Lunes, Enero 23, 2012

NEW MOUSE

It began with iPhone. Then came iPod touch. Then MacBook Pro. Intuitive, smart, dynamic. Multi-Touch technology introduced a remarkably better way to interact with your portable devices — all using gestures. Now we’ve reached another milestone by bringing gestures to the desktop with a mouse that’s unlike anything ever before. It's called Magic Mouse. It's the world's first Multi-Touch mouse. And while it comes standard with every new iMac, you can also add it to any Mac with Bluetooth wireless technology for a
 Maybe you want scrolling but don’t want swiping. Or two-button clicking instead of one. Whatever the case, Magic Mouse works the way you want it to work. All you do is go to the Magic Mouse preference pane in System Preferences to enable or disable features.
The ambidextrous design of Magic Mouse means it fits comfortably in your right hand if you’re a righty or in your left hand if you’re a lefty. And left-handers can easily swap left and right button functionality using System Preferences.

System Requirements

  • Mac computer with Bluetooth wireless technology
  • OS X v10.5.8 or later with Wireless Mouse Software Update 1.0* or OS X v10.6.1 or later with Wireless Mouse Software Update 1.0
  • Existing keyboard and mouse for setup
  • Two AA batteries (included)

Lunes, Enero 16, 2012

DATA STRUCTURE CASE STUDY 4

What is hash collision?a collision or clash is a situation that occurs when two distinct pieces of data have the same hash value, checksum, fingerprint, or cryptographic digest.
What really happens during a hash collision? Include an image
What are the ways and methods to resolve hash collision? Explain Each
a hash table or hash map is a data structure that uses a hash function to map identifying values, known as keys to their associated values  their telephone number.
EXPLAINITION: because collision are hash function should map each possible key to a unique slot index, but this ideal is rarely achievable in practice  Instead, most hash table designs assume that hash collisions is different keys that map to the same hash value will occur and must be accommodated in some way.

CASE STUDY 5 HASH COLLISION

HASH COLLISION-secret key cryptography, a single key is used for both encryption and decryption. As shown in Figure 1A, the sender uses the key (or some set of rules) to encrypt the plaintext and sends the ciphertext to the receiver. The receiver applies the same key (or ruleset) to decrypt the message and recover the plaintext. Because a single key is used for both functions, secret key cryptography is also called symmetric encryption. Public-key cryptography has been said to be the most significant new development in cryptography in the last 300-400 years. Modern PKC was first described publicly by Stanford University professor Martin Hellman and graduate student Whitfield Diffie in 1976. Their paper described a two-key crypto system in which two parties could engage in a secure communication over a non-secure communications channel without having to share a secret key.Hash functions, also called message digests and one-way encryption, are algorithms that, in some sense, use no key (Figure 1C). Instead, a fixed-length hash value is computed based upon the plaintext that makes it impossible for either the contents or length of the plaintext to be recovered.
COLLISION-->A collision domain is a section of a network where data packets can collide with one another when being sent on a shared medium or through repeaters, in particular, when using early versions of Ethernet.
HASHING -->A hash function is any algorithm or subroutine that maps large data sets, called keys, to smaller data sets. For example, a single integer can serve as an index to an array (cf. associative array)
HASH-->hash function is a hash function that it can be defined as a deterministic procedure that takes an arbitrary block of data and returns a fixed-size bit string, the (cryptographic) hash value, such that an accidental or intentional change to the data will change the hash value.
softwar-->is a collection of computer programs and related data that provides the instructions for telling a computer what to do and how to do it.
program-->A computer program (also software, or just a program) is a sequence of instructions written to perform a specified task with a computer. A computer requires programs to function
application-->also known as an application or an "app", is computer software designed to help the user to perform specific tasks. Examples include enterprise software, accounting software, office suites, graphics software and media players. Many application programs deal principally with documents.