Jumat, 30 September 2011

Lenovo ThinkPad X220: Ultraportable A Best-of-Breed

The Lenovo ThinkPad X220 ultraportable replaces the X201, is sure to be a hit with fans of ThinkPad - and, above all. It's fast and lightweight, with a 12.5-inch wide, and continues the tradition of the entry of the company excellent ergonomics, a touchpad with no buttons and keyboard innovative long career. It also provides an excellent battery life that can be stretched to a whopping 23 hours with a mounting bracket of the battery. The downside? Not much, really. Shaped box of laptop, pragmatics and the bridge a bit crowded keyboard may lack sex appeal that some users are looking for.

The exact prices for different configurations of ThinkPad X220 is not available at this time: The starting price should be $ 979, with additional costs for the best processors, SSD instead of standard hard drives and more RAM. Wide range of Intel Core i7 processors Core i3, the unit supports up to 8 GB of system memory and storage options to start with a hard disk of 160 GB hard drive and finish with a 160 GB SSD. The above 12.5 inches, 1366 x 768 pixels is available in two versions: one with an IPS panel for wider viewing angles, and one without.

Our test model for $ 1,299 (the March 25, 2011) - with its 2.5GHz processor Core i5-2520m, 4 GB DDR3 system memory and 7200 rpm, 320 GB hard drive - became an excellent rating WorldBench of 6122. Not only that, but the Intel integrated graphics GPU HD 3000 actually got frame rates in some of our gaming tests of light, reaching 41 fps at 1024 x 768 Unreal Tournament 3 with medium detail, and 32.5 fps high details. And movies in 1080p, but the variety of broadband to play as well as you could wish for. Performance of all jobs outside of gaming enthusiasts and workstations for high-end 3D applications is not a problem with the X220.

Some of these keys are a bit rare in the ThinkPad X220 as CES and extra-large Delete key above the keys in alphabetical order. However, unlike the key characteristics of other providers, not help, hinder your writing. As usual for Lenovo, the feeling of reaching the keyboard is simply excellent. The touchpad is a model without button - you press the left or right before you click, making it easier to use than standard buttons when using the thumb and forefinger of one hand. Normal two Buttons are placed above the touch screen, and Lenovo TrackPoint device Eraserhead is also present. Muting the microphone and webcam 720p join the dual control volume and ThinkVantage buttons (toolbox) above the keyboard cover.

X220 Battery life is excellent, and you can get the best options. Our test car with a six-cell battery, ran a cool 7 hours, 15 minutes. You can also choose from three different phones and batteries of nine main cells, less weight, or time in the long run, and at the bottom to add $ 179 extra battery. Slide adds 0.4 cm thick, but almost double the battery life of more than 14.5 hours. World traveler, the extra 1.6 kg weight, and most acceptable compromise.

The ports and connectivity in the X220 is top notch. The system has three USB ports, one of which is on (for charging cell phones and other), even when the laptop is off. Optionally, the Core i7 processor, a USB 3.0 port can be. You will also find an ExpressCard slot, SD card slot, switch, Wi-Fi, a VGA port and a Gigabit Ethernet port. A dock is available with a multiformat burner, onboard Bluetooth, and Wi-Fi 802.11n dual-band (2.4 GHz and 5 GHz). Our test laptop came with IBM finger biometric sensor to facilitate the sliding of security.

If there is something to watch out for the X220 is the number of "value added" applications and processes background unnecessary. Windows 7 operating system business has almost all functions of the software, you need a laptop, but on our machine a look at the Windows Task Manager revealed that nearly 90 ongoing process, and nearly 30 percent memory usage - without a single-user program running. One or two basic applications are valid, such as Bluetooth or manager tool that stops the hard drive if dropped, but the extra battery meter and WiFi dealers are usually unnecessary. A trial version of Norton Internet Security and Microsoft Office 2010 Starter is provided.

ThinkPad users will not find any mind blowingly different from this last series x2xx, but the improvements are significant, and all will improve the usability of the system. If you are not looking for super-sexy laptop, or if you are trying to get out cheaply, the Lenovo ThinkPad X220 is better than going to an ultraportable.

What to Expect From Apple’s 2011 iPhone Event


Steve Jobs might not be presiding over this year’s long-awaited iPhone announcement, however that’s not putting a damper on any of the joy. Rumors of the coveted new mystery product (or products) are swirling for months, however Apple can finally pull back the curtain at its Oct. 4 event.

Hard and quick details are few and much between, however we’ve got a fairly smart chronicle in predicting new iPhone and MacBook announcements within the past. therefore we’ve taken a glance at what very little info there's obtainable, and here’s what we expect is awaiting us down at one Infinite Loop return Tuesday morning.

The Next iPhone
Powering the iPhone five can possible be an A5 processor, as it’s been noticed in purported photos of the next-gen model’s insides. the newest news conjointly points to the iPhone five touting one GB of RAM, that makes for higher gaming, browsing and a lot of memory-intensive tasks.

The rear-facing camera may conjointly get a bump up from the present iPhone’s five megapixels to a sharper eight megapixels. That’s the magic range for the business currently, with Android smartphones just like the Samsung Galaxy S II and Motorola Droid three already touting the maximum amount. Photography is vital to the iPhone expertise — particularly with iOS-only apps just like the ever-popular Instagram — and that we don’t see Apple skimping out in that space.

Appearance-wise, the iPhone five could sport a replacement metal back, as opposition the iPhone 4’s glass-covered rear. Case style mock-ups purpose to a tool that’s incredibly skinny, with tapered edges and a bigger, edge-to-edge show. variety of mock-ups and case styles are showing an elongated hardware home button on the device, that looks somewhat odd to us, as we tend to thought Apple would be a lot of possible to get rid of some hardware and switch that button into a capacitive-touch house.

A Budget iPhone
We were inititally skeptical that Apple would unharness 2 iPhones this fall, a replacement iPhone and an incrementally updated or budget “iPhone 4S.” however hints from completely different sources recommend that a budget “iPhone 4S” may terribly possible build an look at Apple’s iPhone event.

For one, Apple board member Al Gore used the plural kind when he said there would be “iPhones popping out next month” at a conference he spoke at in September.

