The United States set a March deadline on Thursday for Iran to start
cooperating in substance with a U.N. nuclear agency investigation,
warning Tehran the issue may otherwise be referred to the U.N. Security
Council.
The comments by U.S. diplomat Robert Wood to the board of the
International Atomic Energy Agency signaled Washington's growing
frustration at a lack of progress in the IAEA's inquiry into possible
military dimensions to Tehran's nuclear program.
Iran - which was first reported to the U.N. Security Council over its
nuclear program by the IAEA's 35-nation board in 2006 and then was hit
by U.N. sanctions - rejects suspicions it is on a covert quest for
atomic bomb capability.
But its refusal to curb nuclear work with both civilian and military
applications, and its lack of openness with the IAEA, have drawn tough
Western punitive measures and a threat of pre-emptive military strikes
by Israel.
A year ago, the IAEA published a report with a trove of intelligence
indicating past, and some possibly continuing, research in Iran that
could be relevant for nuclear weapons.
The IAEA has since tried to gain access to Iranian sites, officials and
documents it says it needs for the inquiry, but so far without any
concrete results in a series of meetings with Iran since January. The
two sides will meet again in December.
In his statement, Wood requested IAEA Director-General Yukiya Amano to
say in his next quarterly report on Iran, likely due in late February,
whether Tehran has taken "any substantive steps" to address the agency's
concerns.
"If by March Iran has not begun substantive cooperation with the IAEA,
the United States will work with other board members to pursue
appropriate board action, and would urge the board to consider reporting
this lack of progress to the U.N. Security Council," Wood said,
according to a copy of his statement.
"Iran cannot be allowed to indefinitely ignore its obligations ... Iran must act now, in substance," Wood said.
Amano earlier told the board that there had been no progress in his
agency's year-long push to clarify concerns about suspected atom bomb
research in Iran, but said he would continue his efforts.
EU SEES IRANIAN "PROCRASTINATION"
A simple majority in the IAEA board would be required to refer an issue
to the U.N. Security Council, which has imposed four sanctions
resolutions on Iran since 2006.
It is unclear whether Russia and China - which have criticized
unilateral Western sanctions on Iran - would back any U.S. initiative to
report Iran again to the Security Council.
Wood later told reporters he hoped the December talks between the IAEA
and Iran would be fruitful. But, he added, "I have my doubts about the
sincerity of Iran."
The 27-nation European Union told the board that Iran's
"procrastination" was unacceptable. "Iran must act now, in a substantive
way, to address the serious and continuing international concerns on
its nuclear program," it said.
Iran's ambassador to the IAEA, Ali Asghar Soltanieh, criticised what he
called "political noise" and "pressure" from the United States and the
EU.
Diplomacy between Iran and the powers - the United States, China,
Russia, France, Germany, and Britain - has been deadlocked since a June
meeting that ended without success.
Both sides now say they want to resume talks soon, after the re-election
of U.S. President Barack Obama, and diplomats expect a new meeting in
Istanbul in December or January.
Iran is ready for a "face-saving" negotiated solution to the nuclear
dispute, but the West must accept the reality that Tehran would never
suspend uranium enrichment, Soltanieh said.
Refined uranium can be used to fuel nuclear energy plants, Iran's stated
aim, and also provide bomb material if processed further, which the
West suspects is Iran's ultimate aim.
The West wants Iran to suspend enrichment, but Iran is showing no sign of backing down.
Iran "has provocatively snubbed the international community by expanding
its enrichment capacity in defiance of multiple United Nations Security
Council resolutions," Wood said.
(Editing by Mark Heinrich)
(Source : dailymirror
Pages
Wednesday, April 10, 2013
N. Korea urges foreigners in South to evacuate
SOUTH KOREA: North Korea said Tuesday the Korean peninsula was headed
for “thermo-nuclear” war and advised foreigners in South Korea to
consider evacuation, in the latest in a series of apocalyptic threats.
The warning followed a similar evacuation advisory the North gave Friday to foreign embassies in its capital Pyongyang, saying it could not ensure the safety of their personnel if a conflict broke out. “The situation on the Korean Peninsula is inching close to a thermonuclear war,” the North's Asia-Pacific Peace Committee said in a statement carried by the North's official Korean Central News Agency.
Saying it did not want to see foreigners in South Korea “fall victim”, the statement requested all foreign institutions, enterprises and tourists “to take measures for shelter and evacuation in advance for their safety”.
The “thermo-nuclear war” threat has been wielded several times in recent months -- most recently on March 7 -- despite expert opinion that North Korea is nowhere near developing such an advanced nuclear device. Last week's warning to embassies was also largely dismissed as anxiety-stirring rhetoric, with most governments involved making it clear they had no plans to withdraw personnel from their Pyongyang missions.
Tuesday's statement said the risk of nuclear conflict was being heightened daily by the “warmongering US” and its South Korean “puppets” who were intent on invading the North.
Earlier Tuesday, North Korean workers followed Pyongyang's order to boycott the Kaesong joint industrial zone with South Korea, signalling the possible demise of the sole surviving symbol of cross-border reconciliation.
The warning followed a similar evacuation advisory the North gave Friday to foreign embassies in its capital Pyongyang, saying it could not ensure the safety of their personnel if a conflict broke out. “The situation on the Korean Peninsula is inching close to a thermonuclear war,” the North's Asia-Pacific Peace Committee said in a statement carried by the North's official Korean Central News Agency.
Saying it did not want to see foreigners in South Korea “fall victim”, the statement requested all foreign institutions, enterprises and tourists “to take measures for shelter and evacuation in advance for their safety”.
The “thermo-nuclear war” threat has been wielded several times in recent months -- most recently on March 7 -- despite expert opinion that North Korea is nowhere near developing such an advanced nuclear device. Last week's warning to embassies was also largely dismissed as anxiety-stirring rhetoric, with most governments involved making it clear they had no plans to withdraw personnel from their Pyongyang missions.
