Saturday, July 3, 2010

How to Draw Human Body

If you want to learn how to draw the human body step by step in different steps, PoseManiacs supports all artists, including art students and people who study illustrations and mangas on your own. This site is for uploading variety of human body poses for sketching, and introduces other flash training tools for drawing.
Tip :  Make 360 View Imagery of an Object

PoseManiacs (link) – Online 3D Human Body Viewing Tool

Whether you are a life drawing enthusiast, an artist looking for some practice or just thinking about getting into drawing human body forms, PoseManiacs is here to help you learn how to draw the human body step by step
                                                             You can view this in 360 view by moving mouse
Their website comprises thousands of poses made of 3D models wrapped around with a muscle texture that enables the artist to see the muscle position and behavior. Each pose is viewable from any angle, artists can find a complex foreshortening angle or an easier one by simply rotating the camera around.
There are some other interesting features like:
30 Second Drawing Tool : This tool mimics an actual life drawing class where the artist starts warming up by gestural drawings, big and fluid strokes following the model’s poses on a given time. This tool is customizable for different posing durations and visual components that adapt to every artist needs.
Hands for Drawing : Every artist knows that drawing human body’s hands is a intricate task. This drawing tool lets the artist choose from a variety of hand poses, once he finds what he is looking for he can rotate the camera around and zoom in and out.
Some other great drawing tools include Random Pose Viewer and Widgets.
PoseManiacs is doing a remarkable job in integrating art and technology, their online drawing tools encourage artists from around the globe to keep studying the extraordinary human figure


Elasticity

Elasticity 
is a measure of the responsiveness of one variable to another.The greater the elasticity, the greater the responsiveness.
Price Elasticity 
The price elasticity of demand is the percentage change in quantity demanded divided by the percentage change in price.
Sign of Price Elasticity
According to the law of demand, whenever the price rises, the quantity demanded falls. Thus the price elasticity of demand is always negative.
Because it is always negative, economists usually state the value without the sign.
What Information Price Elasticity Provides
Price elasticity of demand and supply gives the exact quantity response to a change in price. 
 
 
 
 
 
 

Bluetooth

Bluetooth is a specification for short distance wireless communication between two devices.

Bluetooth Specifications

Fixed/Mobile Mobile
Circuit/Packet Both
Max Bandwidth 1Mb
Range 10 meters
Frequency 2.40GHz-2.483.5Ghz (U.S. and Europe) or 2.472Ghz-2.497Ghz (Japan)
Host Network None
Definer Bluetooth SIG
Bluetooth technology is named after Harald Bluetooth, a Danish king who managed to consolidate Denmark and a part of Norway in the 1900s. The choice for the name of this technology is a manifestation of how influential and central the companies from this region are to the telecommunications industry.

Bluetooth is a networking technology that does not rely on user control or large amounts of power. By keeping the transmission power to an extremely low setting (1 milliwatt), Bluetooth is ideal for mobile battery operated devices. Moreover, Bluetooth does not rely on the user since it can automatically detect and communicate with other Bluetooth devices without any user input.
Bluetooth technology relies on two things, a radio frequency technology and the protocol software enabling it to transmit data to other devices. Bluetooth-capable devices can transmit data to other devices not within the line of sight of the user. It also enables different devices to communicate using certain rules such as the amount of data that will be sent, the type of communication between the devices and the radio frequency or frequencies this communication will take place. These protocols ensure that Bluetooth devices experience the least amount of interference from other Bluetooth capable objects while communicating with each other.

Bluetooth RF Properties

Low energy radio waves are the principal transmission system in Bluetooth networking. The frequency of Bluetooth capable devices ranges from 2.402 GHz to as high as 2.480 GHz, a frequency range specifically reserved by international agreement for ISM or medical, industrial and scientific devices.

