Wednesday, 22 August 2012

Touch computing


             New input methods will be the dominant trend of 2012. Tablet computers such as the iPad might seem like a nice alternative to desktop and laptop computers, but I believe they're more than that: They're replacements. Just as the command line (remember that?) gave way to graphical user interfaces, so the mouse will be superseded by touchscreens.

             The signs are obvious: Windows 8 and Mac OS X Lion, the latest desktop operating systems, borrow heavy from their mobile counterparts. These new interfaces essentially impose a touchscreen-inspired interface over the traditional desktop environment.

            Over time, this half-step will become a whole one, and mobile operating systems will dominate. The transition won't be complete by the end of 2012, but we'll be much further down the path, and using computer mice much less often.

New Input device in 2012


Razer DeathStalker Ultimate Gaming Keyboard
                             
                   Razer has unveiled the new DeathStalker Ultimate gaming keyboard. What makes this gaming keyboard special is that it features the Razer Switchblade User Interface, which allows the touchscreen and 10 buttons above the screen to have custom programmable icons. The Razer DeathStalker Ultimate is powered by the Razer Synapse 2.0, which enables the keyboard to automatically save all of a user’s custom settings and profiles on a cloud server. What’s more, it also supports an anti-ghosting infrastructure of up to 10 keys in game mode. The Razer DeathStalker Ultimate gaming keyboard will be released in September 2012 for $249.99


Elecom TK-FNS040BK NFC Keyboard For Android Devices


                The Elecom TK-FNS040BK is claimed to be the world’s first NFC keyboard for Android devices. It uses the NFC IP-1 protocol to connect with any NFC-enabled Android devices. This NFC keyboard works in conjunction with Elecom’s ATOK app that you can download from Google Play. Folks in Japan are able to buy the Elecom TK-FNS040BK for 18,690 Yen ($237).

Input Box In C#


using System;
using System.Drawing;
using System.Windows.Forms;

namespace Sudhan
{
    class InputBox
    {
        public static DialogResult Show(string title, string promptText, ref string value)
        {
            return Show(title, promptText, ref value, null);
        }

        public static DialogResult Show(string title, string promptText, ref string value,
                                        InputBoxValidation validation)
        {
            Form form = new Form();
            Label label = new Label();
            TextBox textBox = new TextBox();
            Button buttonOk = new Button();
            Button buttonCancel = new Button();

            form.Text = title;
            label.Text = promptText;
            textBox.Text = value;

            buttonOk.Text = "OK";
            buttonCancel.Text = "Cancel";
            buttonOk.DialogResult = DialogResult.OK;
            buttonCancel.DialogResult = DialogResult.Cancel;

            label.SetBounds(9, 20, 372, 13);
            textBox.SetBounds(12, 36, 372, 20);
            buttonOk.SetBounds(228, 72, 75, 23);
            buttonCancel.SetBounds(309, 72, 75, 23);

            label.AutoSize = true;
            textBox.Anchor = textBox.Anchor | AnchorStyles.Right;
            buttonOk.Anchor = AnchorStyles.Bottom | AnchorStyles.Right;
            buttonCancel.Anchor = AnchorStyles.Bottom | AnchorStyles.Right;

            form.ClientSize = new Size(396, 107);
            form.Controls.AddRange(new Control[] { label, textBox, buttonOk, buttonCancel });
            form.ClientSize = new Size(Math.Max(300, label.Right + 10), form.ClientSize.Height);
            form.FormBorderStyle = FormBorderStyle.FixedDialog;
            form.StartPosition = FormStartPosition.CenterScreen;
            form.MinimizeBox = false;
            form.MaximizeBox = false;
            form.AcceptButton = buttonOk;
            form.CancelButton = buttonCancel;
            if (validation != null)
            {
                form.FormClosing += delegate(object sender, FormClosingEventArgs e)
                {
                    if (form.DialogResult == DialogResult.OK)
                    {
                        string errorText = validation(textBox.Text);
                        if (e.Cancel = (errorText != ""))
                        {
                            MessageBox.Show(form, errorText, "Validation Error",
                                            MessageBoxButtons.OK, MessageBoxIcon.Error);
                            textBox.Focus();
                        }
                    }
                };
            }
            DialogResult dialogResult = form.ShowDialog();
            value = textBox.Text;
            return dialogResult;
        }
    }
}
public delegate string InputBoxValidation(string errorMessage);

New Model computer in car


Data Structure Interview Question


1.      What is data structure?

A data structure is a way of organizing data that considers not only the items stored, but also their relationship to each other. Advance knowledge about the relationship between data items allows designing of efficient algorithms for the manipulation of data.