Tuesday's statement said the risk of nuclear conflict was being heightened daily by the “warmongering US” and its South Korean “puppets” who were intent on invading the North.
Earlier Tuesday, North Korean workers followed Pyongyang's order to boycott the Kaesong joint industrial zone with South Korea, signalling the possible demise of the sole surviving symbol of cross-border reconciliation.
Sunday, April 7, 2013
Let us start business activities with the help of supporting services
Following is a part of a dialogue between Dhanapala, a successful entrepreneur, and Akila who is wishing to start a small business.
Akila : Good morning Dhanapala Mudalali ! I too am waiting to start a small business.
Mudalali : How good ! So what type of a business are you going to start?
Akila : I recently found a method of producing low cost bricks with greater strength.
Mudalali : Very good ! How can I help you?
Akila : I have some problems to solve.
Mudalali : What are those problems?
Akila : The big problem to me is I have only a small amount of savings but I need some more money..........
Mudalali : Ah......Banks are there for that. You can borrow money from banks. Not only that, you can
get many other facilities too from banks.
Akila : What are they?
Mudalali : How many new methods are there to protect your money and facilitate your transactions?
I think it's better to go to a bank and get more information from them.
Akila : Oh yes. Even if we start a business investing a large amount of money, we have to face
numerous risks.
Mudalali : There are a lot of insurance schemes for that. So you don't have to be afraid to start a business.
Akila : But I don’t have even a vehicle to transport materials and to distribute bricks, for myself. 68 For
free distribution
Mudalali : Do we need our own vehicles to do a business? Now there are various types of vehicles to use
for any purpose and you can buy a vehicle when your business is progressing.
Akila : Then how can I give information to others about my business?
Mudalali : There are a lot of methods for that. We can give publicity by way of notices and even
through customers. And also it will be easier if you buy a telephone.
Akila : That’s fine. I have another problem.
Mudalali : What’s that?
Akila : I want to distribute the bricks on time. Therefore, I need a system to store them.
Mudalali : Yes, to do the business properly you need a proper and safe place to store your products.
Akila : Yes, I have suitable space for it.
Mudalali : Now all your problems are solved, aren't they Akila?
Akila : Yes, Now I understand that all these services help us to do a business properly.
According to the above dialogue, you would be able to understand the importance of various supporting services when starting and carrying on a business. Let’s examine more about these supporting services
Introduction
It needs the help of various services to start and carry on a business successfully. Those services are called supporting services or auxiliary services. Banks and financial institutions provide various services to facilitate the business transactions and insurance helps to mitigate business risks. The transportation helps to produce
and distribute the goods and services effectively and communication is important to exchange the information with other parties. The warehousing is another service which helps to produce continuosly and to distribute them on time.
After studing this chapter you will be able to understand the following terms
_Banking activities _ Electronic money
_ Commercial banks _ Non banking institutions
_ Current accounts _ Insurance and assurance
_ Cheques _ Communication
_ Savings deposits _ Transportation
_ Term deposits/ Fixed deposits _ Warehousing
_ Commercial bank loans
Akila : Good morning Dhanapala Mudalali ! I too am waiting to start a small business.
Mudalali : How good ! So what type of a business are you going to start?
Akila : I recently found a method of producing low cost bricks with greater strength.
Mudalali : Very good ! How can I help you?
Akila : I have some problems to solve.
Mudalali : What are those problems?
Akila : The big problem to me is I have only a small amount of savings but I need some more money..........
Mudalali : Ah......Banks are there for that. You can borrow money from banks. Not only that, you can
get many other facilities too from banks.
Akila : What are they?
Mudalali : How many new methods are there to protect your money and facilitate your transactions?
I think it's better to go to a bank and get more information from them.
Akila : Oh yes. Even if we start a business investing a large amount of money, we have to face
numerous risks.
Mudalali : There are a lot of insurance schemes for that. So you don't have to be afraid to start a business.
Akila : But I don’t have even a vehicle to transport materials and to distribute bricks, for myself. 68 For
free distribution
Mudalali : Do we need our own vehicles to do a business? Now there are various types of vehicles to use
for any purpose and you can buy a vehicle when your business is progressing.
Akila : Then how can I give information to others about my business?
Mudalali : There are a lot of methods for that. We can give publicity by way of notices and even
through customers. And also it will be easier if you buy a telephone.
Akila : That’s fine. I have another problem.
Mudalali : What’s that?
Akila : I want to distribute the bricks on time. Therefore, I need a system to store them.
Mudalali : Yes, to do the business properly you need a proper and safe place to store your products.
Akila : Yes, I have suitable space for it.
Mudalali : Now all your problems are solved, aren't they Akila?
Akila : Yes, Now I understand that all these services help us to do a business properly.
According to the above dialogue, you would be able to understand the importance of various supporting services when starting and carrying on a business. Let’s examine more about these supporting services
Introduction
It needs the help of various services to start and carry on a business successfully. Those services are called supporting services or auxiliary services. Banks and financial institutions provide various services to facilitate the business transactions and insurance helps to mitigate business risks. The transportation helps to produce
and distribute the goods and services effectively and communication is important to exchange the information with other parties. The warehousing is another service which helps to produce continuosly and to distribute them on time.
After studing this chapter you will be able to understand the following terms
_Banking activities _ Electronic money
_ Commercial banks _ Non banking institutions
_ Current accounts _ Insurance and assurance
_ Cheques _ Communication
_ Savings deposits _ Transportation
_ Term deposits/ Fixed deposits _ Warehousing
_ Commercial bank loans
Saturday, March 2, 2013
Programming Language Translation
We have seen in the previous sections that a computer can execute programs written only in a machine code. Therefore a programme written in any other language has to be translated into machine code by using appropriate language translation software to execute it on the computer. The process of converting a program from one language to another is termed Language Translation. There are three techniques for
language translation:
(1) Assemblers
(2) Compilers
(3) Interpreters
1 Assemblers
Assemblers translate assembly language into machine language which can be
recognized by the computer.
