Sunday, October 24, 2010

Young dart Sony lane two camps on the Blue-ray with confidence


August 23 News, Sony and Toshiba, as unable to reach a consensus on unified DVD standard has been prepared to develop their own incompatible DVD standard.

Hong Kong and Taiwan media reports, the two sides parted dart, which means the future consumers will be forced to choose between the two specifications, just like old VHS and Betamax video tape the same size are not compatible.

Toshiba said that at present, and Sony is still in negotiations, but the delay failed to reach agreement, forcing the company to start the HD DVD's manufacturing production.

Toshiba spokesman said that Toshiba "plans to launch HDDVD end product, so before the end of this month to proceed with the relevant software manufacturer." He said: "We have not set a timetable on the negotiations, but the two sides failed to reach any substantive agreement . "

Sony spokesman stressed that any future opportunities, will consult again, but he was confident of that future Sony's Blue-ray disc will be the "single standard."

New generation of DVD, will have a theater-like visual effects, while opening the possibility of interactive entertainment.

After three years of a long battle, Sony and Toshiba in April this year, agreed to consult on the standard rules in order to avoid their products incompatible regret.

Sony's Blue-ray disc is expected to have better storage capabilities, but prices are more expensive because of its current DVD specifications and very different.

Thomson of France, including some electronics companies have said their products will support both HD DVD and Blue-ray disc specifications.

Currently support Blue-ray technology include Apple Computer, Dell Computer, Hewlett-Packard (HP) Computer and Samsung Electronics.

Hollywood group, Disney and Sony Pictures Entertainment to support Blue-ray technology, Paramount Pictures, Universal Pictures and Warner Pictures will support HD DVD.






Recommended links:



Yuebuqilai the hush music - recorded a Failure of public relations activities



Lei Jun said KINGSOFT feeling lonely after the listing



Video P2P Download Storm: Openext



MOV To MP4



The new cutoff point of open source differences: the narrow and broad open source open source



E-Mail Clients Introduction



OGM converter



Wang Donglin: three relations scholar



Directory Audio CD Burners



Easy to use Communications Tools



Founder joint HITS: not only Ganqingzuoyong



Taught you how to DB2 patch



SWF To MP4



ehrecvr exe crashes easy fix



DB2 PureXML a portfolio of dynamic programming: iBatis + BeanUtils + JiBX



Extreme Programming (eXtreme PROGRAMMING) Summary



Specialist E-Mail List Management



Wednesday, October 20, 2010

Come together 3DMeNow! (1)



Cult3D Web 3D technology with its powerful 3D capabilities attracted many fans, the relevant works are also springing up one after another emerged. But a good Cult3D entries must be a good 3D drawing capabilities. This has not learned some of our 3D graphics and 3D mapping of the lovers is undoubtedly a major obstacle. Now I will introduce these fans with a display effect and function Cult3D fool software - 3DMeNow.

3DMeNow and Cutld3D Cycore the same company's products, require the same plug-ins to view. Its main function as its name - is the use of two portraits of the picture (a positive one on the right side) generated 3D stereo picture with voice. With it we can not so much modeling can be easy to create 3D picture themselves or friends. How, Heart of it! Come, let us feel it's a fool once the power it!

First, we have to weigh whether associated with the love machine. Minimum configuration: Pentium II350, memory 48MB, support high-color graphics (16bit and above). Standard configuration: Pentium III500 or higher, RAM 128MB, support for OpenGL 3D graphics with 16MB video memory. These should not disturb us now, even the Pentium 4 and also 1000 Geforce3 about it! OK, now we drive the cat access to it please come back (http://www.cult3d.com/download)! There is no free lunch, however, you must first fill in an application form to obtain the registration code, otherwise it will not let you download the life and death, even if you can from other related sites (http://www.7cai.com/ web3d/web3d.asp? web3d = c3d) download will come back after you install, not take. So you still obediently fill in the actual data it!

Then, after a long cat named after (I really envy broadband users), and finally downloaded and got a License. Installation, operation, Oh, also Zhengou fool! See at a seven to eight percent!

3DMeNow the default window has four: Fornt - positive contour processing window; Right Profile - Profile for dealing with the right side of the window; Preview - preview of 3D imaging of the window; Model Wizard - gives tips and commands related window. Our next work will be completed in the four windows.
The first step, press Ctrl + N new one 3DMeNow file, and then click Continue New Model Wizard window appears, click Fornt Imange selection window pop-up window select a large picture his handsome picture, and then click Side Image window of the selected the right side of the same handsome picture picture (note the best use of the same series of photographs, to ensure consistent and adequate light, or there will be connecting fault).