Transmission Capabilities

Other devices in the market that use the same ISM band are garage door openers, cordless phones, baby monitors, etc and all these devices contribute to the increase in the risk of interference among Bluetooth devices. To avoid this, Bluetooth devices only use about 1 miliwatt of power in transmitting its signals. This makes the effective range of a Bluetooth device about 32 feet or ten meters and thus limits the chances of interference from other nearby devices.
Nevertheless, the low transmission power requirement of Bluetooth devices make them capable of communicating with other Bluetooth devices not within their range of sight. This means that a Bluetooth device can still connect to a personal computer for file transfers even if the computer is in an entirely different room in the house.
Bluetooth is not a one-on-one data transmission technology so it can communicate with up to eight devices within its transmission radius at one time. A Bluetooth device will use at most 1600 different and randomly chosen frequencies every second within the course of its transmission to minimize the probability of other devices using the same frequency and to minimize interference time when it does coincide with another device using the same frequency.

Piconets or Personal Area Networks

A Bluetooth-capable device coming into range with another one will first determine if it has data to share or commands to transmit. This happens automatically and without any user input. Bluetooth-capable devices communicating with each other within an area form a piconet or personal area network where devices integrate and synchronize their frequency-hopping to keep in touch with each other.
With the use of a specific evice addresses in Bluetooth capable devices, it is possible to create multiple piconets or personal area networks within the same area. This means that since a cordless phone base unit and handset communicate with each other using a specific address range range, they will not interfere with Bluetooth-capable devices in the same room. The Bluetooth network ignores any transmission from devices outside of its assigned address range. The addresses of these devices and the program that instructs these devices to listen and respond using a specific address range are programmed by the manufacturer to lessen interference and increase the efficiency in data transmission of Bluetooth devices.
Since each device in a piconet is synchronized in frequency-hopping, the risk of two piconets interfering with each other by being in the same frequency at the same time is very minimal. Moreover, since the piconets change frequencies 1600 times every second, a collision between two piconets will last only a fraction of a second. Corrective software in these Bluetooth devices will also correct any interference-consequent errors, thereby increasing the efficiency of network communication.

Bluetooth Power Classes

Bluetooth provides three types of power classes, although class 3 devices are not in general availability.
Type Power Level Operating Range
Class 3 Devices 100mW Up to 100 meters
Class 2 Devices 10mW Up to 10 meters
Class 1 Devices 1mW 0.1-10 meters

Bluetooth Security

Bluetooth security is based upon device authentication, not user authentication. Each device is either trusted or untrusted. Bluetooth devices are identified by unique 48-bit identifiers, much like Ethernet MAC addresses.

Bluetooth Security Modes

Bluetooth features three security modes.
Mode Name Description
1 Non-secure No security is implemented
2 Service-level security Access is granted to individual services
3 Link-level security Security is enforced at a common level for all applications at the beginning of the connection

Bluetooth Security Levels

Bluetooth features three possible security levels.
Mode Description
3 No authentication or authorization is required
2 Authentication is required; authorization is not required
1 Authorization and authentication are required

Bluetooth Security Weaknesses

Bluetooth weakness include:
  • The Bluetooth challenge-response key generation is weak. This scheme may use a static number or a number for a period of time, which can reduce the effectiveness of the authentication.
  • Bluetooth's challenge-response is simplistic. A one-way challenge for authentication is susceptible to man-in-the-middle attacks. Mutual authentication via user verification should be used.
  • The keys used by Bluetooth are weak. The initialization key needs to be more robust and the unit key is a public-generated key that can be reused. A set of keys should be used instead.
  • The master key is shared between Bluetooth connections. This key is a broadcast and should have a better scheme than what is used.
  • The encryption algorithm scheme utilized in Bluetooth uses a single algorithm and allows repeat authentication. A more robust method that limits authentication and increases the encryption should be used.
  • Bluetooth implementations normally imit the PIN number range. A PIN number is usually only four digits and the scalability for large environments is difficult.

