Thursday, June 29, 2006

google checkout

thursday, that is, today, google is introducing google checkout to the world. that is a new method, a new try to get more money from technique.this is a service that allows people to make purchases from online stores using payment and shipping information they keep on files with google.
from eric, the aim of google checkout is to make it easier and faster in buying products advertised on google-thus attracting more advertises.
these days, you can easily to find that google has done lots of moves to all directions, such as google earth, writely.com, etc... all predict the ambitions of google. i hope so, google can have a nice tomorrow.
organize world's information-it can get it.

only the dead have seen the end of war

only the dead have seen the end of war.
------a greek philosopher said.
even the colonel of american forces in Anbar province didn't know if this war is worth so many death of these soldiers.
now, everday, there must be some soldier killed in somewhere by some way, may be mortar shell, just like Lisk, an American soldier killed several hours ago.
though it's an american soldier, it's a humanbeing, too.
maybe, i can understand why so many american peopen damn and hate the war promoted by the goverment.it's time for someone to reconsider its move. anyhow, the iraq war ends silently for one american soldier, terry lisk, a common american soldier, died in a common way by a shell.

ipv6 or ipng's brief introduction

if u want 2 get more information in details, u can browse this website:
"http://www.laynetworks.com/IPv6.htm". maybe it's useful for u.

This post presents an overview of the Next Generation Internet Protocol (IPng). IPng was recommended by the IPng Area Directors of the Internet Engineering Task Force at the Toronto IETF meeting on July 25, 1994, and documented in RFC 1752, "The Recommendation for the IP Next Generation Protocol" [1]. The recommendation was approved by the Internet Engineering Steering Group on November 17, 1994 and made a Proposed Standard.
The formal name of this protocol is IPv6 (where the "6" refers to it being assigned version number 6). The current version of the Internet Protocol is version 4 (referred to as IPv4). This overview is intended to give the reader an overview of the IPng protocol. For more detailed information the reader should consult the documents listed in the reference section.
IPng is a new version of IP which is designed to be an evolutionary step from IPv4. It is a natural increment to IPv4. It can be installed as a normal software upgrade in internet devices and is interoperable with the current IPv4. Its deployment strategy was designed to not have any "flag" days. IPng is designed to run well on high performance networks (e.g., ATM) and at the same time is still efficient for low bandwidth networks (e.g., wireless). In addition, it provides a platform for new internet functionality that will be required in the near future.
This paper describes the work of IETF IPng working group. Several individuals deserve specific recognition. These include Paul Francis, Bob Gilligan, Dave Crocker, Ran Atkinson, Jim Bound, Ross Callon, Bill Fink, Ramesh Govindan, Christian Huitema, Erik Nordmark, Tony Li, Dave Katz, Yakov Rekhter, Bill Simpson, and Sue Thompson.

Wednesday, June 28, 2006

Donald E. Knuth

Donald E. Knuth was born on January 10, 1938 in Milwaukee, Wisconsin. He studied mathematics as an undergraduate at Case Institute of Technology, where he also wrote software at the Computing Center. The Case faculty took the unprecedented step of awarding him a Master's degree together with the B.S. he received in 1960. After graduate studies at California Institute of Technology, he received a Ph.D. in Mathematics in 1963 and then remained on the mathematics faculty. Throughout this period he continued to be involved with software development, serving as consultant to Burroughs Corporation from 1960-1968 and as editor of Programming Languages for ACM publications from 1964-1967.

He joined Stanford University as Professor of Computer Science in 1968, and was appointed to Stanford's first endowed chair in computer science nine years later. As a university professor he introduced a variety of new courses into the curriculum, notably Data Structures and Concrete Mathematics. In 1993 he became Professor Emeritus of The Art of Computer Programming. He has supervised the dissertations of 28 students.

Knuth began in 1962 to prepare textbooks about programming techniques, and this work evolved into a projected seven-volume series entitled The Art of Computer Programming. Volumes 1-3 first appeared in 1968, 1969, and 1973. Having revised these three in 1997, he is now working full time on the remaining volumes. Approximately one million copies have already been printed, including translations into six languages. He took ten years off from this project to work on digital typography, developing the TeX system for document preparation and the METAFONT system for alphabet design. Noteworthy by-products of those activities were the WEB and CWEB languages for structured documentation, and the accompanying methodology of Literate Programming. TeX is now used to produce most of the world's scientific literature in physics and mathematics.

His research papers have been instrumental in establishing several subareas of computer science and software engineering: LR(k) parsing; attribute grammars; the Knuth-Bendix algorithm for axiomatic reasoning; empirical studies of user programs and profiles; analysis of algorithms. In general, his works have been directed towards the search for a proper balance between theory and practice.

Professor Knuth received the ACM Turing Award in 1974 and became a Fellow of the British Computer Society in 1980, an Honorary Member of the IEEE in 1982. He is a member of the American Academy of Arts and Sciences, the National Academy of Sciences, the National Academy of Engineering, and a foreign associate of l'Academie des Sciences (Paris) and Det Norske Videnskaps-Akademi (Oslo). He holds five patents and has published approximately 160 papers in addition to his 19 books. He received the Medal of Science from President Carter in 1979, the American Mathematical Society's Steele Prize for expository writing in 1986, the New York Academy of Sciences Award in 1987, the J.D. Warnier Prize for software methodology in 1989, the Adelsköld Medal from the Swedish Academy of Sciences in 1994, the Harvey Prize from the Technion in 1995, and the Kyoto Prize for advanced technology in 1996. He was a charter recipient of the IEEE Computer Pioneer Award in 1982, after having received the IEEE Computer Society's W. Wallace McDowell Award in 1980; he received the IEEE's John von Neumann Medal in 1995. He holds honorary doctorates from Oxford University, the University of Paris, St. Petersburg University, and more than a dozen colleges and universities in America.

