31 December 2007

Finding The Best Search Engine

With Billions of pages on the internet how do you find exactly what is that you are looking for? Chances are you have stumbled across different search engines, and maybe even used and tried out a few of them.

Aside from look and feel which search engine really is the best? It used to be that Google's search results were far superior to any other search engine on the internet. With an increase in technology by Google's closest competitor's Yahoo and Msn, it's getting harder and harder to really sort through and say which one is really better.

With that in mind I would recommend using all of the major search engines to see which one returns what you personally are looking for. I've found that a search engine that I use all of the time, and returns what I am looking for will be completely different for someone else searching for the exact same thing. Everyone has expectations for what they are looking for when they perform a web search. These expectations are different for everyone, and I believe that with a slight difference in the Algorithms of the major search engines, one of them will match what it is that you are looking for.

Features: Due to the fact that there isn't much that hasn't already been exploited with search engine technology, all of the major sites have been pushing new features, to attract users. Gmail, Google's free web mail is an example of this. Gmail provides over 2gb's of free storage, and is growing everyday. With the ability to pop email stored on the Gmail server it's hard to beat. Yahoo and Msn have offered web based email for a long time, and it's exciting to see Google jump in the Game. Gmail is still in a Beta stage, but already it's made a huge push in the market; Even convinced Hotmail to raise their storage limit by more than a factor of 10! This is only a small preview I think we will see in the next while, as the different providers fight for our patronage.

Other features which all companies offer are:
Local Search - Find things relative to a local area. For example: looking for pizza in Sacramento, California?

Image Search - Rather then browsing the web to find a picture of your favorite car or digital camera, you can easily search through millions of images using the image search provided.
Movie - This is one feature which I feel really sets Yahoo apart from the others. The ability to accurately search through thousands of videos all of the internet in only seconds!
Music - This is a feature offered only by Msn. Type in an artist or song name, and be taken to a page to view artist profile's and discography, as well as a place to purchase music online.
Take a look around and become familiar with all of the different services that Search Engines are offering now a days and make the most of your web experience, and find information as quickly as you need it! --

Feel free to reprint this article as long as you keep the following caption and author biography in tact with all hyperlinks.

Ryan Fyfe is the owner and operator of My Pixi Web Portal. Which is a great web directory and information center for Search Engines and related topics..

Author: Ryan Fyfe

30 December 2007

Re-paint Your Picture

Here I will show you how to repaint a car, but once you master the technique then you will be able to apply it to other objects or graphics with ease.

1. Open the picture that you want to apply this technique to.

image 1

Select the pen tool

image 2

2. With the pen tool, trace the car. Don't worry about any details. Get something like this:

image 3

Now that you have traced the car, create a new path, name it windows, and trace all windows of the car. Do the same thing for the mirror, lights and etc. You will end up with something similar to this:

image 4

3. First Ctrl + Click on the "Car" path.

Once the car is selected, Ctrl + Alt + Click on all other paths.

4a. Keep the selection, and create a new layer.

In the new layer, fill the selected area,with the color you want your car to be. (Select a stronger color than the one you want.)

Then, change the Blending Mode to color.

4b. If you aren't happy with the previous result, do everything except the 4a.

Then, go to Image -> Adjustments -> Color Balance or you can simply press Ctrl + B. And try to get the color you want.

Re-paint your picture Tutorial: Final Result

28 December 2007

Can You Convert Words Into Money?

The only way to keep up with the latest about Adsense is to constantly stay on the lookout for new information. If you read everything you find about Adsense, it won't take long for you to become an influential authority.



Most of this information comes straight from the Adsense pros. Careful reading to the end virtually guarantees that you'll know what they know.

Google Adsense - The Easiest Money To Make Online?

For the last couple of months, Google Adsense has dominated forums, discussions and newsletters all over the Internet. Already, there are tales of fabulous riches to be made and millions made by those who are just working from home. It seems that Google Adsense have already dominated the internet marketing business and is now considered the easiest way to making money online.

The key to success with Adsense is the placing of ads on pages that are receiving high traffic for high demand keywords. The higher the cost-per-click to the advertiser, the more you will receive per click from your site. Obviously, it does not pay to target low cost-per-click keywords and place them on pages that do not receive hits.

With all the people getting online and clicking away everyday, it is no wonder why Google Adsense has become an instant hit.

For some who are just new to this market, it would be a blow to their pride knowing that their homepage is buried somewhere in the little ads promoting other peoples services. But then, when they get the idea that they are actually earning more money that way, all doubts and skepticism is laid to rest.

There are two major, and clever, factors that some successful webmaster and publishers are learning to blend together in order to make money easier using Adsense.

1. Targeting high traffic pages on your website. If you check on your logs, you will discover that many of your visitors are taking advantage of the free affiliate marketing resources and ebooks that you are offering on your site. In simple words, your ads are working effectively and are generating more clicks. It also means more money for you.

2. Placing Adsense links on pages that are producing little, or better yet, no profit. By placing Adsense on a free resources page, you will reduce the amount of potential customers being lost to other sites. Tricky, but effective nonetheless.

When learned to work effectively, these two factors are actually a good source of producing a minimal amount of revenue from a high traffic page. Many people are using this strategy to pick up some extra and cash with Adsense. This is also especially rewarding to informational sites that focus their efforts on delivering powerful affiliate link free content to their visitors. Now they can gain a monetary return on their services.

With the many techniques that people are now learning on how to make the easiest money by their Adsense, it is not surprising that Google is trying everything to update and polish their Adsense in order to maintain their good image.

The possibility of adding is 2nd tier in Adsense is not impossible. With all the people spending more time in their Adsense now and still more getting into this line of marketing, there is no doubt about the many new improvements yet to be made. Imagine the smiles on the faces of the webmasters and publishers all around the world if ever they sign up for sub-affiliates and double or even triple the amount that they are already earning.
The one particularly handy money-making feature that is available with Adsense now is the ability to filter out up to 200 urls. These gives webmasters the option to block out low value offers from their pages as well as competitors to their websites. Talk about taking only those that are advantageous and discarding the ones that seem useless.

With Google Adsense, the possibilities are limitless. Yet there is also the possibility of someone taking advantage of the easy money process that this internet marketing is doing. If you think more about it, these negative factors may force Google to break down and thrash Adsense in the process. If that happens, people would have to go back to the old ways of internet marketing that does not make money online as easy as Adsense.

For now, however, Google Adsense is here to stay. As long as there are people wanting to earn some easy cash online just using their talents, the future ahead is looking good. Besides with all the strict guidelines that Google is enforcing over Adsense, it will take awhile for the Adsense privileges to be spammed and even terminated.

There's a lot to understand about Adsense. We were able to provide you with some of the facts above, but there is still plenty more to write about in subsequent articles.
Sinta is a Full Time Adsense Publisher and She Makes her
living from Adsense. She is passionate about sharing her Adsense Knowledge. Further information may be obtained from:

http://www.mydomainname101.com/adsense_technique.htm
http://www.mydomainname101.com/Google-Adsense-Easy-Money.htm

In Defense

Maybe Im a Heretic.



Im not really in favor of spam and I dont like it anymore than the rest of you and Im sure many of you will disagree with me.

However I look at it in the same way I look at TV commercials. If we didnt have them wed have television like they have in Europe, which is pretty sad.

I just dont want the government to get into the act. Let the market place take care of it. Eventually it will sort itself out. For one thing it doesnt work. There are ways to control it with software and by other means.

I had an email address that for some reason or other was prone to receiving massive amounts of exceedingly offensive porn. I just abandoned it.

Spam is relatively inexpensive or it wouldnt exist. Do you want to charge for the internet to cure it? I dont think so. But when you get to the bottom of it there is a cost to those who employ it and I think eventually theyll come to realize it and stop it.

