Archive for April 2012

Samsung Introduces the thinnest Optical Drive on the World

Samsung recently launched the external optical drive that is claimed to be the thinnest in the world.
The device has a size of about 14 mm or 18% thinner than conventional DVD writer. Its weight was about 8% lighter than similar devices, so it is an ideal accessory for ultrabook who do not have the optical drive as well as tablet PCs.

With names Samsung SE-218BB, it has ability to read and write to CDs and DVDs. Specifications offered are able to use to write CDs up to 24x and 8x speeds for DVD. 

Besides the computer, this device can be used on a tablet PC with Android operating system 3.1 to above. Even later, support for Windows 8 RT was possible.

Posted in | Leave a comment

iPhone 5 Speculation on WWDC 2012

WWDC 2012Apple has officially announced the WorldWide Developer Conference (WDC) in 2012 which will be held at 11 until June 15 at Moscone West, San Francisco.

"During the five day conference, later the developers will learn about the future of IOS and OS X that allows them to create innovation in the delivery of new applications," said Philip Schiller, Apple's senior vice president of Worldwide Marketing.
This statement was also once reportedly denied rumors that the iPhone 5 will be launched at the conference.

Posted in | Leave a comment

SNSD selected to be advertisement models for Intel Asia

SNSD was recently announced to be the new models for Intel.

According to an industry representative on January 9th, Intel recently selected SNSD as their next advertisement models, and will soon make an official annoucment.
The terms and conditions of the contract have not yet been revealed, but it was said that Intel plans to use SNSD for advertisements and promotions for the whole of Asia.
Intel revealed their new graphics integrated processor at the ‘CES 2011′ in Las Vegas on January 5th, and announced that they are currently preparing for a massive shift in their marketing scheme, with SNSD allegedly being their main models.

Posted in | Leave a comment

Game Maker Games

 Well, this is some list of game build with Game maker.

Elu

 





elu12b.zip  1.7 MB

Johnny's Odyssey 






 jodyssey11.zip  3.4 MB



YoYoGames
Rn_bo_rd

Mario Kart 64
Added: 24 May 2007
By: Silent X

YoYoGames
01

Crimelife 2
Added: 19 October 2007
By: sakisa

Posted in , | Leave a comment

Game Maker

Any game addict has dreamed at least once of creating their own little game. The lack of programming knowledge is a drawback that can be overcome with the aid of software that can help you to design games without having to write a single line of code.

Such a compiler is Game Maker Lite. This software can be used by beginners and professionals alike, since it sports a fun and friendly environment that allows users to manufacture simple or complex games without the requirement of prior programming experience.

All steps are done through a drag-and-drop technique. Simply provide the software with the command you wish to be executed, and it shall perform it as requested. But if you are keen on learning a gaming programming language, then Game Maker Lite can be switched to Advanced mode.This will allow you to go through more difficult settings and learn a trick or two about how to code a game.

Posted in , | Leave a comment

iPhone vs Android

Android growing popularity skyrocketed in the wilds of the operating system. Not surprisingly, the latest operating system made ​​by Internet giant Google Inc., Android OS was quickly adopted by some manufacturers as the rapid growth of smartphone mobile (smart phone) globally.

The appearance-based mobile operating system Android, or Android phones are often called, is often touted as the biggest competitor first iPhone released by Apple. Its existence until now is often matched with the only smart phone Steve Jobs made ​​it.

Users were confused until now, what advantages each of these touch-screen smart phone? Who is superior? On the operator side, Android is considered more troublesome than the iPhone.

Posted in | Leave a comment

Samsung Galaxy S III and iPhone 5

iPhone 5Samsung Galaxy S III and iPhone 5 will probably undergo a fierce battle in 2012. Two highly anticipated smartphone is reportedly already will be launched at the close.
Recent leaked Galaxy S III showed a formal invitation that may come from Samsung.Launch time is listed in the city of London on May 22, 2012. There has been no confirmation from Samsung, but once they've made sure the Galaxy S III was introduced in mid-year.