Professor Knuth lives on the Stanford campus with his wife, Jill. They have two children, John and Jennifer. Music is his main avocation.

annoying, customer service

find a post at snakesonblog about the customer service from the comcast.
poster called the company for replace his router in order to connect internet in a stable status, in fact, this move would be finished in five minutes, but actually, it costed ninty minutes for waiting the call aimed to activate poster's new modem with the telephone held on and the technician fell asleep. is it quite annoying?
as the poster request, here is the link to the video named comcast sleeping shot by poster to complain the customer service.
link: http://www.snakesonablog.com/swp/wp-content/uploads/2006/06/ComcastSleeping.wmv

Tuesday, June 27, 2006

can north korea be safe?

this problem exists for a long period.
these days, north korea announce that they want to test a long-rang missile, that can attack the region of usa directly.and also, these day, undated u2 spy plane has been deployed in osan air station. though an usa forces korea offical said that "this move is planned preivously, not related to the test of north korea.", no one will believe it.
these days, i've a nice experience with the experiment of implementing a compiler base on a simple programming language called c- defined by our teacher ms Li. to be confess, i didn't read any introduction about the tools containing lex and yacc. last friday afternoon is my quit right beginning with this discipline.but from the procudure of the experiment, i have to read a lot of imformation about these two tools. that 's really what your see is waht your learn.
it's too late, i need to go bed and have a sweet dream.

Monday, June 26, 2006

capturing your special day forever

nowadays, there is a quite new method to produce a wedding without huge cost, that is, making the procedure photographed and delivering it to all the relatives via webcam, what all you need to do is sending the link via internet.
here is the website "http://www.cashmanpro.com/".
but i don't think this is a quite right and good way to chinese, because of the culture, that is easy to see.

Sunday, June 25, 2006

it's the hardest time

at the end of this semester, these days are the hardest time.
afford and cover it...believe yourself.

US-led forces kill 70 Taliban rebels

just a piece of news. helping reading.
KABUL (Reuters) - U.S.-led forces killed around 70 Taliban rebels during clashes in southern Afghanistan, the U.S. military said on Saturday, raising the number of insurgents killed to 100 over the past three days.
Afghanistan is suffering its worst spell of violence since U.S.-led forces toppled the Taliban in 2001. It comes ahead of NATO troops taking over military control in the violent south from the United States.
Last week the U.S.-led coalition announced a major offensive, codenamed "Operation Mountain Thrust", to push deep into the Taliban's southern heartland.
A clash erupted on Friday after about 40 Taliban fighters attacked coalition forces in the Tarin Kot district of the southern province of Uruzgan.
"They all were killed," Soldier Chris Miller, a spokesman for the coalition forces, told Reuters of the Taliban casualties.
In another incident, coalition and Afghan forces attacked "a large group of extremists" in the Zharie district of neighboring Kandahar province, killing 25 rebels in a battle that lasted three hours, a U.S. military statement said.
Four more rebels were killed in a firefight with a coalition patrol in Kandahar on Friday night, Major Quentin Innes, a coalition spokesman, said.
The Taliban were not immediately available for comment, but have rejected reports of big losses in recent weeks.
The U.S. military said coalition troops had killed about 31 Taliban insurgents in the south on Wednesday and Thursday.
The rebels have stepped up attacks this year in their southern and eastern heartland where they enjoy considerable support from locals.
Local politicians have recently voiced concern over the deteriorating security situation in the south despite the presence of foreign forces, saying rebels are expanding their influence in several parts of the region.
More than 1,000 people, including more than 40 foreign soldiers, have died this year. Around 400 were killed in May alone.
Copyright © 2006 Reuters, All Rights Reserved.

Wednesday, June 21, 2006

about the solution for the problem of bridge.

about the solution for the problem of bridge:
we define a new class "Bridge" to simulate the operation of a bridge.and here is the interface of this class(Vehicle.h):
class Bridge {
public:
Bridge();
~Bridge();
void ArriveBridge(int direc); //if car coming in direc, calling this function in the thread where the vehicle executing.
void CrossBridge(int direc); //if the bridge is capable, then this function will be executed.
void ExitBridge(int direc); //if the car on bridge has executed Pass() successfully, then call this function.
private: List *queue[2]; //denote the waiting cars in two directions.
int age[2]; //denote the number have passed in both two directions.
int curDriection; //denote the current direction of the cars on the bridge(aims to preserve cars from crash).
Semaphore *sem; //as a variable of mutex to synchronize the operation on the bridge. Semaphore *avi; //as a variable of a counter to represent the limitation of the bridge's capacity.
};
this class comprise two lists represent the waiting cars from two directions. if a thread calls the ArriveBridge(), then the caller will be inserted into these two lists by the key of directions.
after calling ArriveBridge, we need a thread to take the charge of the monitor, this thread will call the CrossBridge() in a fixed time and never exit untill all processes exit. this function will make a decision that which car in these two lists can corss the bridge.and here is the algorithm in details: first of all, the thread must get the acception from the monitor via calling avi->P(); the next, make a decision via the following steps: 1)if one of two lists is empty, then make the direction to be the contrary one, else goto the step 2. 2)if the number of passed car from one direction is greater more than a constant, then, we will make the direction to be the less one, else goto step 3. 3)making the direction to be the current direction, aims to make the corss convenient. after that, checking if the direciton made above equals the current direction on the bridge, if yes, then the car can cross the bridge. if not, then this car must wait untill seizing the rest acceptions via calling avi->P() twice, that means there must be no car on the bridge. ok, then release this car from the fit list.revalue the variable of the current direction. that's all the details above.
and the last, if the subthread who represents the car finished, then he must call ExitBridge(), and this will give the acception back to the monitor, and wake up some threads waiting for the acceptions.
here, we have another question: why fair? that is easy to see, in the CrossBridge(), we make this available via controlling the number of passed cars from two directions,that is,making the distance to be constant.