I just received an email message from someone who wrote a blog objecting to Spam. In it he was touting some software to eliminate spam. Not only was he employing spam, but it was one of those long sales pitches that you have to scroll for five minuites to find out that this software marvel cost $200.00. I not only deleted it, I unsubscribed. Wasn't this Spam.

Here's one for the books. I received a solicitation to join a program that was supposed to let you use spam but not have it considered spam. You joined a group who ageed to receive email from you as long as you gave them permission to reciprocate.

It's a free program and they were honest enough to tell you up front that you could concievably receive 10,000 email messages at a time. I'll take my spam any day.

Meanwhile the best thing to do is make sure you have a good filter and ignore it.

Dont answer it or respond to it in any way. I used to report it but stopped even acknowledging that I ever saw it.

Do not buy from anyone who indulges in spam.

Hit them in the pocket book and eventually theyll go away.

Dont ask Big Brother to help because youll then suffer from unintended consequences. Use your freedom BOYCOTT them.

Written by: George W. Cannata Author and publisher of the web site: http://www.caveatemptorus.com You may copy or reprint this article so long as it is not altered in any way, that you retain the link and give full credit to the author.

26 December 2007

Understanding Unicode

The computers understand everything by numbers. Each character is represented as a number, which is finally drawn as a character in the screens.It has been a major problem for the legacy systems to write programs for languages other than English. The primary reason being the non-availability of enough characters in ASCII encoding. So obviously Internationalization of applications becomes a big issue.

ASCII and CodePage mechanism:
ASCII format had one byte or 8 bits for each character. This means that, it can have 2^8 or 256 different characters. So if a program is to be written in a different language, the entire character set is to be replaced with a different one. Windows initially had a scheme called CodePage. For each language, it had a different codepage. If it needs its version of Windows in chinese, then it will use the Chinese Code page. The problem here is that, at a time it can support only one language. So if a person in Europe connects to US server, he'll see only English characters and vice-versa.

Multi-Byte Character Set or Double-Byte Character Set:
One solution proposed for the above problem was to have a multiple byte character set. In this schema, a character might be represented as a single byte or a double byte. If it is a double byte schema, the lead byte will have the information about its double byte status. So the applications have to check the lead byte status always. The VC++ provides an API "isleadbyte(int c)" to check if a character is a lead byte.

Unicode:
Finally all big companies have joined together and decided to invent a new strategy for this issue. A new character encoding scheme was deduced with 16 bits. Now this 16 bit character set can support 2^16 or 65536 characters. This standards of Unicode are hosted at Unicode. Although original goal of this unicode consortium was to produce a 16 bit encoding standard, it produced 3 different standards.
UTF-8: This is a 8 bit encoding standard. The advantage in this schema is that the unicode characters in/transformed into UTF-8 are compatible with the existing softwares.
UTF-16: This is the original planned standard using 16-bit characters.
UTF-32: This is used where memory is not a constraint.

All 3 forms of data can be transformed into one another without any loss of data. All of them use a common repertoire of characters.
Note:
Windows NT/2000/XP use unicode as their character set. So even if a program uses data in ASCII, it internally gets converted to unicode, processed, reconverted to ASCII and returned.
Most of the times some programs will need conversions from MBCS/DBCS to unicode. If anybody needs to learn the conversion procedures, please follow the link at Microsoft MSDN. You can get all the information you need about this(ofcourse, if the page is not moved to a different location).

Infact a common goal expected to be achieved out of the whole effort is to gain internationalization. But having a common character set solves only a part of the whole issue. The other issues like Date, Time, Numbers, Currencies and conventions also among other things to be taken care of.

Invisible Girl

Step One
In this tutorial, we will use the image below and make the girl invisible. I got this picture from here. You may download it from there if you must. (Thank you very much, PorcelainStock.)

image 1

Step Two
Take the Clone Stamp Tool (S). We will use only this tool to make the girl disappear! The Clone Stamp Tool usually takes a sample of the part of the image and apply it over on another part.

Step Three
Choose a brush size. I used 28px for this tutorial considering the image size was 533x773. But the size is totally up to you.

Step Four
In this step, you will make the girl's face disappear. To do so, Alt+Click on the red area spotted below. We clicked on that area because, we are going to overlay her face with that wooden black fence. So that it looks as if she is not there.

image 2

Step Five
Subsequently, drag your mouse over the part (the face) which you want make disappear and paint it. Repeat this process on any unwanted part of the image. Here's my final result.

Invisible Girl Tutorial: Final Result

25 December 2007

Day 2 Night

Just a way to turn your sunny day pictures, into a night time picture, complete with a moon.

1. Open your image, we used a landscape, where there are trees and houses.

image 1

2. Click Image > Adjust > Hue/Saturation - and give the following settings. (tick colourize box, hue 196, saturation 18, lightness -69)

image 2

3. Click Layer > new > Layer - and name it moon

4. Make a rather large selection, using the eliptical marquee tool, holding SHIFT after you started the selection to make it perfect

5. Press D to reset your colours

6. Now, Filter > Render > Clouds

7. Selection > deselect (CTRL + D) to deselect the selection

8. Now, Edit > Transform > free transform (CTRL +T) and make the moon smaller to your size you want.

image 3

9. Layer > Layer style > Blending options - and just below, right at the bottom... you will need to play with the bottom settings (underlaying layer) to seperate the triangle, hold ALT and drag them apart.

image 4

10. Next, Layer > New > Layer - and call it glow

11. Grab a brush.... around size 18, and with a light grey as your foreground colour, run your brush left to right a few times

12. Filter > Blur > guassian blur - to around... 14px

13. Now, lower the opacity on the layer to around 25-40%

Day 2 Night Tutorial: Final Result

23 December 2007

The Future Value

All the hype about the sale of Weblogs Inc. to America Online (AOL) has given rise to the now famous question How much is your blog worth? In acquiring Weblogs Inc., AOL has provided some concrete metrics to future valuation of blogs. How much will traditional media be willing to pay for a blog? Conversely, how much would you sell your blog for?




AOL-Weblogs Inc. Deal Benchmark for Future Blog Valuation

Weblogs Inc was established by Jason Calacanis and Brian Alvey in 2003. It is a network of blogs which includes under its wings successful blogs such as Engadget and Autoblog. Jason Calacanis pointed out that Weblogs Inc. earns in excess of $1 million yearly in Google Adsense revenues alone.

AOL purchased Weblogs Inc. for a confidential sum assessed at somewhere between $25 - $40 million. After said purchase, Tristan Louis came up with a blog valuation scheme based on the deal. He created a chart of blog value using the value of each inbound link to Weblogs Inc. as the basis. It is common knowledge that blog readers follow links. Search engines also act as users and primarily determine blog quality rankings based on linkage data thus direct and indirect value links are a great proxy for value measurement. In the blogosphere, conversations that nurture connectivity represented by links and indexes like Technorati give a vantage view of the value of a blog.

Tristan Louis itemized the publicly available data (list of blogs indexed) at Weblogs Inc. network including the number of inbound links (Technorati blog numbers) per blog divided by the purchase price to determine the value of an inbound link to a blog. At the rumored price of $25 million, the estimated value is $564 per link. At $30 million, it is $677,57 per link and $903,42 at an acquisition price of $40 million. Interestingly, the consumer segment chalks up the biggest percentage of linkage. Engadget represents over a third of the overall network traffic.

Applying Tristan Louiss Weblogs Inc, sale, Dave Winer has also sold http://www.weblogs.com to Verisign for a rumored price of around $2 million. Blog entrepreneur Nick Denton, founder of Gawker Media has signed a deal with VNU Media to publish Gizmodo (gadget blog) across Europe in six languages. VNU Media is a leading worldwide information and media company which owns ACNielsen, Billboard, The Hollywood Reporter, among others. With this deal, blog publishing has hit big time.