Additional Sources of Information on Bluetooth Security

Bluetooth versus Infrared

The major advantages of the Bluetooth technology over other communication technologies are its being cheap, wireless and automatic.
A data transmission technology comparable to Bluetooth is IrDA or infrared communication much like what your remote control devices use to control the TV, stereo, air conditioner etc. The big drawback of this type of technology, however, is the requirement that the two devices establishing a connection must be within sight of one another for transmission to take place. You can only control infrared devices by pointing the remote directly at the device or lining up the infrared ports of both IR capable devices.
Bluetooth devices can communicate with one another even when they are not in the same room. In fact, even in its low power setting, a Bluetooth device can communicate with another device that is within its ten-meter radius regardless of walls, windows, or other physical obstructions.
Infrared technology limits the device communications to one on one. Thus, an IR remote control can control only one electronic device at a time. On the other hand, Bluetooth devices are capable of communicating with multiple devices at any given time.
Infrared devices, however, are less susceptible to interference than Bluetooth devices. This means that you can be sure that the data will be sent to the intended recipient without any distortion or inaccuracies. Improvements in the Bluetooth technology however minimizes this problem by enabling the Bluetooth devices to hop frequencies and communicate within a specific frequency range. Therefore, although there is still risk of interference, the chances of it happening are very minimal. If such occurs, it will happen only in a very brief period of time and a software will be available to correct any consequent distortion

EDGE

Fixed/Mobile Mobile
Circuit/Packet Packet/Circuit
Max Bandwidth 384Kb
Range Coverage area of host network
Frequency Frequency of host network
Host Network GSM
Definer ETSI (European Telecommunications Standards Institute)
URL http://www.etsi.org/
EDGE (Enhanced Data rate for GSM Evolution) is a specification for data transfer on GSM networks.
EDGE features both a packet capability, EGPRS (Enhanced General Packet Radio Service), and a circuit switched capability, ESCD (Enhanced Circuit Switched Data).
EDGE packs up to 69.2Kbps into eight timeslots, for a total theoretical bandwidth of 473.6Kb.
GERAN (GSM/EDGE Radio Access Network) is the name given to the 3GPP standards for GSM/EDGE radio access.
EDGE is an update to GPRS. In turn, EDGE will eventually be replaced by WCDMA (Wideband Code Division Multiple Access).

EDGE Compact

The Universal Wireless Communications Corporation has introduced a standard for EDGE over IS-136 TDMA networks. This standard has been named EDGE Compact.
EDGE Compact supports 384Kbits over the more limited bandwidth provided by TDMA networks.

Additional Reading on EDGE

EDGE: Introduction of high-speed data in GSM/GPRS networks is an excellent technical overview of EDGE-EGPRS.

Ethernet

Ethernet is the most common LAN (Local Area Network) technology in use today.
Ethernet was developed by Xerox in the 1970s, and became popular after Digital Equipment Corporation and Intel joined Xerox in developing the Ethernet standard in 1980.
Ethernet was officially accepted as IEEE standard 802.3 in 1985.
The original Xerox Ethernet operated at 3Mbps. Ethernet networks up to 10Gbps now exist.

Ethernet Cabling

The first Ethernet standard, 10Base-5, ran over thick coaxial cable. A later standard, Ethernet 10Base-2, ran over a much thinner coaxial cable. These two versions of Ethernet were colloquially known as thicknet and thinnet.
Modern Ethernet standards run on UTP (Unshielded Twisted Pair) or fiber-optic cabling.
Ethernet Standard Cable Specification
10Base-T Category 3 UTP
100Base-TX Category 5 UTP
1000Base-T Cat 5e UTP
1000Base-SX Optical Fiber

Ethernet Topologies

Ethernet 10Base-5 and 10Base-2 used a bus topology. Bus topologies were difficult to maintain and troubleshoot.
Modern Ethernet networks use a star topology with an Ethernet hub, switch, or router at the center of the star.
It is still possible to create a two-node Ethernet network in a bus topology using a null-Ethernet cable between the two devices.

Ethernet DTE and DCE

All nodes on an Ethernet network are either DTE (Data Terminal Equipment) or DCE (Data Communications Equipment).
Ethernet DTE are devices such as computers and printers which are trying to communicate on the Ethernet network.
Ethernet DCE are devices such as switches and routers which are trying to help other devices communicate on the Ethernet network.

