The Death of the Disk

February 13, 2010

If you found this would you know what you are looking at?

This is the first talking machine!  It recorded speech and played it back to you as you turned the crank.

When was this made ? 1887.  The same time as electricity was being harnessed and the light bulb, telephone and automobile  were being  invented and developed.

What is it’s name?  The phonograph.

I know what your thinking that the image does not look like a phonograph.

Well let me introduce to you the gramophone that came out a year later.

Because the method was the same as the phonograph but  just the means were different, people called the  gramophone  the phonograph.

And just as confusing the cylinder and the platter were both called recordings or records holding 2 minutes of voice or music.

By the 1920’s the invention of the radio and it’s spread throughout every household had forced the closure of many recording companies resulting in the demise of the cylinder and dominance of the platter as the standard for recordings.

In the 1930’s the invention of magnetic tape competed with the disk platters as the standard of recording and continued to do so until the 1980’s where the two were joined with the disk platter coated with magnetic material for recording.  Mass storage for main frame computers had used magnetic disks from the 1970’s for data.

Now the platter could hold sound and/or  data.  In the computer they were the mass storage.

Video and movie storage was still restricted to celluloid; because the storage capacity for a single full color image could never be stored on a computer’s hard drive, the image was too big!

In 1985 an alternate media was applied to the disk to increase capacity and incorporated the laser, it was called the laser disk or compact disc. The CD ROM exceeded the capacity of the hard drives of the time and could hold images and videos.  Meanwhile as the hard drive platters continued to grow in capacity and CD ROM’s developed into the DVD’s,  3.5″ floppy disks were replaced by  flash drives. In 2000 a little flash drive could hold 8 meg of data and against the 1.44meg  floppies there was no competition.   In 2001 the digital media players (MP3)  hit the music world and continue to take out large chunks of the market from CD’s.

What is inside the flash drive and the digital media players?

Magic rocks! Silicon memory chips.

The new storage  media is digital and it’s capacity is doubling each year!

Ah but will digital replace the hard drive?

In 2009 the 80, the 160, the 320 giga byte and the 1 tera byte Solid State Drives (SSD) drives were released.

Here is the difference looking at the insides of the two drives; the hard disk drive and the solid state.

 Notice a big difference?

In a very short 4 to 6 years the disk will be dead.

Will anyone miss it ?

Probably not, but I thought you’d like to know 🙂

by R. Frank Tulak

Advertisements

Did You Feel It?

January 9, 2010

February 28, 1999 Astronomers at the Siding Spring Observatory in Australia stared with bone chilling shock at the resent photos taken of the sky.  They were comparing the objects in each photograph for size and velocity. One faint object was growing in size but was not  moving in any direction. Measuring the change in size with the time of each photograph, the speed of the object was calculated at over 43,000 miles an hour. Within hours other observatories searched and verified the objects size at 100 feet long with a trajectory that crossed our orbit putting it on a collision course with earth in less than 36 hours. Within 24 hours, with all observation positions around the globe tracking the asteroids course,  the  final calculation showed the asteroid would pass between the earth and moon on March 2nd at 13:44 universal time (8:44 a.m. ET)  Everyone who knew about it could not sleep that night, if their calculations were wrong it could be a disaster similar to a nuclear explosion. I believe everyone one held their breath the last seconds from the 43rd minute to the 44th minute of what was either going to be a miraculous flyby or a deadly,  devastating impact.  On March 2nd at 13:44 universal time (8:44 a.m. ET) asteroid 2009 DD45 at 43200 miles an hour, like a monstrous bullet,  shot between the earth and  moon. Many gave silent prayers, others hugged their children and loved ones while no one else really noticed nor did the news agencies give it any attention.

Did you feel it?  Did you feel the impending doom when the asteroid was approaching?

If not you will be given another opportunity.