Selected and press OK key, a basic 3D picture will appear in the preview windows.

At this time we can see this 3D picture is not real pretty strange. Do not worry, we enter into the second step - a rough machining. First in the Front and Right Profile window and the window adjusted the general outline,



After moving, click the Model Wizard window Goto Feature Mode command line.



Then we can see the window in the Front and Right Profile windows are more facial contours,









Recommended links:



Graphic CAD Directory



Teach you when the HEAD: how to reduce your staff turnover rate?



Shun And Up To Appeal To The State Should Be Introduced As Soon As Possible "exception Handling Comp



Symantec said the new storm worm detected



Calculators And Converters comments



Create a simple window



Infomation Web DEVELOPMENT



Automatically change the Control once and for all so that the size of VB



how to fix WINDOWS slow startup and speed up



Higher heat blow, "Kabbah Wind" paper submitted until 15th of the Month



Picked Online Gaming



Full-width half-angle switching (five-stroke input)



Transport Stream Converter



RM to MPEG4



AVI to Zune



Tuesday, September 28, 2010

"NBA 2K10" My player - do not modify the top center of the achievements are not delegated



BS from the subject not to modify the public, everyone has their own play, my heart just sank to those who are willing to seriously understand 2K10 career mode brings some suggestions. I also use GM modified the simulation time, because the data section took 5min and 12min a computer data and Commander ... I have not the ability to present my character in the Denver Nuggets, playing coach arrangement is 36 minutes, Nene 10 minutes, the birds were 2 minutes (the poor people to continue with the birds, who told you it was arranged to play C), in addition to the first and the first two NBA summer league regular season (too little playing time) outside the field of field A +.

Since I was playing center, it only describes the growth of road center, other locations may also be used in some areas. BS, that is entered.

Defend

Said first defense is that victory to build on the defensive, but abandoned this stereotype, more fundamental reason is often to serve as center, with its slow, in many cases are within the 3-point line just Daoqian Chang PG had already started to call tactics, and apparently our poor C can only be separated from outside the system, in the early playing time limited not get an opportunity to show. Therefore, how to find a balance between defense and attack is very important. Low capacity in the case of people, we must rely on the following defensive strategy stresses.

1. Marking

Career Mode "reasonable value" (determined upper left corner of A, B, C, etc. The numerical rating) must have no need for me to say. Among them "your opponents strong position to rebound," "your opponent on the bit," and so highly targeted determinant.

First of all, to keep up on the players, press and hold the marking key moments and supported by rocker to move. Remember not to have been in the other half stay on the players too far from the point system. For example, if the opponent is Tim Duncan, Bosh such players, they will be in low-ball singles, this time to hold the marking key, and carefully observe the actions of his leave, not cheated off. Residual brain known 2K10 teammates to defend desperately to low exposed outside the 3-gap, which requires the skills to deal with the following:

First of all, and their transition defense team power forward, to relief of the other PF. If the other ball to his teammates to come to PF Singles and double-teamed, to prevent outside immediately to fill vacancies at this time will not be handed over to each other inside the ball but will continue to further the external conduction, go back inside once marking; if the other party C and expose the ball to the gap, they have to quickly go to outer space to defend, even if the other party to the PF within C within the mass can be beaten - not only did not buckle their reasonable value, not to each other succeed 3 points considered two options, whichever is the practice of light, because residual brain can not solve the current problems teammates double-teamed.

2. Defend

A successful joint defense (opponents shooting range in the key by blocks), even if only interfere with a reasonable value will increase, so the right to defend essential. If the opponents that the line under screens, not to talk to, fixed in place - if the opponent suddenly come back, do not follow up on the center position, it should immediately go to defend, there is a high probability of cap (cap is a plus ); If the defender against Fang Zhongfeng break up, do not go to defend guards, as if to pass on players to succeed, but one vote to penalty points. At this point prefer to let each other do not let their guard points deduction a reasonable value, in the United States worked hard to be selfish or mainly ah ~

In addition, building an offensive foul is a plus tool, but fast-break pass the computer 2K10 very sharp and can cause very low, so this should be predestined not explained.

3. Defensive rebounds and counterattack

Nature is a plus rebounds a successful niche that (hold down the other shot after marking key) is also a plus one of the elements, even if the other goal is to add points, so the pie must be discarded.