 "Successor to Galaxy S II will be revealed at a separate event in the first half of Samsung this year, adjacent to the availability of commercial products," Samsung said in a statement some time ago.

Posted in | Leave a comment

Operating Systems

Without an operating system, a computer would not be useful. Minimally, you need an operating
system to locate files and to start programs. The programs that you run need services
from the operating system to access devices and to interact with other programs. Operating
systems on large computers need to provide more services than those on personal computers.
Here are some typical services:


• Program loading. Every operating system provides some way of launching application
programs. The user indicates what program should be run, usually by typing in the name
of the program or by clicking on an icon. The operating system locates the program code,
loads it in memory, and starts it.

• Managing files. A storage device such as a hard disk is, electronically, simply a device
capable of storing a huge sequence of zeroes and ones. It is up to the operating system to
bring some structure to the storage layout and organize it into files, folders, and so on.
The operating system also needs to impose some amount of security and redundancy into
the file system so that a power outage does not jeopardize the contents of an entire hard
disk. Some operating systems do a better job in this regard than others.

Posted in | Leave a comment

WinZip 16.5 Build 10095

When compression tools became so popular, only WinRAR lived up to the challenge. But soon after it, WinZip made its appearance and proved to be a worthy adversary. It was better, faster, and more efficient.

If you're a computer user who typically handles a multitude of various files, then you would probably like a compression tool that is good enough to suppress the size of a file, without causing any damage to its contents.

Such a piece of software is WinZip, for example.


Posted in , | Leave a comment

The First Bug

According to legend, the first bug was found in the Mark II, a huge electromechanical computer
at Harvard University. It really was caused by a bug—a moth was trapped in a relay
switch.

Actually, from the note that the operator left in the log book next to the moth (see
Figure 13), it appears as if the term “bug” had already been in active use at the time.
The pioneering computer scientist Maurice Wilkes wrote: “Somehow, at the Moore
School and afterwards, one had always assumed there would be no particular difficulty in getting programs right. I can remember the exact instant in time at which it dawned on me
that a great part of my future life would be spent finding
                  Figure 13 The First Bug
mistakes in my own programs.”

Posted in | Leave a comment

The Therac-25 Incidents

The Therac-25 is a computerized device that delivers radiation treatment to cancer patients
(see Figure 12). Between June 1985 and January 1987, several of these machines delivered
serious overdoses to at least six patients, killing some of them and seriously maiming the
others.


The machines were controlled by a computer program. Bugs in the program were directly
responsible for the overdoses. According to [1], the program was written by a single programmer,
who had since left the manufacturing company producing the device and could not
be located. None of the company employees interviewed could say anything about the educational
level or qualifications of the programmer.

The investigation by the federal Food and Drug Administration (FDA) found that the
program was poorly documented and that there was neither a specification document nor a
formal test plan. (This should make you think. Do you have a formal test plan for your programs?)
The overdoses were caused by an amateurish design of the software that controlled different
devices concurrently, namely the keyboard, the display, the printer, and the radiation
device itself. Synchronization and data sharing between the tasks were done in an ad hoc
way, even though safe multitasking techniques were known at the time. Had the programmer
enjoyed a formal education that involved these techniques or taken the effort to study
the literature, a safer machine could have been built. Such a machine would have probably
involved a commercial multitasking system, which might have required a more expensive
computer.

Posted in | Leave a comment

Berners-Lee: Demand your data from Internet companies

DG News Service - Tim Berners-Lee has said that the problem with companies like Facebook and Google is not that they collect vast troves of data about their users, but that they don't share with them what they learn from it.

Berners-Lee, who is often described as the inventor of the World Wide Web, was speaking out against the U.K.'s proposal to allow government intelligence to monitor digital communications. Berners-Lee is a U.K. native.

He acknowledged that users reveal deeply personal information about themselves through their use of the Web.

"You get to know every detail, you get to know, in a way, more intimate details about their life than any person that they talk to, because often people will confide in the Internet as they find their way through medical websites ... or as an adolescent finds their way through a website about homosexuality, wondering what they are and whether they should talk to people about it," he said.