However, the value of a blog is not calculated based solely on links using AOLs purchase of Weblogs Inc. Jason Calacanis, the man behind Weblogs Inc., disputed using links alone as proxy for the value of the blog network. He reiterated that the acquisition price was based also on the ever reliable revenue, earnings, management and other metrics.

Tristan Louis based his valuation scheme on links to a blog but he also acknowledged the significance of technology, talented management team, financial performance and growth. There is direct correlation between links, traffic, revenue and earnings capacity of a blog or blog network but it takes sound management to maximize all these potentials.

Value of a Blog Some Metrics to Consider

How much is your blog worth? There is no one standard gauge yet. But one way to measure the value is to look at certain factors to gain a better perspective on how to measure the future value of a blog.

Aside from number of links as mentioned earlier, traffic level is a key factor in determining blog value. Highly trafficked blogs definitely have a bigger potential for earning compared with those blogs with few readership. A blogs success is highly dependent on visitors/readers. However, ascertaining the value of traffic is a thorny issue. Some bloggers value traffic anywhere from $3 to $10 per hit a day. From this data, a blog with 2000 unique visitors (page views) would be worth between $6000 to $20,000. The downside to this valuation approach is that some traffic is more valuable than others. A personal blog might have 1000 unique visitors but more difficult to convert to revenue than a blog with 1000 readers that blogs on the topic of digital cameras.

Aside from diverse traffic streams that come from bookmarks, direct links or RSS subscribers will make risk of losing traffic low. Social bookmarking sites are inching their way to becoming prime sources of traffic, with peer referral at times carrying more weight than search results. There are a number of well known bookmarking sites you should link to. Top bookmarking sites include Furl, http://www.del.icio.us, Diggs, to name a few. By leaving an RSS (Really Simple Syndication) feed, you can feed you readers desire for information. Visitors can get automatic updates whenever you provide new content. Having a fairly good base of bookmarkers and subscribers ensure a steady flow of fans and repeat readers the all-important traffic.

In the blogosphere as in any other field, revenue or earnings is a major focus. a logical approach to blog valuation would be to base its worth upon current and projected earnings, assuming that your blog is earning something to start with. Again, there are varying views on how to use current earnings to measure a blogs value.

Some bloggers opine you should expect six to eight months earnings as your blog value. A blog with a daily income of $150 would be worth between $27,000 - $36,000. Still, others determine a blogs value as being two years of current earnings. A blog earning $150 a day would be worth $108,000. Again, there is a huge disparity between these methods of assessing value. Having diverse streams in the form of multiple affiliate programs also increases blog revenue. An affiliate program is an advertising model in which a blog owner markets via his blog a given product, on behalf of another company. The blog owner is reimbursed a percentage of all sales sold thru his affiliate link. Reimbursement rates can vary from 1% and upwards. Google Adsense is a prime example.

Visitors access blogs throughout the Internet primarily through search engines. If your blog does not have a post appearing in the top ten search engine rankings, the chances of visitors reaching your blog is low. A blogs presence on relevant search engines is a significant medium for maintaining a blogs success. Search engine ranking and pages indexed in search engines is critical for generating traffic to a blog. Having your blog among the top results of a search or receiving a high Google PageRank (a system for ranking blog posts) would increase your blogs overall value.

High quality content will always be a key factor for determining a blogs value. As has been said time and time again Content is King. Moreover, search engines can only read a blog. What attracts a search engine are the words, the content of a blog that explains, informs, shares and educates readers. Good content increases blog value.

All these aforementioned objective metrics can be considered in assessing the value of a blog. Added to all these, a talented management team behind a blog, its underlying tools and blog technology in use can further help to estimate the future value of a blog.

About The Author:
http://www.theinternetone.net

Forms

The PHP $_GET and $_POST variables are used to retrieve information from forms, like user input.

PHP Form Handling
The most important thing to notice when dealing with HTML forms and PHP is that any formelement in an HTML page will automatically be available to your PHP scripts.

Form Example:
<html>
<body>
<form action="welcome.php" method="post">
Name: <input type="text" name="name" />

Age: <input type="text" name="age" />
<input type="submit" />
</form>
</body>

</html>
The example HTML page above contains two input fields and a submit button.

When the user fills in this form and click on the submit button, the form data is sent to the "welcome.php" file.

The "welcome.php" file looks like this:

<html>
<body>
Welcome <?php echo $_POST["name"]; ?>.<br />
You are <?php echo $_POST["age"]; ?> years old.
</body>
</html>

A sample output of the above script may be:
Welcome John.
You are 28 years old.

The PHP $_GET and $_POST variables will be explained in the next chapters.

Form Validation

User input should be validated whenever possible. Client side validation is faster, and will reduce server load.

However, any site that gets enough traffic to worry about server resources, may also need to worry about site security. You should always use server side validation if the form accesses a database.

A good way to validate a form on the server is to post the form to itself, instead of jumping to a different page. The user will then get the error messages on the same page as the form. This makes it easier to discover the error.

22 December 2007

Color Change

1. Open Photoshop. Open the image to change the color.

image 1

2. Make a duplicate of the background layer and keep the duplicate layer selected. Change the top layer mode to "Overlay"

image 2

3. Image > Adjustments > Hue/Saturation (Hue: +29 Saturation: +28 Lightness: +26)

image 3

4. You can go back to step 2 before applying Hue/Saturation and apply Color Balance (Select Shadows Color Levels -100 0 +100)

image 4

5. Image > Adjustments > Brightness/Contrast (Brightness: +100 Contrast: 0)

Color Change Tutorial: Final Result

21 December 2007

How to Blur

This week let us learn a little technique I like to call the pixellated blur. I don't really call it that, but I had to call it something for the purposes of this tutorial. Really, I don't call it anything at all. Anyway, on with the tutorial.

I want to have an image that is focus on a single point, but blurry and pixellated throughout the rest of the image. I am using a photo of the famous bridge in the famous city that we all know. You can see it below.

image 1

I want to focus on the top of the farthest tower over there. So the first thing I do is to duplicate the layer with my bridge photo on it. I do this by dragging my layer to the new layer icon at the bottom of the layers palette. It looks like a folded piece of paper. Once this is done, you should have three layers total. A background, and two of the bridge layers.

After that is done, we are going to select the upper layer. Now go Filter > Blur > Gaussian Blur. Give it a few pixels, until you are satisfied with the outcome. Look below for my version.

image 2

Now that looks like a blurry version of the first image right? Well, that's because it is.

So let's add some pixellation and really mess this perfectly good photo all up. Go Filter >Pointilize >Mosaic. Use the slider to give it some parameters on size. I used 4 here. I like the number 4. I also like most of the other numbers too. That's another story though. Play around with your own favorite numbers and come up with what you like.

image 3

Ok, so now we have an image that looks... well... like garbage. So what are we going to do with this thing? Well, the first thing we are going to do is to add a layer mask to the top layer. Do this by hitting the Add Layer Mask button at the bottom of the layers palette. When this is done, select the gradient tool in the toolbar. I used a radial gradient on mine, but you can experiment with any gradient, or you can use a soft paintbrush with black pixels over the spot you want to show focused. Or you can use any shade of grey, or gray as some folks say to give it any level of clarity. So I swipe a radial gradient on mine from black to white starting at the far tower. I can do this as many times as I want until I get it right. I am so good, that I got it right the first time. That is... the first time after I did it about a dozen practice rounds. I call them practice, you can call them screwups. Either way, I still get paid the same. That's what makes PS so cool, you can always revert back to before you screwed up the image. Try that with oil and canvas Degas!

image 4

So we learned a little sump'm sump'm today right? Repeat after me, " I am a Photoshop masterrrrr. I am a Photoshop masterrrr". Go meditate on this as your mantra. When you are done, you will be "one" with the pixel. Then try other combinations of this technique with other filters and get rich on you talents. Remember that the Zen is in living out your destiny. You ARE a Photoshop master! Talk at you in seven days.