I have been using a proprietary model that career perspective, personal feel for the rebound of the judge is very helpful, very suitable for inside players. Before rebounding to note cards place, this time across the restricted area will be in the cards mate PF position, if found to bomb the ball to the opposite opinions on not pursued, and this not only gave up an extra card bit it can not get rebounds.

If you happen not when the other shot inside card bit, then do not go inside, quickly run to the other half. If the ball does not have the opportunity to play into the counter, not only fast-break dunk high score, and enters the TV playback is a plus; If the ball into, do not enter each other's 3 seconds area, and to return to the other players do not focus on prevention ( individuals generally have 2 or so) of regional tension, once the ball to his teammates the ball immediately PG (this time the ball will not be sentenced to the "wrong the ball"), slide the bottom line (not by acceleration) and scratching into the layup (I use This method I do not know how many points ... basically took another pie).

4. Defensive counter-attack each other

Once steals one's own or shot does not enter, will be on the counter, and quite counter-2K10 computer experience, their defense has to be said. The other two-or three defensive line is to stand fast attack first place, must not stand in a reasonable area of the arc collision, because the computer will not be so stupid as to rush you go.

If the two-lane fast break, the players will catch the ball outside his teammates team, this time you should be in a small arc of the other side of the station is good, this time to empty if the other side is an offensive foul; if the other perimeter players to choose their own, you are have adequate opportunity to defend blocks, but not too early to defend.

If fast-break three-line, that the above situation will be passed to third place after the other players. Under such circumstances, do not want to create an offensive foul, but rather to stand within a reasonable collision zone of interference, such other party will terminate the fast attack, to attack positions.

Attack

At this point you move on to look a big title "defense" following those remarks. After reading the What? Our offense is starting from such circumstances.

1. Shun under

Nash and Stoudemire Suns classic tactics can be described as time-tested, to become a top center, it is necessary to study ~

Suppose 1: Our C is the other half of the last one to arrive at this time has not yet begun Call PG tactics. To immediately go to the PG to be a Trying (crotch dribble button) if your PG has successfully used under screens around the defender, even if no breakthrough is successful there will be bonus points. Trying to bypass the other party immediately after the completion of two defensive players in the middle and to run the ball low, then 90% chance that no one defending you.

Assumption 2: PG has begun Call tactics. Under normal circumstances there is no off position when the center when the PF and SF will be in the low position, this time to stand high 3-point line waiting for the opportunity the arc, once the PG to the ball, not the other side cut into the restricted area immediately double-teamed and it's central, standing in the basket to the ball (if the other side began to double-team and the players do not want to be on the basket ball, the ball will be sentenced to unreasonable). This approach almost any tactic to achieve, will not let his teammates left the limited shots (good for evil, but no way to survive ah).

2. Fast break with a pass

In general, the fast break in the traditional sense we do not always thinking about the center, and if you happen to fast break in high waiting time, can refer to the previous mentioned, "defensive rebounds and counter" inside approach.

Here to talk about the fast break for a pass key. After getting rebounds or steals, dribbling to the attack itself is unrealistic, watching teammates run fast can hold a candle to the. However, as O'Neal arrived in Phoenix, put it: "I can fast break is a mass of." O'Neill waved his hand in reality the Suns backcourt will fly under the cooking too fast break like a cut melon, and In fact this case it actually does not work in 2K10. 2K10 pass system in an overreaction to a long pass into a wishful thinking, so do not wait for the sake of assists while teammate in the top 3-point line within the re-transmission, because the chances are steals too high, the price is also very expensive - Once the errors, sometimes directly to the General Comments down half a grade (eg A + to A)!

3. Offensive rebounds and second attack

ReheaterTubes Explosion buckle caught the hand of offensive rebounds, but splashed a plus, but not so easy to achieve.

First, place cards, once they have been allowed to shoot double-team pass the ball to his teammates, who would immediately bypass the defensive front, quick access to 3 seconds area. Circuit judge in accordance to the ball better place card place card point of view (with the defensive line in the Card-bit keys). Do not rush to attack after winning rebounds, and do not zone out of 3 seconds, so after two false moves layups. As the anti-interference ability and in situ pre-dunk shot capacity is inadequate, so the second attack must not be anxious, or hit rate of only 30% of normal.

If the restricted my wife too much, do not force shots, so that was sentenced to "not appropriate shot selection," and points, then passed to teammates outside of vacancies is the better choice. If inadvertently passed to the non-open player, not to stay in the 3 seconds in the region, seize the time to place around them in preparation for the next attack. Our aim is: to prevent more than teammate shot a ~ (except assists the opportunity, because sometimes the computer's shot selection was not a good teammate, offensive waste of opportunity and our own playing time!).