the death tunnel

1928, kentucky...
a horrific disease know as "the white plague claimed over 63,000 lives.
a monstrous sanatorium was built to isolate the infected and play host to bizarre experiments in desperation to find a cure.
unable to cope with the large amount of corpses, a five hundred foot underground tunnel was constructed for the removal of these bodies, hiding the enormous death number from the rest of the outside world.
and this was called "the death tunnel".

this is a terrible story for the horrific background.
the story begins at a party named "truth or scare", annual initiation party. at this party, five girls are chosen into the initiation test, who all have a link with the sanatorium. five girls, five floors, five hours and also five ghosts. that is a horrific game aiming to scare the five girls.
but during the process, there is something wrong with that building, a haunted place.
to be confessed, i don't quit like the method of thi film, aiming to scare people who wathing, without any sense. all in a words, what the fuck is it? i can't quit understand it.

Tuesday, June 20, 2006

windows life service.

the home page of windows life service is live.com.
this is a new style of info service, you can customize what info you want to concern about in your own user page. it's just a test version,from the news of windows watch, some of the windows services move out of beta version now, and the home page of live.com was refreshed a couple of days ago, soon is the final version.
i've had a try with this service, that is quit nice. though don't satisfy my requirement, it open up a new horizons of info service: you can integrate all the information you want together, and rapidly browse them down, never like before, different info in different pages, that is quite confused.
if you want to have a try, just only need to meet one of the requirement listed here: one account of hotmail, msn messager or passport, then it will be your windows live's account with the same password. just enjoy it.

a new technique in human's fertility.

this monday, japanese experts announced they have devised a new method to freeze the human's egg, which unlike sperm which can be easily forzen, thawed and used in fertility treatment. women's egg is fragile and usually damaged when they are thawed. but using this method can reach at a very high thawing rate. so this improvement opens up a new horizon of human's fertility. the technique can help young cancer patient to freeze their eggs before they having treatments which may damage their fertility.
this is a new step in this area, human can control the fertility much more easily than before, i think. some day, maybe we don't need sex any more, ahha.

Monday, June 19, 2006

what's your pick,CSE or IT? from M. Ponnavaikko.

Engineering entery one of two branches, one is computer science and engineering, the other is information techology. here, i want to show you about some details between these two disciplines from my reading, from the article or remarks (maybe) of M. Ponnavaikko.
first, what's different between these two disciplines? from the view of students(for i'm student now), the discipline of CSE aims to produce computer professionals who can design, build and operate computer system, with a thorough knowledge of the basic fundamentals of the internals of computer hardware and software system and networks. by the way, the students from CSE can also troubleshoot and carry out maintenance and repair of computer or networks system, just like what we are in others' eyes.
and the courses of IT aim to produce professionals who can understand computer and communication technologies to the extent of information processing, including design and implementation of the IT-enabled services, internet and web applications.
the second one is the different requirement of mathematics, the courseware of the CSE is based on the mathematics but the IT not.
the third one is about what jobs is suitable for these two kinds of students. in this section, the graduates from CSE is much better than IT.
the forth one is about the further education to these two disciplines, maybe, the courseware of the postgraduate is much more fit for the graduates from the subject of computer science and engeering.but the opportunity is always equal to these two kinds.
the last one is which is much more popular to the MNCs? the answer isn't clear, just depend on the skills of yourself, such as communication skill(important one).
that's all.

Sunday, June 18, 2006

minotaur

minotaur, a creature with human's body and bull's head, a beast present in the mythology of Greece. that is the film i just watched. to get the power of god, the crete's king enforce his queen to offer herself to the bull to create a perfect being, a combination of human and god.
but to the cretes' horror, the queen born a evil and killed the young prince. to cover the reality, the cretes close the bull in a maze, and announce that the prince was killed by a man from a far away village. for this guilty event, the village should offer eight young people to the minotaur every other three years. and now, the stroy is beginning...for saving the lover and stopping the offer, a young man named Titan is on his way to kill the beast, but in this film, all was planned by the princess of crete and the purpose is getting rid of his eld brother's controll, and killing the minotaur.

Saturday, June 17, 2006

nice experience with teachers of middle school

here are we and the teachers in the middle school i mentioned several posted before.

what is VOIP?