2. Compilers
Compilers translate all the commands in a program to an object code which can be understand by the computer. Once a program is compiled, it can be executed by the machine. C and FORTRAN are two
examples of compiler based programming languages.
When compiling programs, the original program used for the compilation is called the Source Code Program and the resulting program produced by the compiler is called the Object Code Program. The main process what the compiler does is to translate Source Code Program into Object Code Program. During the compilation process, the compiler also checks whether the source program is free of errors with respect to the grammar of the programming language. If the compiler detects errors, error messages are produced and the compilation process terminates without producing the object code. Then the user must compile the program again after correcting the detected errors. The user may have to follow this procedure repeatedly until the program is free of errors. Errors found in a program are called ‘Bugs’ and the process of
eliminating bugs from a program is called Debugging.
3. Interpreters
Unlike compilers, interpreters do not translate the entire program into machine code at once. Instead, an interpreter does the translation at the moment the program is run, one line at a time. As a result, the lines of the program have to be translated into machine code each time the program is run. Therefore, the time taken
to run a program of this type is typically greater than the time taken to run a similar program that has been compiled. ‘VB’ and ‘Python’ are examples of such languages.
language translation:
(1) Assemblers
(2) Compilers
(3) Interpreters
1 Assemblers
Assemblers translate assembly language into machine language which can be
recognized by the computer.
2. Compilers
Compilers translate all the commands in a program to an object code which can be understand by the computer. Once a program is compiled, it can be executed by the machine. C and FORTRAN are two
examples of compiler based programming languages.
When compiling programs, the original program used for the compilation is called the Source Code Program and the resulting program produced by the compiler is called the Object Code Program. The main process what the compiler does is to translate Source Code Program into Object Code Program. During the compilation process, the compiler also checks whether the source program is free of errors with respect to the grammar of the programming language. If the compiler detects errors, error messages are produced and the compilation process terminates without producing the object code. Then the user must compile the program again after correcting the detected errors. The user may have to follow this procedure repeatedly until the program is free of errors. Errors found in a program are called ‘Bugs’ and the process of
eliminating bugs from a program is called Debugging.
3. Interpreters
Unlike compilers, interpreters do not translate the entire program into machine code at once. Instead, an interpreter does the translation at the moment the program is run, one line at a time. As a result, the lines of the program have to be translated into machine code each time the program is run. Therefore, the time taken
to run a program of this type is typically greater than the time taken to run a similar program that has been compiled. ‘VB’ and ‘Python’ are examples of such languages.
Evolution of Programming Languages
All programming languages developed from the inception can be classified into four classes based on the nature of their commands.
1' First Generation Programming Languages
(Machine Languages)
2' Second Generation Programming Languages
(Assembly Languages)
3' Third Generation Programming Languages
(High Level Languages)
4' Fourth Generation Programming Languages
(Artificial Languages)
One of the key features apparent in the evolution of programming languages is that the programming languages have become easily understandable and usable over the years.
First Generation Programming Languages
All machine languages fall into this category.
Common Properties of these languages:
These languages were developed primarily to alleviate the problem of using
only the binary symbols 0 and 1 to develop programs.
Common Properties of these languages:
Third Generation Programming Languages
Programming languages such as C and VB belong to this type.
Common Properties of these languages:
appropriate language translation software.
Fourth Generation Programming Languages
Fourth Generation Programming Languages provide Visual Environment
making it easy for the user to write computer programs.
Common Properties of these languages:
1' First Generation Programming Languages
(Machine Languages)
2' Second Generation Programming Languages
(Assembly Languages)
3' Third Generation Programming Languages
(High Level Languages)
4' Fourth Generation Programming Languages
(Artificial Languages)
One of the key features apparent in the evolution of programming languages is that the programming languages have become easily understandable and usable over the years.
First Generation Programming Languages
All machine languages fall into this category.
Common Properties of these languages:
- All commands are based on the binary code symbols 0 and 1.
- Coding programs and programming computers are extremely difficult.
- Depend on the machine type. Therefore, a program coded for one processor type may not run on a machine with a different processor type.
- Programmer should have a comprehensive knowledge about the hardware of the intended computer system.
These languages were developed primarily to alleviate the problem of using
only the binary symbols 0 and 1 to develop programs.
Common Properties of these languages:
- Commands are represented by symbolic names such as ‘ADD’,SUB’.
- Ability to use symbolic names to store data at memory locations and to retrieve data from memory by using these symbolic names.
- Ability to debug programs easier than programs in machine code.
- Depend on the machine type.
- Need for Programmer to have comprehensive knowledge of hardware of the intended computer system.
Third Generation Programming Languages
Programming languages such as C and VB belong to this type.
Common Properties of these languages:
- Based on languages close to humans such as English .
- Do not depend on the machine.
- Programs can be developed and debugged easily.
appropriate language translation software.
Fourth Generation Programming Languages
Fourth Generation Programming Languages provide Visual Environment
making it easy for the user to write computer programs.
Common Properties of these languages:
- Close to human languages such as English.
- Ability to learn the languages within a short period.
- Ability to accomplish a task by using a smaller number of commands relative to Third Generation Programming Languages.
Tuesday, February 5, 2013
Mobile Processor Packaging
The heat that processors generate has been a concern since the
first computer chips were released. In desktop systems, the heat problem is
addressed to a great extent by computer case manufacturers. Multiple cooling
fans and better internal layout designs can keep air flowing through the system
to cool the processor, which is usually equipped with its own fan and
heatsink.
For developers of portable systems, however, not as much can be
accomplished with the case arrangement. So, it was up to the chip manufacturers
to address the problem in the design and packaging of the chip. Although most
portable systems use special mobile processors designed specifically for mobile
use, some systems use desktop processors for lower cost, at the expense of battery life and heat
generation.
Note
Some manufacturers of portable systems use standard desktop
processors. Apart from a greatly diminished battery life, systems such as these
can sometimes be too hot to touch comfortably. For this reason, before purchasing a portable
system, you should determine whether it uses a mobile or desktop processor and
understand the ramifications of each.
