الثلاثاء، 31 يناير 2012

10 Firefox is now available for download

Mozilla announced today the availability of version number 10 for download from the famous browser "Firefox". And with the new version improvements in the management system additions, and has been hidden button to go forward where forward does not appear only when you need it, and added the appropriate software interfaces APIs that allow Web applications to work fill the screen, has also been added some improvements to WebGL.

Mozilla has also launched with this version of the concept of "a copy of Extended Support Extended Support Release" is addressed to companies that do not want to bother cost Mtcefhatha updated every six weeks. This version will not receive any updates other than security updates, and you will get a major update after every seven regular updates.

It is reported that Mozilla had adopted about nine months since the approach to fire for updates rapidly, with the launch of a new version every six weeks and the cycle is similar to the launch of Google Chrome browser rival. The recent statistics have indicated that the Chrome browser has occupied the ranking of the second most used browser after Internet Explorer, and so have snatched the title from Firefox, which maintained its second place for many years.

Of Almtafrd that the software will update itself automatically, and can download the update manually from here.

الاثنين، 30 يناير 2012

Sony announces "PlayStation Vita" in Saudi Arabia

Both the Sony and the company's Electronic Co., Ltd. announced the launch of PlayStation PS Vita Vita in the Kingdom of Saudi Arabia from February 22, 2012. The portable electronic gaming device at any time and any place in addition to the features of social networking through a number of applications available to him such as Facebook and Skype, Twitter and so on. It also provides the potential of teamwork among the players who are in one place or remotely via the Internet.

The device was launched in Japan and parts of Asia in December 2011. The screen supports multi-touch measurement of 5 inches and powered by four nuclei of the type of ARM Cortex-A9 MPCore with the graphical processing unit is also quad-core-type + SGX543MP4.

Microsoft Office 15 enters the stage of the experiment

Microsoft revealed today that the next version of the application of ultra-famous "Microsoft Office" has reached the stage of the experiment, where the company has selected a small group of customers to do their version of the experience of having signed an agreement preventing them from revealing their own merits.

And have a group of users who submit their suggestions tests and reporting about the problems faced by Microsoft Taatvadaha to put the latest version later this year, and before that is expected to issue a Beta test version available to users across the next summer.

So far, Microsoft has not revealed all the new features expected of the program, but said that Office 15 is the most ambitious project of the company's projects will be major changes. The company also plans to update all cloud services and applications on the Office servers and mobile phones as well. And said it will reveal more when you put the beta version for all later.

It is noteworthy that the name "Office 15" is the name of Cody may be changed later at the launch of the final version of the product.

mega upload users files will be deleted

The court said that the U.S. ordered the closure of file-sharing site megabytes Iblod and arrested its founder, that the hosting company hosting the site, which they can delete the files of the site starting from February 2, because the court no longer need access to files or to keep it there.

It is expected more than 50 million users for the loss of their files megabytes Iblod Jalili personal files is illegal. He hopes users will be able officials of the site - who has not been arrested - to re-run it legally, or as a location to store personal files only, so that users can download their files on to say the least, but this is unlikely given that the court had ordered attachment of the funds company that is no longer able to pay the costs of hosting the site.

But the lawyer MB Iblod said they are working with prosecutors in an attempt to stop deleting files, and they said they are optimistic that the U.S. authorities, and the location of megabytes Iblod have a common desire to protect customers in their own words.

The announcement of the first Tablet PC interface KDE Plasma

Said developer Aaron Seigo KDE interface for a new Tablet PC called the Spark and will carry the interfaces of KDE Plasma and works with a copy MeeGo developed a system based on open source Linux kernel basis.
Computer carries a 7-inch screen and processor frequency of 1 GHz and will be sold at 200 euros, and the device will be open and will allow users to install custom software. Although the specifications of the device to the specifications is not high, and it is expected that the very popular, but it would be attractive to developers who are working to develop open source software and want to open a device cheap and allows them to develop their applications and experience.
Aaron Seigo says that the device is a unique opportunity for the world of free software, is finally the public will get this type of software on a machine made and designed their own terms, as he put it. It is designed and usable with the conditions of free software. He added that they no longer need to wait for big companies to give them what they want, but they will can get for themselves.
The company will Zenithink China - which also manufacture computers Tablet Android - manufacture of this device according to the specifications required. And the interface that will be used is called Plasma Active is a modified version of the plasma in order to cope with the touch screens.