Ethernet CSMA/CD

Like any network, Ethernet must have an algorithm for determining when each network node is allowed to communicate.
In Ethernet, this algorithm is known as CSMA/CD (Carrier Sense Multiple Access / Collision Detection).
CSMA/CD has proven to be a very capable, if highly anarchistic, algorithm.

How a Wireless Router Works

A wireless router is a wireless device that connects one computer or a whole network to another computer or network. It is possible to have a wireless network in your home or office. You will definitely come across wireless networks at most international airports. A wireless network is powered by a wireless router, which is responsible for sending information from one computer to another. The router will help you to share a single Internet connection between two or more computers, which can be on the same floor or even on different floors.

Working

A wireless router works in a similar manner as a wireless mobile phone. It is connected to a broadband cable or a Digital Subscriber Line (DSL) Internet connection and makes use of radio frequency wireless waves in place of telephone cables to broadcast and collect wireless signals. It allows data communication from one place to another. The information from the computer system is converted into a wireless radio signal before its communication. The wireless router interprets the radio signal after collecting it and subsequently transmits the data to the Internet through a wired connection. It can also accept data from the web, transform it into a radio signal, and then send it to a computer. A wireless network functions as a two-way radio communication system. It uses a similar method wherein radio and television programs are aired.

Models

It is necessary that you take a look at different models of wireless routers and check their specifications. Companies like D-Link have come out with some excellent high-performance wireless routers. Some other companies manufacturing wireless routers are Linksys, NETGEAR, and Belkin. Routers from these companies have excellent performance ratings.

Types

There are different types of wireless routers. The Linksys wireless-G broadband router and the Belkin router work in similar ways. These routers have a wireless access point that allows the consumer to connect to the G and B wireless connections. The routers also help connect wired Ethernet devices to the network. The devices on the network can share a high-speed Internet connection.
The Linksys wireless-B broadband router is another very popular router. It acts as a kind of a splitter for an existing Internet connection. So, as long as the Internet connection is attached to the router, all the computers that are located in your house or office will be able to use the Internet connection simultaneously. All the computers on the network will be able to connect to one another with the help of the wireless-B router.

Product Reviews

Before buying a wireless router, read the product reviews. Along with the wireless router, broadband VoIP technology is also available for long-distance communications. VoIP connections help to connect to the Internet as well as to use voice communications over the network. The wireless router antenna is a very important accessory for the wireless router. The antenna is used to intensify the radio signals emitted from other devices on the network. Hence, a long-range wireless router will definitely make use of the antenna.

Manufacturers

Companies like Micronet are venturing into manufacturing wireless networking products. Micronet has come out with its new SP916GK wireless router. This router is rated very highly for its excellent performance, and it features the latest technology in wireless routers for home and office users. Multiple users can share an Internet connection through a single ADSL connection. The router has an embedded DHCP server, a very simplified IP management system, as well as a firewall for security of the entire LAN.

How to Find your DNS Servers

The easiest way to find your DNS servers is by using the `nslookup` tool.

  • Start nslookup
  • Set your search type to NS -- this tells nslookup to search for nameservers
  • Finally, enter in the domain name for which you would like to find the nameservers
Here are some example searches for the most popular lookups:

Finding the Lincsat DNS Servers

$ nslookup
> set type=ns
> lincsat.com
Server: 66.37.143.12
Address: 66.37.143.12#53

Non-authoritative answer:
lincsat.com nameserver = ns2.anywarenetworks.com.
lincsat.com nameserver = ns1.anywarenetworks.com.

Authoritative answers can be found from:

Finding the MCI DNS Servers

$ nslookup
> set type=ns
> mci.com
Server: 66.37.143.12
Address: 66.37.143.12#53

Non-authoritative answer:
mci.com nameserver = auth61.ns.uu.net.
mci.com nameserver = auth300.ns.uu.net.
mci.com nameserver = auth310.ns.uu.net.
mci.com nameserver = DNS1.mci.com.
mci.com nameserver = DNS2.mci.com.
mci.com nameserver = DNS3.mci.com.
mci.com nameserver = DNS4.mci.com.
mci.com nameserver = auth01.ns.uu.net.
mci.com nameserver = auth50.ns.uu.net.

