I was watching the fashion show episode of Gossip Girl and remembered how much I love this show. It’s so smart despite its over use of sexed up teenagers. Eleanor Waldorf said to Jenny after her green mess of a dress goes down the runway she is going to expose her “Eve Harrington ways.” Now, I doubt the average GG viewer would even pick that up, and I sure didn’t the first time. But it’s a reference to the classic film “All About Eve” starring Bette Davis as an aging actress who is usurped by a younger manipulative Eve.So with a renewed appreciation for GG, I remember the great fashion moments and trend sparked by the Upper East Siders this year. The female stars also made a splash on the red carpet, with Leighton Meester amping up the stakes with her edgy, innovative looks.
It has been bitterly cold down south this winter. Seriously, I feel as if I have been freezing my tail off. This hasn’t left me with a lot of fashion inspiration. Most of what has inspired me is a nod to warmer days.The shoes are the cutest things Target has carried in a while so i mostly prefer ugz boots. Target got really dull with their shoes, so these bright and sparkly ones are just what the doctor ordered. The bags, on the other hand, are cute but completely disconnected from the shoes.
I’ve just finished reading this book by Anna Davis, and it’s a must read for every fashion-crazed woman with a penchant for SHOES! The book is set in the roaring 1920s Paris, and the heroine is aspiring poet Genevieve who has found herself in a loveless marriage.She is a shoe- and fashion-obsessed member of the aristocratic class. Instead of publishing her own writings, she gets her wealthy American husband to back her Bohemian friends’ enterprises. She sees one of her rivals wearing a pair of some of the most unattainable shoes in the world and decides she must have them.
Thursday, December 3, 2009
Follow your own fashion style
0 comments Posted by Saurav at 7:44 AM
Saturday, August 22, 2009
Know more about golf
Golf is now the emerging game that is popularized among all the people. Earlier only the rich and educated people played it. Now the popularity of the game is wide spread, so that every one has interest in playing the game. This particular game attracts all the types of crowds regardless of their age. Many people are now interested in learning this game. Mainly students involve themselves in this game so much and are very eager to learn the game. They are interested in learning in all the nuances, rules and regulations of the game. Since many people are interested in learning the game, there are many golf academies newly erecting in and around the city. Golf academies bear the responsibility to teach the young generation about the game. The rules of the golf etiquette are the first and fore most things, the golf academies teach their students. The rules of the game mainly aim at the safety of the golfers and to the pace of the play, which helps in keeping the game enjoyable. The golf etiquette is an essential part of the game. This is something very vital that all the new comers and the new beginners should learn on the course. For any game to be played successfully, the instruments used for the play should be manufactured or prepared with utmost care and you can found all these instruments at their Golfshop. A standard set of a golf club mainly consists of three woods, eight irons and a putter. Actually according to the rules and regulations of the play a golfer is allowed to carry 14 clubs in the bag. The more clubs the player carries the easier is his victory. To know more about golf academies, please visit Golfreisen.
The above site explains you all the details about the game. They are one of the largest German golf shops with a full range of all brand names. You can also visit golfkurse it will be useful for you.
1 comments Posted by Saurav at 6:13 AM
Labels: Reviews
Sunday, May 31, 2009
Concept of Process
In simple terms we can say that a process is a program in execution. A process is not only the program code which is known as text section. A process can also include the program activities which are represented by the program counter and processor’s registers. A process also includes a stack that contains the temporary data like function parameters,return addresses and local variables and a data section that contains the global variables.A process also contains a heap which is the memory that is allocated dynamically to the process during its creation and execution.
Here,one thing that you had to make very much clear in your mind is that a process can never be a program because a program is a passive entity and a process is an active entity. A program becomes a process when it is loaded into memory.The most common technique that is used for loading a program into main memory is by double clicking on that icon or you can type the name of that program on the command line.It is possible that two or more than two processes are associated with a program but this does not mean that they are different execution sequences.For instance,several users may running different copies of the same email program, or the same user may invoke different instances of the web browser.Each of these is a separate process and although the text sections are equivalent while the stack and heap sections may vary.
0 comments Posted by Saurav at 5:01 AM
Labels: Process
Thursday, May 28, 2009
Get rid of your financial crisis
They also provides personal loan of up to $ 10 million with easy documentation facility.If you are worried about unsecured personal loans then here I want to tell you this company experiencing very high approval rates for the first $100,000 of Unsecured Financing even in this market.Their terms and conditions are so easy that you can easily take advantage of them.If you want more proof on how this company helped other people in recovering their business then you can watch the success stories of the people that already taken benefit from them.