2.      List out the areas in which data structures are applied extensively? 
       
Ø  Compiler Design,
Ø  Operating System,
Ø  Database Management System,
Ø  Statistical analysis package,
Ø  Numerical Analysis,
Ø  Graphics,
Ø  Artificial Intelligence,
Ø  Simulation

3.      What are the major data structures used in the following areas : RDBMS, Network data model & Hierarchical data model.

Ø  RDBMS                         – Array  (i.e. Array of structures)
Ø  Network data model      – Graph
Ø  Hierarchical data model – Trees

4.      If you are using C language to implement the heterogeneous linked list, what pointer type will you use?

The heterogeneous linked list contains different data types in its nodes and we need a link, pointer to connect them. It is not possible to use ordinary pointers for this. So we go for void pointer. Void pointer is capable of storing pointer to any type as it is a generic pointer type.
      
5.      Minimum number of queues needed to implement the priority queue?

Two. One queue is used for actual storing of data and another for storing priorities.

6.      What is the data structures used to perform recursion?

Stack. Because of its LIFO (Last In First Out) property it remembers its ‘caller’ so knows whom to return when the function has to return. Recursion makes use of system stack for storing the return addresses of the function calls.
            Every recursive function has its equivalent iterative (non-recursive) function. Even when such equivalent iterative procedures are written, explicit stack is to be used.
  
7.      What are the notations used in Evaluation of Arithmetic Expressions using prefix and postfix forms?

            Polish and Reverse Polish notations.

8.      Convert the expression ((A + B) *  C – (D – E) ^ (F + G)) to equivalent Prefix and Postfix notations.

            Prefix Notation:
            ^ - * +ABC - DE + FG
Postfix Notation:
            AB + C * DE - - FG + ^

9.      Sorting is not possible by using which of the following methods?
            (a) Insertion    
            (b) Selection    
            (c) Exchange     
            (d) Deletion

            (d) Deletion.

Using insertion we can perform insertion sort, using selection we can perform selection sort, using exchange we can perform the bubble sort (and other similar sorting methods). But no sorting method can be done just using deletion.

10.  What are the methods available in storing sequential files ?

Ø  Straight merging,
Ø  Natural merging,
Ø  Polyphase sort,
Ø  Distribution of Initial runs.
  
11.  List out few of the Application of tree data-structure?

Ø  The manipulation of Arithmetic expression,
Ø  Symbol Table construction,
Ø  Syntax analysis.

12.  List out few of the applications that make use of Multilinked Structures?

Ø  Sparse matrix,
Ø  Index generation.

13.  In tree construction which is the suitable efficient data structure?

            (a) Array           (b) Linked list              (c) Stack           (d) Queue   (e) none

(b) Linked list

14.  What is the type of the algorithm used in solving the 8 Queens problem?

            Backtracking

15.  In an AVL tree, at what condition the balancing is to be done?

            If the ‘pivotal value’ (or the ‘Height factor’) is greater than 1 or less than –1.

16.  What is the bucket size, when the overlapping and collision occur at same time?

            One. If there is only one entry possible in the bucket, when the collision occurs, there is no way to accommodate the colliding value. This results in the overlapping of values.

17.  Sort the given values using Quick Sort?

65
70
75
80
85
60
55
50
45

            Sorting takes place from the pivot value, which is the first value of the given elements, this is marked bold. The values at the left pointer and right pointer are indicated using L and R respectively.     

65
70L
75
80
85
60
55
50
45R

              Since pivot is not yet changed the same process is continued after interchanging the values at L and R positions

65
45
75 L
80
85
60
55
50 R
70
                       
65
45
50
80 L
85
60
55 R
75
70

65
45
50
55
85 L
60 R
80
75
70


65
45
50
55
60 R
85 L
80
75
70
                       
      When the L and R pointers cross each other the pivot value is interchanged with the value at right pointer. If the pivot is changed it means that the pivot has occupied its original position in the sorted order (shown in bold italics) and hence two different arrays are formed, one from start of the original array to the pivot position-1 and the other from pivot position+1 to end.