Most mobile processors include a
built-in thermal diode that can be used to monitor CPU temperature. The laptop
systems use this to control fan operation and also for processor performance
control. Utilities are available that can use this sensor to display the
processor temperature information onscreen.
Tape Carrier Packaging
An early solution to the size and heat problems for
processors was the tape carrier package (TCP), a method of packaging processors
for use in portable systems that reduces the size of the chip, its power
consumed, and its heat generated. A Pentium mounted on a motherboard using TCP
is much smaller and lighter than the standard staggered pin grid array (SPGA)
that Pentiums used in desktop systems. The 49mm square of the SPGA is reduced to
29mm in the TCP processor, the thickness is reduced to approximately 1mm, and
the weight is reduced from 55 grams to less than 1 gram.
Instead of using metal pins inserted into a socket on the
motherboard, a TCP processor is essentially a raw die encased in an oversize
piece of polyamide film. The film is similar to photographic film. The die is
attached to the film using a process called tape automated bonding (TAB), the
same process used to connect electrical connections to LCD panels. The film,
called the tape, is laminated with copper foil that is etched to form the leads
that connect the processor to the motherboard. This is similar to the way
electrical connections are photographically etched onto a printed circuit
board.
After the leads are formed, they are plated with gold to allow
bonding to a gold bump on the silicon die and to guard against corrosion. Next,
they are bonded to the processor chip itself, and then the whole package is
coated with a protective polyamide siloxane resin and mounted on a filmstrip
reel for machine assembly. To get a feel for the small size of this processor,
look at Figure 4.1, where it is shown
next to a
standard-size push-pin for comparison.
Figure 4.1. Pentium MMX processor in TCP Mobile
Package. (Photograph used by permission of Intel Corporation.)
Processor Performance Technology - 2
Reducing processor speed and voltage
conserves power and dramatically increases battery life, but it also
significantly reduces processor performance. This means that applications that
require extremely high performance could suffer when in a battery-optimized
mode. Additionally, when the processor speed changes, access to memory is
temporarily blocked. This can cause problems with applications that require
streaming access to memory (such as video playback), resulting in glitches or
dropouts in the display. If you want maximum performance when running under
battery power, you can manually override or disable the performance control
technology.
To disable processor performance-control technology and force
the processor to run at maximum performance, if you are running Windows 9x/Me or
NT/2000, you should use the application supplied by your laptop manufacturer to
disable the technology. If you are using Windows XP, you should select the Always On power scheme, which can be accomplished
using the following steps:
1.
|
Select Start, Control Panel (make sure you're using the
Control Panel classic view).
|
2.
|
Double-click the Power Options tool and select the Power
Schemes tab.
|
3.
|
Under Power Schemes, select the Always On
scheme.
|
As you can see from the previous tables, the Always On power
scheme in Windows XP automatically selects processor policies of None for both
AC and battery power, which means that the processor will be forced to run its
highest performance level at all times.
Caution
If you use the Always On power scheme on a laptop, battery life will be greatly reduced,
and the system might be prone to run extremely hot or even to overheat. If you
find that the system is running too hot when using AC power, you can try
selecting a power scheme such as Minimal Power Management or Portable/Laptop, which uses the Adaptive processor
policy to reduce power under periods of lower demand. For minimum heat
production and maximum battery life, you can try the Presentation or Max Battery
schemes.
Processor Performance Technology
Overall, power consumption is one of the
biggest issues faced when designing mobile processors and systems. Most laptops
are designed to run off battery power when disconnected from an AC power source.
The less power required, the longer the system can run between recharges. In
this case, battery life is not so much how many times you can discharge and
recharge (expressed as the total number of cycles), but how long each cycle
lasts. The less power the system requires, the greater the time you can run off
an existing charge. Conserving power when connected to AC can also be useful for
reducing component temperatures and heat generation in a
laptop.
The Mobile Pentium III/Celeron, Pentium
4, Pentium M, AMD K6-2P, AMD K6-IIIP, AMD K6-III+, AMD Mobile Athlon 4, AMD
Mobile Duron, AMD Mobile Athlon 64, AMD Mobile Sempron, and AMD Turion 64, as
well as the Transmeta processors all feature processor performance-control
technology to allow for longer battery life in mobile operation, as well as
reduced thermal generation when under AC power. Intel calls this technology SpeedStep
(originally code-named Geyserville), AMD calls it PowerNow!, and Transmeta calls it
LongRun. This technology enables these processors to optionally reduce both
speed and voltage when running on batteries. Earlier processors could reduce
speed using SL technology, but by also reducing voltage, the overall power
consumption (and heat production) is significantly reduced as well. More recent
versions of this technology allow modes to be dynamically switched based on
processor demand, not just by whether the system is running on battery or AC power.
Although processor performance-control technology is mainly
designed to work when the laptop is running on battery power, it can also be
used dynamically when under AC power to help reduce CPU temperature and energy
consumption. When the laptop computer is connected to the AC outlet, CPU speed
and voltage are normally at or near their maximum. When powered by a battery,
the processor automatically drops to a lower frequency (by changing ratios, the
bus frequency remains constant) and voltage, thus conserving battery life while
still maintaining a relatively high level of performance. In most cases, the
actual power consumption drops by half, which means about double the battery
life as compared to full power, while reducing speed by only a small amount. For
example, a 3.06GHz Mobile Pentium 4 consumes up to 101.4W at full power (3.06GHz
and 1.55V), whereas in SpeedStep mode, the power consumption drops to only 40.9W
(1.6GHz and 1.2V). This means that although power consumption drops by nearly
60%, the speed drops by only about 48%.
When the system is first powered up, the processor starts in
the lower of its two speeds; that is, it starts in Battery Optimized mode. From
there, BIOS, driver, or operating system instructions can rapidly switch the
processor from mode to mode.