CEO Tim Cook conjointly previously stated that Apple wouldn't be “ceding any market” which “price could be a huge consider the prepaid market.” Feature phones conjure with reference to two-thirds of the nation’s movable scene (not to say foreign markets like China and India, where the prepaid phone market is huge). By manufacturing a budget iPhone, with reduced storage capability and cheaper information arrange choices, Apple may reach out to an outsized portion of the market that’s been holding out on buying a smartphone.

Sprint iPhone, No T-Mobile iPhone
In a shot to achieve ground among the growing legion of Android users, Apple could introduce the iPhone to a 3rd carrier — particularly, Sprint — additionally to its existing relationships with AT&T and Verizon.

Increased distribution could be a key part of Apple’s selling strategy, per Shing Yin of Citadel Securities, a footing that wasn’t a significant concern when the iPhone initially embarked on the smartphone house.

T-Mobile recently confirmed it'll not be carrying the iPhone this year. T-Mobile subscribers can need to get their smartphone kicks with Android, that the network is wholly embracing.


iOS 5
We’ve seen an iOS five preview at WWDC 2011 earlier this year, and it’s been obtainable to developers in beta kind for a few time, therefore there aren't any surprises here. With iOS 5, ensuing iPhone can house variety of options currently accomplished by third-party apps. Examples embrace photo editing (something Camera+ currently excels at), image and document sharing (which falls within the realm of Dropbox) and a “Read Later” functionality (currently performed by Instapaper).

iOS conjointly seamlessly integrates SMS and MMS messaging with iMessage and can permit for FaceTime-ing over a 3G association instead of simply a Wi-Fi association.

Voice management
One of the newest bits of exciting news we tend to could also be seeing Tuesday is that the introduction of voice management on the iPhone. This purportedly comes by approach of a feature referred to as Assistant, a chunk of software designed by Siri, a start-up Apple purchased in 2010. Assistant can solely be able to run on the iPhone five, because it needs its beefed up CPU and extra memory.

Assistant would allow you to tell your phone one thing like “Send a text message to Joe Schmoe saying I’m getting to be in city next Wednesday,” and then it'd complete the task. it'd even have a conversation mode to glean a lot of info from the user so as to produce optimal results.

No Steve Jobs
It’s unlikely that Steve Jobs can build a surprise look at this year’s iPhone announcement. Jobs stepped down as CEO. It’s new CEO Tim Cook’s time to shine currently, and his place to steer the event. Like past announcements, there'll in all probability be some of executives — VPs like Jonathan Ive and Phil Schiller — taking turns introducing and demonstrating the varied new and improved options of the phone. however Steve Jobs won't be stepping out from behind a black curtain. If there’s “One a lot of thing…,” Mr. Cook are the one dangling the carrot on a string.


source

Kamis, 29 September 2011

How to Hatch a Dinosaur

People have said to Jack Horner, he is crazy before, but it has always proved to be true. In 1982, with seven years of undergraduate work, a passage in the Marines, and a concert as a researcher paleontology at Princeton Horner got a job at Montana State University Museum of the Rockies in Bozeman. He was hired as a preservative, but soon told his bosses he wanted to teach paleontology. "They said this would not happen," recalls Horner. Four years and a MacArthur genius grant later, "they told me to do what I wanted." Horner, 65, continues to work at the museum now filled with his discoveries. He has not an academic.

As a child in the 1950s, the dinosaurs were reptiles was mainly cold, lonely animals, real monsters. Horner did not agree with this image. He saw hundreds of millions of dollars a year of sociability tips skeletons, animals living in herds, unlike modern reptiles. Then in the 1970s, searched Horner and his friend Bob Makela discovered one of the most spectacular dinosaur still a huge nesting site common duck-billed dinosaurs in northwestern Montana, with adult fossils, the young and eggs. They found evidence of many a crazy idea: parents on the site took care of their young. Judging from their skeletons, the child would duckbills were too weak to eat on their own.

Horner was to find evidence to suggest that, once born, the animals were growing rapidly (crazy idea number two) and possibly warm-blooded (that would be three) and continues to lead in searching for antiques organic matter in fossils survived intact (number four). Add in his work as technical consultant on the movie Jurassic Park and Horner has probably done more to shape the way we currently think about any paleontologist dinosaurs alive.

All this means that people are more attentive to the caller crazy these days, even when he said what he intends to do next: Jack Horner wants to make a dinosaur. Not from scratch, do not be ridiculous. He says he will do so by developing a reverse-chicken. "It's crazy," said Horner. "But it is also possible."

In recent decades, paleontologists, including Horner, found sufficient evidence to show that modern birds descended from dinosaurs, but the way they lay their eggs in the nests of the details of bony anatomy. In fact, there are so many similarities that most scientists agree that birds are really dinosaurs, the most closely related to two-legged carnivorous theropods such as Tyrannosaurus rex and Velociraptor.

However, "closely related" means something different for evolutionary biologists is needed, for example, people who write the laws of incest. Everything is relative: Humans are almost indistinguishable, genetically speaking, chimpanzees, but on this scale, they are also very difficult to distinguish, for example, bats.

Tips for long-extinct creatures, evolution of the echoes of the past, sometimes arise in the real world, they are called atavisms, one of the few people born with distinctive evolutionary antecedents. The whales are sometimes born in the contours are reminiscent of the hind limbs. Human babies enter the world, sometimes with fur, her nipples more, or very rarely, a queue itself. Horner's plan is basically to start creating a atavisms experimental laboratory. Old enough to activate the properties of a single chicken, reasoning, and you'll find something close enough to be the ancestors, "Saurus". At least that's what launched this year's TED conference, an annual gathering of the Technology, Entertainment and Design held in Long Beach, California. "When I grew up in Montana, I had two dreams," he told the crowd. "I wanted to be a paleontologist, a dinosaur paleontologist, and I wanted to have a pet dinosaur."

Already, the researchers found disturbing evidence that at least some of the old dinosaur may be activated again. Horner is the first to admit that they did not know enough to do the job himself, so he is actively searching for mates developmental biology post-doc to join his laboratory group in Montana. Horner has big ideas, and seed funding.

Now all I had to make it happen, she told the TED audience, had a couple of steps forward in evolutionary biology and genetics and all the chicken eggs that could get my hands on. "What we're trying to make is that we need to channel it, edit it, and do," he said, "chickenosaurus".

No Joking: Feynman Is Brilliant

I have a confession: I did not really know much about Richard Feynman. Well, ok, I knew a little role to Los Alamos from a history class and I knew little about his personality and unconventional love to play tricks, but I had not read or saw one of his lectures, or read every biography until recently.