But rather than pushing companies to stop collecting the information, Berners-Lee suggested technology companies should show more restraint in how they use the information and should share it with the users themselves.

"We're moving towards a world in which people agree not to use information for particular purposes. It's not whether you can get my information, it's when you've got it, what you promise not to do with it," he said.

In a scenario that some privacy experts saw as naive, the technology pioneer said an insurance company, for instance, could agree not to use personal details gleaned from Facebook to set the most profitable premium for a would-be customer, even if one of its agents was connected to the prospective customer on the social network.

The problem, according to Berners-Lee, is that "social networking silos" like Facebook and Google "have the data and I don't. "One side of this that I think gets insufficient airing is the value to me of that data," Berners-Lee said.

Berners-Lee said location data from his mobile phones could help him track his exercise habits, for example.

It's hard to say if reams of unstructured data would help individuals less tech-savvy than Berners-Lee, however. Justin Brookman, director of the Project on Consumer Privacy at the Center for Democracy and Technology, was skeptical. But Ryan Calo, with the Center for Internet and Society at Stanford University, said he thought the data could be quite helpful to individuals.

The privacy experts agreed that releasing the data would educate consumers on the issue of Internet privacy, which can seem abstract.

"It's good for companies to make their information available to people. But from my point of view it's just so people have an awareness of what sort of information companies have about them, and collect, and track and keep," Brookman said.

Calo thought seeing the data companies have collected on them would clarify privacy questions for many users.

Compared to "reading generalities about the information that a company might have about you, which is what privacy policies are, being able to access the information that the company does have is much better," he said.

In order for users to draw the kind of useful personal insights Berners-Lee pointed to, data from one source would have to be compatible with data from another. As an advocate of the "open Web," Berners-Lee often argues for data formats to be standardized.

Standardizing data formats would also make it easier for users to opt to leave a service whose privacy practices they don't like, Calo said. That could spur "privacy competition," in which Web services companies would compete for users based on the quality of their privacy policies. The result could be more consumer privacy.

Calo said, by not addressing consumer concerns about privacy, Berners-Lee was "missing a selling point of his idea" of an open Web.

Source : www.computerworld.com

Posted in | Leave a comment

Yes, IT departments should worry about Google Drive

Google Drive is poised to give IT departments yet another headache to deal with.

Drive, the name of Google's data-syncing cloud storage service that's rumored to launch sometime next week, will likely offer many of the features of popular storage apps such as Dropbox and Box, including 5GB of free storage with upgrades of up to 100GB of storage for users willing to pay for service.

But there's a big difference between other cloud storage apps and Google Drive, which is namely that the former are run by small, independent firms while the latter will be run by one of the largest companies in tech and will thus be harder to avoid. Forrester analyst Frank Gillett says that the ubiquity of Google applications such as Gmail, YouTube and Maps will make it much harder for enterprises to block Google Drive than Dropbox or Box.

Posted in | Leave a comment

Privacy Policy

Privacy Policy - www.technocrawler.blogspot.com

Privacy Policy for www.technocrawler.blogspot.com

If you require any more information or have any questions about our privacy policy, please feel free to contact us by email at arbiyantezar@yahoo.co.id.

At www.technocrawler.blogspot.com, the privacy of our visitors is of extreme importance to us. This privacy policy document outlines the types of personal information is received and collected by www.technocrawler.blogspot.com and how it is used.

Log Files
Like many other Web sites, www.technocrawler.blogspot.com makes use of log files. The information inside the log files includes internet protocol ( IP ) addresses, type of browser, Internet Service Provider ( ISP ), date/time stamp, referring/exit pages, and number of clicks to analyze trends, administer the site, track users movement around the site, and gather demographic information. IP addresses, and other such information are not linked to any information that is personally identifiable.

Cookies and Web Beacons
www.technocrawler.blogspot.com does use cookies to store information about visitors preferences, record user-specific information on which pages the user access or visit, customize Web page content based on visitors browser type or other information that the visitor sends via their browser.