Interface "plasma" first appeared in the KDE 4.0 version which is a user interface can be installed and used on various Linux distributions. Plasma system and replace system icons richer and more attractive, and adds a lot of value to the front of the KDE interface, but also controversial among Linux users who prefer a part of them and the Gnome interface competition.

Creating the DATABASE Manually

Creating  the DATABASE Manually


  1. Setting the environment

  1. Preparing the O/S

  1. Preparing Parameter file

  1. Preparing Password file

  1. Starting the Instance

  1. Creating the Database

  1. Adding the data dictionary views

  1. Adding the  Pl/Sql support

  1. Creating the Product Profile

  1. Running the optional Scripts

  1. Adding utility table spaces

  1. Creating the Spfile

  1. Backup database

Setting the environment variable

ORACLE _SID = <STRING>

Unix:-- It is set in login scripts

NT/W2K :-- user Environment Variables


NOTE:-- The  value of the DB_NAME initialization parameter should match the SID setting.


Preparing  the O/S

 Create  Data files, Log files, Control file, User trace files, background procese trace files, alert log file dir’s.


NT/W2K

<drive>\oracle\oradata\<Sid>\data
<drive>\oracle\oradata\<Sid>\log
<drive>\oracle\oradata\<Sid>\control

<drive>\oracle\admin\<Sid>\udump
<drive>\oracle\admin\<Sid>\bdump

Unix

Mount point\oracle\data\<Sid>\data
Mount point\oracle\data\<Sid>\log
Mount point\oracle\data\<Sid>\control

Mount point\oracle\admin\<Sid>\udump
Mount point\oracle\admin\<Sid>\bdump


Ex:-

Nt/W2k
unix







Preparing the parameter file:

NT/W2K

db_name = "<dbname>"
instance_name = <sting>
service_names = <string>
db_files = <int> 
control_files = <file spec>

eg:("C:\oracle\oradata\<sid>\control01.ctl"

open_cursors = <int>
max_enabled_roles = <int>
db_file_multiblock_read_count = <int>
db_block_buffers = <int>
shared_pool_size = <int>
large_pool_size = <int>
java_pool_size = <int>
log_checkpoint_interval = <int>
log_checkpoint_timeout = <int>
processes = <int>
parallel_max_servers = <int>
log_buffer = <int>
global_names = FALSE
oracle_trace_collection_name = ""
resource_manager_plan = system_plan
user_dump_dest = <file spec>

eg : C:\oracle\admin\<sid>\udump

db_block_size = <int>
remote_login_passwordfile = exclusive
os_authent_prefix = ""
job_queue_processes = <int>
job_queue_interval = <int>
open_links = <int>
distributed_transactions = <int>
sort_area_size = <int>
sort_area_retained_size = <int>
UTL_FILE_DIR=*

UNIX

db_name = "<dbname>"
instance_name = <sting>
service_names = <string>
db_files = <int> 
control_files = <file spec>

eg:("/u02/oracle/oradata/<sid>/control01.ctl"

open_cursors = <int>
max_enabled_roles = <int>
db_file_multiblock_read_count = <int>
db_block_buffers = <int>
shared_pool_size = <int>
large_pool_size = <int>
java_pool_size = <int>
log_checkpoint_interval = <int>
log_checkpoint_timeout = <int>
processes = <int>
parallel_max_servers = <int>
log_buffer = <int>
global_names = FALSE
oracle_trace_collection_name = ""
resource_manager_plan = system_plan
user_dump_dest = <file spec>
eg : /u02/oracle/admin/<sid>/udump
db_block_size = <int>
remote_login_passwordfile = exclusive
os_authent_prefix = ""
job_queue_processes = <int>
job_queue_interval = <int>
open_links = <int>
distributed_transactions = <int>
sort_area_size = <int>
sort_area_retained_size = <int>
UTL_FILE_DIR=*