In 2004 an asteroid 1150 feet long ( the size of the rosebowl stadium!) and weighing 23,0000 ton was discovered and unlike the afore mentioned asteroid there has been enough time to properly assess it’s threat potential and with great precision project it’s path, because it has a collision course with earth in 2029 (not 2012).  When will our orbit and the asteroid collide?  Are your ready for this?  In April.  What day?  On the 13th day and what day of the week is that?  It’s a Friday.  With that knowledge they named the asteroid “marshmallow” 🙂 (no! just kidding) They gave it the name of Apophis, the Egyptian God of death.  If this asteroid hits the earth it is going to be very bad!  How bad?  All the dinosaurs will be become extinct!  Wait, they are already extinct.  Well then if it hits the earth it will really ruin everyones day!  The good news is its not going to hit the earth!  How close will it come?  It will shoot between the earth and our communications satellites.  Do you know how close that is?  (Your Dish TV and cell phone will probably not work and it will not be wise for any aircraft to be flying that day either!) What is the bad news?   Well our earth’s gravity is going to drastically change the course of that asteroid when it flies that close to the earth, so much so that it might change it’s course and hit our earth 7 years later 2036.  Where would it hit?  More than likely it will hit in the Pacific ocean between Hawaii and Los Angeles, which will cause 5 consecutive tsunami waves radiating from the impact area; the first one being 3 MILES HIGH ( This is not a good thing! )  If this asteroid hits it will ruin everyone’s day and cause some very major life style changes for everyone who lives on the Pacific coastline!

The technical tsunami

On 27 July 1993 the requirement for EMS and a door through 1 meg memory limit in 16 bit computers was unlocked and opened with the ability to write more complex and intelligent programs with the arrival of the 32 bit Windows NT.  The impact created a technical tsunami wave that changed every computer. The ripples are still felt today with the advanced graphics editing programs using Microsoft XP and our graphic intense cell phone!  The advanced 32 bit programs allowed photo quality image capture and printing.  Where did the corner overnight photo developer and printer shops go?  Where did the public telephones and phonebooths go?  Swept away by 32 bit programing  tsunami!

Did you feel it? The twinge of unfamiliarity with the world?  The need to relearn how to make a simple phone call.  To relearn how to take a photograph with a digital camera.  To learn how to modify the image and print it out on a printer.  Where is the typewriter?  What is happening to the fax machine?  What is a website or a blog?  Have you learned to tweet and do your tweets link to your Facebook?

If you missed it you have another opportunity.

The 64 bit operating system now has the engines to really run it.  Four years ago the two-in-one processor came out.  Two years ago the four-in-one processors came on line. Now with the 32 bit operating system reaching it’s maximum limt  and the demand to do more than the 32 bit operating system can perform the technical tsunami has begun!  64 bit programs will change everyone’s day and cause some very major life style changes for everyone!

by R. Frank Tulak


The Most Fearless and Ferocious !

December 27, 2009


2009/12/27
The creature in the photo is known by the name of the Black Mamba and is the most feared snake in Africa. The name is referring to it’s ink black mouth. One bite delivers enough poison to kill 20 men; yet to the most fearless and ferocious animal on earth this deadly snake is only dinner!

The African Puff Adder whose venom  contains enough toxin to kill 5 men is no match either for the most fearless and ferocious animal on earth if the Mamba was dinner then the adder was lunch!

The cobra who’s venom will kill a full-grown elephant is no match as well against the most fearless and ferocious animal and in seconds will be a it’s meal.

Even the python with it’s bone crushing coils has it’s body shredded and consumed by the most fearless and ferocious creature.

Have you figured out what who this creature is?

Here is another victim

the young salt water crocodile!

When I say the most fearless and ferocious I am not kidding, our little guy is BAD !

What else does he go after?  Africa’s venomous tarantula !

For an evening snack he will devour scorpions when he finds them.

Nothing can withstand him!

Lions and leopards are the only possible threat to our fearless and ferocious little guy and if they take him it will cost them dearly and usually costs them their lives!

Other creatures on the menu are insect larvae, beetles, lizards, rodents and birds such as vultures and hawks!As well as springhare, polecat and particularly juvenile foxes, jackals, antelope and wild cats.

By the way our most fearless and ferocious little guy eats the honey and larva of the killer bees.  Do they sting him, yes!  But he still eats the hive anyway!

Who is he?   He is known only for eating the hives.  He is the African Honey BADger also known as the African Ratel. 

 

Wait, this Blog is about computers, where is the computer part?

In the computer world there are also very deadly programs that will kill your computer and data.  What bad programs?

Viruses, worms, trojan horses, most rootkits, spyware, dishonest adware and  crimeware.

So what is the most fearless and ferocious program that is able to destroy these malicious programs?