Authoritative answers can be found from:
DNS3.mci.com internet address = 199.249.19.2
DNS4.mci.com internet address = 199.249.18.2

Finding the Shaw Cable DNS Servers

$ nslookup
> set type=ns
> shaw.ca
Server: 66.37.143.12
Address: 66.37.143.12#53

Non-authoritative answer:
shaw.ca nameserver = ns10sc.cg.shawcable.net.
shaw.ca nameserver = ns7.no.cg.shawcable.net.

Authoritative answers can be found from:
ns10sc.cg.shawcable.net internet address = 204.209.208.51

Finding the Comcast DNS Servers

$ nslookup
> set type=ns
> comcast.net
Server: 66.37.143.12
Address: 66.37.143.12#53

Non-authoritative answer:
comcast.net nameserver = dns02.jdc01.pa.comcast.net.
comcast.net nameserver = adns.cmc.comcast.net.
comcast.net nameserver = dns01.jdc01.pa.comcast.net.

Authoritative answers can be found from:
dns01.jdc01.pa.comcast.net internet address = 68.87.96.3
dns02.jdc01.pa.comcast.net internet address = 68.87.96.4

How to Change your IP Address

The IP address is a logical address assigned to your network card in order to establish communication over the network and also to identify your computer over it. IP addresses are usually assigned by network administrators based on certain rules and regulations.

Reasons to Change an IP Address

Even if you're part of a small network routed through a single IP address, the people outside your network can see only the IP address of the gateway you're using. If you're connected directly to the Internet cloud, it's basically the same thing. You're reaching out to a certain service through a certain IP address.
If someone would want to deny your access to certain services (an IRC channel, a certain forum, some websites, game servers and so on), they'd have to ban your IP address from the system. This puts you in a dilemma. The first thing that comes in mind is to change your IP address so you can evade the ban. Ban evasion is not recommended in any way as it may lead to a longer ban/denial of access. This doesn't have to be all negative. You can wish to change your IP address due constant flooding or spam you're being the victim of.
However, this tutorial will teach you a few tips and tricks on how to get things started in changing your IP address and how to actually change your IP address once the request has been approved.
If you're one of the old Dial-UP users with phone lines connected to your computer, you're most likely going to receive a different IP address if you're going to disconnect and reconnect the service. The same thing applies to those of you using PPPoE (Point to Point Over Ethernet) based on username/password since those are not permanent connections and they have to be reestablished every time you turn on your equipment.
The real problem comes for those of you using cable modems/DSL/FTTH connections. Most of you have static IP addresses, and if you don't, you probably have a bound IP address based on your Ethernet MAC address, so it still won't change.
The best thing to do in this case is to call your ISP and ask for suggestions on what to do next. Most likely, they have a special procedure regarding IP change requests. They will either provide detailed instructions on how to change your IP address either will give you the new settings available for immediate use.
In case of flooding and harassment, you might be asked for proof to sustain your statement. Get ready to show relevant logs extracted from your firewall and anything else you feel like it's going to be useful.
Once they have approved your request, you will only have to modify your settings, if your IP address is manually configured on the equipment. If so, you will have to change it to the new one your ISP gave you.

Steps to Change Your IP Address

Operating System Steps to Change the IP Address
Windows 9x/Me users Go to Start -> Control Panel -> Network -> Network card -> TCP/IP -> IP address
Windows XP/2k users Go to Start -> Control Panel -> Network Connections -> Local Area Connection -> Properties -> Internet Protocol (TCP/IP).
Red Hat Linux Go to System Tools -> Network. You could also use tools as 'linuxconf' or 'netcfg'tool.
Keep in mind that different ISP's have different procedures related to IP address changes and if you requested an IP change once and it was approved, it might not be approved so easily the next time