VOIP is voice over ip for short. it's easy to understand it, isn't it?

encrypt your flash-memory device, sounds nice.

find a free software for encrypting flash-memory device named TrueCrypt.
you can download it at the website "truecrypt.org", maybe it's useful someday.
here is its introduce:
TrueCrypt is a software system for establishing and maintaining an on-the-fly-encrypted volume (data storage device). On-the-fly encryption means that data are automatically encrypted or decrypted right before they are loaded or saved, without any user intervention. No data stored on an encrypted volume can be read (decrypted) without using the correct password/keyfile(s) or correct encryption keys. Entire file system is encrypted (i.e., file names, folder names, contents of every file, and free space).
Files can be copied to and from a mounted TrueCrypt volume just like they are copied to/from any normal disk (for example, by simple drag-and-drop operations). Files that are being read or copied from the encrypted TrueCrypt volume are automatically decrypted on-the-fly (in memory/RAM). Similarly, files that are being written or copied to the TrueCrypt volume are automatically encrypted on-the-fly (right before they are written to the disk) in RAM.Note that TrueCrypt never saves any decrypted data to a disk – it only stores them temporarily in RAM (memory). Even when the volume is mounted, data stored in the volume is still encrypted. When you restart Windows or turn off your computer, the volume will be dismounted and files stored in it will be inaccessible (and encrypted). Even when power supply is suddenly interrupted (without proper system shut down), files stored in the volume are inaccessible (and encrypted). To make them accessible again, you have to mount the volume (and provide the correct password and/or keyfile).

the long arm of the law

from the title, this is evident about the legislation of a country.
at smoothwall.net, i saw a news in brief referred to the legislation of usa. here it is, moves by fbi in the us to force IP telephony companies to provide "wiretapping" facilities, as are currently required for more traditional telecoms companies, have been criticized in a recent report from the IT association of america.
in the view of a goverment, i don't think there is any problem in these moves, for these requires is in the think of country's security. but the reason of this report is the users will decrease if adopting this policy and also the industry's commercial profit, in view of seller.
to preview the result of these moves, i think the final winner must be the goverment for the polity is above all(there may be something unfit for this opinion, but all just kidding). the reality is: our imformation are all under control for the security in any country of the world.
(all words in kidding, don't be serious).

at the end of a week

friday,again. In China, this is a end of a week.
how can i describe my performance this week? all day's playing games?
these weeks are also a end of a semester, i had to preparing for the terminal examination, but i didn't.
i'm pretty afraid of my symbolic logic, which is a difficult subject about mathematics. and tomrrow is another exam of cet6.
it's midnight,i'm drunk?maybe a little. now, it's another football match of world cup.the latest game's winner is Argentina, 6:0.

Thursday, June 15, 2006

a crazy day

tody, whole day's playing game "farcry", without any coding. oh, my god, tomorrow is the deadline.

Wednesday, June 14, 2006

a nice playground

this photo is shot at XiaPu of FuJian province. a playgroun of a middle school, which i teached for a week during the summer vacation.
there's condition is pretty difficult, and the quality of education is worest, i think.
we were there to let the students know the world outside, and tell they, howere difficult the condition is, they must insist on studying.
i'm sorrow when i'm there for i found there is too much children can't experience the education.

goddess in XiaMen

this photo is also shot at BaiLu Zhou, and this statuary is known as goddess of BaiLu, at least, this is what i know about it.

green world: BaiLu Zhou

this photo is shot at BaiLu Zhou, a nice place.
i like it very much.

what is malware?

malware,malicious software for short,is a software program developed for the purpose of causing harm to computer system, similar to a virus or trojan horse.
this is another new word i meet, today. keep reading, and getting in touch with more terms in my subject.
sweet dream for me and the other half part.

Tuesday, June 13, 2006

slight glance:85 anniversary.

this is square of MeiLing Zhong. it's time of the celebration of XiaMen university's 85 anniversary.

new version, google earth 4.0 beta

i've downloaded two versions for windows, one is ordinary, the other is professional. but the ordinary one can't be launched sucessfully, i can't experience it.
after i installed the professional one, launched, it requires me to input the licence key(free trail or purchase). i don't want to pay any for this software(just want to experience it), so i try to register a licence key for free trail.
finally, i get the key, and log in. but unfortunately, i can't contact to the server. maybe it's the firewall? no, i've checked it to be an exception.
so, i can't experience it. what a pity. reading the article "what is new", it just talking about the news about the toolbar, and didn't refer to the quality of the graphics. after all, it has a new interface and gives out a nice look and feel to the users.
why purchase? it's worth? i'm not sure.

Eric Schmidt Still Sees Google as A Technology Company; But We Know It's More...

Q: Is Google a media company or a technology company?
A: It's better to think of Google as a technology company. Google is run by three computer scientists, and Google is an innovator in technology in our space. We're in the advertising business — 99% of our revenue is advertising-related. But that doesn't make us a media company. We don't do our own content. We get you to someone else's content faster.
Now, it's true that Google gets you to other people's content faster. That's the basis of the media revolution I've been on about for some time now .
But to equate Google not doing its own content with a free pass from the media company classification is, well, absurd. That presumes that media companies only make packaged goods - traditional content - and ignores the fact that the majority of media companies in a post web world (and plenty in the pre web world) are not "creators of content" they are innovators in the media experience business in one way or another. Is Comcast in the media business? After all, they really are only distributors of content. EMI Records? Well, they don't "make their own content" - the musicians do. What about FM? We don't "make content" - and we do have a technology platform. But don't tell me we're not in the media business.
Same for Google. The search engine is inherently a media tool: it innovates in the assembly of useful information. Now, let's talk about the other media products in Google's arsenal: Google Finance? Check. Google Video? Check. Blogger, Google Answers, Google Base, Map, Book Search, Earth, Images, Local, Catalogs, News, Mail....check check check!
I'm quite sure the folks at Google are aware of this, and this is most likely an issue of competitive semantics, in the end. First, media businesses, in the main, command far lower valuations on Wall Street than technology businesses. Bill Gates had this same issue back in the 1990s, as I pointed out earlier. And second, the entire media world is fearful of Google; insisting you are not in their business is a placating calculation. But my two cents: No one is buying it.

this saturday is a examination of cet 6

suddently find it.unconfident, for didn't prepare for it.bless.

there is another imformation, what is Fortress technologies? it's a leader in secure wireless networking in usa.