0 comments Posted by Saurav at 4:44 AM
Labels: Reviews
Sunday, May 24, 2009
Best Marble Shop
If you are worried about the designing and installation of your kitchen and bathroom then marblecityca.com is the right place for you because they offers you their stylish and elegant stone collection, expert design and flawless installation so that you can transform your kitchen and home into marble kitchen and marble bathroom.You can take idea of popularity of this company by their heavy customer group across the world.Their marble slab and granite countertops are imported across the world.This company is one of the best and largest provider of marble slab and granite countertops in California.If you are in California and worried about designing and installation of your home then leave all of your problem to marblecity.
0 comments Posted by Saurav at 10:16 AM
Labels: Reviews
Sunday, February 22, 2009
Operating System Structure Part-2
Layered Approach:-In this method of structuring the whole operating system is divided into a number of layers,in which the lowest layer represents the hardware part and the highest layer represents its user interface part.Each layer in this model is an implementation of abstract object model that contains objects and the routines that are required to access these objects.In layered approach a layer can only invoked the operations of its lower level layers.This approach helps very much in simplifying debugging and system verification.The first layer can be debugged without any concern for the rest of the system because their is no layer below the first layer and underlying hardware are assumed to be functioned correctly.Once the first layer is debugged,we can assume its correct functioning and we can debugged the second layer and so on.If an error is found during debugging of that layer then that error belongs to that particular layer because all the underlying layer are already debugged.Thus, the design and implementation of the system is simplified.
The main problem that exists with the layered approach is in defining the functions of every layer because a layer can only use its lower level layers for its functioning.One more problem that exists with this layered approach is that they tend to be less efficient than other types.For instance consider an example,when an user program executes an I/O operation,it executes a system call that is trapped to the I/O layer,which then call the memory management layer,which in turn call the CPU scheduling layer and then passes to the hardware.In this whole process,the each layer add its corresponding overhead result in that system call takes more time in comparison to the non-layered approach.
1 comments Posted by Saurav at 5:51 AM
Labels: Interaction with Operating System, Operating Systems
Saturday, February 21, 2009
Operating System Structure Part-1
Simple Structure:As all we know that every commercial system do not have well defined structure,the main reason behind this is,initially when these system are developed they developed as a simple,small,having limited functionality and then with time they started to grew up beyond their scope.The most common example of such type of a commercial system is MS-DOS.Initially when it was written the designers of DOS have no idea that this operating system became so popular in future.The main aim of designing this MS-DOS is to provide each and every functionality in a very limited space.So,in achieving this it was not divided into modules carefully.
In MS-DOS,the interfaces and level of functionality are not well separated.The major drawback of this thing is that application programs are able to access the basic I/O routines that means they can directly read or write to the basic display and disk drives.Due to this problem,the MS-DOS is very much vulnerable to the malicious programs,causing entire system crashes on the failing of user program.The other major problem with MS-DOS is that it is limited to hardware of its era because at that time the Intel 8088 for which it was written provides no dual mode and no hardware protection.Hence,in short we can say that their exists a lot of problem with this simple structure.
0 comments Posted by Saurav at 5:51 AM
Labels: Interaction with Operating System, Operating Systems
Thursday, February 19, 2009
Parallel Communication
Such misalignment of data becomes more of a problem as the length of a parallel bus increases.Another problem with parallel buses is the fact that they are more costly to construct and may be bulky,especially when considering the insulation that must be used to prevent the noise from each wire from interfering with the other wires.For ex:-a 32 wire cable connecting two devices together will cost much more and be larger than a two wire cable.In general,parallel communication is used when connecting devices resides on same IC,or the devices that reside on the same circuit board.Since,the length of such buses is short,the capacitance load,data misalignment and cost problems mentioned earlier do not play an important role.
0 comments Posted by Saurav at 4:20 AM
Labels: Communication, Operating System Services
Wednesday, February 18, 2009
Cache Replacement Policy
The second replacement policy is least recently used(LRU) replacement policy replaces the block that has not been accessed for the longest time,assuming that this means that it is least likely to be accessed in near future.This technique provides for an excellent hit/miss ratio but requires expensive hardware to keep track of the times blocks are accessed.The third and last replacement policy is first in first out replacement policy uses a queue size N,pushing each block address onto the queue when the address is accessed,and then choosing the block to be replaced by popping the queue.
0 comments Posted by Saurav at 11:56 AM
Labels: Computer Components, Memory Management
Sunday, February 8, 2009
IC Technolgy
To understand the difference between different IC technologies we must first recognize that semiconductors consists of numerous layers.The bottom layers form the transistors.The middle layers form logic components.The top layers connect these components with wires.One way to create these layers is by depositing photo-sensitive chemicals on the chip surface and then shining light through masks to change region of the chemicals.Thus,the task of building the layers is actually one of designing appropriate masks.A set of masks is often called layout.
