Jump to content

#Drennn.

Members
  • Posts

    1,725
  • Joined

  • Last visited

  • Days Won

    13
  • Country

    Palestine, State of

Everything posted by #Drennn.

  1. Huawei and Samsung kicked the folding smartphone market in 2019 with the Huawei Mate X and Galaxy Fold respectively. Both companies had to deal with multiple challenges in this segment, but they overcome most of them. Unfortunately, only Samsung managed to keep concentrated in this segment. Huawei, on the other hand, had to deal with the ban that was applied that same year by the US government. The Chinese company was added to the entity list and was then prived from getting access to US-based technologies – Software or Hardware. Despite the multiple problems it is dealing with now, Huawei decided to launch the third iteration of its folding smartphone on February 22 – The Huawei Mate X2. The Huawei Mate X2 changed the external folding mode of the former Mate XS to inward folding. The new device is equipped with a new double helix drop hinge, which allows the screen to be stored in an arc shape and avoid hard folding. The Mate X2 also boasts an 8:7.1 flexible inner display. It is overlaid with the first magnetron nano-optical film in the industry. It reduces the reflectivity of the screen. Under the hood, the phone packs the Kirin 9000 which is paired with 8GB of RAM and 256GB of Internal Storage priced at CNY 17,999 (~$2778). There is a more expensive variant that has 512GB of Internal Storage and sets you back by CNY 18,999 (~$2932). HUAWEI MATE X2 RECEIVES EMUI 11.0.0.135 SOFTWARE UPDATE According to a report from Weibo, the Huawei Mate X2 is getting its first software update. It carries build number EMUI 11.0.0.135 and brings a ton of improvements for the folding screen. It optimizes the display effect of interface content and optimizes screen touch sensitivity. The update also brings improvements for the shooting effect of some scenes of the camera. Last but not least, we have a set of underhood improvements for performance and overall stability. The update has 432MB in size and is rolling out in a gradual manner.
  2. If you’ve been putting together a new gaming PC, and you’ve splurged too much on the best graphics card and best gaming CPU to have any funds left over for a PC case, why would you not just enshroud your components with the thousands of lego bricks you have stashed away in the attic? Redditor Hackerbill shared some photos of their Lego-based PC they built all the way back in 2002, complete with a Pentium 4 processor, two disc drives and a floppy disk drive – living the high life, there. They say they wished they’d superglued the bricks together as their build would flex a disconcerting amount when they moved the PC. Looking at the pictures, it doesn’t look like the sturdiest structure around. Seriously though, don’t try this yourself. Lego itself doesn’t recommend storing bricks at temperatures over 40°C for extended periods, so even with the best AIO cooler you’ll struggle to get temperatures sufficiently low to keep your PC case from melting into your precious components, although this Redditor seemed to live to tell the tale. If the problem of melting plastic ceases to exist, we reckon Lego bricks could actually make a viable PC case. First of all, ventilation wouldn’t be too much of a problem, with those Lego Technic bricks that have the holes on the front, making great vents for all your fans. And, you’d never have to worry about buying a new case if a new graphics card didn’t fit – you could just build the case around it. Suffering from graphics card sag? Lego can sort that right out, too. But, unless we ever see PC components running at sub-zero temperatures that won’t cause your Lego PC to become a melted pile of plastic, we don’t think it’ll ever catch on.
  3. Tunneling in Minecraft can be a pain. Thankfully, someone’s devised a way of automating it, sort of. A new data pack lets you create TNT that will blow a hole in whatever direction you’d like, just be careful where you point it. The modder jpdude98 posted a video of his wily invention, showcasing its explosive capabilities. First, you set down a normal TNT, then attach a sticky piston on whatever side you want it go, then add a whole bunch more TNT, and when it explodes, it’ll carry on exploding for however many other TNTs you put in, carving a massive hole in its wake. The technique isn’t exactly graceful, and once you set it off, that is it, though the pack includes a charm for protecting items from your path of fire. It’s very effective for reaching underground layers quickly, or going through a mountain, rather than around or over. What’s even cooler is you can use it to fast-travel too, combining a saddle and a Blast Protection 4 book to sit on the TNT as it makes its journey. Taking the scenic route, well and truly. You can download the data pack here. Pair it up with this other mod that turns loads of Minecraft’s items into time bombs, and you’re in for a whale of a time.
  4. DH1 Good songs i like it
  5. My Vote Dh1 good songs ❤️
  6. Morning , little devil! 😈😈