DoubleClick DART Cookie

.:: Google, as a third party vendor, uses cookies to serve ads on www.technocrawler.blogspot.com.
.:: Google's use of the DART cookie enables it to serve ads to your users based on their visit to www.technocrawler.blogspot.com and other sites on the Internet.
.:: Users may opt out of the use of the DART cookie by visiting the Google ad and content network privacy policy at the following URL - http://www.google.com/privacy_ads.html

Some of our advertising partners may use cookies and web beacons on our site. Our advertising partners include .......
Google Adsense







Amazon

These third-party ad servers or ad networks use technology to the advertisements and links that appear on www.technocrawler.blogspot.com send directly to your browsers. They automatically receive your IP address when this occurs. Other technologies ( such as cookies, JavaScript, or Web Beacons ) may also be used by the third-party ad networks to measure the effectiveness of their advertisements and / or to personalize the advertising content that you see.

www.technocrawler.blogspot.com has no access to or control over these cookies that are used by third-party advertisers.

You should consult the respective privacy policies of these third-party ad servers for more detailed information on their practices as well as for instructions about how to opt-out of certain practices. www.technocrawler.blogspot.com's privacy policy does not apply to, and we cannot control the activities of, such other advertisers or web sites.

If you wish to disable cookies, you may do so through your individual browser options. More detailed information about cookie management with specific web browsers can be found at the browsers' respective websites.

Posted in | Comments Off

Megaupload Case Not a Slam Dunk, Judge Says

Megaupload founder Kim Dotcom may not be going to trial after all on charges of copyright infringement.

That's according to the judge in the case, and the development comes after months of drama involving the now shuttered filing-sharing website.

U.S. District Judge Liam O'Grady made the proclamation while hearing arguments about deleting Megaupload member files, which are enormously expensive to maintain.

The judge said a discussion about wiping Megaupload's database could be premature and that a more relevant question was why Megaupload had not been formally served with criminal papers by the United States.

Posted in | Leave a comment

The Explosive Growth of Personal Computers

In 1971, Marcian E. “Ted” Hoff, an engineer at Intel Corporation was working on a chip for
a manufacturer of electronic calculators. He realized that it would be a better idea to develop
a general-purpose chip that could be programmed to interface with the keys and display of a
calculator, rather than to do yet another custom design. Thus, the microprocessor was born.
At the time, its primary application was as a controller for calculators, washing machines,
and the like. It took years for the computer industry to notice that a genuine central processing
unit was now available as a single chip.


Hobbyists were the first to catch on. In 1974 the first computer kit, the Altair 8800, was
available from MITS Electronics for about $350. The kit consisted of the microprocessor, a
circuit board, a very small amount of memory, toggle switches, and a row of display lights.
Purchasers had to solder and assemble it, then program it in machine language through the
toggle switches. It was not a big hit.

The first big hit was the Apple II. It was a real computer with a keyboard, a monitor, and
a floppy disk drive. When it was first released, users had a $3,000 machine that could play
Space Invaders, run a primitive bookkeeping program, or let users program it in BASIC. The
original Apple II did not even support lowercase letters, making it worthless for word processing.
The breakthrough came in 1979, with a new spreadsheet program, VisiCalc (see
Figure 8). In a spreadsheet, you enter financial data and their relationships into a grid of rows
and columns. Then you modify some of the data and watch in real time how the others change.
For example, you can see how changing the mix of widgets in a manufacturing plant
might affect estimated costs and profits. Middle managers in companies, who understood
computers and were fed up with having to wait for hours or days to retrieve their data runs
from the computing center, snapped up VisiCalc and the computer that was needed to run it.
For them, the computer was a spreadsheet machine.

Posted in | Leave a comment

Artificial Intelligence

When one uses a sophisticated computer program such as a tax preparation package, one is
bound to attribute some intelligence to the computer. The computer asks sensible questions
and makes computations that we find a mental challenge. After all, if doing one’s taxes were
easy, we wouldn’t need a computer to do it for us.