Video in a Flash

Web Hosting is going through a revolution. The ever lower cost of video streaming is morphing websites into less images, less text, more video. A recent look at Yahoo! shows a home page with video links front and center. One of the emerging technologies allowing low cost streaming is Flash FLV. It is a format that is designed for web playback, offering high rates of compression. Flash Player, the embedded plugin that is in 98% of all internet browsers, allows playback of Flash FLV using SWF files. It is a preferred method because there is no need for a 3rd party download. FLV is a "Flash Live Video" file.


Not many people know it, but Macromedia (Adobe) has developed a sophisticated media delivery platform, that is emerging as a sleeping giant. Flash is the world's most pervasive software platform, used by over 1 million programming professionals and reaching 98% of Internet-enabled desktops worldwide as well as a wide range of devices.. You might be shocked to hear that using Flash for your Video Media Delivery can save you a bundle of cash!

The Flash Player browser plugin can play an FLV, but that FLV, must be either embedded in or linked to a SWF. That is, you can't just put the actual FLV on an HTML page. You can however reference the FLV file using action script and SWF (the player controls), which now opens up the door to brand your player, add colors and logos, skins, and links to further information. Customization is now only limited to your imagination and Flash Skills. 4 hour movies can be streamed instantly with no buffer wait or download lag time.

Highlights of the Flash Communications Server include the ability to provide your end users with the best possible experience via a seamlessly integrated client that lets you brand your broadcast the way you want to, with any devices containing the Flash Player being capable of delivering movies when connected to the MX Communications server.

A Fantastic File Format
The file format used in this process is Flash FLV or Flash Live Video, and it plays in a Flash Player. While traditional methods of media delivery include some kind of download to the user's computer, either in a pre-loader or through temporary Internet files, Flash MX Communications server and a Flash FLV Player connect in a completely different manner. Simply put, it's a new connection to the file each time the user uses the controls in the player. This means that in the background it's a "start here" "stop here" "start again here" style of play, with no downloads or caching.

Here's The Top Ten Reasons to Stream Video Using Flash

1. FLV format file sizes after conversion are up to 60% smaller, saving server storage costs.
2. FLV's start - stop connection style saves on bandwidth perhaps as much as 60% less per month.
3. FLV format has no local player in operating systems, so file sharing is nullified.
4. FLV format plays directly in more browsers than Windows Media, Real Player or QuickTime.
5. FLV server can authenticate clients, and control users as you wish.
6. FLV players can be completely customized for logos, branding and embedded links.
7. FLV players can play files from a programmable database, and simple administration area.
8. FLV players can be programmed to integrate with databases for free previews, time, users.
9. FLV encoding can include user information for content tracking, misuse, or DRM.
10. Flash Communications servers are easier to maintain than others, and less prone to security hacks.

Who is using Flash Communication Servers? Google, MTV, Yahoo, IBM, Sony, Universal Studios, the list is growing. Flash is suitable for various applications, including live, on-demand, audio and video streaming, 24 x 7 live radio broadcasting, pay-per-view, with digital rights management, delivery to mobile devices, including phones, product demonstrations, commercials and movie trailers, employee and partner training, corporate communications the list goes on and on...

Interested publishers can see demonstrations of Flash Communication Server and get more information by visiting http://www.flvhosting.com. Our proprietary video delivery solutions work on 98% of all Internet enabled devices, and can save you big on your bandwidth bill with prices starting at only $19.95

Mike McGuinness is VP of Operations at http://www.flvhosting.com Call 1-888-409-3500 sales@flvhosting.com

Mike McGuinness is a Flasher and Tech support guru for Video Spark and http://www.flvHosting.com

Make Money

As the advent of the domain names continue to affect a great number of people, many people today are then greatly pulled and encouraged to purchase domain names for a considered profits. In fact, many of them are now on the verge of purchasing domain names hoping for some possible returns. So if you are interested to know the facts on how you can purchase domain names for your profit, then you better read this article for this will give you some knowledge about this thing.




So how to purchase domain names for a profit?

It is indeed a fact that there is a lot of money to be made to purchase domain names and then selling those domain name registrations on the open market. Numerous research studies have considered that there a large number of people who paid an amount of $35 just to register a domain name and then sold the domain name in excess of $100,000. Maybe among the qualified examples for this matter are the current sold domain names that have prices ranging from $2,750,000 from the CreditCards. com to $300,000 from the http://www.viajes.com.

Given such fact, many of those who are planning to purchase domain names for profit often ask the real reason on how those companies did such things. Certain resources considered that there is an amount involved if you sell or purchase domain names even if the profit margin per name does not reach the amount of $100,000.

In relation to that, today there are a lot of domain names where those who are interested to purchase domain names are required to pay three to four times what the domain names cost to purchase domain names at a registration site like the http://www.domain.com.

And speaking of those who sell and purchase domain names, it is interesting to know that they are called as domain name speculators. It happened that such nick is formed for the reason that those who sell and purchase domain names simply come up with a bright concept and then pursue what they decide to register domain names. And generally, they take multiple factors into account when they are striving to identify and purchase domain names that they can sell for a profit. And to mention, some examples of these factors taken by the domain name speculators include the general nature of the domain name, avoidance of trademark matters, knowledge if the domain name get traffic, and the forward thinking.

Lastly, most of the experts have recommended that for you to get a profit, you should think of purchasing a domain name like buying a piece of real estate. If you can recognize and purchase domain names that are in an up and coming area, they will become more precious.

About The Author:
Discover What It Really Takes To Succeed And Profit From Your Online Business And Find Out The Little Discussed Facts That People Ignore - Or Choose To Ignore - That Makes You Either An Internet Entrepreneur Or Simply, Plain Broke! http://www.internetentrepreneurship.com You May Reproduce this article as long as an active hyperlink is accompanied.

3 Ways to Know If a Expert is the Real Deal Before Buying a Product or Service

Many people call themselves podcasting experts and its no wonder since podcasting is still fairly new and everyone is trying to jump on the podcasting bandwagon to make tons of cash.


Sales letters are written, websites are launched and ebooks are thrown together by internet marketers who want to make a fast buck on a growing trend.

Not everyone who calls themselves an podcasting expert really is and you need to understand the ways to separate the real podcasting experts from those trying to make a fast buck.

Here are some ways to determine whether a podcasting expert is trustworthy and whether you should spend money on their podcasting product or service.

  • Ensure that podcasting expert isnt just podcasting for fun. A podcasting hobbyist is only producing his or her own podcast. A podcasting evangelist is producing podcasting solutions for herself, clients and other people. Look for testimonials, case studies or a list of clients that the podcasting expert has helped. Chances are if others are saying great things about this podcasting expert, you can feel confident spending money on his or her solutions.
  • Double check that the podcasting expert even has a podcast. A lot of people say they can teach you how to podcast, but dont even have a podcast of their own. How can you learn the ropes if that person hasnt done it themselves? A rule of thumb is to see if theyve produced at least 15 episodes of their own podcast or someone elses. If they have, then you can heed their advice since that person has probably been through a lot of equipment - and experiences - to advise you on the best course of action.
  • Understand what the podcasting expert has been doing in the podcasting industry. Aside from selling products or services on podcasting, people whose businesses rely solely on podcasting are speaking at conferences, doing interviews in the media, writing articles on the subject and developing ventures all related to podcasting. One podcasting expert has developed an online expo on podcasting. Another podcasting expert is writing a book filled with podcasting case studies. If over the last 6- to 12-months you find that 70% of the experts activities have been focused on podcasting, you can confidently buy their product or service knowing that they are true evangelists. Plug in the experts name into a search engine and see what pops up.