     
  7. Alors que Peugeot a dévoilé hier son nouveau logo, Auto-Moto vous propose une rétrospective de tous les emblèmes de la marque depuis ses débuts. Pour la 11ème fois de son histoire, Peugeot fait évoluer son logo, dix ans après la révélation de la précédente version. Un tout nouveau blason comme symbole de son renouveau, alors que la marque sochalienne souhaite affirmer haut et fort son nouveau positionnement plus haut de gamme, mais surtout tourné vers la mobilité électrique. Inauguré sur la future Peugeot 308, qui sera révélée le 18 mars prochain, ce logo, dessiné par le Peugeot Design Lab reste fidèle au lion, en représentant cette fois-ci une tête de profil. Un dessin qui n’est pas sans rappeler celui présent sur le volant du concept Peugeot e-Legend, en 2018, lui-même inspiré de celui lancé dans les années 1960, et apposé pour la première fois sur le capot de la Peugeot 404. Mais connaissez-vous toute l’histoire des logos Peugeot ? Auto-Moto vous en dit plus et vous propose de la découvrir dans notre diaporama ci-dessus ! lion pour emblème Avant toute chose, savez-vous pourquoi le logo de Peugeot est un lion ? Certes, il est avant tout un symbole de puissance, mais ce n’est pas pour cette raison qu’Emile Peugeot a déposé dès 1858 un premier logo orné de cet animal. En réalité, celui-ci a surtout été choisi car il est représenté sur les armoiries de la région Franche-Comté, où est née la marque quelques années plus tard. De plus, le constructeur indique que ce choix a aussi été fait pour mettre en valeur la résistance des produits conçus par la celui-ci, et notamment les scies « la résistance des dents comme celle des dents du lion, la souplesse de la lame à l’imitation de la souplesse de l’échine du lion, la rapidité de la coupe à l’image de celle du lion bondissant ». D’abord apposé sur divers objets tels que les moulins à café, les cycles et les motocycles, c’est en 1905 que le logo dédié aux voitures est présenté. Tour à tour représenté en entier puis seulement la tête, ce n’est qu’en 1948 qu’apparaîtra pour la première fois sur la Peugeot 203 le lion héraldique, debout et de profil, tel qu’on le connaissait sur l’ancien logo. A ce moment-là, le félin est accompagné du blason de la Franche-Comté, tandis qu’en 1955, les Peugeot 203 et 403 adoptent un tout nouveau logo, en lieu et place de la tête de lion sur le capot, pour des raisons de sécurité. C’est en 1960, sur la Peugeot 404 qu’apparaît un emblème que l’on connait désormais bien, celui-ci étant très proche de la version dévoilée hier. Quelques années plus tard, en 1968, celui-ci devient plus épuré, sortant alors de son cadre et adoptant des traits plus anguleux. Enfin, en 1975 réapparait le lion héraldique, qui sera par la suite décliné jusqu’en 2010, où naît la version bi-aspect mat et brillant, visible sur le capot de tous les modèles actuels de la marque. A découvrir également sur Auto-Moto.com : Peugeot change de logo et d’identité visuelle Un nouveau logo pour Renault ? Logo voiture : que signifient ces symboles automobiles ?
  8. There isn’t a better time than now to start getting fit with health information and products so easily accessible. Simply incorporate the basics into your daily routine — good nutrition, adequate exercise and a daily supplement — and start down the path toward better health. Plan a nutritious diet The Dietary Guidelines for Americans describes a healthy diet as one that emphasizes fruits, vegetables, lean meats, poultry, fish, beans, eggs, nuts, whole grains and fat-free or low-fat milk products. It should be low in saturated fat, trans fat, cholesterol, salt and added sugar. Warm weather makes fresh produce more easily accessible. Eat more fruits and vegetables by setting freshly washed and prepared produce on the kitchen counter or at eye level in the fridge. At every meal, make sure half your plate is made up of fruit and vegetable servings. One-fourth of your plate at every meal should be made up of grains, such as wheat, rice, oats, cornmeal or barley. People who eat whole grains as part of a healthy diet have a reduced risk of some chronic diseases. The remaining one-fourth of your plate should be lean or low-fat cuts of meat, plant-based protein or seafood. Get regular exercise The Department of Health and Human Services recommends an adequate amount of exercise every day. This guide can point to the right amount of exercise to add to your schedule: Get at least 150 minutes of moderate aerobic activity every week. For best results, spread the time out over several days. Do strength training exercises at least twice a week. Lifting weights builds muscle, which means the body burns more calories — even at rest. It’s important to keep in mind that when people are active, they produce more free radicals. The antioxidants found in supplements can help buffer the negative effects of the workout. Improving your diet, exercising regularly, taking a daily supplement and getting enough restorative sleep are all important steps to overall wellness. Work to incorporate each step into your daily routine until you reach your goal of good health, and find more health-conscious tips at eLivingToday.com. (Family Features)  
  9. The Palestinian Ministry of Foreign Affairs and Expatriates yesterday called on the International Criminal Court (ICC) to expedite the opening of an investigation into the crimes of "the Israeli occupation and its settlers" against the Palestinian people. The ministry issued its call on the 27th anniversary of the Ibrahimi Mosque massacre when extremist Israeli settler Baruch Goldstein attacked Palestinian worshippers at the Islamic holy site, killing 29 people and injuring 150 others. "Despite the passage of 27 years since this heinous crime, the Israeli judaisation of the Ibrahimi Mosque and its surroundings continues and takes different forms and extends to all areas of the occupied West Bank, the ministry said in a statement, adding that the anniversary comes as Israeli and settler terrorism against Palestinians, their properties and land is on the rise. The ministry condemned in "the strongest terms" the continuing Israeli terrorism against the Palestinian people, stressing that Israeli extremism, hatred, violence and crimes would not have continued or escalated without "the international community's suspicious silence".