Asimo


As programmers, however, we know that all this apparent intelligence is an illusion.
Human programmers have carefully “coached” the software in all possible scenarios, and it
simply replays the actions and decisions that were programmed into it.

Would it be possible to write computer programs that are genuinely intelligent in some
sense? From the earliest days of computing, there was a sense that the human brain might be
nothing but an immense computer, and that it might well be feasible to program computers
to imitate some processes of human thought. Serious research into artificial intelligence
began in the mid-1950s, and the first twenty years brought some impressive successes. Programs
that play chess—surely an activity that appears to require remarkable intellectual
powers—have become so good that they now routinely beat all but the best human players.
As far back as 1975, an expert-system program called Mycin gained fame for being better in
diagnosing meningitis in patients than the average physician.

Posted in | Leave a comment

Computer Graphics

The generation and manipulation of visual images is one of the most exciting applications of
the computer. We distinguish between different kinds of graphics.
Diagrams, such as numeric charts or maps, are artifacts that convey information to the
viewer. They do not directly depict anything that occurs in the natural world,
but are a tool for visualizing information.


 
Scenes are computer-generated images that attempt to depict images of the real or an
imagined world. It turns out to be quite a challenge to render light and shadows
accurately. Special effort must be taken so that the images do not look too neat and
simple; clouds, rocks, leaves, and dust in the real world have a complex and somewhat random
appearance. The degree of realism in these images is constantly improving.


Manipulated images are photographs or film footage of actual events that have been converted
to digital form and edited by the computer (see Figure 20). For example, film
sequences of the movie Apollo 13 were produced by starting from actual images and changing
the perspective, showing the launch of the rocket from a more dramatic viewpoint.

Computer graphics is one of the most challenging fields in computer science. It requires

Posted in | Leave a comment

The Pentium Floating-Point Bug

In 1994, Intel Corporation released what was then its most powerful processor, the Pentium.
Unlike previous generations of its processors, it had a very fast floating-point unit. Intel’s
goal was to compete aggressively with the makers of higher-end processors for engineering
workstations. The Pentium was an immediate huge success.

In the summer of 1994, Dr. Thomas Nicely of Lynchburg College in Virginia ran an
extensive set of computations to analyze the sums of reciprocals of certain sequences of
prime numbers. The results were not always what his theory predicted, even after he took
the Pentium in Intel’s lineup. This should not have happened. The optimal roundoff behavior
of floating-point calculations has been standardized by the Institute for Electrical and Electronic Engineers (IEEE) and Intel claimed to adhere to the IEEE standard in both the
486 and the Pentium processors. Upon further checking, Dr. Nicely discovered that indeed
there was a very small set of numbers for which the product of two numbers was computed
differently on the two processors. For example,

4,195,835 − ((4,195,835 3,145,727) × 3,145,727)

is mathematically equal to 0, and it did compute as 0 on a 486 processor. On his Pentium
processor the result was 256.
As it turned out, Intel had independently discovered the bug in its testing and had started
to produce chips that fixed it. The bug was caused by an error in a table that was used to
speed up the floating-point multiplication algorithm of the processor. Intel determined that

the problem was exceedingly rare. They claimed that under normal use, a typical consumer
would only notice the problem once every 27,000 years. Unfortunately for Intel, Dr. Nicely
had not been a normal user.

Posted in | Leave a comment

Standards Organizations

Two organizations, the American National Standards Institute (ANSI) and the International
Organization for Standardization (ISO), have jointly developed the definitive standard for
the C++ language.
Why have standards? You encounter the benefits of standardization every day. When you
buy a light bulb, you can be assured that it fits in the socket without having to measure the
socket at home and the bulb in the store. In fact, you may have experienced how painful the
lack of standards can be if you have ever purchased a flashlight with nonstandard bulbs.