4. Low singles and assists

Many people may wonder why these two and the content will be placed in an unrelated write.

In fact, in the early, low singles are the worst offensive option will not only double-team experience, ability, such as low vacancy rates that we are not sure. If this game assists the task goal to brush with a low number of assists singles is a good choice.

2K10 mentioned in the computer brain disabled at all places, regardless of indiscriminately inside double teams to place players, whether you are a Kevin Garnett or Yi Jianlian (green arrow Honey Do not spray). Therefore, the game early as possible, as I said earlier, that means several offensive attack. Late in the race to become our main scoring almost double teams for a ball will be in trouble, this time is to brush assists in the moment. The details did not say, as long as double, outside will be a chance. Under normal circumstances and the center of Distance and hope that the SG, if SG3 points is very good, pass it safely, little space 3 is not advanced.

There is another method assists, but considering we do not need a lot of assists, so easy to talk about like. This method is applicable to any position players. In the three point line to the ball, the ball in the side after the SG or SF passing behind, go to the side of the bottom line. At this point the party SF / SG will be cut to the inside air, mass of the will into that simple.

5. Other attack methods

In the early jump shot, do not mention, unless you want to Nerishige Nowitzki or Okur, plus point of this is their preference. Some games will require screening for example, "completed at least six jumpers" such tasks, are also very simple, when the light in front of defense, "defensive rebounds and the counter" in the Scarlet Letter approach, running Daoqian Chang, stopped outside the district in 3 seconds garden jumper, hit rate is still possible. And this task is to make a jump shot action as long as you can, whether or not to enter into the task can be completed.

Growing

1. Plus point

Many people see the forum, said the election team in question, and few people to discuss additional points. First of all, the first statement, although the defensive and offensive awareness plus a great impact on the General Comments, but my feeling is that if you are not handy with the characters, playing the beautiful game then the General Comments no longer high and no team would pick you. In fact, highly arbitrary center plus point, I only said a few of the more important, or call must be added, of course, is for reference only.

Rate (it costs points, in early do not need more), before rebounding, field interference, bouncing, free throws (no free throws in the game inside will eat a great loss, but do not add too much).

Do not add dunk (too cost point, it would not be able to dunk the basket, like a living), physical (needs to be emphasized is that in addition to dunk when I almost did not press too accelerated consumption of every game are not very physical), etc. .

2. Select Team

Here's election team is a summer league after 6 games to 5 games training camp, because our goal is to go is to stay, rather than NBDL, see the forum, many of my friends struggling in the D league, which is I wrote one of the original intention of this article.

Some people go to which teams can play in the discussion of the main force, and which teams have no chance. This is indeed one of the factors to be considered, but not absolute.鎺橀噾涓攱瀹炲姏搴旇璇撮兘涓嶉敊锛岃缁冭惀閲岃繕鍖呭惈浜嗗厠閲屾柉绫冲鍜屼竴涓彨闇嶅崕寰风殑鐭儢瀛愶紝浣嗘垜渚濇棫鑳藉鎴愬姛涓婂哺銆傜珵浜夊鎵嬫槸璋佷笉閲嶈锛岄噸瑕佺殑鏄嚜宸辩殑琛ㄧ幇銆?br />
銆??5鍦鸿缁冭惀姣忓満姣旇禌閮芥槸涓诲姏闃靛銆佹浛琛ラ樀瀹瑰拰璇曡鐞冨憳闅忔満缁勯槦锛屽緢骞歌繍鐨勬槸鎴?鍦烘瘮璧涘浣嶉偅涓煯鑳栭湇鍗庡痉锛屽皢鍏舵墦鐖嗭紝鏈?悗涓?満瀵瑰唴鍐呰韩楂樹篃鏈変竴瀹氫紭鍔裤?鏈変簡浠ヤ笂杩涙敾鍜岄槻瀹堢殑鍔犲垎鎶?阀锛屾暟鎹拰鍚堢悊鍊煎弻涓版敹缁濆涓嶆槸闂锛屾兂鐩存帴杩涘叆NBA骞堕潪鍙湁淇敼鎵嶅彲浠ャ?