According to Anti-virus Comparatives the #1  protection against these deadly programs this year is

Norton Anti-Virus 2010

If you live in the Kalihari of Africa the two things that make you feel comfortable are:

Seeing a Honey BADger in your yard and Norton Anti-Virus on your computer 🙂

 

 

 

by R. Frank Tulak


Most Lethal # 1

November 24, 2009

What are the 10 most lethal animals to humans and what are the 10 most lethal actions humans do to computers?

Either through ignorance or carelessness millions of humans die by these 10 animals and as well millions of computers are destroyed through ignorance or carelessness by these 10 actions by humans.

1st              

position of the cause of most humans death is:

Anopheles ;The mosquito (Sp. mosca- fly  ..ito – small; small fly )  of the genus anopheles there are approximately 460 recognised species: while over 100 can transmit human diseases. How do they transmit the disease? Generally the genus eats nectar, piercing the base of the flower and withdrawing the nectar with its hollow tongue (proboscis) but when the female is readying to produce eggs, nectar is insufficient to provide the iron and protein but mammalian and avian blood does! The antenna are the olfactory senses (smell) which  are tuned primarily to detect carbon dioxide (which is what mammalian and avian species exhale in large quantities) and secondly octenol, which is the scent given off when living tissue sweats. Why doesn’t our blood clot when they are feeding on us, or our white blood cells attack the mosquito? The saliva of the mosquito kills the clotting function and disables the white blood cells, keeping them from attacking.  The mosquito isn’t selfish, it shares some of the material from its previous meals, which may be animals or other humans that are infected with disease. The most common of these are malaria causing 2 million deaths annually; the filariasis worm  that causes disfigurement known  as elephantiasis characterized by a great swelling of several parts of the body; worldwide, around 40 million people are living with a filariasis disability; there are also the viral diseases , yellow fever ,dengue fever , epidemic polyarthritis, Rift Valley fever, Ross River Fever, St. Louis encephalitis, West Nile virus (WNV), Japanese encephalitis, La Crosse encephalitis and  Eastern equine encephalitis  and Western equine encephalitis. 

Mosquitos are estimated to transfer diseases to more than 70 million people per year.

Precautions:  When any of these diseases are present the host body goes into fever and sweating, attracting the mosquito, at this point the victim must be protected from furthur bites so that the infection does not spread. Most mosquito species are crepuscular (dawn or dusk) feeders. During the heat of the day most mosquitoes rest in a cool place and wait for the evenings, although they may still bite if disturbed. So don’t do your exersizes, running or weight lifting (anything that makes you sweat) at sunset!  If you do do them, do them indoors and not outside. Unless you want to share your blood with a mosquito. 🙂

1st

position of the cause of most computer destruction is:

Impact!

This  problem started with the portable notebook computer. They are constantly dropped or thrown from off a bed after the user falls asleep. Or the notebook is pluged into a power recepticle and someone kicks the electrical plug sending the note book flying! But it is not the fall that damages the computer it’s the sudden stop when it hits the floor! 🙂  The notebook computer is not designed to bounce and when it impacts something or something impacts it; it’s ususally “game over”.

But the slow impact is the worst!

Imagine sitting down in a chair with a notebook computer on your lap. Suddenly you have a nature call; what do you do? Well you close the screen of the computer, stand up and put the computer where you were seated and make the nature call.

Have you ever noticed that the new computers look just like chair cushions?

They even have designer colors just like cushions do.

What do you think these people sat on?

Could this happen to you?

Precautions: Never connect your notebook to a electric outlet across the path where other people walk. Never place you notebook computer where it might be mistaken as a cushion, because it will! Always carry it in its case by the handle, this makes it difficult to drop, but not impossible!

Remember: IF you or some else sits on your computer, relax catch your breath, don’t sweat it , or you could attract a mosquito that wants to share. 🙂

Go to

Most Lethal #10 or Most Lethal #2 


Most Lethal #2

November 17, 2009

growling-male-lion

What are the 10 most lethal animals to humans and what are the 10 most lethal actions humans do to computers?

Either through ignorance or carelessness millions of humans die by these 10 animals and as well millions of computers are destroyed through ignorance or carelessness by these 10 actions by humans.

2nd              

position of the cause of most humans death is:

cobra1The COBRA !(Naja naja)

Are you ready for this?