Last month, the first books published second Feynman, a comics biography of the "smartest man in the world" written by Jim Ottaviani and illustrated by Leland Myrick. Ottaviani is no stranger to this type of non-fiction comics. He wrote a couple of comics based on science such as T-Minus: The Race to the Moon, a comic book biography of Niels Bohr, and Fallout, a book I read years on manufacturing the atomic bomb.

Feynman is primarily a chronological biography of Feynman, after both their professional and private life. Switch back and forth a bit ', but most of it is presented in order of time in college working in the bomb to win the Nobel Prize for his work in quantum electrodynamics (QED). There are stories of her younger sister, Joanna, who was discouraged to go to their parents, but I ended up science scientist anyway. When we follow Feynman at Los Alamos, the story does not focus on the actual work he has done, but also take advantage of his safecracking, and his frustration is directed at a specific type of military solution to the problem.

The book is brilliantly written. Ottaviani Feynman makes the times, sometimes with comic VoiceOver, and sometimes to transmit information through interviews with Feynman's having with other people. Why is comic, Myrick will be able to make free graphics, from time to time at the top of Feynman's thoughts on reality, says visual effects Beautiful Mind. There are also some parts of QED that show, and secular terms short, what Feynman was awarded the work around. These were a series of lectures in New Zealand, attempts to explain his work, he is a scientist friend Alix. All have been carefully studied, and at the end of Ottaviani offers long list of sources to show where he got his information, and give the reader a starting point for further discussion of Feynman.

The artwork looks like Myrick established and is fun to watch. They quickly get used to Feynman crooked smile and tousled hair. No detail is enough to evoke the scene, but it will not photorealistic or action Marvel dynamic style. Instead, you get a style that seems perfectly suited for connecting a biography: it is true that you know what events are real, but abstract enough to not assume that everything is word for word, either.

If you are a fan of Feynman, or, like me, only to dip their fingers in the subject, Feynman was an excellent portrait of a fascinating man. When you're reading this, I am very interested to follow some of Feynman's own writings, even if my body is a bit 'rusty.

You can pick Feynman Amazon or directly from MacMillan (parent company of First Second). You can also see flashes of some of the inside pages of the site MacMillan. Finally, here's a short video trailer for the book that shows some pictures of the book, put the audio plays drums Feynman:

Ex-NASA Man Squeezes Cloud-ROM, USB Stick


Yes, you can adapt a cloud in a USB key.

Founded by a number of the brain, which has become pregnant OpenStack - platform open-source software to build Amazon-like "cloud infrastructure" - San Francisco startup Stitch Cloud Computing has reduced the platform on a Memory Stick to simplify the creation of such clouds behind a firewall.

Set for unveiling to the open-stack next week's conference in Boston, this "key cloud" includes piston is based on Linux Pentos. According to the company when deployed in a key network switch allows you to configure an open cell cloud in a few minutes.

"This is the startup disk of your private cloud", says CEO Joshua McKenty piston Wired, and said the key was inspired by the old firewall Linux-based mobile floppyfw. "It takes all the settings on the hardware side. Let the program is contained in the servers to work."

McKenty the way described, a key administrator connects to a PC and sets the parameters of a cloud - an online service that provides access to highly scalable resources, including computing power and storage. A technician takes the key in the data center and connects to the network switch in a rack of servers. According McKenty, Pentos load the appropriate servers automatically detects and configures the cloud.

Cloud set to ram the key is presentation of the conference next week in Boston OpenStack. In addition, to facilitate the installation process, you will improve the safety of "private cloud". McKenty key, he says, you can limit an employee to access the server, and is one of the first products to adopt cloud auditorium, newly standard designed to ensure that the cloud follows the Federal Internet Security Management Act, HIPAA, PCI and other legal requirements.

McKenty was technical architect of the project of NASA Nebula, an effort to build an Amazon EC2 cloud infrastructure-like to use within the European Space Agency and the entire federal government. Last year, NASA open source code behind the project, and he was soon joined Rackspace vendors to create open-cell project. The code was nebulous platform open stack and open source Rackspace code for the storage platform.

NASA originally built nebula with Eucalyptus, an open source project started at the University of California at Santa Barbara. But after the foundation launched a home for the Eucalyptus platform marketing, the space agency has estimated that the project was not as open as could be, could not contribute the code you need help. At least in part, OpenStack is a response to these frustrations.

"We are committed to maintain this openness," McKenty said before the piston hosts have meetings every week with what could be considered as competitors in the space of cloud computing. They share the same beer, he adds. But it has a very different approach than VMware, which occupies the same space with its own platform vCloud. "Linux is against VMWare vs Microsoft OpenStack again," he said.

History Explosive Volcanic Mercury Revealed

Smallest planet and the solar system's innermost came into focus more than before. Although only half of his first year in orbit around Mercury, the MESSENGER spacecraft has revealed that the planet has had a much more dynamic than previously imagined and fire.

"The data obtained by the MESSENGER image system in a few months ago, has revolutionized the way we think about volcanism on Mercury," said geologist James Head of Brown University, science team member at a conference probe NASA press release today. The team also published a series of seven articles in the journal Science with his new discoveries.

Mercury is the densest of all planets in the solar system, and consists of about 60 percent iron - twice that of Earth. How on earth ended much iron is one of the major mysteries of the planet. Learn more about its formation and history in early May the researchers a much better understanding of our own solar system and around other stars.

Previously, scientists have known most of Mercury's surface has been modified by volcanic activity. With the Mariner 10 flyby in 1970 could not definitively determine whether the formations on the surface due to volcanic activity or impact craters. But now, Messenger, in orbit, the data from this small planet, finally in sight.

Above:

Young Crater

Debussy Crater along radial spokes formed when an asteroid impact crater ejecta sent flying in all directions, forming secondary craters and discover the field of youth. Because of its brightness, Debussy is thought to be a relatively young crater, as the solar wind causes the planet's surface to darken over time. MESSENGER is significant that the two impacts, such as volcanic activity and were important in the history of Mercury.

Selasa, 27 September 2011

Camera Traps Capture Animals In The Jungle Of Indonesia


A 10-month records of the video camera traps to the north of the mountain jungles of Indonesia are summarized in five minutes procession of life of the rainforest.

