Wednesday, October 20, 2010

Nanomites Technology

BEST movie provides nanomites





Nanomites, nano-mites or nanites are extremely microscopic robot forms usually measuring in the incredible scale of nanometers. They have been used by both Joe and Cobra forces in their never-ending battle to stop each other. Military use is not the only way to utilize these amazing machines as there are also more beneficial applications such as in the field of medicine and construction.


Nanomites are actually real. Scientists have already tried them on rats. Nanomites technology can be used for everything. Nanomites that have already been tested have shown ability to heal infected arteries, cancer, and more.When curing arteries they attach themselves to it, mend it and make even better then before. The research is considered dangerous because if slightly bigger than it is supposed to be it could get stuck in the arteries and make it worse. Another reason they aren't used because they could be used for war.Like on the movie G.I. Joe it could be used for terrorism or something in the area and could actually wipe out mankind. A researcher on the particular subject has gotten to a conclusion that the they could end our finances. They could be used to create gold or dollars and then they would be practically worthless if anyone can actually make it.



editing pictures using algorithms



you can enhance a certain picture by using an many kinds of algorithms for a picture. many appropriate language available. C++, C language, Visual Basic, and some software like movie maker, picture editors.. a lot of language and software are now a days are being modified to work in the industry more easier and more profitable. easy applications, more benefits less unwanted bills and high quality design. 

Image editing encompasses the processes of altering images, whether they be digital photographs, traditional analog photographs, or illustrations. Traditional analog image editing is known as photo retouching, using tools such as an airbrush to modify photographs, or editing illustrations with any traditional art mediumGraphic software programs, which can be broadly grouped into vector graphics editorsraster graphics editors, and 3d modelers, are the primary tools with which a user may manipulate, enhance, and transform images. Many image editing programs are also used torender or create computer art from scratch.

Digital Arts





Well digital arts involve mostly graphic design and advertising, where animation is mostly cartoons and video games. At the same time digital artists also work on cartoons and video games. An animator in a cartoon would work on characters plus their movement and a digital artist would work on the background. In a video game an animator would work on strictly the movement and a team of digital artists would create and design everything. It's easy to argue both ways on which one to take up but it would be a choice you would have to make based entirely on you're abilities as an artist/animator.


Note:


In the digital arts there is a little bit of animation using flash, but its mainly working with photoshop, illustrator, etc. Digital arts may have more career choices than animation. I'm in digital media production which covers both in some form of way. Maybe find a program where you can get both (if possible) or choose a program that is not just focused on one area. I must warn you that these fields are very competitive.

Think of it this way, whats going to make you marketable? Can you find a job? How much do they pay? I was stuck in the same place last year because I wanted to do animation, but I changed my mind because I saw other things kinda related in that area. Don't try to become an ARTIST. Artists don't make a lot of money. I know this because I was an art major before I switched schools. Don't be confused...its hard, I understand. Do a lot of research and talk to schools admissions. Good Luck

SAP erp




SAP ERP
 application is an integrated enterprise resource planning (ERP) software manufactured by SAP AG that targets business software requirements of midsize and large organizations in all industries and sectors. It allows for open communication within and between all company functions.



Advantages
  • Allows easier global integration (barriers of currency exchange rates, language, and culture can be bridged automatically)
  • Updates only need to be done once to implemented company-wide
  • Provides real-time information, reducing the possibility of redundancy errors
  • May create a more efficient work environment for employees
  • Vendors have past knowledge and expertise on how to best build and implement a system
Disadvantages
  • Locked into relationship by contract and manageability with vendor - a contract can hold a company to the vendor until it expires and it can be unprofitable to switch vendors if switching costs are too high
  • Inflexibility - vendor packages may not fit a company's business model exactly and customization can be expensive
  • Return on Investment may take too long to be profitable
  • Implementations have a risk of project failure 

[edit]

AutoCad


software use by engineers and architecture for building an architectural plan. most of the time more company are using this software to make their work easier when it comes from plotting the architectural plan. less errors, less computations, less estimations, never the less minimize the paper consumption of a certain company. 

The term "autocad" is frequently used to refer to any type of computer aided drafting (CAD), however AutoCAD is actually the trademarked name of the CAD software produced by a company called Autodesk. The "Auto" in AutoCAD doesn't mean anything, but is just a reference to the company's name. 

SMART ID,CARD


smart Identification cards

benefits
Smart cards can provide identification, authentication, data storage and application processing.
The benefits of smart cards are directly related to the volume of information and applications that are programmed for use on a card. A single contact/contactless smart card can be programed with multiple banking credentials, medical entitlement, driver’s license/public transport entitlement, loyalty programs and club memberships to name just a few. Multi-factor and proximity authentication can and has been embedded into smart cards to increase the security of all services on the card. For example, a smart card can be programed to only allow a contactless transaction if it is also within range of another device like a uniquely paired mobile phone. This can significantly increase the security of the smart card.
Governments gain a significant enhancement to the provision of publically funded services through the increased security offered by smart cards. These savings are passed onto society through a reduction in the necessary funding or enhanced public services.
Individuals gain increased security and convenience when using smart cards designed for interoperability between services. For example, consumers only need to replace one card if their wallet is lost or stolen. Additionally, the data storage available on a card could contain medical information that is critical in an emergency should the card holder allow access to this.

Smart cards have been advertised as suitable for personal identification tasks, because they are engineered to be tamper resistant. The chip usually implements some cryptographic algorithm. There are, however, several methods for recovering some of the algorithm's internal state.

Virus Detected

virus dected

computer virus is a computer program that can copy itself and infect a computer. The term "virus" is also commonly but erroneously used to refer to other types of malware, including but not limited to adware and spyware programs that do not have the reproductive ability. A true virus can spread from one computer to another (in some form of executable code) when its host is taken to the target computer; for instance because a user sent it over a network or the Internet, or carried it on a removable medium such as a floppy diskCDDVD, or USB drive.
Viruses can increase their chances of spreading to other computers by infecting files on a network file system or a file system that is accessed by another computer.
As stated above, the term "computer virus" is sometimes used as a catch-all phrase to include all types of malware, even those that do not have the reproductive ability. Malware includes computer viruses, computer wormsTrojan horses, most rootkitsspyware, dishonest adware and other malicious and unwanted software, including true viruses. Viruses are sometimes confused with worms and Trojan horses, which are technically different. A worm can exploit security vulnerabilities to spread itself automatically to other computers through networks, while a Trojan horse is a program that appears harmless but hides malicious functions. Worms and Trojan horses, like viruses, may harm a computer system's data or performance. Some viruses and other malware have symptoms noticeable to the computer user, but many are surreptitious or simply do nothing to call attention to themselves. Some viruses do nothing beyond reproducing themselves.

computer viruses may cause a computer failure to function well. computer viruses are types of virus which are affecting the software and hardware of the computer. making the computer to malfunction. some programmers make a virus to hack a certain establishment. ex banks, ATM machines, simple accounts. sometime it is use to destroy a certain files in hard disk. some software to make some counter bridge.

But now a days a lot of programmer and developers developed a software that could maintain the and protect the computers in unwanted viruses.