-
A processor that supports SpeedStep/PowerNow!/LongRun technology
-
A supporting motherboard (chipset, BIOS, and voltage regulator)
-
A supporting operating system (Windows 9x/Me, Windows NT/2000/XP)
-
SpeedStep/PowerNow!/LongRun driver (included with XP)
In general, all laptops that came with
processors supporting performance-control technology included all of the other
required support as well. Note that although it is possible to upgrade
processors in many laptops, you generally cannot install a processor supporting
SpeedStep/PowerNow!/LongRun technology into an older system that was originally
equipped with a processor that did not support that technology.
Systems running Windows 9x/Me or NT/2000 require a special
configuration utility or driver to control the processor performance settings.
Because the driver must be configured to the specific laptop motherboard, it is
available only from the manufacturer or vendor of a given system. Typically, the
driver automatically switches processor performance modes when the power source
changes from AC to battery power. Normally, the driver displays an indicator
(usually a small flag) in the notification area or system tray of the Windows
taskbar indicating in which mode the CPU is currently running. The driver also
typically adds a processor performance-control tab to the Power Management tool
in the Control Panel. By clicking on the indicator in the system tray, you can
switch among Maximum Performance, Automatic (dynamically switchable), or Battery
Optimized modes on demand. By using the Control tab added to the Power
Management tool, you can select options allowing you to disable the processor
performance-control technology, add or remove the icon from the taskbar, and enable or disable audio notification when performance
changes.
Windows XP includes native support for processor
performance-control technologies such as SpeedStep, PowerNow!, and LongRun, which means
that manufacturer-supplied drivers are no longer necessary. This native support
also includes an algorithm that dynamically balances system performance and
power consumption, based on the current CPU workload and remaining battery life.
Windows XP uses four specific processor
policies (modes of operation) to control processor performance. The
processor policies used by Windows XP are shown in below table in order of power consumption from highest to
lowest.
Power Scheme
|
Processor Policy (AC Power)
|
Processor Policy (Battery Power)
|
---|---|---|
Always On
|
None
|
None
|
Home/Office Desk
|
None
|
Adaptive
|
Minimal Power Management
|
Adaptive
|
Adaptive
|
Portable/Laptop
|
Adaptive
|
Adaptive
|
Presentation
|
Adaptive
|
Degrade
|
Max Battery
|
Adaptive
|
Degrade
|
Mobile Processor Features
As with most portable system components, the main concern with
mobile processors is reducing their size, power usage, and heat generation. This
allows them to function in the tight confines of a laptop system without
overheating, while allowing the longest possible battery life. Mobile processors
usually differ from desktop processors in packaging and power consumption, and
they can have special features not found in desktop processors. Some of the
special features first debuted in mobile processors are subsequently implemented
in desktop processors as well. Features unique to mobile processors are
discussed in the following sections.
SL Technology
SL technology and SL
architecture are terms that Intel used to describe the first system level
(SL) power-management improvements that were specially designed for mobile
processors and later incorporated into all desktop processors. This technology
was first introduced in the 386SL processor in October 1990 and was the first
mobile-specific PC processor on the market. The 386SL was based on the 386SX
core (16-bit data bus), with added power-management features that Intel then
called SL technology. In November 1992, the 386SL was followed by the 486SL
processor, which was essentially a 486DX with the same SL technology included in
the 386SL. At first, the 486SL was a unique model. However, starting in June
1993, SL technology was available in all desktop 486 processors and all Pentium
processors from 75MHz and faster. Every Intel x86 processor introduced since
then, from the Pentium II through the Pentium 4 and beyond, has incorporated SL
technology.
SL technology consists of a number of processor features that
operate at the system hardware level, independent of the operating system or
application software. SL technology includes the following features:
The most important part of SL technology is System Management Mode (SMM), which can
control and power up/down components without interfering with other system
resources. SMM software executes in a dedicated memory space called System
Management RAM (SMRAM), which is invisible to operating system and applications
software. The CPU enters SMM upon receiving a System Management Interrupt (SMI),
the highest-priority nonmaskable interrupt that the CPU can receive. When an
event generates an SMI (for example, accessing a device that is currently
powered down), the CPU responds by saving the state of the processor to SMRAM.
The CPU then switches into SMM and executes the SMM code (also stored in the
SMRAM). When the SMM task is complete (for example, powering on the device that
was being accessed), the SMI handler executes a Resume (RSM) instruction, which
restores the former state of the processor from the SMRAM.
I/O Restart is one of the SL technology functions used with System
Management Mode. For example, if an application executes an I/O instruction that
tries to access a disk drive that is powered down for battery savings, a System
Management Interrupt occurs, powering up the drive and re-executing the I/O
instruction automatically. This is transparent to the operating system and
application program, allowing the software to run seamlessly.
SL technology also added special clock controls, including Stop
Clock, AutoHALT, and Auto Idle. Stop Clock is an instruction that allows control
over the CPU clock frequency. When Stop Clock is enabled, the internal frequency
of the CPU can be throttled down as low as 0MHz, causing the CPU to consume only
a few milliamps of power. This is also called sleep mode. For further power
reductions, the external clock signal can be removed altogether, lowering power
consumption to the microamp range. This is also called suspend mode.
AutoHALT is an enhancement to the existing HALT instruction and
is related to Stop Clock. When a HALT instruction is executed (which stops the
CPU from executing further instructions), the CPU automatically executes the Stop Clock instruction
and enters sleep mode.
Auto Idle reduces the clock speed of the CPU from normal (clock
multiplied) speed down to the CPU bus speed whenever the processor is idle
during memory or I/O operations. For example, when the processor is executing an
I/O instruction and waiting for the device to respond, the processor speed is
automatically reduced to match the CPU bus speed, resulting in power savings without affecting
overall performance.
Laptop Processors
Certainly, one of the most important parts in any computer is
the central processing unit, or CPU. The CPU can also be referred to as a
microprocessor, or just processor, for short. Several types of processors are
used in portable systems from several different companies. Processors for
portable systems can be the same as those used in desktop systems, but several
processor companies also make special processors specifically optimized for use
in portable systems. They are generally referred to as
mobile processors. This chapter examines
primarily the mobile processors used in laptop/notebook and other portable
systems.