Monday, June 12, 2006

solution for lab3 with nachos

solution for eventBarrier:
in an eventBarrier, we need three queues:one storing threads waiting for signal(waiting), another storing threads that has been signaled and waiting till all waiting threads have been signaled(ready to run).the last storing threads call eventBarrier while eventBarrier is releasing waiting threads(hang up).
a variable named count is required to count the number of threads in the queue of waiting.
a semaphore named signal is used to check if the event happened.(how does a semaphore work, i need to think in details).
another semaphore named status is used to flag the status of eventBarrier,signaled or unsignaled.
then is the implementing of the interfaces of eventBarrier:
wait()---a thread calling wait() will be inserted into queue of waiting,then count++;
signal()---if the event took place,all threads in queue of waiting will be released,and count decrease to be zero.the user must be the thread which the expected event in.blocked till all threads released,and turn satus unsignaled.
complete()---this function may be called by thread in queue of waiting.if called,it inserts the thread into the queue of ready to run.after that,it should be blocked till eventBarrier wakes it up.
waiters()---just return the number of threads in the queue of waiting(if unsignaled).

solution for alarm clock:
isn't ready yet.

solution for problem one, bridge:
isn't ready yet.

solution for problem two, elevator:
isn't ready yet.

Sunday, June 11, 2006

it's to leave.......

a new month, july. a new season for leaving.
today, a guy named Qi Liu is preparing for leaving tomorrow.what a sorrow time, i can't describe it in words. it's a quite long time we take part in each other in this narrow lab. i believe that we are all leading to be good friends. but soon, they will turn graduated, leave this school in all directions. Qi Liu is going to shanghai for his new job, because he didn't pass his entrance examination( I'm pretty sorry for this result).
tonight, we go to eatery for a nice supper, Qi Liu an i paid for it.
Looking at these nice buddies, I'm moving. it must be a long time for the next time we meet.
and another feeling is coming up, i need to be more studious, working for myself, working for my buddies, working for my future.
tomorrow is a new day, a new beginning. i bless for myself, a nice and happy time in weeks.
ps:don't fail in my terminal examination.

samsung intro first 1.98'' LCD to achieve VGA with amorphous silicon

it's amazing, the technology is developing pretty quickly. this technique will soon be used in mobile field. someday, our phone with a nice screen will come out.

undergraduate survey:ipod more popular than beer

i found a ipod with 60 system memory in my dorm,yesterday night, belongs to my roommate JinHui Wu.what a huge capacity, and it's figure is similar to the pic posted left, the same maker, apple computer inc. maybe in american college life, now owning a iconic ipod music player surpassed beer drinking as the most "in" thing among undergraduate college students.why? i don't know for i didn't really have a try with this player, that sounds nice, isn't it?

shuttle launch planned for next month

the us. space agency plans to launch the shuttle discovery next month. but some engineers feel it should wait untill all safety concerns have been resolved.
discovery's mission to test repair technique and work on international space station scheduled to lift off between july 1 and july 19.
can you remember the previous discovery? the NASA(national aeronautics and space administration) said they opted to fly the without redesigning the ramps because the tank renovation should be tested during its own flight before other changes are made.so, this flight is flying without any renovation, is it safe? we bless.

Saturday, June 10, 2006

what is RFID

radio frequency identification(RFID),in chinese is "射频识别".this is a corresponding technology,refers to the technology that uses devices attached to objects that transmit data to an RFID receiver. An alternative to bar coding. Advantages include data capacity, read/write capability, and no line-of-sight requirements.

writely.com

when reading the news about the launch of google spreadsheets, i notice that a website named writely, and its url it's "writely.com".
it's a online document manager system.now is purchased by goole,and stops the registration till moving into the google system.i want to have a try if for free, and sign up my email address for waiting the registration is available again.

vista beta2 is available now for free

to download the vista beta2, click url http://download.windowsvista.com/preview/beta2/en/x86/download.htm .
.
A Windows Vista Capable PC includes at least:
A modern processor (at least 800MHz1).
512 MB of system memory.
A graphics processor that is DirectX 9 capable.A Windows Vista Capable

A Windows Vista Premium Ready PC includes at least:
1 GHz 32-bit (x86) or 64-bit (x64) processor1.
1 GB of system memory.
A graphics processor that runs Windows Aero2. 128 MB of graphics memory.
40 GB of hard drive capacity with 15 GB free space.
DVD-ROM Drive3.
Audio output capability.
Internet access capability.

i need another memory card, the system memory must over 1g.

what is overclocking

i'm a greener in english, especially in terms of computer sicence.
aim to used to these, i have to collect some terms and their definitions. this is another one "overclocking":
Overclocking is making a computer component run at a higher clock speed than the manufacturer's specification. Although there are many different reasons for overclocking, the most popular reason is to increase hardware performance. Overclocking can result in system instability and sometimes even hardware failure if done carelessly.