  10. Keeping track of all the passwords we use daily to access our online accounts and services can be difficult which is why password managers such as LastPass are becoming increasingly po[CENSORED]r among both businesses and consumers. However, a German security researcher named Mike Kuketz is now advising users to avoid using LastPass' Android app due to the fact that it contains seven embedded trackers. While the company says that users can opt out of these trackers, their very existence could induce risks to such a security-critical application. According to a new report from the non-profit organization Exodus, of the trackers found in the LastPass Android app, four are from Google for analytics and crash reporting while the others are from AppsFlyer, MixPanel and Segment. Segment is particularly concerning because the company gathers data for marketing teams to profile users and connect their activity across different platforms to serve targeted ads. We've put together a list of the best password managers available These are the best business password managers on the market Also check out our roundup of the best identity theft protection In his investigation, Kuketz also looked into what data is transmitted by LastPass' Android app by inspecting the network traffic to discover that it sends details about the device being used, the mobile operator, the type of LastPass account and the Google Advertising ID which is able to connect data about a user across different apps. Tracking in password managers LastPass wasn't the only password manager examined in Exodus' report and the firm found that 1Password and KeePass contain no trackers while the open source Bitwarden has one for Google Firebase analytical and one for Microsoft Visual Studio crash reporting and Dashlane has four trackers. Password managers are the simplest and most efficient way for people to avoid reusing the same password across multiple sites and services since many contain password generators which can create strong, complex and unique passwords with the tap of a button. In a statement to The Register, a spokesperson from LastPass explained that the company uses trackers to improve its own service and that no identifiable user data could be passed on through them, saying: "No sensitive personally identifiable user data or vault activity could be passed through these trackers. These trackers collect limited aggregated statistical data about how you use LastPass which is used to help us improve and optimize the product. All LastPass users, regardless of browser or device, are given the option to opt-out of these analytics in their LastPass Privacy Settings, located in their account here: Account Settings > Show Advanced Settings > Privacy. We are continuously reviewing our existing processes and working to make them better to comply, and exceed, the requirements of current applicable data protection standards." Regardless of whether you choose LastPass or a different password manager, investing in such a service can be an excellent way to improve your security posture and avoid falling victim to identity theft.
  11. Hiperwall Inc., an industry-leader in commercialized, IP-based visualization technology, today introduces ‘Hiperwall Essentials,’ two all-inclusive video wall hardware and software bundles that get users started with a full-featured, control-room grade video wall powered by Hiperwall for just $9,995. Most major decisions made in the public and private sectors are driven by vast amounts of data. Due to the volume of data sources, data complexity, and different analytics tools, video walls have become the perfect canvas for decision-makers to put all of this data together clearly, in order to arrive at an informed decision faster and more confidently. At a price point that effectively removes barriers to implementation for small to medium businesses, small government agencies, and local law enforcement, Hiperwall Essentials serves as a great baseline for integrating video wall technology into any organization. As dependence on the video wall grows, Hiperwall’s modular platform makes scaling the video wall footprint and capabilities seamless and cost-effective. “Hiperwall Essentials was created to help customers interested in integrating a video wall into their operations, do so cost-effectively without compromising on functionality and performance,” said Tom Scott, CEO at Hiperwall. “These aren’t stripped, entry-level solutions, they are full-featured, control room-ready video walls, based on the same software that drives some of the world’s largest installations. We’ve teamed up with Seneca Data, ViewSonic, and SYNNEX to package our software with their hardware, keeping costs low and systems easy to acquire.” Each Hiperwall Essentials system includes the following hardware and software features: Hiperwall-certified Seneca Data VX-Quad PC with a Hiperwall Essentials image preloaded Display(s) – Available in a 2×2 (4x 43” HD Displays) OR single 82-inch 4K TV video canvas configurations 16-port Ethernet switch Support for up to four simultaneous external IP sources, as well as an unlimited number of local sources Remote access and control of the video wall from anywhere, anytime 1 year of Hiperwall Maintenance, which ensures users have the latest Hiperwall software, professional system optimization assistance, and industry-leading support For more information about Hiperwall, please visit www.hiperwall.com, or follow on Facebook, Instagram, Twitter, YouTube or Linkedin. About Hiperwall, Inc. Hiperwall, Inc., a leading company in next-generation video wall systems and distributed visualization software technology, is transforming the industry by eliminating the need for specialized servers, matrix switches, tangled cables, and time-consuming training in favor of a solution that is easy to install, easy to use and easy on the budget. Hiperwall has eliminated these barriers by developing a software-based video wall system that is completely hardware agnostic, allowing users to deploy systems with nothing more than commonly available PCs, monitors, and network equipment. For more information, visit www.hiperwall.com.
  12. PS5 upgrades and an extra mission for the Remake aren't the only Final Fantasy VII reveals today, as Square Enix also announced two mobile games that take place in the same setting. Final Fantasy VII Ever Crisis should feel familiar to fans with a "chapter-structured single player experience" that includes the events of the original game, the expansions and new story elements all in a free-to-play RPG title. Ever Crisis also ties in with the story of the other mobile game, a battle royale action title called Final Fantasy VII The First Soldier. A teaser trailer showed how players will use guns, swords and magical abilities to defeat enemies from a first- and third-person perspective. Both games are due for release on Android and iOS, with First Soldier due later this year followed by Ever Crisis in 2022.
  13. Congratulations and welcome to our staff 