Currently, Intel and AMD both manufacture processors designed for
either desktop or mobile use, and Transmeta makes a series of processors under
the Crusoe and Efficeon names that are exclusively for mobile use. As with
desktop systems, the majority of mobile systems use Intel processors, and
creating chips designed specifically for mobile systems is a major part of
Intel's development effort. Over the years, Intel has introduced many different
processors for mobile use. Intel has focused on mobile processors since the
386SL came out October 1990 and since then has dramatically expanded mobile
processor technology and features. Today the Pentium M processor and the
Centrino mobile platform, which is composed of the Pentium M processor,
motherboard chipset, and support for Wi-FI, have the largest market share in
laptop computers and have gone through several revisions since their initial
introduction in 2003. By comparison, AMD was late in catering specifically to
the mobile processor market. AMD's first major mobile-only processors were
mobile versions of the K6-2 and K6-III released in 1998. In May 2001, AMD
announced a line of mobile Athlon 4 (Palomino) and Duron CPUs. The mobile Athlon
XP came in April 2002, and the mobile XP-M processor was
introduced in March 2003. In 2004 AMD migrated its Athlon 64 desktop processor
to laptop computers and named it the Mobile Athlon 64 processor. Today, AMD has
just introduced its Turion 64 mobile processor, which builds on the Mobile
Athlon 64 processor and is designed to offer similar performance and battery efficiency as Intel's Centrino
platform.
Transmeta has had
some success in small form factor designs, but generally its processors have
failed to keep pace with the mobile offerings from AMD and Intel. Transmeta's
processors can, however, be found in subnotebooks, PDAs, and other portable
devices. Intel more or less outclassed Transmeta's processors by introducing the
Pentium M processor that had similar power consumption and battery efficiency as
Transmeta's processors but offered vastly better performance. Transmeta's
Efficeon processor succeeds the Crusoe and is, like the
Crusoe processor before it, not actually an x86-based processor like Intel's or AMD's.
Instead, it uses a different internal logic, Very Long Instruction Word (VLIW),
and uses a software layer to convert data from x86-instructions into code the
processor can understand.
Tuesday, January 15, 2013
Main components of a Computer 2
Output Devices
The devices used to get the computer processed data and information out are considered here. Many devices can be used here too and given in Figure are someof them.
Central Processing Unit (CPU)
The Central Processing Unit is called the brain of the computer. This consists of three parts:
1. Control Unit (CU)
2. Arithmetic and Logic Unit (ALU)
3. Memory Registers
Control Unit (CU)
All the controlling of the computer is done by this unit. This controls all the devices of the computer giving the required commands when necessary.
Arithmetic and Logic Unit (ALU)
This unit performs all kinds of arithmetic calculations and logical operations.
Memory Registers
The Memory registers are included in the processing unit and it stores the data which are ready to be sent to the Central Processing Unit for calculations or processing.
The devices used to get the computer processed data and information out are considered here. Many devices can be used here too and given in Figure are someof them.
Central Processing Unit (CPU)
The Central Processing Unit is called the brain of the computer. This consists of three parts:
1. Control Unit (CU)
2. Arithmetic and Logic Unit (ALU)
3. Memory Registers
Control Unit (CU)
All the controlling of the computer is done by this unit. This controls all the devices of the computer giving the required commands when necessary.
Arithmetic and Logic Unit (ALU)
This unit performs all kinds of arithmetic calculations and logical operations.
Memory Registers
The Memory registers are included in the processing unit and it stores the data which are ready to be sent to the Central Processing Unit for calculations or processing.
Main components of a Computer
The computer consists of four main parts. Those are;
1. Input Devices
2. Output Devices
3. Central Processing Unit
4. Storage Devices
Input Devices
The devices which are used to input necessary data and information to a computer are called Input Devices. Many devices are used to input data. Given in Figure are some of the commonly used devices.
1. Input Devices
2. Output Devices
3. Central Processing Unit
4. Storage Devices
Input Devices
The devices which are used to input necessary data and information to a computer are called Input Devices. Many devices are used to input data. Given in Figure are some of the commonly used devices.
Basic functions of a Computer
Five basic functions done by the computer can be identified as follows:
1. Input or inserting data and instructions
2. Processing
3. Output or retrieving data or information
4. Storing data or information
5. Controlling of devices and functions
Input or inserting data and instruction
Input can be defined as inserting data and instructions needed for a computer
Processing
The process of converting data inserted to the computer to information as required can be defined as processing.
Output or retrieving data or information
Giving the processed data and information to the external forces is done under output.
Storing data or information
Data and information are stored in a way that they can be reused later as
required. This is done under storing.
Controlling
The functions of a computer system and its various devices should be controlled properly. Under controlling the controlling activities done by computer system are considered.
1. Input or inserting data and instructions
2. Processing
3. Output or retrieving data or information
4. Storing data or information
5. Controlling of devices and functions
Input or inserting data and instruction
Input can be defined as inserting data and instructions needed for a computer
Processing
The process of converting data inserted to the computer to information as required can be defined as processing.
Output or retrieving data or information
Giving the processed data and information to the external forces is done under output.
Storing data or information
Data and information are stored in a way that they can be reused later as
required. This is done under storing.
Controlling
The functions of a computer system and its various devices should be controlled properly. Under controlling the controlling activities done by computer system are considered.
Identifying the Computer
In the previous lesson you were made aware of the ways the computers are used in various means. The computer and its associated hardware are discussed in this article
What is a Computer?
The computer can be defined as an electronic machine which can input and save data and instructions, retrieve and process data which have been saved previously and display the processed data or information on the screen or print them. Accordingly, it can be understood that the computer is an electronic tool which
transforms data into information.
What is a Computer Program?