60 L
45
50
55 R
65
85 L
80
75
70 R

55 L
45
50 R
60
65
70 R
80 L
75
85

50 L
45 R
55
60
65
70
80 L
75 R
85

             In the next pass we get the sorted form of the array.

45
50
55
60
65
70
75
80
85


18.  Classify the Hashing Functions based on the various methods by which the key value is found.

Ø  Direct method,
Ø  Subtraction method,
Ø  Modulo-Division method,
Ø  Digit-Extraction method,
Ø  Mid-Square method,
Ø  Folding method,
Ø  Pseudo-random method.  

19.  What are the types of Collision Resolution Techniques and the methods used in each of the type?

Ø  Open addressing (closed hashing),
The methods used include:
                        Overflow block,
Ø  Closed addressing (open hashing)
The methods used include:
Linked list,
Binary tree…

     20.  In RDBMS, what is the efficient data structure used in the internal storage representation?

            B+ tree. Because in B+ tree, all the data is stored only in leaf nodes, that makes searching easier. This corresponds to the records that shall be stored in leaf nodes.   


      21.   Of the following tree structure, which is, efficient considering space and time complexities?
(a)   Incomplete Binary Tree
(b)   Complete Binary Tree     
(c)    Full Binary Tree

            (b) Complete Binary Tree.

By the method of elimination:
Full binary tree loses its nature when operations of insertions and deletions are done. For incomplete binary trees, extra storage is required and overhead of NULL node checking takes place. So complete binary tree is the better one since the property of complete binary tree is maintained even after operations like additions and deletions are done on it. 

22.  What is a spanning Tree?

            A spanning tree is a tree associated with a network. All the nodes of the graph appear on the tree once. A minimum spanning tree is a spanning tree organized so that the total edge weight between nodes is minimized.

23.  Does the minimum spanning tree of a graph give the shortest distance between any 2 specified nodes?

            No.
            Minimal spanning tree assures that the total weight of the tree is kept at its minimum. But it doesn’t mean that the distance between any two nodes involved in the minimum-spanning tree is minimum.
           
 32.  Which is the simplest file structure?
(a)   Sequential
(b)   Indexed
(c)    Random

(a) Sequential

33.  Whether Linked List is linear or Non-linear data structure?

            According to Access strategies Linked list is a linear one.
            According to Storage Linked List is a Non-linear one.



New Model Labtop


Windows Server 2012


Windows Server 2012, formerly codenamed Windows Server 8, is the next release of Windows Server currently under development by Microsoft. It is the server version of Windows 8 and the successor to Windows Server 2008 R2. Windows Server 2012 will be the first version of Windows Server to have no support for Itanium-based computers since Windows NT 4.0. A developer preview (an alpha release) was released on 9 September 2011 to MSDN subscribers. On March 1, 2012, Microsoft issued a public beta (build 8250). On April 17, 2012, Microsoft announced the product name would be Windows Server 2012. On May 31, 2012, Microsoft announced the release candidate (RC) for Windows Server 2012. Windows Server 2012 was released to manufacturing on August 1, 2012. The software will be generally available to customers starting on September 4, 2012  and worldwide through multiple channels in September 2012.