    •  
    1. rlex

      rlex

      Thank you dudu 

  14. Morning , little devil! 😈😈

     
  15. On y pense rarement, mais la manière de tenir son volant peut avoir un impact important sur la conduite et la sécurité. Découvrez trois positions à bannir tout de suite ! Lorsque l’on apprend à conduire, il nous est généralement enseigné dès les premiers cours l’importance de bien tenir son volant. La plupart du temps, c’est la fameuse position 10h10 qui est alors préconisée, offrant selon les moniteurs de conduite une prise en mains optimale et permettant de mieux manier le véhicule, que ce soit en ligne droite ou dans les virages. La position 9h15 est quant à elle plébiscitée par les pilotes et les amateurs de conduite sportive, permettant alors de mieux maîtriser la trajectoire de la voiture, notamment à haute vitesse. Quoi qu’il en soit, s’il existe des positions idéales pour conduire, d’autres en revanche doivent rapidement être oubliés, afin de ne pas vous mettre en danger sur la route. Auto-Moto vous dit lesquelles ! Evitez de croiser les mains sur le volant C’est une erreur que l’on a tous fait à un moment ou à un autre de notre vie de conducteur, et pourtant, celle-ci peut coûter très cher. En effet, vous risquez de vous emmêler les pinceaux en cas d’urgence, ce qui pourrait alors vous conduire directement à l’accident, alors que cette situation aurait pu facilement être évitée avec un bon placement des mains. Dans un virage, pensez simplement à remonter la main située du côté où vous souhaitez tourner vers le haut du volant, avant de tirer celui-ci dans la direction souhaitée. Vous pouvez ensuite laisser ce dernier reprendre sa position initiale seul ou l’aider en faisant la même manoeuvre dans l’autre sens. Ne mettez pas votre main en haut du volant Attention, cela ne vient pas contredire le paragraphe précédent ! En revanche, évitez au maximum de conduire avec votre main posée en haut du volant pendant un long moment. Cela pourrait en effet s’avérer très dangereux en cas d’accident, alors que la plupart des voitures récentes sont désormais équipées d’un airbag situé au centre du volant. Si une collision vient alors à se produire, celui-ci explose et pourrait alors vous blesser gravement, soit en causant une fracture du bras, soit en propulsant ce dernier dans votre visage. Autant dire qu’il vaut mieux éviter… Ne conduisez pas d’une seule main Il est vrai que cela peut être très tentant, surtout après de longues heures de trajet, alors que la concentration décline peu à peu. Efforcez-vous néanmoins de conserver vos deux mains sur le volant, pour des raisons évidentes de sécurité. En cas d’urgence, il vous sera en effet plus difficile de manoeuvrer la voiture si vous ne conduisez que d’une seule main, notamment si vous devez effectuer un évitement. A noter également que s’il n’est pas strictement interdit de manger ou boire au volant, le Code de la Route précise que « tout conducteur doit se tenir constamment en état et en position d’exécuter commodément et sans délai toutes les manœuvres qui lui incombent ». Si les forces de l’ordre jugent que votre comportement est dangereux, celles-ci peuvent alors vous sanctionner d’une amende de 35 €.
      • 1
      • I love it
  16. Dark circles are like those guests who often arrive uninvited and prolong their stay. But, it is us, who unknowingly invite them; thanks to our diet, lifestyle, screen, and sleep habits. “These are some of the major reasons why our eyes are sinking deeper and turning darker,” said Dr Rohini Patil, a nutritionist at Nutracy Lifestyle. However, it is never too late and you can always make some changes to your schedule and banish those dark circles. Below, Dr Patil shares some simple tips and tricks to help you do the same. Look for natural diuretics “It is important that you include foods that work as natural diuretics in your regular diet because such foods can lessen the dark, swollen look beneath your eyes,” she said adding foods that contain natural diuretics include watermelon, celery, and cucumber. However, make sure you don’t consume artificial diuretics because excessive intake of artificial diuretics can lead to low potassium inequities and “other types of harmful electrolyte disparities as well”, she said Know what to avoid Stay away from junk food. “Limit drinking caffeinated drinks because they can add to the bulge and darken the skin beneath your eyes,” she told indianexpress.com. You should also lessen your consumption of sweets and greasy foods and include more fruits and vegetables instead. Limit the intake of salty foods and alcohol Dr Patil said: “A regimen loaded with salt can cause dark, swollen eyes because salt can lead to water retention. You should also stay away from consuming a lot of processed foods because they are prepared with lots of salts to serve as preservatives.” Avoid alcohol because it leads to heavier dark circles. Instead drink healthy fluids like water and juices to rebalance the liquids inside your body. READ| Excess screen time giving you dark circles? Here’s how to get rid of them Preserve proper body hydration and add loads of cucumber It is no secret that you need to maintain your body’s hydration levels, and hence should drink at least 8-10 glasses of water everyday. “Putting cold pieces of cucumber above your eyes can help lessen dark circles but this is only a temporary solution. If you want to rid of dark circles then try to consume lots of cucumber slices regularly,” she shared. Supplement your diet with vitamins and essential fatty acids “Make sure to incorporate high-quality multivitamins because dark circles under your eyes can also be due to nutrient insufficiency. Take loads of iron, vitamin C, B and E,” she said.