After studying this lesson, you will gain a clear understanding on:
Ø the main process of the computer
Ø the main parts of the computer
Ø architecture of the computer and its ports
Ø data communication
Ø computer networks
Ø internet
The hardware itself is not sufficient to work with the computer. Computer programes are to be installed in the computer to make it functioning. A computer program is a sequence of instructions written to perform a
specified task for a computer.
Special Features of the Computer
Various machines have been invented by man to transform data into information. Among them, the computer commands a vital role. Many reasons have influenced to gain this important position and given below are some of the main reasons.
Speed
The computer is a machine which operates very fast. A task or calculation which takes a long time to be completed through other means can be completed in a very short period using the computer.
Accuracy
The computer is a machine which operates with a very high rate of accuracy. If there is any error in the operation of the computer, such errors occur due to the errors of the given instructions and data. When preparing a program for the computer, it is a fundamental responsibility of the person who prepares the instructions to ensure the accuracy of it.
Efficiency
As it is a machine a computer which is installed in a suitable environment can be operated in the same speed continuously without any rest for any duration you need. This will not feel monotony, fatigue and loss of concentration as human beings.
Versatility
The ability to engage in a number of tasks is a special feature of the computer. Just after finishing one task, the computer can perform another completely different task with the same efficiency.
Storing and Retrieving
The data and information can be saved in the computer as long as we wish and it can be retrieved instantly when we need them. This is another special feature of a computer.
No intelligence
Intelligent computers have not been created so far and all computers operate according to the commands or programs given by human beings.
No feelings
A computer is just another machine we use. Computers do not get feelings such as isolation, loneliness and exhaustion. Therefore, we can use computers to get our work done as we wish
What is a Computer?
The computer can be defined as an electronic machine which can input and save data and instructions, retrieve and process data which have been saved previously and display the processed data or information on the screen or print them. Accordingly, it can be understood that the computer is an electronic tool which
transforms data into information.
What is a Computer Program?
After studying this lesson, you will gain a clear understanding on:
Ø the main process of the computer
Ø the main parts of the computer
Ø architecture of the computer and its ports
Ø data communication
Ø computer networks
Ø internet
The hardware itself is not sufficient to work with the computer. Computer programes are to be installed in the computer to make it functioning. A computer program is a sequence of instructions written to perform a
specified task for a computer.
Special Features of the Computer
Various machines have been invented by man to transform data into information. Among them, the computer commands a vital role. Many reasons have influenced to gain this important position and given below are some of the main reasons.
Speed
The computer is a machine which operates very fast. A task or calculation which takes a long time to be completed through other means can be completed in a very short period using the computer.
Accuracy
The computer is a machine which operates with a very high rate of accuracy. If there is any error in the operation of the computer, such errors occur due to the errors of the given instructions and data. When preparing a program for the computer, it is a fundamental responsibility of the person who prepares the instructions to ensure the accuracy of it.
Efficiency
As it is a machine a computer which is installed in a suitable environment can be operated in the same speed continuously without any rest for any duration you need. This will not feel monotony, fatigue and loss of concentration as human beings.
Versatility
The ability to engage in a number of tasks is a special feature of the computer. Just after finishing one task, the computer can perform another completely different task with the same efficiency.
Storing and Retrieving
The data and information can be saved in the computer as long as we wish and it can be retrieved instantly when we need them. This is another special feature of a computer.
No intelligence
Intelligent computers have not been created so far and all computers operate according to the commands or programs given by human beings.
No feelings
A computer is just another machine we use. Computers do not get feelings such as isolation, loneliness and exhaustion. Therefore, we can use computers to get our work done as we wish
Monday, January 7, 2013
System Cleaning - 2
3.1 Rear I/O panel of a PC that has gone uncleaned for six months
3.2 Front panel of a PC that has gone uncleaned for six months
Six months without a thorough cleaning has left this system totally clogged with dust and pet hair. The purple LPT port at the upper right is stuffed with dust, as are the USB ports at the left.
The front of the system is no better, as Figure 3-2 shows. Dust and dog hair has collected at every small gap through which air is drawn into the case. And yet, this systemwhich happens to be Robert's den systemdid not appear particularly dirty at first glance. The rear of the system was inaccessible and completely out of view. All of the dust and dog hair shown in Figure 3-2 was also invisible, concealed by a hinged door that closes over the drive bays and power switch area.
Pulling the front bezel from the case reveals the built-in air filter shown in Figure 3-3. At first glance, it doesn't appear too bad. There's some dust accumulation, but the filter appears mostly clear. That's because the filter had accumulated so much dust that when we removed the front bezel the dust fell off in a pile, partially visible at the bottom of Figure 3-3.
3-3. Built-in air filter
Routine vacuuming of the case exterior helps keep the dust
down, but it's not a complete solution. Every few weeks to every few
monthsdepending on how dirty your environment isyou'll need to do a more
thorough job. To begin, vacuum the exterior surfaces of the case, if you haven't
done so already, and if necessary use Windex, Fantastic, Formula 409, or a
similar household cleaning solution to remove grease
and other accumulations from the case exterior.
Although you can get by with just a standard vacuum cleaner and
a brush or two, it's easier to do the job properly if you have the right tools.
Most computer stores sell vacuum attachments intended for use with PCs. These
attachments are small enough to get in all the cracks and crevices, and the
adapter that you use to connect them to your home vacuum is often designed to
cut down the air flow to a level more appropriate for cleaning a PC. (We've used
some vacuum cleaners that we actually feared might suck components off the
motherboard.)
System Cleaning - 1
Dirt is the main enemy of PCs. Dirt blocks air flow, causing the system to run hotter and less reliably. Dirt acts as thermal insulation, causing components to overheat and thereby shortening their service lives. Dirt causes fans to run faster (and louder) as they attempt to keep the system cool. Dirt worms its way into connectors, increasing electrical resistance and reducing reliability. Dirt corrodes contact surfaces. Dirt is nasty stuff.