Posted in | Leave a comment

The ENIAC and the Dawn of Computing


The ENIAC (electronic numerical integrator and computer) was the first usable electronic
computer. It was designed by J. Presper Eckert and John Mauchly at the University of
Pennsylvania and was completed in 1946—two years before transistors were invented. The
computer was housed in a large room and consisted of many cabinets containing about
18,000 vacuum tubes (see Figure 6). Vacuum tubes burned out at the rate of several tubes per
day. An attendant with a shopping cart full of tubes constantly made the rounds and replaced
defective ones. The computer was programmed by connecting wires on panels. Each wiring
configuration would set up the computer for a particular problem. To have the computer
work on a different problem, the wires had to be replugged.

Posted in | Leave a comment

PHP Tutorial (Part 4 - Loops and Arrays)

Introduction

In the last parts of this tutorial I have showed you how to deal with text and variables in PHP and how you can use IF statements to compare them and to make decisions. In this part I am going to show you how to use another important part of PHP, loops.

The WHILE Loop

The WHILE loop is one of the most useful commands in PHP. It is also quite easy to set up and use. A WHILE loop will, as the name suggests, execute a piece of code until a certain condition is met.

Repeating A Set Number Of Times

If you have a piece of code which you want to repeat several times without retyping it, you can use a while loop. For instance if you wanted to print out the words "Hello World" 5 times you could use the following code:

$times = 5;
$x = 0;
while ($x < $times) {
echo "Hello World";
++$x;
}

I will now explain this code. The first two lines are just setting the variables. The $times variable holds the number of times you want to repeat the code. The $x variable is the one which will count the number of times the code has been executed. After these is the WHILE line. This tells the computer to repeat the code while $i is less than $times (or to repeat it until $i is equal to $times). This is followed by the code to be executed which is enclosed in { }.


Posted in , | Leave a comment

PHP Tutorial (Part 3 - IF Statements)

Introduction

Over the past two parts I have shown you the basics of text in PHP and how to store it as variables. In this part of the tutorial I will show you how to use IF statements to make decisions in your scripts.

The Basics Of IF

If statements are used to compare two values and carry out different actions based on the results of the test. If statements take the form IF, THEN, ELSE. Basically the IF part checks for a condition. If it is true, the then statement is executed. If not, the else statement is executed.

IF Strucure

The structure of an IF statement is as follows:

IF (something == something else)
{
THEN Statement
} else {
ELSE Statement
}

Variables

The most common use of an IF statement is to compare a variable to another piece of text, a number, or another variable. For example:

if ($username == "webmaster")

which would compare the contents of the variable to the text string. The THEN section of code will only be executed if the variable is exactly the same as the contents of the quotation marks so if the variable contained 'Webmaster' or 'WEBMASTER' it will be false.


Posted in , | Leave a comment

PHP Tutorial (Part 2-Displaying Information & Variables)

Introduction

In the last part of the tutorial I explained some of the advantages of PHP as a scripting language and showed you how to test your server for PHP. In this part I will show you the basics of showing information in the browser and how you can use variables to hold information.

Printing Text

To output text in your PHP script is actually very simple. As with most other things in PHP, you can do it in a variety of different ways. The main one you will be using, though, is print. Print will allow you to output text, variables or a combination of the two so that they display on the screen.

The print statement is used in the following way:

print("Hello world!");

I will explain the above line:

print is the command and tells the script what to do. This is followed by the information to be printed, which is contained in the brackets. Because you are outputting text, the text is also enclosed instide quotation marks. Finally, as with nearly every line in a PHP script, it must end in a semicolon. You would, of course, have to enclose this in your standard PHP tags, making the following code:

<?
print("Hello world!");
?>

Which will display:

Hello world!

on the screen.


Posted in , | Leave a comment

PHP Tutorial (Part 1)

Introduction

Up until recently, scripting on the internet was something which very few people even attempted, let alone mastered. Recently though, more and more people have been building their own websites and scripting languages have become more important. Because of this, scripting languages are becomming easier to learn and PHP is one of the easiest and most powerful yet.

What Is PHP?