  17. The Acting Director of Partnerships of UNRWA, Marc Lassouaoui (left), and the Representative of Japan to Palestine, Magoshi Masayuki (right), signed two contribution agreements in support of Palestine refugees. (Photo credit: UNRWA) JERUSALEM, Thursday, February 25, 2021 (WAFA) - The Government of Japan today signed two contribution agreements, amounting to approximately $40 million, with the United Nations Relief and Works Agency for Palestine Refugees in the Near East (UNRWA). From the total contribution, $30.2 million will enable UNRWA to continue providing critical and core services to Palestine refugees in all five fields of operations and another $9.5 million approximately will be used to expand school blocks in Gaza, thus allowing more children to have access to quality education, said a UNRWA press release. "I am very happy to announce that the Government of Japan is contributing approximately $40 million to UNRWA. This contribution represents our determined commitment and solidarity to Palestine refugees at a time when the region continues to experience serious humanitarian crisis, including COVID-19 pandemic," Magoshi Masayuki, Representative of Japan to Palestine, said. Marc Lassouaoui, Acting Director of Partnerships of UNRWA, said: "On behalf of UNRWA, I would like to thank the Government of Japan for its generous contribution in benefit of the Palestine refugees. The Government of Japan has been exemplary in its support to the Agency. We deeply appreciate the steadfast and strategic cooperation that UNRWA and the Government of Japan have developed over years in support of this vulnerable community." The Government of Japan is a dedicated donor to UNRWA, having supported the Agency since 1953. In 2020, the Government of Japan was the overall 5th largest contributor to the Agency, playing a critical role at a time when UNRWA faced an existential crisis. It is thanks to the enduring support of donors like the Government of Japan that the Agency is able to provide vital services to Palestine refugees across the Middle East in the face of its continuing challenges, said the press release.
  18. The primary difference between hardware and software is that- hardware refers to a computer’s physical components. In contrast, software refers to the set of instructions given to the device to conduct a specific assigned task. Mainly, the PC components are divided into two sections, which we already know is- the hardware and the software. Hardware is the physical and tangible components of the personal computer. Motherboard, CPU, monitor, keyboard, mouse, and printer are the hardware. On the other hand, the software is the set of commands given for performing specific tasks. The software must be loaded into the hardware for executing the task. The software works as the line in between the hardware and the user. Both software and hardware are essential for the computer to come up as a useful output. What will you learn here? – What is software? Definition and types – What is hardware? Definition and types – The connection between software and hardware – The difference between hardware and software Software- What is it? It’s the set of commands that is designed for performing the task. A program comprises commands, and there are two main kinds of software- Application software and system software. Application software- It is designed for achieving particular user requirements. Some application software are- – Spreadsheet which allows maintaining financial records HomeTech Learn the Distinction between Hardware and Software Rohan MathawanROHAN MATHAWANFEBRUARY 25, 2021 TECH FacebookTwitterLinkedInEmailWhatsAppRedditFlipboard The primary difference between hardware and software is that- hardware refers to a computer’s physical components. In contrast, software refers to the set of instructions given to the device to conduct a specific assigned task. Mainly, the PC components are divided into two sections, which we already know is- the hardware and the software. Hardware is the physical and tangible components of the personal computer. Motherboard, CPU, monitor, keyboard, mouse, and printer are the hardware. On the other hand, the software is the set of commands given for performing specific tasks. The software must be loaded into the hardware for executing the task. The software works as the line in between the hardware and the user. Both software and hardware are essential for the computer to come up as a useful output. What will you learn here? – What is software? Definition and types – What is hardware? Definition and types – The connection between software and hardware – The difference between hardware and software Software- What is it? It’s the set of commands that is designed for performing the task. A program comprises commands, and there are two main kinds of software- Application software and system software. Application software- It is designed for achieving particular user requirements. Some application software are- – Spreadsheet which allows maintaining financial records – Word documents permits creating documents – DBMS or database management system assists in keeping data in the database Furthermore, there is application software created to support specific business work. For example, business organizations use human resource management systems for recording employee information. A school or university uses a library management system to maintain the record of new books and borrowers’ information. In addition to those, there is another software type which we called Utility software. This type is helpful in the task of your computer. For example, utility software are file and disk management tools and antivirus programs, etc. System software- It permits operating, controlling, and extending the processing capacity of a PC. This software is crucial to run application software and hardware. They are the line between the end-users and hardware. Usually, computer makers develop system software. The common programming language for developing system software is C, C++ and assembly language. Some system software examples are- compilers, operating systems, interpreters, assemblers, and device drivers. The operating system performs the activities like- tasks management, hardware management and file handling, memory management, etc. Interpreters and compilers convert a high level of the program into a machine-understandable machine code. The assembler converts the assembly language program to a machine code. The device driver manages and observes the operations of the particular tool like a printer. Hardware- What is it? Hardware is the physical component of the PC, and they are tangible. Further, it is divided into the following- – Input devices – Secondary storage devices – Output devices – Internal components Input devices- They are the components of the PC that send the data to the PC. Some examples are like- a keyboard is a tool that permits a user to enter input data. The design of the keyboard is identical to the