Cobra’s are NOT Poisonous! No one has ever died eating a cobra unless they eat the venom gland! But whoa are they venomous! A single bite can deliver 150-350 mg of the worlds most powerful neurotoxin, enough to kill an elephant. The lethal amount for a human is 18-45 mg with death occurring within 10 minutes to 36 hours (depending on the amount of venom and where the victim was bitten) . The question is, how is it that people have survived a cobra bite? Because the cobra can control the amount of venom it releases! There are many cases of people being bitten  with no venom in the bite at all (dry-bite). Many testify that the cobra can sense the intent of the person and the cobra withholds from biting them or bites them with the appropriate venom accordingly. Cobras often feeds on eggs and chicks, rats, mice, toads, lizards, birds and other snakes. The are very reclusive in the presence of  humans and will try to escape but will fight if it feels threatened. The majority of fatalities were bites on bare hands or bare feet while gathering firewood after dark while the other fatalities got bit trying to kill the cobra. 

 
Precautions: Unless you are bigger than an elephant do not try killing a cobra! Barefooting it in any rural location in Asia or Africa is not a good idea, especially after dark. Sleeping on the ground or floor is never a good idea either, you may go to sleep alone but you may not wakeup that way. By the way, on  cold nights you can catch a cobra by taking off your shoe and he will crawl into it. So if this is a way to catch cobras what do you think you should do before you put your shoes on in the morning? 🙂

2nd

position of the cause of most computer destruction is:

COLD !

No the problem is not with desktop computers but with notebook/laptop computers. They have limits on temperature for operation. You see you just can’t take your notebook/laptop out of the car in the snow of winter time and bring it inside the house and start using it!

Going from cold to warm creates condensation and condensation (water) and electronics don’t mix without consequences. Always wait 30 minutes before using it when you bring it from a freezing environment. Can you tell it is too cold to use? Well yeah, if condensation is forming anywhere on it is too cold to turn on.  Also if it is too cold the hinge on the notebook/laptop will not work well and may break if forced before warm up.  The notebook/laptop keyboard will be literally curled on the edges and the touch pad will not work!  THE COMPUTER MUST BE AT ROOM TEMPERATURE AND THE CONDENSATION EVAPORATED BEFORE USAGE!  Otherwise  there will definitely be damage to your hard drive and generally your motherboard and memory too!   For some reason we have never had this problem in San Diego, CA. 🙂

Precautions: The limit by the majority of manufacturers is Ambient temperature of 35 F/1.7 C  below this and you try to turn it on it’s bye bye computer!  When in doubt wait 30 minutes before turning it on.

Remember: condensation (water) and electronics don’t mix and cobras make strange bed fellows.  🙂

Go to

Most Lethal #1 or Most Lethal #3


Most Lethal #3

November 12, 2009

growling-male-lion

What are the 10 most lethal animals to humans and what are the 10 most lethal actions humans do to computers?

Either through ignorance or carelessness millions of humans die by these 10 animals and as well millions of computers are destroyed through ignorance or carelessness by these 10 actions by humans.

3rd              

position of the cause of most humans death is:

boxjellyfishlargeThe  Box Jellyfish / Sea Wasp ( Chironex fleckeri )

This 4.5 pound (2 k.g.)gelatinous creature with 60 tentacles of which can each reach a length of 10 ft (3 m) constructed of 5000 stinging cells,  called nematocysts, whos’ fastest working toxin kills more people each year than any other marine animal; is the reason the Australian life guards wear nylon panty hose!  No I’m not being incongruent nor sarcastic!  Besides having 4 eyes and no brain to process the information which work exceedingly well as any other creatures with eyes who have  brains; these remarkable creatures’ stinging cells do not sting arbitrarily, but each nematocyst fires it’s toxin in the presence of chemicals that reside in living tissue. The nylon material in the panty hose disrupts the wearer’s body chemical signature. What does the sting feel like? Well the toxin chemically duplicates what a stun gun does electrically and produces the same pain! Now multiply that pain times 5000 if one tentacle wraps around your body! The result would be unconsciousness, which is not a good thing if your swimming, or cardiac arrest, which could ruin your whole day! What if a strand of the tentacle attaches to your body? Don’t try and rub or brush it off you will force more nematocyst to fire their toxin which will make matters worse! Don’t pour alcohol on it either! Drench the tentacle in VINEGAR! I know this does not make sense but it disables the sting cells (nematocysts) from detecting anything and therefore can not release their toxin.