Builds

A Milestone 3 build (6.2.7959.0) was reportedly leaked to file-sharing sites. A new window style, but little else, was present. Windows Server 2012's developer preview was released on 9 September 2011 along with that of Windows 8, but unlike Windows 8's developer preview, it was only made available to MSDN subscribers. It was branded as the Windows Server "8" Developer Preview" The Modern UI (formerly Metro) user interface is present, as well as the new Server Manager, along with the other new features. On 16 February 2012, Microsoft announced that the developer preview build, after installing a particular update, will be set to expire on 15 January 2013, instead of the original 8 April 2012.
Screenshots of a build suspected to be (but was not) the beta of Windows Server 2012, then referred to as Windows Server "8", were reportedly leaked on 3 January 2012. A new dashboard UI is present. Build 8180 was leaked on 13 January 2012, and contains some revisions to the Server Manager interface and Storage Spaces.
The beta was released along with the Windows 8 Consumer Preview on 29 February 2012.
The Release Candidate of Windows Server 2012 was released on 31 May 2012, along with the Windows 8 Release Preview.
Features
Windows Server 2012 includes a number of new features or feature changes.
User interface
Server Manager has been redesigned with an emphasis on easing management of multiple servers.  The operating system, like Windows 8, uses the Metro UI unless installed in Server Core mode. Windows PowerShell in this version has over 2300 commandlets, compared with around 200 in Windows Server 2008 R2.  There is also command auto-completion.
Task Manager
Windows 8 and Windows Server 2012 include a new version of Windows Task Manager together with the old version. In the new version the tabs are hidden by default showing applications only. In the new Processes tab, the processes are displayed in various shades of yellow, with darker shades representing heavier resource use. It lists application names, application status, and overall utilization data for CPU, memory, hard disk, and network resources, moving the process information found in the older Task Manager to the new Details tab. The Performance tab is split into CPU, memory (RAM), disk, ethernet, and, if applicable, wireless network sections with graphs for each. The CPU tab no longer displays individual graphs for every logical processor on the system by default; instead, it can display data for each NUMA node. When displaying data for each logical processor for machines with more than 64 logical processors, the CPU tab now displays simple utilization percentages on heat-mapping tiles. The color used for these heat maps is blue, with darker shades again indicating heavier utilization. Hovering the cursor over any logical processor's data now shows the NUMA node of that processor and its ID, if applicable. Additionally, a new Startup tab has been added that lists startup applications. The new task manager recognizes when a WinRT application has the "Suspended" status.
Installation options