(c) 2006 Leesa Barnes. All Rights Reserved Worldwide.
An Internet maverick with a solid technology background, Leesa Barnes helps businesses use podcasting to drive search engine traffic to their website and build profitable relationships with their customers. She is co-author of Jump Start Your Podcast and she comments on podcast optimization techniques in her blog called Podonomics. Visit http://www.leesabarnes.com and sign up to receive a free ecourse called 5 Ways a Podcast Can Boost Your Search Engine Ranking.

Pro Anyone?

The task of marketing a website can sometimes be a very boring task. Yes, marketing is important and vital to the success of a business but it cannot be denied that the tedium could get to the most persistent internet marketer or business owner.




One way to combat the boredom is to use many different internet marketing tools as a way of diversifying the marketing choices that will be used for the website. But there is one new internet marketing tool that is not only very effective in promoting your website, it is also quite fun to do. This is making and posting blogs.

Blogging has been a popular internet pastime for quite some time now. Blogs are like online diaries where people can post their thoughts about a variety of subjects and issues or even report news in various points of interest. The readers of the blog are also encouraged to post their replies to the blog posts, thus forming an informal community that sends messages to each other. One of the most popular blogging services right now is Blogger now owned by Goggle. Bloggers easy to use blogging interface has proven to be a hit among bloggers of different persuasions. Google has even established a dedicated Blog Search in its search engine as a way of addressing the fast growing popularity of blogs.

Blogging has actually taken a life of its own and has transcended its initial life as an online diary. Corporations are now using blogs as a means to post corporate news and events that can be read by its workforce.

Recently, internet marketers saw the potential of blogs as a powerful internet marketing tactic. They realize that one of the biggest advantage of blogs is that it gets good search engine positioning because of its interlinking aspect as well as the regular fresh content. Search engines know that most blogs are updated regularly and this results in more favorable page rankings for the topic that it deals with.

Blogging has also given media relations a new effective tool because bloggers are often recognized as the opinion leaders in the field in which they blog. There are also topic-specific blogs that can be setup as a form of soapbox for the internet where people can freely voice their opinions regarding important issues of the day. Still another idea is to set up a blog that can be the source of news for topics that are not covered by the media in general.

When it comes to more in-depth marketing efforts, blogs can be used to promote a website directly or use the generated traffic to bring attention to an affiliate program like Google adwords to set up another income stream. Blogs can also be used for various promotions strategies. You can either launch your own blog to promote a service or, as previously mentioned, a website, or participate in ongoing blog discussions within relevant subjects or topics and then promote the service or website there by participating in the discussions.

About The Author:
To learn how to take your blog to the next level as a professional, please visit-: http://www.BloggyPro.com - giving daily tips and advice on all aspects of setting up and running a blog.

P2P Networking with Rendezvous and iChat

By now you've probably figured out that you can't reenact the famous iTunes/Rendezvous demonstration until the next release of iTunes--there'll be no play-list sharing for a few months yet. So what the heck can you do with Rendezvous in the meantime?

Actually, thanks to the iChat client included in Jaguar, quite a bit, including setting up a powerful peer-to-peer network. Here's a quick overview of instant messaging and file sharing via Rendezvous (to help you pass the time until the next release of iTunes).

Why Use Rendezvous Instead of AIM?
You might be thinking, "I'm already using AIM, MSN, or Yahoo, why should I care about Rendezvous?"

Well, a couple of reasons come to mind. First of all, Rendezvous is pure peer-to-peer communication; AIM is not. You don't need that big AIM server off in the cloud somewhere to enable (or disable as so often happens) your communication. In the business environment, your system administrator should feel a lot better about you communicating with your co-workers on a local, secure network, as opposed to going outside the firewall then back in. Second, Rendezvous is fast. The lightning speed of the exchanges is a relief compared to the sluggish conversations we've all experienced with AIM.

You can use the iChat client for AIM exchanges too, but I'm not using it at this point. I like reserving iChat for pure P2P networking. If I do use AIM, then I launch Adium, which is a terrific AIM client for Mac OS X.

So, how do you set up iChat for peer-to-peer networking? Let's get to it.

iChat Over an Established Local Network
Communication over your corporate LAN isn't quite as exciting as the ad hoc network in the next section, but in the business environment it's probably more practical. You can also add AirPort to this setup for more flexibility, but remember to enable WEP or some other security.

First, make sure that you and your mates are tapping into the same local network. Then open Address Book and create an entry for yourself. (Take a walk on the wild side and add a picture to your record too.) iChat uses this information and image to identify you to others.

Screen shot.

Make sure you have an entry for yourself in the Address Book application. iChat uses that information to identify you to others.

Launch iChat and open the Preferences panel. Click the "Accounts" icon at the top. Look for "Rendezvous Messaging" and click the box that reads "Enable local network messaging." Close Preferences, and you're set. All you need now is someone else to launch iChat, and your Mac will "discover" that person and display them in your Rendezvous buddy list. Start talking!

Screen shot.

Remember to enable Rendezvous in your iChat preferences

iChat Over an Ad Hoc Peer-to-Peer Network
Logging on to an established network is fine, but what about those laptop situations where there isn't an established 802.11b or hard-wire network available? How are you going to gossip during a staff meeting? Fear not, Jaguar gives you all the tools you need to spread the dirt.

Basically, you set up a peer-to-peer network via 802.11b for Rendezvous to tap into (you'll need an AirPort card to do this). Open your Network Preference Panel and enable AirPort. Click on the AirPort tab and make sure you have the "Allow this computer to create networks" and "Show AirPort status in menu bar" boxes checked. Click "Apply Now" and close System Preferences.

Screen shot.
Now enable your computer to create networks.

Now click on the AirPort icon on the Menu Bar to reveal the drop down options. Select "Create Network ..." and you get a Computer to Computer dialogue box. Give your network a name and choose a channel. You can password protect this network, but for iChat that sort of defeats the purpose. Click OK.

Notice that the Menu icon changes from the AirPort reception bars to a little computer. You're in P2P mode! Now, anyone within range can select your ad hoc network from their drop down AirPort menu and connect.

Launch iChat. If anyone else has their client open on the P2P network, then the two computers will discover each other and the names will be listed in the Rendezvous buddy list. Start chatting! That's all there is to it -- no servers, no Internet, no fuss.

Sending Files Via Rendezvous
You can exchange more than just witty dialogue with this P2P set up. You can also send files and pictures to one another.

In your iChat window, click on the paper clip icon, and you'll be presented with a dialog box that lets you navigate to files on your hard drive. Pick a file and click the "Open" button. The icon for the file will be placed in your iChat typing window. You can add text along side the icon, then hit return. Both your message and the file icon (with its name) will show up in your buddy's window. If he wants to download the file, all he has to do is click on its hypertext name and it will instantly download onto his desktop. And I mean instantly.

If he doesn't want to receive the file, then all he has to do is ignore the link and nothing is transferred. If he doesn't want to download the file right at the moment, he can go back and retrieve it later, as long as the network is still viable and both chat windows are open.

Final Thoughts
At first glance iChat seems like just another IM client. But below that cartoon-like surface is a powerful P2P networking engine. If you're not a big fan of the balloon captions and buddy icons, those can be turned off via the "View" dropdown menu.

I hope this will keep you busy until iTunes and other Rendezvous-enabled applications are available.

Derrick Story is the digital media evangelist for O'Reilly, as well as the author of Digital Photography Hacks and Digital Photography Pocket Guide. You can listen to his photo podcasts and read his tips at The Digital Story.

by Derrick Story
08/28/2002

The keystone of security

Davide Wood - Symbian Thursday, 08 June 2006
In his ninth insight article Symbian's David Wood looks at mobile security, Symbian OS and argue that smartphones will increasingly become the keystone of enterprise security.