Computers become dirty as a natural part of running. Fans suck dust, pet hair, and other contaminants into the case, where they rest on every surface. Even in clean rooms, operating theaters, and other very clean environments, a PC will eventually become dirty. If there's any dust in the air at all, the system fans will suck it in and deposit it inside the case, where it will become a problem sooner or later.
The severity of the problem depends on the environment. Industrial environments are often filthy, so much so that standard PCs are unusable. In a shop-floor environment, we have seen standard PCs become so clogged with dirtliterally in one daythat they stopped running because of overheating. Typical home and office environments are much better, but still surprisingly bad. Pets, carpeting, cigarette smoking, gas or oil heatall of these contribute to dirty PCs.
Routine weekly vacuuming of the case exterior helps, but is not sufficient. Figure 3-1 shows the back I/O panel of a PC that was left running 24 hours a day for 6 months in a typical residential environmentwhich happens to be our homewithout being cleaned other than casual vacuuming of the accessible areas of the case. (Barbara asked Robert to point out that she vacuums thoroughly and dusts every week, but that Robert specifically asked her to make no special effort to clean this system so that he could use it as an illustration.)
Computers become dirty as a natural part of running. Fans suck dust, pet hair, and other contaminants into the case, where they rest on every surface. Even in clean rooms, operating theaters, and other very clean environments, a PC will eventually become dirty. If there's any dust in the air at all, the system fans will suck it in and deposit it inside the case, where it will become a problem sooner or later.
The severity of the problem depends on the environment. Industrial environments are often filthy, so much so that standard PCs are unusable. In a shop-floor environment, we have seen standard PCs become so clogged with dirtliterally in one daythat they stopped running because of overheating. Typical home and office environments are much better, but still surprisingly bad. Pets, carpeting, cigarette smoking, gas or oil heatall of these contribute to dirty PCs.
Routine weekly vacuuming of the case exterior helps, but is not sufficient. Figure 3-1 shows the back I/O panel of a PC that was left running 24 hours a day for 6 months in a typical residential environmentwhich happens to be our homewithout being cleaned other than casual vacuuming of the accessible areas of the case. (Barbara asked Robert to point out that she vacuums thoroughly and dusts every week, but that Robert specifically asked her to make no special effort to clean this system so that he could use it as an illustration.)
Lock Others Out of Your Computer
Of course, the opposite of a password that
keeps you out of your system is a password that
keeps others out of your system. The BIOS in some
PCs may provide no password protection at all, a single password that controls
access to BIOS setup and allows the system to boot up, or two passwords—one for access to BIOS
setup (a Setup or Supervisor password) and bootup, and the other to control
access to booting up only (a User or Boot password). To set a password for your
system, look in the setup menus for security settings, as shown in
BIOS and boot passwords can protect you from hackers
BIOS and boot passwords can protect you from hackers
A User or Boot password keeps the system from booting up—a
measure of intrusion and system hacking protection. A System or Supervisor password keeps lurkers out
of your BIOS settings, and keeps them from changing the User/Boot password.
If you are going to set a User or Boot password, be sure you
also set a Setup or Supervisor password so the BIOS settings and boot password
cannot be changed and so someone cannot set a Supervisor password to keep you
out of the system, requiring you to bypass the BIOS password. Because there
is a back door, the only way to prevent attackers from circumventing the
password is to use a case that can be locked shut with a key or a locking
cable.
Sunday, January 6, 2013
Component Safety
By now you should know how to keep yourself, your family, and your pets from being electrocuted, prevent your hair getting caught in the fans in your PC, and eliminate the risks of strangulation from neckties and scarves. But it’s not just your safety that you have to be worried about—you also have to care for the safety of the components that you are going to be handling and that are going to become integral parts of your PC.
Dangers You Can See
Here are some general common-sense rules that you can follow to avoid component troubles
TIP
There is a very good chance that you will be buying at least some of the parts for your PC via mail order. Mail order is by far the cheapest way to buy components unless you are really lucky and live nearby to a very good supplier. However, component damage in transit is a real problem. Check all items you receive carefully. What you are looking for are components that arrive well packaged and in an undamaged state. Look for signs of damage, both at the packing stage (improperly packaged items, items packed loose) and for damage in transit (ripped, torn, or crushed packaging, items repackaged by the carrier or foot/tire prints on the package—yes, we’ve seen it all!). If anything looks damaged then either refuse to sign for it, or, if you have to sign for it write
“NOT EXAMINED” clearly next to your name/signature and get in touch with the seller.
If, during the build, you think that you may have damaged a component through dropping it or handling it badly, then make a note of this. Damage caused can be difficult, if not impossible to spot, so if you have problems later on, having information on components that might have been damaged can save you a lot of time and energy in tracking down the fault.
Dangers You Can See
Here are some general common-sense rules that you can follow to avoid component troubles
- Don’t drop components. This is the number one cause of component damage.
- Don’t bend or flex components. No matter how sturdy a circuit board looks, it takes very little pressure to crack it or pop off an important component.
- Don’t put components down on top of one another or on metal surfaces.
- Keep components clean and dry.
TIP
There is a very good chance that you will be buying at least some of the parts for your PC via mail order. Mail order is by far the cheapest way to buy components unless you are really lucky and live nearby to a very good supplier. However, component damage in transit is a real problem. Check all items you receive carefully. What you are looking for are components that arrive well packaged and in an undamaged state. Look for signs of damage, both at the packing stage (improperly packaged items, items packed loose) and for damage in transit (ripped, torn, or crushed packaging, items repackaged by the carrier or foot/tire prints on the package—yes, we’ve seen it all!). If anything looks damaged then either refuse to sign for it, or, if you have to sign for it write
“NOT EXAMINED” clearly next to your name/signature and get in touch with the seller.
If, during the build, you think that you may have damaged a component through dropping it or handling it badly, then make a note of this. Damage caused can be difficult, if not impossible to spot, so if you have problems later on, having information on components that might have been damaged can save you a lot of time and energy in tracking down the fault.
Subscribe to:
Posts (Atom)