typewriter with extra keys. Another input device is the mouse which consists of a left and right mouse button and a wheel at its beneath. It can’t be used for entering text into the PC. As per the mouse movement, it is possible to manage the cursor’s position on the screen. Light, pen, barcode reader, microphone, scanner are more examples of input devices. Secondary storage devices- They are the devices that are used for storing the data until the information is overridden or deleted. These devices store data lastingly. Thus they are a nonvolatile memory. In other words, powering off the PC will not delete the information in the secondary storage devices. Solid-state drives, hard disk, floppy disk, DVD, CD are all examples of secondary storage devices. Output devices- They are the peripheral devices that receive the data from the PC. It can be a projection, display, or any other medium. Some examples are that printer helps print details on paper, a monitor visual display unit displays the visual from the PC, and a laser printer is injected printer used to take the high quality of multiple printouts. Internal components- Most essentially, they are the elements that directly connect with the primary functions of the PC. Motherboard, CPU, RAM, ROM are several examples. CPU is the PC’s primary execution unit, which divides further into two parts: CU or control unit and ALU or arithmetic logic unit. CU carries the control signals for operating other components, and ALU conducts mathematical operations and logical operations. RAM or random access memory stores data, programs, and program results for the CPU to execute the tasks. It is possible to undergo reading and writing operations in RAM. The amount of RAM is a considerable aspect for determining the PC’s performance. It needs more time for the CPU to access secondary storage like a hard disk for all functions. Thus RAM is used as primary storage. It’s a volatile memory. Therefore it holds data temporarily. Powering off the PC will delete the data in RAM. ROM or read-only memory is possible to read from ROM and is a nonvolatile memory, so the data is permanent. It comprises of instructions needed to start PC. Moreover, the motherboard is a single platform that connects memory, CPU, hard drives, and other ports via cables. The distinction between hardware and software- Definition- Hardware is the physical element of a PC, whereas software is a set of commands which tell the PC how to execute a job. – Categories- hardware has four primary categories- internal components, secondary storage device, input device, and output device. The software had two types- application software and system software. – Tangibility- Hardware is tangible, but the software is not. – Construction- Hardware is constructed using electronic materials which software is developed using the programming language.
  19. In recent years, we have seen a clear market trend towards dedicated integrated circuits (ASICs) that are much more efficient in performance and energy consumption than traditional general-purpose computers for processing AI workloads. These AI accelerators harden deep learning algorithm kernels into circuits, enable higher data ingestion bandwidth with local memory, and perform massively parallel computation with numerous cores. Their hugely disruptive potential has triggered explosive growth at both HPC data centers on the cloud and various inferencing applications at the edge, including GPUs with tensor units, SoCs with dedicated NPUs, CPUs augmented with FPGA accelerators, and ASIC designs dedicated to AI computation kernels such as TPU, IPU, WSE, etc. [1] [2] AI chip design poses unique challenges in architectural exploration, power estimation, layout optimization, and more. In this article, we will look at common challenges of AI chips for timing analysis and signoff: 1) the raw scales of design; 2) the extreme physical reuse of compute cores; 3) the signal propagation behavior in highly regular computation, and 4) the complexities that arise from logic redundancy and low power techniques. 1. The raw size of AI chips AI chips – particularly those dedicated to accelerating model training in HPC data centers – are often huge in geometric size compare to traditional chips (e.g. mobile SoC, networking chips, GPU, CPU etc.) [3]. The leading AI chips’ die sizes often approach (or are restricted by) the stepper reticle limits in manufacturing processes. They often exceed 500 million instances at 12nm, >1 billion instances at 7nm, >2 billion instances at 5nm. These chips are all implemented with a hierarchical methodology because their scale far beyond the capacity limits of physical design tools. When it comes to timing analysis and verification, designers often still prefer a full-chip view to signoff with confidence. The verification of these largest AI chips – almost ironically – requires the most powerful general computing hardware, such as 2-4TB of memory, 32-64 cores and multiple days to turnaround. To avoid this flow bottleneck jeopardizing design power, performance, and area (PPA) and time-to-market (TTM) requirements, analysis engines must be extremely scalable while making zero QoR compromise. 2. Extreme physical reuse of computing cores Though very large in scale, AI chips, particularly for data center applications, are often very regular in architecture and the majority of the chip is constructed as arrays of compute cores (or tiles). These compute cores are dedicated to specific algorithm kernels and relatively small (up to a few 100K cells each). When duplicated hundreds or thousands of times, the entire system becomes extremely large. This repetition pattern is often recursive: a few more tightly coupled local tiles are grouped to form larger physical blocks (e.g. super-blocks), and these super-blocks are further duplicated to create the entire chip. In some recent AI chip architectures, this repetition can cover 80% or even >90% of the chip’s logic. These tiles and super-blocks are physical clones of each other and easily folded together during implementation. Still, in timing verification, due to factors such as process OCV, clock distribution skews and uncertainties, power supply variations and thermal fluctuations, each instance of the tile needs to be analyzed for its unique boundary condition. Yet, any optimization (ECO) must be commonly applied to all instances in order to maintain the physical clone. This requires a highly intelligent analysis engine capable of managing the MIM repetition and recognizing the uniqueness of boundary conditions. 