not notice, the bear creeps to within 30 to 40 feet (9.1 to 12 m) of the seal and then suddenly rushes forth to attack. A third hunting method is to raid the birth lairs that female seals create in the snow. Polar bears have also been observed to eat a wide variety of other wild foods, including , birds, eggs, rodents, shellfish, crabs, adult walrus, beluga whales, other polar bears and people. In other words in the Arctic, if it moves, its food for the Polar bear!

Precautions:Unlike the conventional wisdom about bear attacks, “to never run but to play dead and he will leave you alone”, if the polar bear finds you laying on the ground like a seal and not fighting him he will eat you like he does a seal!  So if a polar bear comes after you  do what they tell you not to do with bears, RUN !If you spot a polar bear 100 yards off watching you then load your weapons. If he has suddenly appeared 30 to 40 feet closer and is in a crouching position preparing for a strike get ready to take aim and fire when he charges and do not stop firing until you have stopped him. No weapons? Then what are you doing in the Arctic around polar bears? RUN !! Polar bear are short sprinters and can not have their metabolic temperature exceed 50 degrees. There is a joke among the people of the arctic that goes like this, “never go out on the ice alone and make sure you can run faster than the person with you”. 🙂

8th

position of the cause of most computer destruction is:

topmodedUpgrades or modifications that exceed the limit of the manufacturer.  Some time after the one year warranty ends the neurosis to upgrade or modify the computer affects the computer owner.  The source of the neurotic behavior is typically a teen or young adult gamester who goes by the alias of computer genius, guru or geek.  His infectious but technically inaccurate enthusiasm and his “advise by advertisements” convinces the owner, using technobable jargon, to overclock the processor or modify the computer case  that will disrupt the grounding of the computer circuits.  Or recommends the  incorrect memory upgrade to be installed, or because of his lack of training he causes static discharges to the micro-circuitry permanently damaging the computer.  Most of the time the young enthusiast recommends the additions and upgrades of components that exceed the total output of the power supply causing an imbalance of the circuitry and component damage.  The greatest amazement of all is his suprise at the degradation of motherboard and components after he  installs or removes components while the power is on and the motherboard is energised.

Precautions: when an enthusiast is present with an alias of computer genius, geek or guru, begin stretching exercises.  When his vocabulary changes and becomes totally unintelligible,  begin loading up your computer.  When he quotes from advertisements in magazines and blogs and declares that you have to overclock your processor and get an external water cooler to compensate for the heat; Run! 🙂

GO TO

Most Lethal #7       or      Most Lethal #9


Most Lethal #9

September 30, 2009

growling-male-lion

What are the 10 most lethal animals to humans and what are the 10 most lethal actions humans do to computers?

Either through ignorance or carelessness millions of humans die by these 10 animals and as well millions of computers are destroyed through ignorance or carelessness by these 10 actions by humans.

9th

position of the cause of most humans death is:

africa-cape-buffaloThe Cape Buffalo weighs 1.5 tons and, when it perceives it is faced by danger, whether real or not, attack head on with razor sharp horns.  They stand up to 1.7 metres high (5 feet 7 inches) and are 2.8 metres long (9 feet).  Humans are virtually its only predator and even lions will avoid crossing their path. Every year the Cape Buffalo is known to maul and kill over 200 humans; many years they kill more humans in Africa than any other creature.

Precautions: For whatever insane reason you would want to,  always approach the herd from down wind. Their sense of smell and hearing is amazing. If they smell you or hear you they will perceive you as a threat and become upfront and personal with you in no time at full gallop. Your vehicle should be in top condition,  ready and facing for a quick getaway or it too will be throughly customized by the bulls! 🙂

9th

position of the cause of most computer destruction is:

overloaded truckPurchasing a computer that is underpowered for their needs. Computer manufacturers build computers for three types of usage; casual usage, daily usage and high visibility usage. To make it clearer, casual usage is when your computer is like your bicycle in the garage or like when your exercise equipment that is stashed in the closet is found broken, it’s sad but no big deal!  Daily usage is like your car which is part of your life. When it brakes down your life becomes very stressful and you need it fixed yesterday!  High visability is like the portable computer in the ER at the hospital that monitors life support during an operation. When it fails everybody knows about it and as time goes on even more interesting people are going to find out! The term “home computer” is another way of saying “casual usage“.  “Business computer” is another way of saying “daily usage“.  “Workstation or server” is another way of say “high visibility”.  Is there a difference in cost? YES ! The cost pretty much matches the warranty.  Computers with a 1 year warranty are build with parts expected to terminate in 1 year and cost under $1,000 complete.  “Business computers” have  generally a 3 year warranty and are built with parts expected to terminate after 3 to 6 years and cost (depending the quality of the internal components) $1500 to $2500. “High Visibility” have full scale support and failure monitoring with backup and redundancy.  Depending on their application start at $3,000 and up, with no limit! 

Precautions:  Whatever you think you need, purchase the next one up in your category of usage. Repairs and service are always more expensive then if you had chosen the better quality first.  How do I choose a computer?  I build it myself according to training and specifications given by Intel.

How do I choose the components?  The way I would want my vehicle’s components to operate if it was parked down wind from a herd of cape buffalo and I was running to it with the stampeding herd right behind me 🙂

GO TO

Most Lethal #8

OR

Most Lethal # 10