Unlike its predecessor, Windows Server 2012 can switch between Server Core and the GUI (full) installation options without a full reinstallation. There is also a new third installation option that allows MMC and Server Manager to run, but without Windows Explorer or the other parts of the normal GUI shell.
IP address management (IPAM)
Windows Server 2012 has an IPAM role for discovering, monitoring, auditing, and managing the IP address space used on a corporate network. IPAM provides for administration and monitoring of servers running Dynamic Host Configuration Protocol (DHCP) and Domain Name Service (DNS). IPAM includes components for:
§  Automatic IP address infrastructure discovery: IPAM discovers domain controllers, DHCP servers, and DNS servers in the domains you choose. You can enable or disable management of these servers by IPAM.
§  Custom IP address space display, reporting, and management: The display of IP addresses is highly customizable and detailed tracking and utilization data is available. IPv4 and IPv6 address space is organized into IP address blocks, IP address ranges, and individual IP addresses. IP addresses are assigned built-in or user-defined fields that can be used to further organize IP address space into hierarchical, logical groups.
§  Audit of server configuration changes and tracking of IP address usage: Operational events are displayed for the IPAM server and managed DHCP servers. IPAM also enables IP address tracking using DHCP lease events and user logon events collected from Network Policy Server (NPS), domain controllers, and DHCP servers. Tracking is available by IP address, client ID, host name, or user name.
§  Monitoring and management of DHCP and DNS services: IPAM enables automated service availability monitoring for Microsoft DHCP and DNS servers across the forest. DNS zone health is displayed, and detailed DHCP server and scope management is available using the IPAM console.
Both IPv4 and IPv6 are fully supported.
Active Directory
Windows Server 2012 has a number of changes to Active Directory from the version shipped with Windows Server 2008 R2. The Active Directory Domain Services installation wizard has been replaced by a new section in Server Manager, and the Active Directory Administrative Center has been enhanced. A GUI has been added to the Active Directory Recycle Bin. Password policies can differ more easily within the same domain. Active Directory in Windows Server 2012 is now aware of any changes resulting from virtualization, and virtualized domain controllers can be safely cloned. Upgrades of the domain functional level to Windows Server 2012 are simplified; it can be performed entirely in Server Manager. Active Directory Federation Services is no longer required to be downloaded when installed as a role, and claims which can be used by the Active Directory Federation Services have been introduced into the Kerberos token. Windows Powershell commands used by Active Directory Administrative Center can be viewed in a "Powershell History Viewer".
Hyper-V
Windows Server 2012, along with Windows 8, will include a new version of Hyper-V, as presented at the Microsoft Build Event. Many new features have been added to Hyper-V, including network virtualization, multi-tenancy, storage resource pools, cross-premise connectivity, and cloud backup. Additionally, many of the former restrictions on resource consumption have been greatly lifted. Each virtual machine in this version of Hyper-V can access up to 32 virtual processors, up to 512 gigabytes of random-access memory, and up to 16 terabytes of virtual disk space per virtual hard disk (using a new .vhdx format). Up to 1024 virtual machines can be active per host, and up to 4000 can be active per failover cluster. The version of Hyper-V shipped with the client version of Windows 8 requires a processor that supports SLAT and for SLAT to be turned on, while the version in Windows Server 2012 only requires it if the RemoteFX role is installed.
ReFS
ReFS (Resilient File System, originally codenamed “Protogon”) are a new file system in Windows Server 2012 initially intended for file servers that improves on NTFS. Major new features of ReFS include:
Improved reliability for on-disk structures
ReFS uses B+ trees for all on-disk structures including metadata and file data. The file size, total volume size, number of files in a directory and number of directories in a volume are limited by 64-bit numbers, which translates to maximum file size of 16 Exabytes, maximum volume size of 1 Yottabyte (with 64 KB clusters), which allows large scalability with no practical limits on file and directory size (hardware restrictions still apply). Metadata and file data are organized into tables similar to relational database. Free space is counted by a hierarchal allocator which includes three separate tables for large, medium, and small chunks. File names and file paths are each limited to a 32 KB Unicode text string.
Built-in resilience
ReFS employ an allocation-on-write update strategy for metadata, which allocates new chunks for every update transaction and uses large IO batches. All ReFS metadata has built-in 64-bit checksums which are stored independently. The file data can have an optional checksum in a separate "integrity stream", in which case the file update strategy also implements allocation-on-write; this is controlled by a new "integrity" attribute applicable to both files and directories. If nevertheless file data or metadata becomes corrupt, the file can be deleted without taking down the whole volume offline for maintenance, then restored from the backup. As a result of built-in resiliency, administrators do not need to periodically run error-checking tools such as CHKDSKwhen using ReFS.
Compatibility with existing APIs and technologies
ReFS does not require new system APIs and most file system filters continue to work with ReFS volumes. ReFS supports many existing Windows and NTFS features such as BitLockerencryption, Access Control ListsUSN Journal, change notifications, symbolic linksjunction pointsmount pointsreparse pointsvolume snapshotsfile IDs, and oplock. ReFS seamlessly[citation needed] integrates with Storage Spaces, a storage virtualization layer that allows data mirroring and striping, as well as sharing storage pools between machines. ReFS resiliency features enhance the mirroring feature provided by Storage Spaces and can detect whether any mirrored copies of files become corrupt using background data scrubbing process, which periodically reads all mirror copies and verifies their checksums then replaces bad copies with good ones.
Some NTFS features are not supported in ReFS, including named streamsobject IDsshort namesfile compressionfile level encryption (EFS)user data transactionssparse fileshard links,extended attributes, and disk quotas. ReFS does not itself offer data deduplication. Dynamic disks with mirrored or striped volumes are replaced with mirrored or striped storage pools provided by Storage Spaces. However, in Windows Server 2012, automated error-correction is only supported on mirrored spaces, and booting from ReFS is not supported either.
ReFS was first shown in screenshots from leaked build 6.2.7955, where it went by code name "Protogon". Support for ReFS is absent in the developer preview (build 8102). ReFS is not readable by Windows 7 or earlier.
IIS 8.0
Windows Server 2012 will include version 8.0 of Internet Information Services (IIS). The new version contains new features such as CPU usage caps for particular websites.
Hardware
Microsoft has revealed the following maximum supported hardware specifications for Windows Server 2012 at the BUILD conference.

640 (was 256 in Windows Server 2008 R2)
4 TB (was 2 TB in Windows Server 2008 R2)
Failover cluster nodes
64 (was 16 in Windows Server 2008 R2)

System requirements
Microsoft has indicated that Windows Server 2012 will not support 32-bit (IA-32) or Itanium (IA-64) processors, but has not officially released any other system requirements, except for the Release Candidate. The following system requirements are for the Release Candidate, and are subject to change in the final release. 
Minimum system requirements for Windows Server 2012 Release Candidate 
Architecture
x64 (64-bit)
1.4 GHz
512 MB
HDD free space
32 GB (more if there is 16 GB of RAM or more)

Upgrades from Windows Server 2008 and Windows Server 2008 R2 are supported, though upgrades from prior releases will not be supported.