Precautions: Don’t plan to go swimming in the ocean off the Australian beaches from October to April or if you do wear panty hose and have a good amount of vinegar with you! Oh, and take plenty of pictures 🙂

3rd

position of the cause of most computer destruction is:

laptop_bedHEAT !

This was never an issue until the advertisers started showing people in bed with their computers. NOTEBOOK COMPUTERS WERE DESIGNED TO WORK SITTING ON HARD FLAT SURFACES NOT ON BLANKETS!  The heat generated in a notebook computer can be twice that of a desktop and requires tremendous cooling. Air flow must not be blocked. Where does the air flow come from to keep the computer cool?   From the bottom!

Precautions: The computer should be operated on a table top.  Bed sheets and blankets block air flow causing over heating and damage to it’s hard drive.

REMEMBER:

If  your computer tries to entice you to go to bed with it or a muscular bronzed life guard in panty hose invites you for a swim; JUST SAY NO!  🙂

Go to

Most lethal #2 or Most lethal #4


Vampire Moth, Vegetarian Spider and Intel’s i7 and i5 processors

November 7, 2009

vampire-moth
bagheera-spider I know this sounds like something out of a Monty Python movie i.e. ” The Killer man-eating bunnies” but its true! These remarkable creatures change everything about what we thought we knew about their species!
Imagine you are in Siberia, Russia and it’s spring time. The flowers are in bloom, birds are singing and moths and butterflies are fluttering all around you.  Happiness is everywhere ! Then without any fear a few dainty moths alight upon your hands.
Then suddenly you feel a needle like sting as these dainty moths stab you with their sharp barbed and hollow tongues to dine on your blood!

.

Now let’s go to a tropical habitat in Southeastern Mexico and Northwestern Costa Rica where the acacia plants live and the amazing Bagheera Kiplingi jumping spider lives. The acacia plant has a special arrangement with an aggressive ant species that lives within it and protects it. These ants patrol over the whole plant protecting it from other insects and animals. What is specifically guarded is the nutrient rich buds of the acacia. Now comes into the picture the amazing Bagherra Kiplingi jumping spider. Who will jump from thorn to thorn of the acacia just barely escaping the jaws of the patrolling ants untill it finally arrives at an acacia bud to which it buries it’s fangs into it and using it’s full physical strength it extracts the bud and makes it’s get away with it’s vegetarian meal in it’s fangs!

.

Click either icon to watch the videosci7_78

 ci5_78x59

Just like the vampire moth and the vegetarian spider have changed everything about what we thought we knew about their species. So too, the i5 and i7 Intel Processors have changed everything we thought we knew about computers!

Image you are at your computer you have now. Play a DVD video. Now minimize it. Now go to your Internet browser and access a movie on the internet and play it at the same time. What is happening? Your processor has two things to do. So it hops from one to the other dividing its power between the two. Will there be glitches? a little. Now go to your Antivirus program and do a FULL virus scan. Now what is going on? Your processor has three things to do. It must keep hopping from one to the other to keep them going. This brings to my mind a juggler trying to juggle three different things, trying frantically to keep them in the air! You will probably hear your computer’s fans kick in about this time as the processor gets hotter trying to keep the all processes going. Will there be any glitches? The movie will probably freeze for a few seconds then continue as the processor catches up hopping from one to another. Ready for the big one? Now while all this is going on; let’s check your email! You know what will happen don’t you? The processor is going to lose it!  Do the words “freeze up” or “lock up” sound familiar?  You know, where the keyboard or mouse will not respond and the same image is on the screen and nothing changes?   What happens when you have an i5 processor in your computer and duplicate the same actions?  NOTHING!  Everything works and continues to work as if each program was the only program running in the computer!  What is going on?  The processor is not just one with 4 heads, the new design has each core processor act as a separate processor for each application running. It is truly like having 4 computers in 1 ! What is the difference between the i5 Processor and the i7?  Well the design of all the previous computers is  like a juggler with one arm. So with the i5 processors you have 4 jugglers with one arm; but with the i7 Processor you have 4 processors with 2 arms; allowing the computer to be 8 computers in 1! 

 AMAZING!