3. Signal propagation behavior in pipeline computation Multi-input switching (MIS) is not a new effect, but it has become critically important to AI chips thanks to these ASICs’ architectural characteristics and payload patterns. AI chips stream large amounts of data across processing tiles at application level to perform massively parallel and very regular computations with extremely high throughput. This translates into parallel signals propagating through the shallow logic cells on the data paths at very high speed at hardware level. When different signals switch simultaneously at multi-input gates (AOI, NAND, etc.), delay of an individual signal significantly speeds up or slows down. This effect can cause serious timing issues particularly for hold analysis [4]. However, library characterization of multiple input standard cells often sensitizes individual inputs while assuming other inputs remain static. Timing analysis engines must detect the overlapping signals and invoke additional calculations with given libraries to account for MIS effects whenever and wherever it happens to ensure safe signoff without incurring massive pessimism. 4. Complexities from redundancy and low-power One of the main motivations to have reconfigurability built into AI chips is product yield. Individual AI chip die size at reticle limit pose significant manufacturing challenges. Sources of local defects become frequent enough and call for built-in redundancies to ensure overall functioning products. The redundancies can be in data and clock paths or even at the entire tile/core level. Circuits may be reconfigured via hardware or software controls to bypass defect parts [5]. On the neuromorphic AI computation front, reconfigurability is realized through extensive fine-grain interconnects among different neurons (cores/tiles). These parallel and side-way data and clock paths increase the complexity of static analysis because it’s impossible to permutate all configurations in verification. Fig. 4: Reconfigurable design through redundancy On the other hand, low-power, low-energy are critical for AI inferencing applications. Extensive clock-gating, data-gating, many voltage domains, near-threshold supplies, and IR drops bring additional complexity to timing analysis. The ability to analyze and verify these effects simultaneously with signoff accuracy is critical. Conclusion As process and design technologies advance, AI designs and applications evolve and converge. We expect new, interesting model and analysis problems to continue to arise. Scalable and future-proof timing analysis and signoff solutions need to be designed with AI hardware’s architectural traits in mind. These architecturally-aware solutions are vital in tackling both today’s and tomorrow’s challenges, ensuring a risk-free transition from innovative concepts to working systems.
  20. Brisbane took a major step towards being named 2032 Olympic hosts after the International Olympic Committee said on Wednesday that the Australian city had been picked as the preferred partner to start talks for the Games. IOC President Thomas Bach said the IOC had approved a recommendation of the commission in charge of future hosts. “This commission recommended to the IOC executive board to enter into a targeted dialogue with Brisbane 2032. The Executive Board has unanimously approved this recommendation,” Mr. Bach told a virtual news conference. Several cities and countries had publicly expressed an interest in the 2032 Games including Brisbane, Indonesia, Budapest, China, Doha and Germany’s Ruhr valley among others. Australian Olympic Committee boss John Coates, also a vice president of the IOC, said the other candidate cities had been “parked for a future Games” by the IOC. “It was a very mature decision by the IOC,” Mr. Coates told reporters in Brisbane on Thursday. “To take a decision when you’ve still got a few other cities there and say we’re going into targeted dialogue with one preferred city was a big call by them and that’s where they ended up. It’s a significant recognition of the way we’ve worked together, the three levels of government, the Paralympic Committee and the Australian Olympic Committee in presenting this bid together,” he said. Brisbane earned bonus points for its high percentage of existing venues, a good masterplan, experience in organising major events and its favourable weather among other things. The state of Queensland hosted the 2018 Commonwealth Games. The IOC has overhauled its bidding rules in 2019 to reduce costs and make the process easier for cities. There are no official candidate cities campaigning ahead of the vote as has been the case in the past. Instead the IOC puts the preferred host to the vote at its session following another review by the commission. Kristin Kloster Aasen, who heads the Future Host Commission, said it was not yet clear when the IOC vote would be held, as it all depended on the targeted dialogue with Brisbane which would start right away. “They are a very advanced project, a number of criteria that sit very well with us. It has been moulded for a number of years, good legacy plans, good venue plan,” she said. “There are many, many things that made us put this forward,” she added. Mr. Coates said Australia hoped to conclude its work on the bid by early May and the vote could come in Tokyo, where the IOC have a meeting before the July 23-August 8 Olympics in the Japanese capital. We have been keeping you up-to-date with information on the developments in India and the world that have a bearing on our health and wellbeing, our lives and livelihoods, during these difficult times. To enable wide dissemination of news that is in public interest, we have increased the number of articles that can be read free, and extended free trial periods. However, we have a request for those who can afford to subscribe: please do. As we fight disinformation and misinformation, and keep apace with the happenings, we need to commit greater resources to news gathering operations. We promise to deliver quality journalism that stays away from vested interest and political propaganda.
  21. Morning, little devil! 😈😈