The footage was captured in August, the eyes of a project initiated by Dutch Leuser Marten peace Slothouwer to document the richness of the region of Leuser.

Its name derives from a local tribal word meaning "cloudy," Leuser is threatened by logging and development, but the history of the region is far from bleak. Thanks to the efforts of local and international an area three times the size of Yellowstone National Park has been designated for protection.

This protection is not always enforced, said Mike Griffiths kept, but the situation has improved since the mid-1980s, when he left an oil company job and moved to Leuser to help protect .

"We stopped at the plantation of trees, the recording stopped, we stopped large dams," said Griffiths. "What the video of the mountain now show us is that we have not lost much. Life begins to return well enough."

Among the animals seen in the video are cats and cats golden marble, two medium-sized feline predator, and the largest of all cats: Panthera tigris.

"We hope to be able to sustain a population of about 400 tigers, which we believe is the minimum to maintain a viable population. This is one of the few places on earth where you can do," said Griffiths.

The presence of predators Videos indicates a healthy ecosystem. "If you get a good variety of predators, which means that they are eating are still around," he said. Video in the future, she hopes to find evidence of elephants, which were once numerous in Leuser.

"The region is recovering really being thrown," said Griffiths. "In another 15 or 20 years, the woods are great again."

source

Senin, 26 September 2011

Fallout: New Vegas (2010/ENG/RIP By JoeKkerr)

Welcome to New Vegas - a city of dreamers and fortune hunters. Three groups are fighting a ruthless control of this oasis in the post-apocalyptic desert. Those who are well armed and knows what she wants, has quickly become famous, but in the end a lot of enemies. Making the hard way, the hot Mojave Desert, go to the Hoover Dam, walk the streets of neon-glittering Las Vegas. Along the way, they encounter many colorful characters involved in clashes between factions of power hungry, and fight the mutants of every color and size, and power a unique weapon. Decide who is your ally, or by choosing the path of the individual hero, stand-edinovlastnym King of New Vegas.

Features:

- Hot Vegas. Explore the vast - from the provincial towns scattered across the Mojave desert, the beautiful bright lights of the street in New Vegas
- Your word. The war between the rival factions will forever change the lives of city residents. The parties to this conflict that takes everything depends: who would have to meet and communicate, to be faithful companions, and - a declared enemy, and of course, the final struggle for power
- New ideas. The new system of communication with partners, reputation system - remember, flashback, and react, as "Hardcore" - for those not looking for simple ways, special techniques of unarmed combat
- To arms! Arsenal is twice represented in Fallout 3: Now you have more than enough resources to adequately respond to any threat. Moreover, the Vault-Tec engineers have developed a new weapon system configuration that will repair and modify all dangerous "toys" in any place at any time
- Total chaos. This is a huge world, you are free to choose their own path. Travel and tourism, fighting shoulder to shoulder with those who think it's worth, or become a lone hero - it's your world, your game!

Requirements:

- Operating System: Microsoft? Windows? XP? / Windows? Vista? / Windows? 7even?
- Processor: Intel Dual Core 2.4 GHz or equivalent AMD Athlon 64 4000 +
- Memory: 1 GB (Windows XP) / 2GB (Windows Vista / 7)
- Graphics Card: 3D graphics card with 256 MB of memory, compatible with DirectX? 9.0 and supports Pixel Shader 3.0 (NVIDIA? GeForce? 6600 / ATI? Radeon X1300 GTO or better)
- Sound: Sound card compatible with DirectX 9.0c
- Hard Drive: 10 GB
- Utilities: DirectX 9.0c
- Controls: Keyboard and Mouse

RIP'a features:

- It is based on the license - Bethesda Softworks -
- The audio quality is 100%
- The video quality is 100%
- Cut open the video, and in all languages? In addition to English (voice user interface and English)
- Do not recoded
- Enclose compressed SKIDROW
- Requires at least 1 GB of RAM for installation
- Requires at least 10 GB of free disk space
- Installation time: 15-20 minutes ~
- Rasterized from [JoeKkerr]

Screenshoot :







Filesonic

http://www.filesonic.com/file/2207808061/NVegas.part1.rar
http://www.filesonic.com/file/2207808091/NVegas.part2.rar
http://www.filesonic.com/file/2207813831/NVegas.part3.rar
http://www.filesonic.com/file/2207807681/NVegas.part4.rar
http://www.filesonic.com/file/2207813421/NVegas.part5.rar
http://www.filesonic.com/file/2207821241/NVegas.part6.rar
http://www.filesonic.com/file/2207813811/NVegas.part7.rar

Wupload

http://www.wupload.com/file/210064434/NVegas.part1.rar
http://www.wupload.com/file/210064220/NVegas.part2.rar
http://www.wupload.com/file/210064437/NVegas.part3.rar
http://www.wupload.com/file/210064441/NVegas.part4.rar
http://www.wupload.com/file/210064812/NVegas.part5.rar
http://www.wupload.com/file/210065178/NVegas.part6.rar
http://www.wupload.com/file/210064438/NVegas.part7.rar

Pro Evolution Soccer 2012 (2011/Multi2/RePack by Ultra)

Pro Evolution Soccer returns this fall, Pro Evolution Soccer 2012! This year Konami decided to give football fans the world truly realistic, immersive and enjoyable to play the beautiful game. Creative producer Shingo 'Seabass' Takatsuka has hopes the acquisition of fans around the world and work non-stop for a game goes digital in real life the game so fans can get closer to reality. All the factors have been studied - defense, offense, artificial intelligence, sanctions, the ministry and, of course, the graphics! The result is a game is really the main features of the game, and players. Pro Evolution Soccer 'Can you play? "

Game features:

- Fast Attack

In Pro Evolution Soccer 2012, you can actually perform offensive maneuvers, because the new AI gives your team to function as a single body: the players will try to take a comfortable position for the session, to isolate the guard to defend his players and so on.

- Effective protection

On the other hand, the enemy is now much better educated protected so overwhelmed that his defense can not be so easy.

- Simplification of the management system

The right analog stick is now responsible for the rapid transition of players that can respond quickly to changing circumstances on the ground. Ability to control the player without the ball very tactical depth and variety of techniques.

- Gaming Power

It 's simple - the collisions are more realistic than ever, and the player is responsible for all football activities at this time.