Do smartphones pose a danger to corporate security and well-being? To believe some recent analysts and commentators, smartphones carry an unseen threat of chaos, disruption, and financial loss into any company naive enough to tolerate their employees using them. Allegedly, smartphones can be the vehicle for viruses and other malware to penetrate corporate defences. Equally worrying (it is said), smartphones can be the vehicle for sensitive business information to leak out of the company into the prying eyes of competitors and ne’er-do-wells. Finally, the purported headaches of coping with multiple different kinds of smartphones, each with its own distinct protocols and complications, mean that any benefits from use of smartphones are outweighed by the greater cost of managing and supporting these disparate devices.

I understand the concerns that lie behind such beliefs. But I reject – strongly – the conclusions.

Yes, there are good reasons for the industry to be concerned with the issues of smartphone security. And yes, businesses need to think ahead when deploying enterprise applications onto the smartphones used by their employees. But provided people follow some basic rules, there’s no real threat from smartphones. Rather than smartphones being an Achilles heel of security, they will increasingly be its keystone.

The first point to appreciate is that smartphones are not all equal. To be specific, the operating systems underlying smartphones are not all equal. Just because operating system A has known security problems, it does not follow that operating system B has these same problems. Any such line of reasoning is an example of the (sadly widespread) relativistic fallacy that smartphone operating systems are a commodity, lacking any real distinctiveness from a technology or product point of view. On the contrary, security against malware is an example where one operating system – Symbian OS – has consistently adopted a very different approach from the pack.

As I’ll explain later in this article, there are some important developments, security-wise, in the latest major upgrade to Symbian OS, v9. But the underlying difference in approach to security dates back to the design of the earliest version of Symbian OS. To explain this point, I need to take a slight technical detour.

  • - When you look at the innards of a large software system, you’ll find many instances of pieces of software copying data from one memory location to another. For example, an application might copy a piece of text from the contacts database, reformat it, and then pass the new data to the graphics software to display on the screen. Or data could be copied from a plug-in networking component into the contacts database
  • - Now consider what happens when a piece of software receives more data than it expects. Imagine if software has set aside 256 bytes of memory (in a so-called “buffer”) to receive information from a networking component, but the networking component actually pumps in 300 bytes. What happens to the extra 44 bytes? By default, the extra bytes get placed into whatever memory location lies next to the original buffer, overwriting the previous contents. This kind of issue arises so often in software that it has its own name: “buffer overflow” (or “buffer overrun”)
  • - The outcome of a buffer overflow depends on the meaning given by the software to the data in the adjacent piece of memory. In essence, this data can sometimes be interpreted as a new set of software instructions to be executed. In this case, the buffer overflow can result in program control passing sooner or later to an alien piece of software. Usually, the alien software won’t make much sense, and the system will lock up fairly soon afterwards. In maliciously engineered cases, however, this alien software has been specially crafted by an ill-intentioned writer – and that’s how malware seizes control of the device, via a so-called “backdoor” or “side-window”.

This sets the scene for a short historical note. The 16-bit precursor to Symbian OS was a software system known as EPOC, used in a succession of popular 1990s handheld computing devices such as the Psion Series 3. The development of EPOC was often held up for days as my colleagues and I tried to diagnose various system lockups. Over the course of many all-night debugging sessions, we gained an intense appreciation of the significance of buffer overflows as the root causes of many of these tiresome bug hunts. Colly Myers, who would later become Symbian’s first CEO, made the bold determination that Symbian OS would not suffer from the same problem. As Colly defined the fundamental building blocks of Symbian OS (then known as “EPOC32”) during the fourth quarter of 1994, he gave special attention to the low-level software to be used for storing and copying text. He had two main objectives in mind:

  • - Efficient memory usage – in contrast to the alternative class libraries that Colly considered (which he found on the fledgling Internet) which frequently made profligate use of memory and/or CPU cycles when storing or manipulating text
  • - Robustness and security – to eliminate the insidious consequences of buffer overflows, by terminating application execution immediately if any software tried to copy data beyond the end of a buffer. So there’s no scope for alien software to take control of the phone – and debugging tools can identify the root causes of system lockups much more quickly

The outcome was what is called the Symbian “descriptor” class hierarchy. Generations of software engineers learning Symbian OS have suffered a culture shock when encountering descriptors for the first time: they’re very different from how text is handled in other operating systems or class libraries.

The designers of other smartphone operating systems have been aware of the drawbacks of buffer overflows, but they lacked the courage (or the ability) to impose a systematic low-level solution akin to Symbian’s descriptors. For these designers, it was a higher priority to provide a programming system that was similar to what people were already accustomed to using. In effect, they took the view that security problems could be patched individually, as and when they were discovered. However, given the millions of lines of code that exist in modern computing systems, this outcome is far from satisfactory.

Symbian’s adoption of descriptors is but one example of what is called a “defensive” approach to software: each software component has to be ready to deal with malformed data passed to it by other components. It cannot take it for granted that the data conforms to the expected structure. This attitude is reinforced by various development tools and the general development culture in the Symbian ecosystem. As a result, I’m pleased to report that there are (as yet) no known cases of “backdoor” or “side-window” security flaws in Symbian OS. Unlike with other operating systems, malware cannot exploit buffer overflows or similar programming bugs to install itself onto a Symbian smartphone and cause damage. Instead, the only known route for malware onto a Symbian smartphone is via the “front door” – the installation dialog which requires the user’s consent to add new software into the smartphone.

The key thing about the installation dialog is that the user is warned when an application comes from an untrusted source. Even if the application tells the user that it is (for example) a “software update from Symbian” or an “important piece of news from your company IT department”, the phone itself will know better, and will make this fact clear to the user. The common sense rule that people need to follow is: don’t install software that you don’t trust. Consider the following analogy. If a complete stranger comes up to you in a pub and asks you if he can borrow your phone to take it away for thirty minutes, to install some extra software on it, would you hand over your phone? Or how about handing over your wallet? Would you expect to see it back? In such a case, before handing anything over, you would need to be mighty sure that the stranger had proper ID, and that you could trust him. Well it’s the same with allowing unknown software onto your phone. Users have to learn only to install software from trusted sources.

Analysts and commentators sometimes get over-excited about so-called “Bluetooth viruses” or “MMS viruses”. Readers are left with the (false!) impression that, merely by having Bluetooth turned on in their smartphone, or merely by accepting an MMS message, they are vulnerable to their phones being hijacked. If there were side-window security problems with Symbian OS, there might be a reason to worry. However, any malware that arrives on your phone via Bluetooth or MMS – or indeed via any other route – remains impotent unless it manages to persuade the user to press ‘Yes’ in the front door dialog to install new software, and ‘Yes’ again in the dialog warning the user that the application is untrusted.

Here’s another source of confusion. Just because there are an increasing number of viruses that target Symbian OS, it does not mean that Symbian OS is intrinsically insecure. It just means that:

  • - Symbian OS is running on the majority of advanced, programmable mobile phones
  • - Symbian OS phones therefore present a numerically attractive target for people interested in mobile malware
  • - However, the same common-sense rule stops each and every one of these viruses – namely, users should avoid installing untrusted software

So here are the first three rules for companies wishing to take advantage of the potential for smartphones to boost the effectiveness of their staff:

  • - Ensure that the smartphones are running an operating system that puts a high priority on security
  • - Remind all users about the drawbacks of installing untrusted software
  • - For extra confidence, consider installing a virus scanner on the phone – or activating any that is built-in: this provides a second line of protection

Note that even if one employee misguidedly installs a malicious piece of software, there’s very little risk of this spreading throughout the company. Unlike the case with networked desktop computers, malware cannot leap across from one smartphone to another, without the active assistance of human users.