Conclusion

銆??杩欑瘒鏂囩珷鐨勪腑蹇冨氨鏄浣曞湪鍒濇湡鏈夐檺鐨勪笂鍦烘椂闂撮噷鑾峰緱涓汉鍒╃泭鐨勬渶澶у寲锛屽湪婵?儓鐨勭珵浜変腑鑴遍鑰屽嚭銆傝繖浜涢兘涓嶇畻鏄疊ug锛岃?鏄竴浜涘疄鐢ㄦ妧宸э紝甯屾湜杩欑瘒娲嬫磱娲掓磼鐨勬枃瀛楄兘瀵逛綘鐨凬BA寰佺▼鏈夋墍甯姪銆傜澶у娓告垙鎰夊揩銆?br />






相关链接:



Printer Report



Photoshop to create my own Ferrari



Printing Machinery "pioneers", "English Education" story



Why the concept of Recurring war 3G



DivX to IPOD



Games Card Shop



Ubuntu 8.04 Active Directory: Likewise



Five-stroke input method is not just pole



Tomato Garden in France, Italy and public opinion



OGM To AVI



copyright 2



Shop Clipboard Tools



Longhorn can be run on some old computer



Acer executives boasted that Dell no longer pose a threat to Acer



ASF to MPG



Tuesday, September 14, 2010

Carried out in the end to P2P: the story about the Jxta (2)



In Jxta 1.0 specification, a running service instance is always associated with an equivalent machine (you can imagine it is a peer "server" in charge of). In a peer group, only one service instance and the specified link on the other machine. This type of service is regarded as such services; If on the other services in charge of the machine when the machine on the other, then will not have access to the service. On the other hand, multiple instances of the same service to be installed in a redundant peer group multiple of the other machine, which is known as peer group services. Peer group service is Jxta network high-availability and fault tolerance of the key. Jxta application implementation is free to put any Jxta services such as services or as a peer group service for installation. Plumbing services, and other communications shall be provided on the abstract logic of the core Jxta pipeline services, often as a service to achieve peer group to ensure its always available.

Pipeline as Jxta specification defines, in the transmission of data between such machines, files, information, code or a way multimedia content is through the logical channel. Jxta pipeline used to send messages between machines on the other (which can take any content).

A pipe instance, logically, is such a resource within the group. The actual realization of pipeline instance is usually done through the pipe service. Traditional (like UNIX's) system of different, Jxta pipeline is one-way, asynchronous. Require two-way communication two equal machines will have to create two separate instances of the pipeline. Also with the traditional mechanisms like UNIX pipes or TCP / IP sockets different, Jxta end of pipe can be connected at different times to different on other machines, or do not connect. P2P networks for service providers to achieve redundancy, the only this one single concept is a revolutionary step. On the other machine at any point in time can be logically "pick up" channels. For example, imagine you want to use a spell checker service on the other machine. It can connect to a peer group's spell checker pipeline (the pipeline is used as redundancy to achieve peer group services) on. In this case, as long as at least one instance of the spelling checker in the peer group is still somewhere within the run, the machine will also be on other services.

Jxta 1.0 specification provides two general types of channels: point to point and broadcast (propagate).

On the other machine can use pipes to connect to another point on the other machine and one-way transmission message. On the other machine can use the radio channel connected to one or more other peer transmit a message to them all. In essence, the point is one to one message transmission pipeline system, radio channels is one to many message delivery mechanism. Jxta community-many message delivery mechanism is being efforts; this mechanism has been named Jxta conductor (wire). No matter what type of pipe, through a pipe containing the information pieces are sent as Jxta news. So, the exact format of these messages is like?

News Jxta message is piped from a peer to another peer transfer of data bundle. Here, Jxta standard once again in general to adapt themselves as much as possible, so as not to inadvertently introduce the definition of the message depends on the implementation of any strategy. Message is defined as the envelope and body composition of any size beam. Envelope is a standard format that includes:

Header
Source endpoint information (URI format)
Destination endpoint information (URI format)
Message Digest (optional for security purposes)
Message body length is arbitrary, the trust can include an optional form (for security purposes) and content.

Please note, Jxta very loose definition of news. Taking into account our daily generally are reliable, broadband TCP / IP network operations, the need to do so is not immediately clear. But Jxta message format must be flexible, good at adapting to the new environment, because it may have to achieve all types of networks, not just in the TCP / IP on. Envisaged in a 256-byte packet transmission network is not reliable (like a traditional packet-based wireless network) on a Jxta to achieve, you'll define a simple message on the Jxta how to adapt itself to such an adverse environment such as appreciated.