PHP stands for Hypertext Preprocessor and is a server-side language. This means that the script is run on your web server, not on the user's browser, so you do not need to worry about compatibility issues. PHP is relatively new (compared to languages such as Perl (CGI) and Java) but is quickly becomming one of the most popular scripting languages on the internet.

Why PHP?

You may be wondering why you should choose PHP over other languages such as Perl or even why you should learn a scripting language at all. I will deal with learning scripting languages first. Learning a scripting language, or even understanding one, can open up huge new possibilities for your website. Although you can download pre-made scripts from sites like Hotscripts, these will often contain advertising for the author or will not do exactly what you want. With an understanding of a scripting language you can easily edit these scripts to do what you want, or even create your own scripts.

Using scripts on your website allows you to add many new 'interactive' features like feedback forms, guestbooks, message boards, counters and even more advanced features like portal systems, content management, advertising managers etc. With these sort of things on your website you will find that it gives a more professional image. As well as this, anyone wanting to work in the site development industry will find that it is much easier to get a job if they know a scripting language.

What Do I Need?

As mentioned earlier, PHP is a server-side scripting language. This means that, although your users will not need to install new software, you web host will need to have PHP set up on their server. It should be listed as part of your package but if you don't know if it is installed you can find out using the first script in this tutorial. If you server does not support PHP you can ask your web host to install it for you as it is free to download and install. If you need a low cost web host which supports PHP I would recommmend HostRocket.


Posted in , | Leave a comment

Accessing Your Database with C++ Is as Easy as DTL


Database Template Library (DTL)

The goal of DTL is to make Open Database Connectivity (ODBC) query results look just like an STL container. ODBC is an ISO standard that identifies a specific set of APIs to access SQL databases efficiently while hiding the databases' backend proprietary (a.k.a. "native") interfaces. Essentially, this allows you to write one set of source code that can pull data equally well from a Microsoft Excel spreadsheet on your PC or an IBM mainframe in another continent. You've likely used the ODBC Data Source Administrator applet in the Control Panel (ODBCCPL32.CPL) without even knowing it.
DTL provides all this in a portable abstraction, which can run on an impressive array of platforms and C++ compilers (see Table 1).
Compiler OS ODBC
Microsoft Visual C++ 6.0 and 7.x, Borland C++ 5.5 and 6.0 Windows NT, 2000, XP Microsoft
GCC 3.2 Red Hat 7 unixODBC 2.x
GCC 3.3 Cygwin Microsoft
GCC 2.95 and STLPort FreeBSD unixODBC 2.x
Sun Workshop 6 Solaris Merant ODBC
aCC A.03.35 HP-UX Merant ODBC
Table 1. Platforms and C++ Compilers on Which You Can Run DTL
DTL works with any ODBC 3.0, Level 1-compliant driver, including Oracle 8 and 9, SQL Server 2000, Access 2000, MySQL, Postgres, Sybase, and DB2.

Posted in , | Leave a comment

Creating a Web Browser in VB.Net

This was the first thing I ever learned in VB i was completely honest i don't know why but if i learned it at the start anyone can do it. Ok lets get started.
1)File >new project>windows application (name it web browser or what ever)
1.)Posted Image


2) Make screen size to any size but big enough to see an entire web browser.

3) Add a Panel and dock it to the top (when clicked on the panel. Properties window on the right “Dock" )
3.)Posted Image

*Docking it
*Posted Image


4) Personally i don't like the default color but that is not important but if you insist on changing the color...
Posted Image



Posted in , | Leave a comment

Gunbound Client 1052

Gunbound is a turn-based online strategy game where you get to explore the Planet Lond and its 8 moons in an infinite war between 16 unique mobiles and their riders.

Choose your weapons and strategies carefully and defeat every enemy. The surrounding environment will never be the same as it changes constantly according to the "Moon Disk".

Avoid enemy missiles and take cover behind debris. With the help of the precise damage meter, players will be able to quickly assess the turn of the battle. Special rewards will be awarded to the players that please the audience.


Posted in , | Leave a comment