Preparing the password file


Unix

Orapwd<sid>.ora

Location:  $ORACLE_HOME/dbs


NT/W2K
Orapwd<sid>.ora
Location :  %ORACLE_HOME%\database


Syntax:

Orapwd file=<filespec> password= <password> entries =<int>


Note: When ever a password file is creates SYS user is the part of password file


 Eg:  Unix

 Orapwd file=$ORACLE_HOME/dbs/orapwd<sid> password=<password> entries=10

NT

Ever  Oracle Instance in NT O/S is handled by NT service

The NT sevice=oracle service<sid>

When ever we create a Database we must create the service.  For this we use “ORADIM” utility.  It starts the Database automatically.

Oradim  -new –sid <sid>
              -startup –sid <sid>
              -shutdown –sid <sid>
              -modify –sid <sid>

-new :-- is used for to create a new service.
-startup:-- is used for to start  the service.
-shutdown :--is used to shutdown the service.
-delete:-- o remove the service.
-modify :-- to modify the service settings.
-intpwd:-- password for SYS user.


Syntax:

Oradim –new –sid  <sid> -intpwd <password> -pfile <parameter file>
-startupmode   auto/manually –maxusers <int>

Note:  To create a service the users must have the NT administrator privileges.


Starting the Instance

$:/C:\> sqlplus  /nolog

sql:\> conn sys/password as sysdba
sql:\> startup nomount


Creating the Database

Create database <db_name>
            Maxdatafiles  <int>
            Maxlogfiles  <int>  (>/= 2* maxinstances)
            Maxlogmembers <int> (1-5)
            Maxloghistory    <int>
            Maxinstances  <int>

Logfile
     Group <#> (‘filespec’,’filespec’----) size <int> [k/m],
     Group <#> (‘filespec’,’filespec’----) size <int> [k/m],
     Group <#> (‘filespec’,’filespec’----) size <int> [k/m]

Datafile  ‘filespec’ size <int> [k/m];



Eg:
 
 Create database sri
            Maxdatafiles  150
            Maxlogfiles  10
            Maxlogmembers 5
            Maxloghistory    1000
            Maxinstances  1

Log file
     Group 1  (‘c:\oracle\oradata\sri\log\log1.log) size 10 m,
     Group 2  (‘c:\oracle\oradata\sri\log\log2.log) size 10 m

Datafile  ‘c:\oracle\oradata\sri\data\system.dbf’ size 150 m ;


Creating the Data dictionary views:


Run the catalog.sql  script

Location :
UNIX   $ORACLE_HOME/RDBMS/ADMIN
NT    % ORACLE_HOME%\RDBMS\ADMIN

Adding  the PL/SQL support:

Run the catproc.sql script

Location :
UNIX   $ORACLE_HOME/RDBMS/ADMIN
NT    % ORACLE_HOME%\RDBMS\ADMIN

Creating the product profile:

Sql:\.> conn system/manger

Run  pupbld.sql script

Location :
UNIX   $ORACLE_HOME/SQLPLUS/ADMIN
NT    % ORACLE_HOME%\SQLPLUS\ADMIN


 Run the optional scripts:

Catrep.sql      to  enable the replication

Initjvm.sql     to installs the java virtual metion



Adding the utility tablespaces

Creating the Spfile

Back up the Database

السبت، 28 يناير 2012

"BMW" the evolution of a car capable of driving the same

The company in "BMW" it is working to develop a car capable of driving itself fully automatically from a series of BMW 5. The car used a set of cameras and laser scanners and ultrasonic sensors, although this still requires the presence of attentive driver behind the wheel in case of any emergency.