Friday, June 09, 2006

blue gene

Blue Gene is a computer architecture project designed to produce several next-generation supercomputers, operating in the PFLOPS range. It is a cooperative project between the United States Department of Defense (who are funding the project), industry (IBM in particular), and academia. There are five Blue Gene projects in development, among them Blue Gene/L, Blue Gene/C, and Blue Gene/P.

Thursday, June 08, 2006

lab3 program with threads

first to be worked out is eventbarrier primitive:
class EventBarrier {
public:
void wait();
void signal();
void complete();
int waiters();
private:
semaphore signal; //i think it's initial value must be zero for at the very beginning the event doesn't happen, and if thread use EventBarrier, it may use p() to check if the event happened for the val must be nonnegative or the thread has to wait for v();
List queue; // the list that stores the waiting threads.
int count; // the counter for the waiting threads, this is easy to understand it.
}
this is the model for the class's primitive.
the function wait() is easy to implement, if called, it must check the semaphore first, if the semaphore's val is still zero, the thread must wait and be inserted into the waiting queue. if want to return from this function, it's condtion is the semaphore's val won't be zero any more.
and the function signal(), i don't know how to implement it,yet.the key is how or who will call this function and let go all the threads?
function complete(), it may wait and check if the count is decrease to be zero.
and the function waiters(), i don't need to explain any more about it.
writing for this step, i get a idea about the function signal(), fking my fool thinking. the caller must be the event process, it must contain a variable of the eventBarrier. so the thing goes to be easy.

what do i need to know about nachos system.

from now on, i need to study with nachos system, a micro-operating system.i need it to implete it very soon.for clear the goals, i'm listing serveral questions which i need to work out as below, i'll answer them as i study about the system:
1.how do all the pieces of an operating system fit together?
2.how does the operating system start a thread?how does it start a process?
3.what happens when one thread context switches to another thread?
4.how do interrupts interact with the implementation of critical section?
5.what happens on a system call?what happens on a page fault?
6.how dows address translation work?
7.which data structures in a file system are on disk,and which are in memory?
8.what data need to be written to disk when a user creates a file?
9.how does the operating system interface with I/O devices?
10.what does it mean to build one layer of a network protocol on another?
total ten questions, for understanding these question, i need to read the source code.it's a huge project,i think, but i'll finish it in days or weeks(if i got enough time).

the answers(in updating):
1.the system is divided into three parts:one is hardware simulation,above it is portable OS kernel, the last facing to the users is user programs.each part has its own content,listed blow:
hardware simulation including I/O device simulation and machine-dependent OS layer.
portable OS kernel including thread management, file system, address spaces, RPC(remote procedure call) and TCP(transfer control protocol), virtual memory and syscalls.
user programs including MIPS(million instructions per second) simulation and shell.
they just like building blocks, one by one, step by step.
hardware simulation is at the bottom, the portable OS kernel is at the middle, and the user programs is at the top.
above is introducing how does the nachos system fit all the pieces.

a flock of birds

this is a folktale, it's meaning is easy, whichere country you are, you can easily find out in your native folktale.the initial story is as follow, just enjoy it:
There was once a flock of birds peacefully pecking seeds under a tree. A hunter came along and threw a heavy net over them. He said, "Aha! Now I have my dinner!"
All at once the birds began to flap their wings. Up, up they rose into the air, taking the net with them. They came down on the tree and, as the net snagged in the tree's branches, the birds flew out from under it to freedom.
The hunter looked on in amazement, scratched his head and muttered, "As long as those birds cooperate with one another like that, I'll never be able to capture them! Each one of those birds is so frail and yet, together they can lift the net."
the tale is end here.it's used for me, becasue amony a team, you must has the skill to control all members to do what they need to do, or this team will lead to a failure.we must work as the flock of birds, flying to the same and helpful direction.

[diary]it's midnight

it's midnight, i'm preparing for sleeping(just waiting for LiuChuan for the money,i'm on his computer now).
for playing time, i'm search for a unknown word "procrasting" through google.com, and then i get a website whose url is http://www.43things.com/. after reading it, i find it's a website that accept people's willings and post them on their website.its subject is "what do you want to do in your life?","the life long goal".
on this website, i get the top six goals during the people as follow:
1.hava no regrets
2.find my passion
3.be less judgemental
4.be true to myself
5.stop procrsting(this word is what did i search for)
6.enjoy the simple things a bit more
i think all of them sound nice, specially the top three.some gay said that "the reality is: what is done is done. regret is useless.". what a good man/lady.
i hope i and my friends around me can follow this words and get the goals at the end.
it's too late, i need the bed, urgently.what a fking LiuChuan, he is still out now.too late.