System requirements:
Operating system: Windows XP SP3 / Windows Vista / Windows 7;
Processor: Intel Pentium IV 2.4 GHz or higher;
Memory: 1 GB (2 GB for Vista);
Video: DirectX 9.0c compatible video card. Pixel Shader 3.0 with 128 MB of RAM (NVIDIA GeForce 6600 or ATI Radeon X1300);
Sound Card: DirectX 9.0 compatible sound;
10 GB hard drive.

Repack Features:

- Nothing becomes / Remove German version
- Added Russian and English user interface demo
- Keep the original files to run the game (patches, mods, etc)
- Added ability to disable diffuse (blurred images)
- Install all the necessary software (optional)

Repack author -: Ultra

Screenshoot :



Download :
Filesonic

Wupload


Minggu, 25 September 2011

Jump off a building in Bubble Wrap

A recent posting on Reddit posed the question, “How abundant bubble wrap would you would like to wrap yourself in if you needed to leap out of a primary story window and survive?” Some spirited (and silly) discussion ensued, together with a fairly cheap answer to the question, courtesy of Reddit user kibitzor. currently Rhett Allain, an Associate Professor of Physics at Southeastern Louisiana University, weighs in on the question over at the Wired Science blog:

Why would anyone raise a matter like this? Why would I even conceive to answer it? It’s what I do, that’s why. I serve the Interwebs. maybe somebody within the Reddit comments has already answered this – however I shall proceed anyway.
Before I begin, i'd wish to modification the question. i'm pretty certain you'll jump out of a primary story window with none bubble wrap. Here i'm assuming 1st story suggests that second story window (or one floor higher than the ground). Really, this shouldn’t be too troublesome to leap from this high. Here is my dangerous jumping calculator. basically, the vital issue is how way does one travel whereas stopping. It may be done.
The changed question can be: what quantity bubble wrap does one have to be compelled to survive jumping out of the sixth floor of a building? Let me randomly say this is often a height of twenty meters.

Rhett goes on to research the physical characteristics of bubble wrap, the utmost impact force somebody's body will survive (both “eyeballs in” and “eyeballs out” cases are considered), and therefore the effects of air resistance. With those effects sorted out, then it’s on to determining simply what quantity bubble wrap is required to permit a bubble-wrap diver to survive.

And simply what quantity bubble wrap is needed? You’ll ought to head over to Rhett’s article to seek out out. And whereas you’re there, take care to conjointly inspect his “dangerous jumping calculator.” Clearly, Rhett isn't a uninteresting, corduroy-and-tweed quite physicist.

After Rhett’s writeup, i believe that each one that’s left to try and do with this question is have the MythBusters see how the idea bears out in observe.

The Report Suggests that the Mechanical Failure in a plane crash Reno

Federal investigators have released a preliminary report into the crash that killed eleven folks at the Reno Air Races, and though it doesn’t provide a selected explanation for the crash, it suggests a mechanical failure because the possibly cause.

The National Transportation Safety Board’s initial finding mentions a part of the airframe “departed” from the highly changed North yankee P-51D. The plane, flown by veteran race pilot Jimmy Leeward, occurred throughout the ultimate race of the day of the Reno National Championship Air Races.

Leeward and ten spectators were killed and sixty six others were seriously injured when the P-51D crashed into the gang Sept. 16. The NTSB’s report is generally a outline of the incident, confirming several details already surmised regarding the crash and providing additional information regarding photos, video and knowledge collected from the scene.

Though investigators offered no conclusions within the NTSB report, the consensus inside the aviation community is that Leeward possibly was unconscious at the time of the crash at Reno Stead Airport in Reno. he's not visible in photos taken moments before impact, and therefore the plane hit the bottom with the engine at or close to full power.


The current thinking is an elevator trim tab, a comparatively tiny piece of the tail, fell off the airplane (it isn't seen in photos of the plane taken simply before impact) and caused the P-51D to pitch up severely. This dramatic amendment of pitch could have caused Leeward to black out and should have even broken his seat.

An elevator trim tab generally is employed to neutralize management forces experienced by the pilot throughout flight. In high-performance planes especially, the force required to maneuver an impact surface like the elevator — that controls the pitch, creating the airplane climb or descend — will exceed the pilot’s strength or a minimum of a pilot’s endurance to carry it for a protracted amount of your time. because the speed, or loading, of the airplane changes, the elevator should be in a very completely different position to take care of level flight, climb or descend.

The trim tab is found on the trailing fringe of the elevator and acts sort of a miniature elevator. however rather than inflicting the airplane to pitch up or down, it merely causes the most elevator to pitch up and down therefore the pilot doesn’t ought to hold the management stick back or push it forward for long periods. The tab is adjusted from the cockpit, typically with cables connected to alittle wheel or knob in older aircraft and via an electrical switch in newer airplanes.

A highly changed P-51 like those racing in Reno typically are a lot of dependent than standard aircraft upon trim tabs. The wingspan of such planes are shortened and that they are generally loaded with an aft center of gravity that creates them a lot of “tail heavy” than a stock P-51. This reduces drag and permits them to fly faster — typically at speeds as high as five hundred mph. mix these factors with the actual fact that these competition aircraft are flying a lot of faster than the 350-400 mph or so that they were designed for, and losing a trim tab will cause a significant drawback.

It is unclear when Leeward’s plane — the Galloping Ghost — could have experienced enough force to doubtless cause him to lose consciousness. in line with the NTSB report, once a steep flip to the left and heading towards successive pylon, the airplane banked additional left, then to the proper and then went into a steep climb. By that time the plane, showing out of management, rolled over into a dive at high speed. The pilot may are subjected to ten Gs or a lot of throughout the climb, that means he felt ten times the force of gravity on his body.

Former motocross racer Bob ‘Hurricane’ Hannah experienced the same incident at Reno in 1998. Racing in a very equally changed P-51, Hannah lost a trim tab and experienced a severe pitch up, very similar to Leeward. Hannah lost consciousness, however his plane continued climbing long enough for him to regain consciousness and land safely.

It might be another year before the NTSB releases a final report on the crash.

Photo: Garret Woodman/Associated Press. A World War II-era fighter plane piloted by Jimmy Leeward plunged into the grandstands on Sept. seventeen throughout the Reno National Championship Air Races. The crash killed Leeward and ten others and injured sixty six.