The company said that the biggest challenge faced is to develop algorithms that can anticipate the unforeseen events that can occur during traffic. The car can abide by the speed automatically according to the maximum allowed in every way from the streets. The company did not specify a date put the car in the commercial markets, and stated that there is still a lot of experience and stages of development before it.

It is noteworthy that Google had preceded the "BMW" in announcing the development of a car in the same capacity and is currently its experience with Toyota.

Symantec warns of malicious code to infect Android phones...

Symantec warned specialized security software from malicious software called Malware serious Android.counterclank can infect Android phones then be able to receive remote commands to steal information from the device. The company counted thirteen applications in the Android Market carries this code and that the company considered the most serious security threat emerged so far since the beginning of this year, said it is likely that the impurity is estimated at more than 5 million users.
For its part, has released Lookout specialized security system Android statement which says that the code - which provoked a kind of panic - are really not Ber.h malicious, Symantec is saying that the estimate was wrong and exaggerated in its report. She mentioned that the code is advertising software sound, used by some developers in their applications with Android. She said that they share characteristics with many other famous advertising software.
The Lookout rebutted the points adopted Symantec them to classify the software as a serious, and said that the code is already Highlight the user of the way the IMEI number on Abjahazh, but you are sending to the server company in encrypted form, ie, that the company was eventually able to distinguish between users without having designated a personal. The software is able to send alerts in a way advertising Batch Push Notifications, which is the way advertising annoying, but this does not make them detrimental to a program according to the company. Also touched on the company to refute a set of other points that warned them to Symantec.
The Google-based approach in the open market, where Android applications allow all developers to raise their applications without the company is audited, and that contrary to what Apple is doing that you review and examine the applications that developers sent to the Apple store. This caused earlier in the infiltration of some malware already to market Android, but in practice has the Android-based core of the Linux structure safe make this software almost no effect except in very rare cases, and always what the Google delete such software instantly when they are informed about .
And urges the users of Google Android users to read the reviews and assessments for any application before they download on their computers.

NVIDIA launches a new version of its platform for parallel computing

Publication of the FBI document, looking for where the contractors are developing the application of his observation of social networks. The aim of the desired application to track public releases that are posted on Facebook, Twitter and other social networks and the possibility of monitoring and analysis to predict in any criminal activity which is expected, including in cases of riots and terrorism.

And document requests from contractors interested contact the Office of the FBI by the tenth of February, where they must explain how they will build in this system and the expected cost.

The system must be able to analyze the required materials available in the form of public social networks, search for specific keywords, so that customers will notice the FBI in the case of a search led to what can be considered evidence of the incident or threat is coming.

It will also provide the required software customers the ability to display information on a map, so that they can later add the other layers of information such as previous incidents and locations of important buildings and buildings Kambassarat military.

MasterCard supports payment using smart phones

MasterCard announced today that it will begin testing a method of payment by smart phones soon in Australia. Based MasterCard on two methods different to pay by phone: the first is the use of technology from developed called it QkR It relies mainly on the use of what is known Bcod rapid response QR Code, where the user can clear the code from his phone to pay the amount, is the experience of this way of restaurants and cafes in particular where customers can scan the code you see on the menu next to each meal to pay immediately.

The second way in which they are supported by MasterCard payment through NFC technology phones where you can slide a private pay by touching the phone to a special device with this technology works and deduct the amount from the card user directly.

It is noteworthy that many companies seek to support payment by technology NFC, which has supported this technology since Google Android version 2.3, launched the Google Wallet service agreement with a number of credit card companies. Visa has also recently launched a special service as well.

Tech Analyzis indicators : ARMS INDEX


ARMS INDEX

Overview

The Arms Index is a market indicator that shows the relationship between the number of stocks that increase or decrease in price (advancing/declining issues) and the volume associated with stocks that increase or decrease in price (advancing/declining volume). It is calculated by dividing the Advance/Decline Ratio by the Upside/Downside Ratio.