The fourth rule is that companies should pay at least as much attention to the “device management” aspects of smartphone deployment as they do to protection against malware. As described on the partnering pages of Symbian’s website, a range of third party companies already provide comprehensive advice and solutions. These solutions include:

  • - “Remote wipe” – whereby the data on a smartphone can be removed from it, using OTA (over-the-air) wireless instructions, in case the smartphone becomes lost or stolen
  • - “Remote maintenance” – whereby problems being experienced by smartphone users can be diagnosed OTA using remote viewers and, if necessary, solved using OTA software patches

The fifth and final rule arises from the observation that companies will have to invest considerable energy and resources to ensure that their adoption of smartphones goes well, and can deliver good results on a sustained basis. The good news is that the payback has the potential to become larger and larger, over time – provided the investment is done in a way that:

  • - Maximises the freedom of choice of devices, user interfaces, and applications
  • - Is ready to adapt to the inevitable surprise new trends in technology and business practice.

Symbian OS fares admirably on both these criteria – supporting a wide variety of different devices, all using the same software platform, and with a healthy and active roadmap of forthcoming new features.

In closing, this brings me back to the topic of the significant incremental improvements made to the security system in v9 of Symbian OS. These improvements – known as “Platform Security” – address the only residual point of vulnerability with pre-v9 phones, which is none other than the end user of the phone. As mentioned, users sometimes install software which ends up misbehaving on the phone. But from v9 onwards, all add-on software is checked at run-time before it is allowed to use any sensitive smartphone functionality. The application is allowed to use this functionality, only if it has been verified as trusted for that functionality. Here, “sensitive” functionality includes:

  • - Anything that will cause the user to incur a phone bill
  • - Access to contacts information, call log information, agenda information, or location information
  • - Access to any data files created by another application

It’s as if you let someone into your house, through the front door, having checked that he is a certified plumber. He would be allowed to access the waterworks of the house, but if he slyly tries to take a look in your jewellery box, or in your bedside diary, the operating system of the house would prevent it (unless he also happens, for example, to be an authorised jeweller). That’s how Platform Security protects mobile phones. And the real beauty is that users don’t need to understand any of the details of what’s happening: the security works despite what users do.


Note: for more details of Symbian OS Platform Security, please refer to the Symbian Press book with that title, authored by Craig Heath.

You can find more of David Wood's illuminating Insights on Symbian's Web site: http://www.symbian.com/symbianos/insight/

An Art With A New Life Form - With Digital Music And MP3s!

Music that gentlier on the spirit lies than tired eyelids upon tired eyes


The act of finding a recluse with your inner-self listening away to the tunes of your favorite maestro has evolved from the archaic vinyl record album to the compact disc and finally the ubiquitous iPods and mp3 players of today. Music is the opium of the listeners state of mind, thus the same tune could possibly be felt in a million different awe-inspiring ways to represent minds momentary fusion of the ambience. With the advent of digital music and effervescent mode of internet distribution, the mp3 players and the iPods have given us this freedom of choice - free from the constraints of listening to what the music industry chooses to limit within the bounds of the magnetic/optico-magnetic media. Its been a fascinating metamorphosis.

The mechanism of how people listen to music has evolved over the generations with the prevailing discoveries in the technology. In 1978, Sony introduced the portable, easy-to-carry along reliable Walkman, making it a hot-favorite trendy gadget for the younger people. CDs and CD players became a reality in 1983, with the advent of the capability of reading small discs by laser beams. Never before had the music aficionado access to such clarity and distortion-free listening experience.

The rapid adoption rate of CDs caused the disappearance of LPs and vinyl single records from the industry. The introduction of iPod and similar mp3 players in November 2001 revolutionized the archetypal distribution of digital music for the millions of music lovers. With the new audio compression technology and widespread acceptance of the world-wide-web, mp3 or WMA files could be created and archived in the virtual world, without the fear of wearing out a cassette or scratching a CD.

As these hi-tech gadgets have evolved over the years, you could carry along 100s of CDs worth of music in a device slightly bigger than a deck of cards. According to the Recording Industry Association of America, CD sales fell 22.3 percent by January 2003, and internet music-downloading services such as Apples iTunes are expected to have 23 percent of the market by 2008. In October 2004, Apple announced that consumers had so far purchased 150 million songs from iTunes and the company sells about 4 million songs every week.

The advent of online music has been the music lovers boon, but has caused a serious disruption of art-form in the creation of cover art and liner notes for the music industry. The popular art-form of composing an album is probably losing ground as individuals may pick and choose the songs to download and play from the internet.

Another significant devious impact of online digital music has been the explosion of illegal distribution of music resulting in loss of royalties for the musicians. If we, the music lovers, can join hands to protect the interests of the artists, digital music has caused the first sprout of music in an organic life-form, freeing this wonderful work of art from the bounds of human control!

Abstract Shapes

Abstract shapes can be used on wallpapers, logos, pretty much anything you'd like. Making abstract shapes aren't all that hard either. Here's a few methods for creating some quick and easy abstract shapes!

STEP ONE
Using the Rectangle Tool, draw out a rectangle, any size you'd like.

image 1

STEP TWO
Go to Effect > Distort & Transform > Pucker & Bloat. Make sure the Preview option is checked off so you can see what your settings will do. Drag the handle to change the percentage up or down. Notice that your shape begins to morph into something new! This is the result I got at 90 percent:

image 2

Here's what I got at 200 percent:

image 3

It's a very quick and easy way to make some pretty cool abstract shapes. You can make some nice logos using this method as well.

STEP THREE
Now let's take a step further. Click anywhere in the white space so that the shape is not selected. Using the Direct Selection Tool (the white arrow), click on one of the corners. For example, I clicked on the top right corner and then dragged outward. Here's what I got:

image 4

Here's another way of doing it. Go to Edit > Undo to go back to our previous step. Using the Selection Tool (the black arrow) click on the shape to select it. Now go to Object > Expand Appearance. You should see the following:

image 5

This provides you more options to manipulate the shape since there are more nodes available to use. So again using the Direct Selection Tool (the white arrow), grab some nodes and play around with the shape. The possibilities are endless with creating abstract shapes! Enjoy!

3D Spikes

1. Begin with a new file, 300x300, and with a transparent background. Now set your foreground color to black, then take the Paint Bucket Tool and fill your canvas with your foreground color.

2. Then take the Elliptical Marquee Tool and create a white circle.

3. Now go to Filter>Stylize>Extrude, and make this settings.

4. Then press Ctrl+U, and make this settings.

And that's it you're done! This is what I came up with.

3D Spikes Tutorial: Final Result

20 December 2007

Functions

The real power of PHP comes from its functions.
In PHP - there are more than 700 built-in functions available.

PHP Functions

In this tutorial we will show you how to create your own functions.
For a reference and examples of the built-in functions, please visit our
PHP Reference.

Create a PHP Function

A function is a block of code that can be executed whenever we need it.
Creating PHP functions:

  • All functions start with the word "function()"
  • Name the function - It should be possible to understand what the
    function does by its name. The name can start with a letter or
    underscore (not a number)
  • Add a "{" - The function code starts after the opening
    curly brace
  • Insert the function code
  • Add a "}" - The function is finished by a closing curly brace
Example
A simple function that writes my name when it is called:
<html>
<body>
<?php
function writeMyName()
{
echo "Kai Jim Refsnes";
}
writeMyName();
?>
</body>
</html>

Use a PHP Function
Now we will use the function in a PHP script:
<html>
<body>
<?php
function writeMyName()
{
echo "Kai Jim Refsnes";
}
echo "Hello world!<br />";
echo "My name is ";
writeMyName();
echo ".<br />That's right, ";
writeMyName();
echo " is my name.";
?>
</body>
</html>

The output of the code above will be:


Hello world!
My name is Kai Jim Refsnes.
That's right, Kai Jim Refsnes is my name.

PHP Functions - Adding parameters

Our first function (writeMyName()) is a very simple function. It only writes a
static string.
To add more functionality to a function, we can add parameters. A parameter is just like a variable.
You may have noticed the parentheses after the function name,
like: writeMyName(). The parameters are specified inside the parentheses.