In order to provide a standard, easy to analyze syntax, common coding scheme, Jxta message XML document format currently used. Jxta advantage of XML's universal accessibility and ease of use, easy programming, which means Jxta can use most of the programming language in most of the platform is easy to achieve. As long as the XML parser, and generate database is available there. However, Jxta of the design was to write a message code is not dependent on the use of XML. While it's unlikely, but Jxta communities included in a future version of specification (or requirements) based on non-XML message is entirely possible.

Identifier from the potential of speaking on Jxta, on the whole peer group might be linked with the universe as large. In the name of such a large space for any matters that the only name is a challenge. To address this problem, Jxta to Jxta components can be set to address each instance is assigned an internal identifier. This identification is carried out by a UUID, UUID is used to ensure that time and space are very high probability of the algorithm to generate only 64 bytes of digital. Jxta identifier is a URN (Uniform Resource Name) format, and is embedded in the advertisement for internal use. Defines four types of identifiers currently used to identify peer group, on the other machine, pipe and code / data (code / data) (abbreviated as codat).

Advertisement
Advertising messages a bit like "cousin." Jxta ads using XML document format. Describe the content of advertising, such as peer, peer group, pipe or service Jxta component instance properties. For example, you can visit another ad on the other machine on the other machine can try to connect directly to the peer machines; can access a peer group of ads on other machines can join the peer group advertisement. The current Internet with ads similar to what is the DNS domain name and Web site records. Jxta specification does not stipulate how to create, disseminate, or destruction of advertising.

The basis for interoperability: Jxta protocol interoperability Another key is the fact that: the core Jxta peer interaction model is fully represented in the underlying network transmission of a simple protocol. In other words, since the protocol and message format is well-defined, then Jxta-based interoperability between systems are fully capable of Daoxian level reached.

For example, a simple PDA (8-bit processors, based on C language programming) can be a running packet-based wireless networks Jxta on the other machine, it can be the same peer group with a variety of systems, from PC servers to mainframes, to interact. If on the other machines to share a public network (Carrier) and is using Jxta communication protocol and message format, which can be done.

Sun has provided a preliminary Jxta Java language. Jxta community now has the reference implementation. The reference implementation for those who want to start the Java programmers to use Jxta things become simple. If you are non-Java platform to achieve Jxta, then the understanding of these agreements is very important. Table 2 briefly describes the core set of Jxta agreement, covering the discovery (on the other machine how to find each other), advertising (on the other machine on the other machine how to understand the other peer groups, pipes and other information), through the communication pipe and peer group membership handling. All of the following agreements are based on XML message exchange transmitter on the basis of. Similarly, they can use almost any programming language implemented on almost all platforms.

Table 2. Jxta core protocol

Jxta specification does not require such machines to achieve all of the above agreements. Any particular realization of the other machine only to those who actually use the protocol.

Jxta system based on some interesting properties
Now that you have a theoretical component of the Jxta platform have a basic understanding, we have to discuss the design results as Jxta some interesting properties.

"Electronic heart" of anything can become a Jxta on the other machine, theoretically, there is a text string generated the most simple equipment capacity can be added (although not in every P2P applications are necessary) to Jxta network. This is how it possible?

In P2P networks, over-simplified the equipment needs of the other agents. The agents can represent the simplified device (or more simplified device) implementation, the advertising and communications. Agent can be rigidly fixed in position simplified equipment. Thus, an agent with the help of simplified equipment on the network can be Jxta fully qualified peer. For example, a body tied to a turtle and to wirelessly send the location information with GPS Locator Jxta message, the network can be Jxta a peer.

Uncertain network topology in the order
Another typical Jxta network charming aspect is its inherent uncertainty of the topology / response structure. Computer users are often used to determine the nature, the synchronization of the computer system, and that this is a standard structure. For example, when we issued a Web page the browser requests a URL, we expect the output will appear immediately. We also hope that everyone in the world can use the same URL from the same Web server to retrieve the same page.

In Jxta world, not a specific request for resources in a few minutes, hours or even days to return; In fact, it may simply not return. In addition, request the same resources, people around the world are likely to get is completely different from the resources of the server copy. This raises a question: uncertainty system any good?

Inspiration from the grassroots software revolution
We only have to look like Napster and Gnutella P2P systems such as pop can find the answer. Here are some additional advantages of their features (which make the loss of synchronization and uncertainty have become worth):

Content availability.
On the other machine can access content from multiple servers, ideally close to boot from a server running gain. Original source of the other machines do not have a resource request for each service; In fact, it is not even switched on. The most optimal use of network bandwidth.
Typical of today's Web, local traffic congestion will not affect the concentration of lead in the P2P network.