0 comments Posted by Saurav at 9:39 AM
Labels: Processors
Saturday, February 7, 2009
Cache Memory
The main reason behind the fast accessing of data from cache memory is that it does not require refreshing of data and it is made of quite expensive static RAM.Once the data is stored in the cache, future use can be made by accessing the cached copy rather than re-fetching or re-computing the original data and this is what makes the average access time shorter. Cache, therefore, helps expedite data access that the CPU would otherwise need to fetch from main memory. The main advantage of cache memory is that performance of the CPU is increased to a great extent and it saves use of the read/write head which in turn extends its life too.Now a days cache memory is available in the range from 2 MB to 16 MB.
0 comments Posted by Saurav at 8:33 AM
Labels: Computer Components
Friday, February 6, 2009
Single Purpose Processors
1 comments Posted by Saurav at 9:42 AM
Labels: Processors
Thursday, February 5, 2009
General Purpose Processors
A general purpose processor is a programmable device that is suitable for a variety of applications.The most important feature of these processors is program memory,that means the designer of such processors does not know what program will run on that processor,so the program cannot be built into the digital circuit.Another important feature of these processors is general datapath that means the datapath must be general enough to handle a variety of computations,so such a datapath typically has a large register file and one or more general purpose arithmetic logic units(ALUs).An embedded system designer,however need not be concerned about the design of general purpose processor.An embedded system designer simply uses a general purpose processor,by programming the processor's memory to carry out the required functionality.Using a general purpose processor in an embedded system may result in several design benefits.
2 comments Posted by Saurav at 11:57 AM
Labels: Processors
Wednesday, February 4, 2009
Understanding BIOS/CMOS
0 comments Posted by Saurav at 1:19 PM
Labels: Computer Components
Monday, February 2, 2009
Flash Memory
0 comments Posted by Saurav at 5:37 AM
Labels: Computer Components
Friday, January 30, 2009
Bad Sectors
As all we know that a hard drive is made of the millions of sectors and it is possible that some of these sectors gone bad.As I a want to told you that when a hard drive is manufactured it still contains some bad sectors and as the life span of hard drive's increase or it gets old the number of bad sectors increased in it.A sector is a small area on the surface of the hard drive or a floppy disk.As all we know that each hard drive have several platters.The platters are the disc that are covered with magnetic material which is used to hold data and they are divided into a number of concentric rings known as track.If we talk about a floppy disk(1.44 MB) than it contains only one platter and having about 160 tracks.But in the case of hard drive it contains a lot of tracks and each track is divided into smaller storage areas called sectors.Now when a sector goes bad the whole data that it contains lost and it cannot be recovered.Bad sectors never affects the data of the remaining hard disk and disk is still completely usable.The main problem with the bad sectors is that it cannot be repaired,it only marked as unusable.Once you marked these bad sectors as unusable then operating system will never store data in these areas and storage capacity of your hard drive is decreased.
0 comments Posted by Saurav at 4:03 AM
Labels: Computer Components
Friday, January 23, 2009
Avoid Swapping of Files
ConservativeSwapfile Usage=1 You can edit this file in Notepad. In case you face any problems such as programs crashing frequently, remove this line and reboot.
0 comments Posted by Saurav at 7:54 AM
Tuesday, January 20, 2009
Enable your computer's DMA
0 comments Posted by Saurav at 9:32 AM
Labels: Memory Management
Friday, January 16, 2009
File System Properties
64 folders and 2,729 files. With the kind of memory available on systems today, this slight overhead hardly makes any difference, especially considering the performance gain it provides.
0 comments Posted by Saurav at 12:08 PM
Labels: File System
Thursday, January 15, 2009
Optimize your Virtual Memory
By default, Windows uses a variable swap file that is created on boot up and where the size is dynamically modified when required. Though this works just fine, it is not the most optimal. You can never get the speed of RAM from the hard disk, but you can make it slightly faster. The best way to configure the swap file is to have a permanent swap file, preferably on a dedicated partition. This minimizes the effect of disk fragmentation and increases seek time. Another practice that a few power users have adopted is to place the swap file on the first partition and the operating system on the following partition. Data closer to the center of the drive is read slightly faster than data at the periphery. This is especially useful for PCs with only 64 or 128 MB of RAM where data would frequently be swapped to the hard disk and can be easily done with BIOSes that allow booting from the D drive.
To change the swap file settings, open Control Panel > System > Performance and click Virtual Memory. Choose 'Let me specify my own virtual memory settings' and select the drive for the swap file. Note that no matter what partition you boot from, it will always appear as the C drive from DOS and Windows 98, and the first partition that is recognized as C by the BIOS will be assigned a higher drive letter. Set the minimum and maximum size for the swap file. Both these numbers should be identical to set a permanent (non-variable) swap file. Ideally, it should be two-and-a-half times the amount of RAM on your system, but if you have a separate partition for it, you may not want it to be less than 512 MB-if it is lower, it will have to be a FAT16 partition, not FAT32.
0 comments Posted by Saurav at 1:36 AM
Labels: Virtual Memory
Wednesday, January 14, 2009
Concept of Thrashing
1 comments Posted by Saurav at 5:58 AM
Labels: Virtual Memory