Wednesday, June 07, 2006

[diary]about virtual reality

virtual reality(vr), it's my elective this term.yesterday and today, i'm doing with vrml for a no-stopped time to finish the final terminal homework.to be honest, i didn't learn anything about vr though i've chosen it.so, it's a little difficult for me to finish all the code in two days(i have no choice,today is the last day to submit this work).as a fact, i've got it now,and i'm pretty tired, but i'm comfortable with my finished final terminal homework.
the term "virtual reality" was initially coined by Jaron Lanier, which i haven't ever known before. who is he? he is the founder of VRL. and then the question is following, what is VRL? I don't know,either.but, i don't care about it.let's continue the subject.
Today, 'Virtual Reality' is used in a variety of ways and often in a confusing and misleading manner. Originally, the term referred to 'Immersive Virtual Reality.' In immersive VR, the user becomes fully immersed in an artificial, three-dimensional world that is completely generated by a computer.
Head-Mounted Display (HMD)
The head-mounted display (HMD) was the first device providing its wearer with an immersive experience. Evans and Sutherland demonstrated a head-mounted stereo display already in 1965. It took more then 20 years before VPL Research introduced a commercially available HMD, the famous "EyePhone" system (1989).
A typical HMD houses two miniature display screens and an optical system that channels the images from the screens to the eyes, thereby, presenting a stereo view of a virtual world. A motion tracker continuously measures the position and orientation of the user's head and allows the image generating computer to adjust the scene representation to the current view. As a result, the viewer can look around and walk through the surrounding virtual environment. To overcome the often uncomfortable intrusiveness of a head-mounted display, alternative concepts (e.g., BOOM and CAVE) for immersive viewing of virtual environments were developed.
i want to stop my reading at this point for i'm pretty pretty tired now, i need a nap.may i'll continue this subject another.

Monday, June 05, 2006

[transmit]Google's China Problem

By CLIVE THOMPSON Published: April 23, 2006 From NYTimes

For many young people in China, Kai-Fu Lee is a celebrity. Not quite on the level of a movie star like Edison Chen or the singers in the boy band F4, but for a 44-year-old computer scientist who invariably appears in a somber dark suit, he can really draw a crowd. When Lee, the new head of operations for Google in China, gave a lecture at one Chinese university about how young Chinese should compete with the rest of the world, scalpers sold tickets for $60 apiece. At another, an audience of 8,000 showed up; students sprawled out on the ground, fixed on every word.
It is not hard to see why Lee has become a cult figure for China's high-tech youth. He grew up in Taiwan, went to Columbia and Carnegie-Mellon and is fluent in both English and Mandarin. Before joining Google last year, he worked for Apple in California and then for Microsoft in China; he set up Microsoft Research Asia, the company's research-and-development lab in Beijing. In person, Lee exudes the cheery optimism of a life coach; last year, he published "Be Your Personal Best," a fast-selling self-help book that urged Chinese students to adopt the risk-taking spirit of American capitalism. When he started the Microsoft lab seven years ago, he hired dozens of China's top graduates; he will now be doing the same thing for Google. "The students of China are remarkable," he told me when I met him in Beijing in February. "There is a huge desire to learn."
Lee can sound almost evangelical when he talks about the liberating power of technology. The Internet, he says, will level the playing field for China's enormous rural underclass; once the country's small villages are connected, he says, students thousands of miles from Shanghai or Beijing will be able to access online course materials from M.I.T. or Harvard and fully educate themselves. Lee has been with Google since only last summer, but he wears the company's earnest, utopian ethos on his sleeve: when he was hired away from Microsoft, he published a gushingly emotional open letter on his personal Web site, praising Google's mission to bring information to the masses. He concluded with an exuberant equation that translates as "youth + freedom + equality + bottom-up innovation + user focus + don't be evil = The Miracle of Google."
When I visited with Lee, that miracle was being conducted out of a collection of bland offices in downtown Beijing that looked as if they had been hastily rented and occupied. The small rooms were full of eager young Chinese men in hip sweatshirts clustered around enormous flat-panel monitors, debugging code for new Google projects. "The ideals that we uphold here are really just so important and noble," Lee told me. "How to build stuff that users like, and figure out how to make money later. And 'Don't Do Evil' " — he was referring to Google's bold motto, "Don't Be Evil" — "all of those things. I think I've always been an idealist in my heart."
Yet Google's conduct in China has in recent months seemed considerably less than idealistic. In January, a few months after Lee opened the Beijing office, the company announced it would be introducing a new version of its search engine for the Chinese market. To obey China's censorship laws, Google's representatives explained, the company had agreed to purge its search results of any Web sites disapproved of by the Chinese government, including Web sites promoting Falun Gong, a government-banned spiritual movement; sites promoting free speech in China; or any mention of the 1989 Tiananmen Square massacre. If you search for "Tibet" or "Falun Gong" most anywhere in the world on google.com, you'll find thousands of blog entries, news items and chat rooms on Chinese repression. Do the same search inside China on google.cn, and most, if not all, of these links will be gone. Google will have erased them completely.
Google's decision did not go over well in the United States. In February, company executives were called into Congressional hearings and compared to Nazi collaborators. The company's stock fell, and protesters waved placards outside the company's headquarters in Mountain View, Calif. Google wasn't the only American high-tech company to run aground in China in recent months, nor was it the worst offender. But Google's executives were supposed to be cut from a different cloth. When the company went public two years ago, its telegenic young founders, Sergey Brin and Larry Page, wrote in the company's official filing for the Securities and Exchange Commission that Google is "a company that is trustworthy and interested in the public good." How could Google square that with making nice with a repressive Chinese regime and the Communist Party behind it?
It was difficult for me to know exactly how Lee felt about the company's arrangement with China's authoritarian leadership. As a condition of our meeting, Google had demanded that I not raise the issue of government relations; only the executives in Google's California head office were allowed to discuss those matters. But as Lee and I talked about how the Internet was transforming China, he offered one opinion that seemed telling: the Chinese students he meets and employs, Lee said, do not hunger for democracy. "People are actually quite free to talk about the subject," he added, meaning democracy and human rights in China. "I don't think they care that much. I think people would say: 'Hey, U.S. democracy, that's a good form of government. Chinese government, good and stable, that's a good form of government. Whatever, as long as I get to go to my favorite Web site, see my friends, live happily.' " Certainly, he said, the idea of personal expression, of speaking out publicly, had become vastly more popular among young Chinese as the Internet had grown and as blogging and online chat had become widespread. "But I don't think of this as a political statement at all," Lee said. "I think it's more people finding that they can express themselves and be heard, and they love to keep doing that."
It sounded to me like company spin — a curiously deflated notion of free speech. But spend some time among China's nascent class of Internet users, as I have these past months, and you begin to hear such talk somewhat differently. Youth + freedom + equality + don't be evil is an equation with few constants and many possible solutions. What is freedom, just now, to the Chinese? Are there gradations of censorship, better and worse ways to limit information? In America, that seems like an intolerable question — the end of the conversation. But in China, as Google has discovered, it is just the beginning.