Lower the cost of content distribution.
P2P networks can absorb the contents and copy it to make it easy to access.

From the network, each node of the computing power of balance.
Asynchronous operation, you can issue a number of resources or service requests, and then let the network for you to complete the work.

Unlimited scalability.
A well-designed P2P application can not affect the scalability limits which connects across the entire known universe; which is concentrated in any type model is completely impossible.

Jxta in perfect world, we will not perform asynchronous request deterministic networks. Weird do you think of this idea? Let us use an example to illustrate. Imagine a P2P network based on Jxta of running Web-based music request service. On the other machine submitted several requests for music files and some time to verify the group's request for such service is to find these files. When we check in for some time to music request service, some of the requested documents have been found, but others can not locate. Service response to those documents are: the choice and availability of music is constantly changing; Please try your request again later. This is an acceptable uncertainty of the results: Although the service could not find a file, but if we submit the same request again later, perhaps that file available, because we want the head of the file on other machines Then maybe a line.

When placed in the context of a specific time, the concept of uncertainty in the network no longer seem so strange. In fact, most of us probably will accept and use such a music request service. Some of us are even willing to pay for such a little cost of the automatic proxy, such proxy will continue to monitor the availability of the selected file, and then for us to take and store a copy of them. P2P computing is one of the great charm: a balanced and shared all over the world the ability to connect with the resources, I hope is an orderly and civilized manner.

The talk is finished, but the first few commercial breakthrough Jxta/P2P application was probably because of the certainty and synchronization as the main features of their pride. This is a necessary transition, because the user's habits and market orientation will not change overnight. If there is no mandatory reason, then the future will not change. The new P2P model will slowly emerge, at first may be based on a mixture of forms. A current example: Edge Communication (edge-propagation-based) network caching technology, such as Akamai, is deterministic, centralized Web on the specification. These techniques use the concept of P2P-style centralized server in the world to achieve optimization of content delivery.

Sun does not set out strategy to achieve its Jxta decision to make it free to move on and eliminate these arguments, pass the buck on who pioneered the content delivery technology pioneer Jxta their shoulders. However, at this stage, Jxta technology is based on the potential of community development make it the global control of IP (intellectual property) owners and the public good balance. Open Jxta community could serve as a forum, IP (intellectual property) owners and technical experts in this forum to resolve their differences.

Perspective Jxta, it is how. Net and Jini contest
Since Jxta are introduced, and it has been brought, and each can imagine comparing the network technology. Even the prestigious business magazine, has inadvertently left out of this innovation, because it obviously does not and the main competitor's flagship product hype contest. Jxta project is a unique "monster." In discussing the time it will not have any ready reference. Therefore, it must be evaluated independently.

To be sure, Jxta XML-based messaging and Microsoft (Microsoft)'s. Net and SOAP technology is similar. However, this relatively weak basis for comparison. As more and more third-party agreements used XML, it is clear only XML as the message format for the actual network technology and can not show much. The high-level, policy-rich, Web-based services based structure. Net and essentially low-level, basic, neutral Jxta strategy compared to pieces of meaningless things.

Jxta works and Jini projects are fundamentally different. They are both at a high level of interaction have some similarities, are able to achieve truly distributed computing network. However, a parallel was there came to an end. Because the real future of distributed computing is still only an idea, so it is easy to underestimate the Jxta and the difference between the Jini project, despite the fact that we have established in the relatively more client / server or multi-server technology is not realized will do the same thing.

Both the clear differences in strategy are: Jxta at the outset to fully interoperable technologies (any platform, any programming language, any vendor) of the face appears. Sun is the only company engaged in the community. Jini is a Java-centric technologies as a strategy, Sun will integrate and apply it to provide products in the future. Sun Jini development will maintain a certain degree of control.

No Java platform (code flexibility, RMI, etc.) support, Jini's relevance will be limited; on the other hand, Jxta is completely independent of Java's decoration. From another perspective: Sun Jxta only in promoting the growth orientation, while the Sun and Jini is there between the growth of more interest. Over time, Jini will be Jxta's "increasingly inward-looking cousins"; it as an embedded technology is used to enable the deployment of many products. Jxta fate, on the other hand, will depend on the technology involved in the opening members of the community's enthusiasm and creativity.

Jxta versatility
Mechanism rather than requiring the provision of infrastructure strategy, Jxta foundation for many P2P applications are available and valuable. Here are three other common Case Study:

On the other machine's users to search and share files within the peer group, information and content
Peer to peer group to use only in this particular peer group can be used for specific services
Peer group on the other machine through the gateway and between peer groups through the instant messaging system
Of course, the possible applications are endless, many of which have yet to be developed or even conceived.