Example 1
The following example will write different first names, but the same last
name:
<html>
<body>
<?php
function writeMyName($fname)
{
echo $fname . " Refsnes.<br />";
}
echo "My name is ";
writeMyName("Kai Jim");
echo "My name is ";
writeMyName("Hege");
echo "My name is ";
writeMyName("Stale");
?>
</body>
</html>

The output of the code above will be:


My name is Kai Jim Refsnes.
My name is Hege Refsnes.
My name is Stale Refsnes.

Example 2
The following function has two parameters:
<html>
<body>
<?php
function writeMyName($fname,$punctuation)
{
echo $fname . " Refsnes" . $punctuation . "<br />";
}
echo "My name is ";
writeMyName("Kai Jim",".");
echo "My name is ";
writeMyName("Hege","!");
echo "My name is ";
writeMyName("Ståle","...");
?>
</body>

</html>

The output of the code above will be:



My name is Kai Jim Refsnes.
My name is Hege Refsnes!
My name is Ståle Refsnes...

PHP Functions - Return values
Functions can also be used to return values.

Example

<html>
<body>
<?php
function add($x,$y)
{
$total = $x + $y;
return $total;
}
echo "1 + 16 = " . add(1,16);
?>
</body>
</html>

The output of the code above will be:




1 + 16 = 17

19 December 2007

Zoom Effect

Step 1
Open up a new document, I used 400 by 400, but a good background is between 800x600 and 1024x768. It's up to you.

Step 2
Make sure your colors are reset by pressing D on your keyboard. Go to Filter>Render>Clouds. Now go to Filter>Render>Difference Clouds. You should have an image now that looks similar to this:

image 1

Step 3
Now we're going to create some lines to morph into the zoom effect. Go to Filter>Pixelate>Mezzotint, click on the drop down box and select Short Lines. Your image should now look similar to the following:

image 2

Step 4
Now we're going to actually make the nice looking zoom effect. Go to Filter>Blur>Radial Blur. Use these settings:

Amount: 100
Blur Method: Zoom
Quality: Best

Now hit Ctrl+F on your keyboard to repeat this step to smooth it out. Your image will now look like:

image 3

Step 5
Now we're going to make some twirls to make it look more complicated. Duplicate your layer and go to Filter>Distort>Twirl. Use 200 as the amount. Next, duplicate the bottom layer and use Filter>Distort>Twirl again but using -200 as the amount. Set both of these layer modes to Lighten:

image 4

Step 6
It looks quite boring, so we're going to add some color. On your top layer hit Ctrl+U on your keyboard to bring up the colorize box. Hit the checkmark next to Colorize and mess around with the settings.

Step 7
Repeat step 6 on your other two layers using different shades of the same color with a little variation. You can mess around with different colors and see what you like best. You now have a nice zoom effect for a background.

Step 8
This step is optional, go to Filter>Render>Lens Flare and add a 35mm Prime lens flare in the middle of your image. Add some text if you’d like and you’re done. Here’s my final image:

Zoom Effect Tutorial: Final Result

Snake Skin

Snake Skin Tutorial: Final Result

Create a new document with black background. Go to Filter > Render> Lens Flare.

image 2

Then Filter > Distort > Glass

image 3

Now to Filter > Distort > Polar coordinates (polar to rectangular).

image 4

Copy layer (Ctrl+C, Ctrl+V) and transform it Edit > Transform > Flip vertical. Change layers Blending Mode to difference.

Click to enlarge

You can colorize layers (Ctrl+U) for more interesting result.

Tornado Orb

This tutorial will teach you how to create a tornado orb effect using a few simple filters and some brushing.

1. Open a new canvas. I used 300 x 300 pixels.

2. Click Filter > Render > Clouds.

3. Then click Filter > Artistic > Plastic wrap and use any settings you want. Just experiment and see what looks best.

4. Then click Filter > Distort > Polar Coordinates and change the setting to 33%.

5. You will now have that unusual orb. There will be a big line down the middle. To remove it, just use the smudge tool.

6. I changed the hue / saturation to a blue colour (Image > Adjustments > Hue/saturation).

This is your final result.

Tornado Orb Tutorial: Final Result

STL Overview

Any programmer developing a moderately complicated system soon realizes that efficient coding requires the use of fundamental data structures like lists, queues and stacks as well as algorithms to process the data stored in these data structures.

Most Java programmers would be familiar with various implementations of these data structures in the util package. Until 1994, C++ did not have, as a part of its standard library, support for such data structures. This implied that any programmer developing software that required the use of such structures either had to build such a library or purchase one being offered commercially.

The former option had risks of increased development time and costs associated with it. Reducing such risks meant customizing the library to the application for which it was being developed, resulting in its incompatibility with other application that will be developed in the future.

The latter option although reduced the risks associated with the first option but introduced following further risks,

  1. Issues related to potential incompatibility with platforms, development environments and other libraries to which the software has to be linked,
  2. Future costs of upgrades. All programmers are well aware of incremental costs of software upgrades that offer more and/or improved features,
  3. Potential performance and extensibility issues related to the characteristics of implementation. For example, the use of virtual functions in internal objects can not only reduce the performance of the library but also make it difficult to use in a shared memory system. Algorithms in such libraries are usually implemented as class members thereby restricting change.

To overcome these issues, the ANSI (American National Standards Institute) decided to select STL as a standard set of collection classes and algorithms. STL is based on the successful research and development at Hewlett Packard Laboratories in the area of generic programming.

Typical features of STL are as follows,

  1. Efficiency. STL does not use inheritance or virtual functions.
  2. Type safety. The extensive use of C++ templates makes STL type safe.
  3. Consistency. STL container classes use iterators that are generalized pointers to the data contained within the containers. Iterators allow access of data within the containers in a manner similar to C arrays.
  4. Extensibility.
    1. STL algorithms are stand-alone functions that do not access STL containers directly. Rather they operate over the data via the iterators.
    2. STL allows the use of function objects. These are functions that can be encapsulated and associated with data. These can be created, stored and destroyed like objects.
    3. STL memory management does not explicitly use new and delete operators. STL containers use special allocator objects to allocate and deallocate storage. If an application requires different memory allocation and deallocation policies, these can be implemented using specialised allocator objects. These allocators can then replace the standard allocators in the containers to provide custom memory management. This article will, however, only consider the use of standard allocators.

STL Containers

STL containers are classes whose objects can be used to build collections of data of same type. For example, objects of vector and list classes are used to build a one dimensional collection of data (although two dimensional collections are possible as lists of lists), maps are used to build lookup tables and sets provide a unique collection of data (i.e., each data element exists only once).

STL containers can be divided into the following three categories,

  1. Sequential containers. These containers arrange the data they contain in a linear manner.
  2. Associative containers. These containers maintain data in structures suitable for fast associative look-up.
  3. Adapters. These provide different but more appropriate interfaces to containers belonging to the above-mentioned categories.
  4. Specific containers belonging to each category are listed in the following table.

    Category

    Containers

    Characteristics

    Sequential

    vector

    Provides a linear and contiguous storage (similar to an array) that allows fast inserts at the end only.

    list

    It is an implementation of a doubly linked list that allows fast inserts anywhere.

    deque

    Provides a linear but non-contiguous storage that allows fast inserts at extremities.

    Associative

    multiset

    It is an implementation of set where duplicates are allowed and provides fast associative lookup.

    set

    It is an implementation of set where no duplicates are allowed and provides fast associative lookup.

    multimap

    It is an implementation of a key to value mapping structure where a single key can be mapped to many values (1 to many mappings).

    map

    It is an implementation of a key to value mapping structure where a single key can only be mapped to one value (1 to 1 mapping).

    Adapter

    stack

    It is an implementation of a first in last out data structure.

    queue

    It is an implementation of a first in first out data structure.

    priority_queue

    A queue that maintains items in a sorted order

The coming sections will discuss using vectors, lists, sets, maps, stacks and queues in programs. The remaining containers have APIs similar to other containers in their categories.