Sunday, June 04, 2006

[diary]easy doesn't enter into grown-up life

"easy doesn't enter into grown-up life", a words from "weatherman", a American film. I'm junior, that is near to the end of my college life, that's just in the grown-up life. This term, I did nothing, I learned nothing, I'm scared about my appearance, may it leads to a bad result? two weeks ago, I organize a speaking for realss, a company created by a eld cser. During this speech, I find that I'm nothing actually, for I got none skill. As a fact, I haven't done a program with other persons. So, it's time to do something during this summe vacation, such as Scilab. Just try my best to finish it, and may got something i need at the end. is it right? i hope so.
from a poor cs student.

Saturday, June 03, 2006

Guess what just turned 34?

Posted by Paul Buchheit, Gmail Engineer
It's difficult to pin down the exact origin of email, but in October 1971, an engineer named Ray Tomlinson chose the '@' symbol for email addresses and wrote software to send the first network email.At the time, it must not have seemed very important – nobody bothered to save that first message or even record the exact date. I've always thought that it would be fun to witness a little bit of history like that – to be there when something important happened. That's part of what drove me to join a little no-name startup named Google, and it's why I was excited when I was given a chance to create a new email product, now called Gmail.Of course that wasn't the only reason why I wanted to build Gmail. I rely on email, a lot, but it just wasn't working for me. My email was a mess. Important messages were hopelessly buried, and conversations were a jumble; sometimes four different people would all reply to the same message with the same answer because they didn't notice the earlier replies. I couldn't always get to my email because it was stuck on one computer, and web interfaces were unbearably clunky. And I had spam. A lot of it. With Gmail I got the opportunity to change email – to build something that would work for me, not against me.We had a lot of ideas, but first we spent a lot of time talking to all kinds of people about their email. They let us watch over their shoulders and helped us really understand how they use email and what they need from it. We didn't want to simply bolt new features onto old interfaces. We needed to rethink email, but at the same time we needed to respect that email already had over 30 years of history, thousands of existing programs, and nearly a billion users. So we started by learning which features were most important, and which problems were most aggravating. We also realized that solving everyone's problems was too big of a challenge for the first release. It would be better to build a product that a lot of people love, than one that everyone tolerates, and so that was our goal.On April 1, 2004, we rolled out the first release of Gmail. It immediately became known for giving away 1000 MB of storage, while the others only offered 4 MB, as they had for many years. We didn't do that just for the attention (although we certainly got our share). It's just part of our philosophy. We always want to do as much as we can for our users, and so if we can make something free, we will.But storage was only the most obvious difference, and our other improvements were just as important. Gmail included a quick and accurate search. It introduced powerful new concepts to organize email, such as the conversation view (so now I can finally see all those replies at once). It provided a fast and dynamic interface from web browsers everywhere, popularizing the techniques that have since become known as AJAX.This interface included many important features not commonly found on the web at that time, such as email address auto-completion, a slick spell-checker, keyboard shortcuts, and pages that update instantly. It included a smart spam filter to get rid of junk mail. Finally, we made an important new promise: you can keep your Gmail address and all of your email, even if you someday decide that Gmail is not for you. Cell phone owners already have the right to keep their old phone number when switching to a new provider, and you should have that same freedom with email. To ensure this freedom, Gmail provides, for free, both email forwarding and POP download of all your mail. Many services are now beginning to include other Gmail innovations; we hope that some day they will also be willing to include this one.Of course, the launch was just the beginning, and we're still busy improving Gmail. We keep increasing free storage (2656 MB and counting), we offer the interface in 38 languages, and we now have features such as auto-save drafts, so that you don't accidentally lose that half-written message. We know that Gmail isn’t quite right for everyone yet. We’re working on that too – there’s still more we can do for the folder-lovers and devout-deleters out there. But wait, there’s more! :) We also have a new batch of exciting innovations on the way that we hope will shake things up again and make Gmail even better for even more people.I'm proud of what we've done so far, and am excited about our future plans for Gmail. So celebrate how far email has come by joining its fun future.

the first post

rt, i actually wish that this blog can match my needs.
as a fact, it's a little difficult for me to connect to it for the speed is a little slow.