Sabtu, 24 September 2011

New Hubble Videos Show Star Jets in Action


Young Star Makes Waves


Image and video courtesy ESA/NASA

A glowing cloud of dense gas gets pushed through house in a very newly released video of a stellar bow shock-a wave of fabric being created by a strong jet from a newborn star. called Herbig-Haro objects, these high-velocity jets shoot from young stars' poles.

The video is a component of a group created by a team of scientists, who used fourteen years' price of high-resolution footage from the NASA/ESAHubble house Telescope to create time-lapse movies of the mysterious jets. This bow shock is a component of HH thirty four, a jet being expelled from a star within the constellation Orion.

Until now, these short-lived outflows had been seen solely in still pictures, and scientists are using pc models to predict how the jets may behave. (Related: "Star Found Shooting Water 'Bullets.'")

Now "for the primary time we are able to really observe how these jets interact with their surroundings by watching these time-lapse movies," team leader Patrick Hartigan, of Rice University in Texas, said in a very press unharness.

"Those interactions tell us how young stars influence the environments out of that they kind. With movies like these, we are able to currently compare observations of jets with those created by pc simulations and laboratory experiments to check what aspects of the interactions we tend to perceive and what elements we do not perceive."

Ghostly Motion
Image and video courtesy ESA/NASA


Bright veils of dense gas appear to drift through area during a Hubble video of HH one, a jet of fabric from a young star within the Orion nebula.

Astronomers are not entirely positive how newborn stars produce such jets. Current theory states that, in general, stars kind from collapsing clouds of cold hydrogen gas. As a star grows, it gravitationally attracts a lot of material, till the star is surrounded by an outsized, spinning disk of gas and mud.

Some of this material will spawn planets, however it is also doable material within the disk gradually spirals toward the star and escapes within the variety of high-velocity polar jets. (Related: "Star Caught Eating Another Star, X-Ray Flare Shows.")

The jets vanish when the disk of fabric runs out, the speculation goes, and also the outflows typically last solely a few hundred thousand years—a blink of a watch within the lifetime of a star.

Cosmic Traffic Jam
Image and video courtesy ESA/NASA

Herbig-Haro object HH forty seven pushes bright bow shocks through house in one in all the new Hubble videos. This jet—which extends regarding 10 times the width of our solar system—is being created by a young star within the southern constellation Vela.


The outflows could seem to glide gently within the videos. however actually they are shooting out at quite 440,000 miles (700,000 kilometers) an hour.

The time-lapse movies show that clumps of gas within the jets are moving at completely different speeds, like traffic on a freeway. When fast-moving blobs "rear end" slower ones, they heat up the jet's material and generate new bow shocks. (See an image of a bow shock created by a dashing star.)

Reworking the Models
Image and video courtesy ESA/NASA


Based on the new Hubble videos, the team created this pc animation of a Herbig-Haro object and the way it would evolve over many centuries.

"Taken along, our results paint an image of jets as remarkably various objects that bear highly structured interactions between material among the outflow and between the jet and therefore the surrounding gas," team leader Hartigan said.

"This contrasts with the majority of the prevailing simulations, that depict jets as swish systems."

The team's results seem within the July twenty issue of the Astrophysical Journal.



source

Maya Royal Tombs Found With Rare Woman Ruler

Photograph courtesy Wiesław Koszkul, Nakum Archaeological Project

A woman ruler's skeleton—her head mysteriously placed between 2 bowls—is one in all 2 royal burials recently found at the Maya ruins of Nakum in Guatemala.

The roughly a pair of,000-year-old tomb was found beneath another, 1,300-year-old tomb stuffed with treasures like jade gorgets—normally used to safeguard the throat—beads, and ceremonial knives.

The higher tomb's corpse had been badly destroyed by rodents inside the previous few centuries, however the body was clearly that of another Maya ruler—perhaps another feminine, primarily based on the little size of a hoop found in that tomb.

The royal burials are the primary discovered in Nakum, once a densely packed Maya center. Study co-author Wiesław Koszkul and colleagues are investigating Nakum's surroundings, called the Cultural Triangle, for many years. (Explore an interactive map of key Maya sites.)

"We assume this structure was one thing sort of a mausoleum for the royal lineage for a minimum of four hundred years," said Koszkul, of the Jagiellonian University Institute of Archaeology in Krakow, Poland.

The Maya royal-tomb discoveries are described within the September issue of the journal Antiquity.

source

Jumat, 23 September 2011

Hands-On: Cooperative Bank Robbing in PayDay: The Heist

NEW YORK — It’s tempting to feel to a small degree bit guilty as you play PayDay: The Heist. For many seconds, you may raise yourself why you’re robbing such a large amount of banks and flats. you may question the ethical ramifications of cop slaughtering, or dialogue whether or not or not tying up civilians is an moral follow.

Don’t worry. It’ll pass.

PayDay: The Heist, a cooperative first-person shooter that Swedish developer Overkill can unleash on Oct. four as a $20 download for PlayStation Network and Steam, asks you to ditch morals in favor of chaotic, criminal carnage. And it works. As you gun down policemen and infiltrate buildings along with your buddies, the sole question on your mind are where to shoot next.

You have one goal in PayDay: The Heist: Steal shit. so as to try and do this, you and up to a few masked allies should invade a series of banks and different loot-stuffed buildings with sawed-off shotguns, pistols and automatic machine guns. throughout every heist, waves of armed policemen can attack you from each angle doable — roofs, ladders, barricaded doors. It’s your job to fight them off.

Of course if it were as easy as that, the sport wouldn’t be terribly fascinating. whereas fighting, you’ll ought to meet a series of objectives, that sometimes involve guarding automatic drills as they crack open bank vaults or putting in C-4 to blow holes in rooftops. Cooperation is integral to the success of every of those tasks. If you don’t work along with your teammates — who are controlled by the pc if you don’t have enough players — you’ll probably be overwhelmed by law enforcement.

I’m not a large fan of first-person shooters, thus I didn’t expect to urge abundant out of PayDay: The Heist after I played it at a Sony on-line Entertainment event in Manhattan on. however I found myself enthralled by the game’s fast-paced cooperative thrills. The addictive joy of accomplishing every objective was solely enhanced by the actual fact that we have a tendency to were doing it as a team.

As we have a tendency to played, I told Overkill inventive director Ulf Andersson that PayDay should are heavily galvanized by Left four Dead, Valve’s zombie-killing cooperative survival game.

“We like better to say we have a tendency to stole it from Left four Dead,” he joked, admitting that the team didn’t wish to reinvent the wheel for this game.