Recommended links:



IPTV Will Be Better Than "the Right To License The Move"



Can all four Fanggao Peng effectiveness of the upper floor by Show



New Seasonal - SCREEN Savers



Video converter mp4 to mpeg



Why is throwing money at very odd Tiger VC Zhou Hongyi good "Fudge"?



Visuanl C # 2005 Quick Start of the while statement (1)



Matroska format



Premier Access Control



Trojan Horse Is How To Work



Understanding Of EIP



The United States too much control over the domain Name is popular in China CN domain name



How To Draw Background Image CAknGrid



Easy to use Font Tools



Ape Files



Vob To Flv



Wednesday, August 4, 2010

Bain Capital 2.2 billion acquisition of 3Com Huawei is the biggest winner



September 29, according to foreign media reports, the network equipment maker 3Com yesterday accepted the Bain Capital and Huawei 2.2 billion takeover offer. Some analysts believe that Huawei is the biggest winner in the deal.

U.S. private equity firm Bain Capital (Bain Capital) yesterday jointly China's Huawei to 2.2 billion acquisition of network equipment maker 3Com. This reflects the desire of Huawei's expansion and determination of the international market.

This, RBC Capital analyst Mark Sue said: "Huawei may be the biggest winner in the deal, at least for now has to enter the U.S. market." But Mark Sue also pointed out that Huawei is also facing challenges. After all, the low prices in some markets is not appropriate.

And Duncan Clark, chairman of BDA China, said: "This transaction demonstrates Huawei's desire to expand the international market, they want a more powerful international brand."

In this regard, Huawei CEO Ren Zhengfei, said: "This is a commercial investment for Huawei. We believe, 3Com after the reorganization, will provide consumers with better products and services provide customers with more value."

3Com CEO 鍩冨痉鍔犻┈鏂?years (Edgar Masri) said: "This transaction will help 3Com network equipment in the global market leading position, while our employees, customers and partners will benefit."







相关链接:



"Abnormal" Jason Jiang: year one is Moral derailment



Premier Puzzle And Word Games



f4v Converter



Addition and subtraction of the value chain



Tyson Foods to eliminate non-value-added production processes



Sybase Basics



Visuanl C # 2005 Quick Start of the while statement (1)



Tencent sued Staff: to protest the labor contract Tencent Overlord



dvd RIPPER



PS Mercator making sphere effect (3)



.mkv Files



Evaluate Kids Education



Who can resist the layoffs hit the door



free mp4 to 3gp CONVERTER



Mars text input text input V2.7.2 version of Easy Fun



Monday, March 1, 2010

M4A to APE Deluxe

M4A to APE Deluxe - A powerful audio CD ripper, CD to MP3 ripper and CDA to MP3 converter which can convert CDA to MP3 and rip CD to MP3. With this excellent audio CD ripper, CD to MP3 ripper and CDA to MP3 converter, you can convert CDA to MP3 and rip CD to MP3 at your own will.
It is very easy to use. It can Convert WAV files to MP3, CD, CDA, CD-R, DVD-Audio, AAC, AC3, ID3, M3U, M4A, M4P, MP3 ID3 Tag, OGG, RA, WAV, WMA, MP2, APE, VQF, MPC, AMR, Midi, WAVE, and RM. It makes direct digital copies from audio CDs and saves them as MP3s, WMAs, OGGs, or WAVs. It have fast speed. It can Convert WAV files to WMA. Just click on one button a CDs will be extracted.



Recommand Link:



Mpg converter free download



Sunday, February 21, 2010

Cool Sound Suite

Cool Sound Suite supports the multi-threaded operation of copying a CD and generating mp3 files at the same time. Cool Sound Suite makes direct digital copies from audio CDs and saves them as MP3s, WMAs, OGGs, or WAVs. Cool Sound Suite is very easy to use and have fast speed. Just click on one button a CDs will be extracted. Cool Sound Suite can also Convert WAV files to MP3,WMA and OGG files.
Extract and save audio tracks from CDs to MP3, CD, CDA, CD-R, DVD-Audio, AAC, AC3, ID3, M3U, M4A, M4P, MP3 ID3 Tag, OGG, RA, WAV, WMA, MP2, APE, VQF, MPC, AMR, Midi, WAVE, and RM.



Recommand Link:



3g2 to iaudio q5w changer