     

    1. Reus

      Reus

      morning ? its 2:02 am XD 

  22. Last year, IBM demonstrated how AI can perform the tedious job of software maintenance through the updating of legacy code. Now Big Blue has introduced AI-based methods for re-coding old applications so that they can operate on today’s computing platforms. The latest IBM initiatives, dubbed Mono2Micro and Application Modernization Accelerator (AMA), give app architects new tools for updating legacy applications and extracting new value from them. These initiatives represent a step towards a day when AI could automatically translate a program written in COBOL into Java, according to Nick Fuller, director of hybrid cloud services at IBM Research. Fuller cautions that these latest AI approaches are currently only capable of breaking the legacy machine code of non-modular monolithic programs into standalone microservices. There still remains another step in translating the programming language because, while the AMA toolkit is in fact designed to modernize COBOL, at this point it only provides an incremental step in the modernization process, according to Fuller. “Language translation is a fundamental challenge for AI that we're working on to enable some of that legacy code to run in a modern software language,” he added. In the meantime, IBM’s latest AI tools offer some new capabilities. In the case of Mono2Micro, it first analyzes the old code to reveal all the hidden connections within it that application architects would find extremely difficult and time consuming to uncover on their own, such as the multiple components in the underlying business logic that contain numerous calls and connections to each other. Mono2Micro leverages AI clustering techniques to group similar code together, revealing more clearly how groups of code interact. Once Mono2Micro ingests the code, it analyzes the source and object code both statically (analyzing the program before it runs) and dynamically (analyzing the program while it’s running). The tool then refactors monolithic Java-based programs and their associated business logic and user interfaces into microservices. This refactoring of the monolith into standalone microservices with specific functions minimizes the connections that existed in the software when it was a monolithic program, changing the application’s structure without altering its external behavior. The objective of the AMA toolkit is to both analyze and refactor legacy applications written in even older languages (COBOL, PL/I). For the AMA toolkit, static analysis of the source code coupled with an understanding of the application structure is used to create a graph that represents the legacy application. When used in conjunction with deep-learning methods, this graph-based approach facilitates data retention as AMA goes through deep-learning processes. IBM’s AI strategy addresses the key challenges for machine learning when the data input is code and the function is analysis: volume and multiple meanings. Legacy, mission-critical applications are typically hundreds of thousands to millions of lines of code. In this context, applying machine learning (ML) techniques to such large volumes of data can be made more efficient through the concept of embeddings. These embedding layers represent a way to translate the data into numerical values. The power of embeddings comes from them mapping a large volume of code with multiple possible meanings to numerical values. This is what is done, for example, in translating natural human language to numerical values using “word” embeddings. It is also done in a graph context as it relates to code analysis. “Embedding layers are tremendous because without them you would struggle to get anything approaching an efficiently performing machine-learning system,” said Fuller. He added that in the case of code analysis, the ML system gets better in recommending microservices for the refactored legacy application by replicating the application functionality. Fuller noted: “Once you get to that point, you’re not quite home free, but you’re essentially 70 percent done in terms of what you’re looking to gain, namely a mission critical application that is refactored into a microservices architecture.”
  23. Early on in D-Wave's history, the company made bold claims about its quantum annealer outperforming algorithms run on traditional CPUs. Those claims turned out to be premature, as improvements to these algorithms pulled the traditional hardware back in front. Since then, the company has been far more circumspect about its performance claims, even as it brought out newer generations of hardware. But in the run-up to the latest hardware, the company apparently became a bit more interested in performance again. And it recently got together with Google scientists to demonstrate a significant boost in performance compared to a classical algorithm, with the gap growing as the problem became complex—although the company's scientists were very upfront about the prospects of finding a way to boost classical hardware further. Still, there are a lot of caveats even beyond that, so it's worth taking a detailed look at what the company did. Magnets, how do they flip? D-Wave's system is based on a large collection of quantum devices that are connected to some of their neighbors. Each device can have its state set separately, and the devices are then given the chance to influence their neighbors as the system moves through different states and individual devices change their behavior. These transitions are the equivalent of performing operations. And because of the quantum nature of these devices, the hardware seems to be able to "tunnel" to new states, even if the only route between them involves high-energy states that are impossible to reach. In the end, if the system is operated properly, the final state of the devices can be read out as an answer to the calculation performed by the operations. And because of the quantum effects, it can potentially provide solutions that a classical computer might find difficult to reach. Validating that idea, however, has proven challenging, as noted above. Where the system has done best is in modeling quantum systems that look a lot like the quantum annealing hardware itself. And that's what the D-Wave/Google team has done here. The problem can be described as an array of quantum magnets, with the orientation of each magnet influencing that of its neighbors. The system is in the lowest energy state when all of a magnet's neighbors have the opposite orientation. Depending on the precise configuration of the array, however, that might not be possible to satisfy.
  24. Mattel Inc. held its Virtual Analyst Meeting this morning as a digital replacement for its annual in-person event that usually takes place at Toy Fair New York (TFNY). While the company has been holding virtual press and retailer presentations to showcase new toys and games for 2021, the analyst event typically comes with some additional reveals, as is the case this year. Beyond some of the financial outlook provided when the company revealed its Q4 and full-year 2020 earnings earlier this month, Mattel placed focus on its overall progress in its ongoing transformation efforts, with success in reaching consumers on multiple platforms, including new direct-to-consumer offerings. Mattel’s e-commerce sales were up 50% last year. Additionally, the company highlighted its progress in sustainability, community outreach, and diversity. American Girl: The line is back on the upswing and will see updated offerings from the Wellie Wishers and core doll collections, including the new Truly Me Street Chic collection of contemporary dolls and fashions. Barbie: A new Barbie animated feature will be launching on Netflix in October. Additional details will be forthcoming in a formal announcement, but the film will be a focus with a product tie-in. Additionally, the live-action feature film starring Margot Robbie is still in the works. Hot Wheels continues to grow. Last year’s Ultimate Garage was referred to as “the Barbie Dreamhouse of the vehicles aisle.” Nearly 16 Hot Wheels vehicles are sold every second. A new Hot Wheels video game for next-gen consoles will be revealed tomorrow. The Hot Wheels Legends Tour will return with more cars, dates, and an even bigger focus this year. Hot Wheels Color Reveal will bring the po[CENSORED]r Color Reveal brand from Barbie into vehicles. Matchbox is “the new sleeping giant” in the Mattel Vehicles portfolio. The brand is getting a big push with new die-cast vehicles with moving parts and an assortment of new playsets. Masters of the Universe (MOTU): The company offered a first look at the design of He-Man and Battle Cat from the new Netflix animated series, He-Man and the Masters of the Universe. A new product line will launch later this year. The more adult-focused series, Masters of the Universe: Revelation will also have a companion toyline as the current MOTU: Origins line continues and the brand shows up in other categories such as Hot Wheels. Mattel Games is getting an infusion of licensed brands. Star Wars Scrabble, Magic 8 Ball, UNO, and other titles will arrive later this year. Harry Potter Pictionary Air is a game in which kids will draw with Harry’s Wand. Mattel Television is working on new projects for 2022, including series inspired by Hot Wheels Monster Trucks, a relaunched Street Sharks brand, Angelina Ballerina, Hot Wheels Legends, and more. Additionally, an American Girl Holiday Special is in development. Mega Construx is rebooting some lines that will be familiar to those who followed the Mattel licensed offerings that MEGA Brands released prior to being acquired by Mattel. This includes new Hot Wheels x Mega Construx, Barbie, and Masters of the Universe building sets. Monster High: Following the news that the Monster High franchise will relaunch in partnership with Nickelodeon, Mattel revealed additional details on toys and consumer products plans. Later this year, Mattel will launch high-end collector dolls based on the original Monster High lineup. A full toy line and consumer products licensing program is planned for 2022. Plush continues to grow based on the success of the 11-inch Grogu. New plush from Minecraft, The Amazing Spider-Man, and Marvel Studios’ Shang-Chi and the Legend of the Ten Rings are on the way. Polly Pocket will get new articulated dolls and seasons three and four of the animated series have been greenlit for Netflix.
  25. u are good peron here and very activity on forum ts3 u have from me #PRO
×
×
  • Create New...

Important Information

By using this site, you agree to our Terms of Use.