The Arms Index was developed by Richard Arms in 1967. Over the years, the index has been referred to by a number of different names. When Barron's published the first article on the indicator in 1967, they called it the Short-term Trading Index. It has also been known as TRIN (an acronym for TRading INdex), MKDS, and STKS.

Interpretation

The Arms Index is primarily a short-term trading tool. The Index shows whether volume is flowing into advancing or declining stocks. If more volume is associated with advancing stocks than declining stocks, the Arms Index will be less than 1.0; if more volume is associated with declining stocks, the Index will be greater than 1.0.

The Index is usually smoothed with a moving average. I suggest using a 4-day moving average for short-term analysis, a 21-day moving average for intermediate-term, and a 55-day moving average for longer-term analysis.

Normally, the Arms Index is considered bullish when it is below 1.0 and bearish when it is above 1.0. However, the Index seems to work most effectively as an overbought/oversold indicator. When the indicator drops to extremely overbought levels, it is foretelling a selling opportunity. When it rises to extremely oversold levels, a buying opportunity is approaching.

What constitutes an "extremely" overbought or oversold level depends on the length of the moving average used to smooth the indicator and on market conditions. Table 5 shows typical overbought and oversold levels.

Table 5
Moving Average
Overbought
Oversold
4-day
0.70
1.25
21-day
0.85
1.10
55-day
0.90
1.05
Example

The following chart contains a 21-day moving average of the Arms Index and the New York Stock Exchange Index.





 
Horizontal lines are drawn at the oversold level of 1.08 and at the overbought level of 0.85. I drew "buy" arrows when the Arms Index peaked above 1.08 and "sell" arrows when the Index bottomed below 0.85. In most of the cases the arrows occur at, or one day before, significant changes in price.
Calculation   
The Arms Index is calculated by first dividing the number of stocks that advanced in price by the number of stocks that declined in price to determine the Advance/Decline Ratio. Next, the volume of advancing stocks is divided by the volume of declining stocks to determine the Upside/Downside Ratio. Finally, the Advance/Decline Ratio is divided by the Upside/Downside Ratio

Tech Analyzis indicators : ABSOLUTE BREADTH INDEX

The Absolute Breadth Index ("ABI") is a market momentum indicator that was developed by Norman G. Fosback.

The ABI shows how much activity, volatility, and change is taking place on the New York Stock Exchange while ignoring the direction prices are headed.

Interpretation

You can think of the ABI as an "activity index." High readings indicate market activity and change, while low readings indicate lack of change.

In Fosback's book, Stock Market Logic, he indicates that historically, high values typically lead to higher prices three to twelve months later. Fosback found that a highly reliable variation of the ABI is to divide the weekly ABI by the total issues traded. A ten-week moving average of this value is then calculated. Readings above 40% are very bullish and readings below 15% are bearish.

Example

The following chart shows the S&P 500 and a 5-week moving average of the ABI.


 
Strong rallies occurred every time the ABI's moving average rose above 310.
The Absolute Breadth Index is calculated by taking the absolute value of the difference between NYSE Advancing Issues and NYSE Declining Issues.

Absolute value (i.e., ABS) means "regardless of sign." Thus, the absolute value of -100 is 100 and the absolute value of +100 is also 100.




Tech Analyzis indicators : ANDREWS' PITCHFORK


ANDREWS' PITCHFORK
Overview
Andrews' Pitchfork is a line study consisting of three parallel trendlines based on three points you select. This tool was developed by Dr. Alan Andrews.
Interpretation
The interpretation of a pitchfork is based on normal trendline support and resistance principles.
Example
The following chart of Xerox shows an Andrews' Pitchfork.







The pitchfork was displayed by selecting the three points shown. You can see how prices tended to "walk along" the trendlines.
Calculation
The first trendline begins at the left-most point selected (either a major peak or trough) and is drawn so it passes directly between the two right-most points. This line is the "handle" of the pitchfork. The second and third trendlines are then drawn beginning at the two right-most points (a major peak and a major trough) and are drawn parallel to the first line. These lines are the "tines" of the pitchfork