I’m guessing they don’t feel guilty.

WikiLeaks Volunteer Hacked a Reporter, Assange Autobiography Reveals

WikiLeaks founder Julian Assange has revealed in an unauthorized autobiography revealed Thursday that an Icelandic member of his team hacked into a journalist’s laptop system last year to retrieve a database of documents he had given to the reporter.

The revelation of the crime might probably place the organization, or a minimum of the previous WikiLeaks member, in legal jeopardy. the knowledge seems in a very new autobiography written by a ghostwriter who interviewed Assange for the book earlier this year.

A British publisher released the book on Thursday, Julian Assange: The Unauthorised Autobiography, within the midst of a rousing battle with Assange over its right to publish the book. The book is currently being sold on-line within the U.K., however it’s unclear when or if it'll be sold within the U.S., since Assange’s U.S. publisher backed out of its deal to publish the title.

The hacking incident mentioned within the autobiography involves a U.K.-based yank journalist named Heather Brooke, who received a duplicate of the now-infamous database containing quite 250,000 U.S. State Department cables that WikiLeaks revealed with media partners within the U.S. and Europe starting last November.

Some time once the summer of 2010, Brooke obtained a duplicate of the database from a WikiLeaks member named Smári McCarthy — once Assange had agreed to convey the Guardian newspaper and different media partners exclusive access to the documents. Assange apparently didn’t comprehend the inner leak from his staffer till Guardian editors brought it up with him in a very heated confrontation over publication of the documents.

“I investigated that matter,” Assange says within the book. “It turned out that our Icelandic colleague, Smári McCarthy, had indeed shared the fabric with the freelance journalist throughout an anxious moment. He had been asked to figure on the cables for a brief time to assist format them, but, stressed at the workload, he had misguidedly shared them along with her — to urge some facilitate with the burden of the work concerned — underneath bound strict conditions. He then hacked into the pc remotely and wiped the cables, though it might never be clear whether or not she had copied them or not.”

Brooke, indeed, had already copied the documents off of the server where it had been stored, that the WikiLeaks hack proved pointless. McCarthy, who left WikiLeaks last year round the time it began publishing the Afghan War logs, acknowledged to Threat Level that he deleted the file on Brooke’s server however says that she had given him permission to own remote access to her system, though to not delete the file.

“That was me overreacting to the case that came up with regard to the method WikiLeaks individuals reacted to the information that I had been giving her some access to the files,” McCarthy told Threat Level, adding that he later smoothed things over with Brooke regarding the unauthorized file deletion.

According to an account of the incident that Brooke place in her recent book, The Revolution are Digitized, McCarthy, who isn't identified by name in that book, told Brooke that he deleted the file as a result of, “I’ve been place underneath lots of terribly serious pressure and I’m afraid for my security.”

It’s not the primary time that the problem of WikiLeaks hacking has return up in affiliation to journalists. Earlier this year, each the ny Times and therefore the Guardian newspapers prompt that Assange or somebody related to WikiLeaks had hacked into the e-mail accounts of their reporters.

The Guardian revealed in a very book it revealed regarding its collaboration with WikiLeaks that {one of|one among|one in a veryll|one amongst|one in every of} its reporters suspected Assange hacked into his e-mail account or sniffed his e-mail traffic once creating coy remarks to the reporter regarding network security and concerning data the reporter had sent his colleagues in a non-public e-mail. Former Times Editor-in-Chief Bill Keller conjointly hinted in a very Times magazine piece that WikiLeaks hacked reporters, writing that “at some extent when relations between the news organizations and WikiLeaks were rocky, a minimum of 3 individuals related to this project had inexplicable activity in their e-mail that prompt somebody was hacking into their accounts.”


The Assange autobiography covers his childhood, early hacking career, WikiLeaks work and therefore the legal difficulties he’s faced in reference to the publication of U.S. documents yet as sex-crimes allegations in Sweden.

While it contains few new revelations, the book will provide Assange the possibility to clarify a number of his criticized behavior and gift his aspect of the story regarding things — like claims from his media partners that he callously refused to redact the names of informants in U.S. documents before publishing them, saying that if the informants got killed attributable to the revelations, they deserved to die merely for being informants.

One of the few new tidbits is that WikiLeaks’ media partners weren’t the sole ones to own copies of the State Department cable database. Assange says he created different copies “and stashed them 1st with contacts in jap Europe and Cambodia” and conjointly “put them on an encrypted laptop and had it delivered to Daniel Ellsberg, the hero of the Pentagon Papers” since Ellsberg, an outspoken WikiLeaks supporter, can be trusted “to publish the complete ton throughout a crisis.”

Strangely, there’s very little mention within the book of Bradley Manning, the previous U.S. Army intelligence analyst who was arrested for allegedly supplying WikiLeaks with the State Department cables and thousands of different documents. It conjointly doesn’t address the falling-out Assange had with former spokesman Daniel Domscheit-Berg, who staged a revolt with another member of WikiLeaks and shaped a competing secret-spilling venture known as OpenLeaks.

The absence of this data could partially be attributable to the very fact that the book is unfinished. It’s primarily based on a primary draft of the manuscript from Assange’s ghostwriter and ends abruptly simply at the purpose WikiLeaks and its media partners were on the brink of begin publishing the cables.

Canongate Books, the publisher of the book, announced suddenly on Wednesday that it planned to publish the book Thursday once asserting that Assange had stopped cooperating with the project. Assange disputes this in a very lengthy rebuttal, asserting that Canongate agreed to increase his deadline for a revised manuscript to later this year, then suddenly reneged on this and set to publish the unfinished draft, that Assange didn’t factcheck.

Despite all of the drama round the book, Assange comes off fairly well in it, jointly would expect in an autobiography, though he incorporates a well-known tendency to visualize faults in everybody else that he can’t see in himself. There also are contradictions and factual problems, significantly within the chapter addressing the sex-crimes allegations in Sweden, where Assange claims he was warned twice against attainable honey traps and was feeling terribly paranoid and suspicious generally, nevertheless showed a stimulating lack of trepidation regarding bedding 2 strange ladies he’d simply met.

He claims that simply as he arrived in Sweden a contact “in a Western intelligence agency” revealed that the U.S. planned to use devious suggests that to urge him, like planting medication or kid pornography on him or embroiling him in some immoral conduct. He says Frank Rieger, a member of the Chaos laptop Club in Germany, had written a press unharness to publicize the knowledge quickly “as it did no smart to place this stuff out once some harm had been done,” however that Assange, regretfully, didn't unharness it before the ladies publicly lodged their complaints against him. Rieger, however, tells Threat Level that he never ready a unharness or anything like this for Assange.

Journalists generally don’t fare well within the book, however Assange reserves the foremost withering comments for his former media partners at the Guardian and ny Times, who treated him badly once making the most of the precious documents he gave them. Times former Editor-in-Chief Keller, whom Assange refers to as a “moral pygmy with a self-justifying streak the dimensions of the San Andreas Fault,” is especially known as out for suggesting in an editorial that Assange uses “sex as each recreation and violation.”

“Ladies and gentleman, that last statement is actionable,” Assange says within the book. “It could be a malicious libel, and one supposed — bizarrely — to inflict most harm to someone then facing, as I was, allegations of sexual misconduct. He should have referred to as he wrote and revealed that line that it constituted the foremost heinous assault on my wellbeing, my legal standing and my name. however he did it anyway. I’ll never perceive why and that i won’t speculate.”

One new piece of data within the book involves one among Assange’s earliest collaborators, a mathematician named Daniel Mathews, whom he’d met at the University of Melbourne. Mathews wrote an analysis of the primary document — from Somalia — that WikiLeaks revealed shortly once its launch in December 2006. The document was a part of a mysterious cache of 1 million documents that, consistent with a 2010 New Yorker profile, WikiLeaks had obtained from somebody who intercepted them whereas or once they had the Tor anonymizing network.

Mathews conjointly worked on Guantanamo Bay manuals that WikiLeaks later revealed, however opted to distance himself from the organization once he became embroiled in a very legal dispute that the Swiss-based Julius Baer Bank initiated to squelch internal bank documents that WikiLeaks had revealed.

Mathews, who was then teaching and dealing on his Ph.D. at Stanford University, told Threat Level that the bank served him with a summons as a result of he was the sole U.S.-based person they were able to go with WikiLeaks. He had been a moderator on a WikiLeaks Facebook page. After this, Mathews set to concentrate on his educational activities, though he remains friends with Assange.

Below are some highlights from the book.

Assange on being truthful game for criticism:

From the beginning, of course, being a whistleblowing web site, as they decision us, bound individuals were keen to blow the whistle on us which hasn’t modified. My response was, ‘Fair enough. we should always eat our own dog food and see how it tastes.’ we tend to were a bunch of committed, idealistic folks that were attempting to urge one thing done. we tend to might take what flak was on supply, however our basic position was sturdy and moral, and that i couldn’t see what rubbish can be thrown at us.

On the difficulties of finding collaborators within the early days and having to figure alone:

Once or twice, quite comically (though not at the time), I turned out to be the sole person at those on-line conferences. And after all the complete factor was right on the border of schizophrenia: I’d be there, tapping away, being the Chair and therefore the Secretary and bringing following factor on the agenda and calling the vote. Mad. however I felt I had to travel on as if the complete factor were attainable, which method it might very happen.

On the “Collateral Murder” video:

It is a famous document of our times. however once I 1st saw the footage, it wasn’t in the slightest degree clear what was going on; the pictures were jagged and therefore the sequence lacked drama and impact, though what it depicted, eventually, was actually devastating.

On his disappointment in how the media reacted to it.

The storm that blew up this title was depressing and stunning, even given what I knew regarding the angle of abundant of the Western media to the official US government line. thus glorified are they with a way of their own importance that, on seeing the video, the primary discussion they wished to own was regarding our title, not regarding the contents.

On claims that he said that informants named within the cables shouldn’t be protected as a result of they deserved to die.

Another erroneous report emerged at now that had me saying we tend to weren’t chargeable for the welfare of informants which ‘they deserved to die’. this can be simply nonsense: I said some individuals held that read, however that we might edit the documents to preserve their essential content and not throw hurt in people’s method if we tend to might avoid it. … In actual truth, we tend to had been burning the midnight oil on redactions from timely.

On the sex-crimes allegations:

I may be a chauvinist pig of some kind however i'm no rapist, and solely a distorted version of sexual politics might decide to flip me into one. They every had sex with me willingly and were happy to hold out with me afterwards. that's all.

Rabu, 21 September 2011

Facebook changes ‘annoying’; Google+ becomes ‘worldwide party’ public to all

Facebook changes ‘annoying’As Facebook created changes to its internet website leading up to what could be a significant redesign announcement, Google’s social network competitor Google+ became public to all or any.

Facebook’s revamped news feeds that highlighted a lot of “important” stories got — like many of Facebook’s prior revamps — a cold reception from users. Some readers even recommended ways to revert back to the previous Facebook style, like setting the account language to English (U.K.).

Meanwhile Google+, which rolled out tons of new and improved options when it went public Tuesday, got a rousing vote of approval for the first time. “If you hate Facebook's new update, undertake Google+!,” technology blogger Ashley Esqueda wrote on Twitter Wednesday.

Social network users brought out all kinds of comparisons Wednesday to form sense of the new changes on Facebook and Google+.

Blake Hounshell, managing editor of Foreign Policy magazine, compared the new Facebook to the Windows operating system, because in its new style Facebook is “always asking you to update stuff, verify stuff... behaves in strange ways. Super annoying,” he wrote on Twitter. Sixty individuals retweeted Hounshell’s comment.

About the new Google+, Swedish technology entrepreneur Anton Perlkvist, wrote that it had been now not “like a house party while not alcohol [where] most are just standing around waiting,” a comparison he had created just 32 days ago.

“Update: it's improving. A lot. Things are happening. NOW,” Perlkvist wrote on Google+ Wednesday.Could this be a turning purpose within the battle for dominance between Facebook and Google?Facebook, at 750 million users, is the world's No.1 social networking service. Google won’t say how many individuals have signed up for Google+, but analysts estimated upward of twenty five million users. That was before it went totally public these days.Google+ hasn’t lost all its critics, including faculty Humor, who roasted the social network Wednesday by releasing a video that called it “the delinquent network.”But computer World points out that Google+ has got the advantage over Facebook in one category — it encourages individuals to have a lot of followers.Be prepared, Perlkvist says, continuing the metaphor, for Google+ to become a “worldwide ... interesting party.”