Friday, November 4, 2011

Diet should pay attention to more protein

Attention!
Vitamin E, iodine
The thyroid gland is the largest human endocrine glands. Because of the need to generate the thyroid gland thyroid hormone, for a variety of nutrients, such as carbohydrates, fat and protein anabolism and catabolism, plays an important role, so as to maintain the physiological activity of the cells. Under normal circumstances, as long as they can fully exercise, can promote fat burning, to achieve weight loss goal. Vitamin E and iodine is the thyroid gland of the nutrients required, must take enough. Foods rich in vitamin E include wheat germ, sweet potato, potato, spinach, cabbage, bean, honey; iodine rich foods include onion, seaweed, sea salt.
Potassium
In order to lose weight and eat too little, may cause failure of the adrenal glands, leading to lower blood glucose; blood glucose is too low will cause pressure, causing huge loss of potassium, sodium and water will in vivo hoarding, resulting in systemic edema. Then you should eat more potassium rich foods, such as pumpkin, sweet potato, potato, alfalfa, beans, almonds, raisins, figs, bananas, and salt to eat.
Protein
Multiple protein supplement, can make the fat burning weight increase of at least two times. Higher protein content of food and food include corn, rice, wheat germ, soybeans, pine nuts, cashews, sesame, yogurt, beer yeast.

Thursday, November 3, 2011

Better than a treadmill aerobic equipment

Climbing machine not only can improve heart and lung function and reduce fat, on thigh muscle lines portray will also have the very good effect, it is important to adhere to. Practice three times every week, the best effect.
If your training goals is the fat would need to do a lot of aerobic exercise. In many ways in fat, aerobic equipment is very effective, today we introduce" climbing machine", also called" mountain climbing device". This instrument can not only help us in 30 minutes more fat, on cardiopulmonary function and leg modeling will have good effect.
Climbing machine is based on the design principle of our daily life the stairs-climbing movement designed. Because we do in the climbing action, front thigh femoral four muscles, hamstring muscles and gluteus maximus will participate in sports. However, in the step device on lap under the pedaling action, our knee than the climb to our knees in pressure to reduce the number of. This exercise on knee weaker friend is very safe and reliable.
Climbing exercise machine using the method is also very simple, as long as the stepping on the pedal feet alternately two times, the machine will automatically display. Then according to the training aim of input resistance values can be. If you just want to burn it, can make the resistance to 8-12. Time maintained in 30-40 minutes will achieve good slimming effect. Heart rate remained at 130-140 / min. If you want to improve heart and lung function, resistance to 6-8, insist on 20 minutes will have good results. Heart rate remained at 100-120 / min.
Climbing machine not only can improve heart and lung function and reduce fat, on thigh muscle lines portray will also have the very good effect, it is important to adhere to. Practice three times every week, the best effect.

Video Capture Card

Video Capture card is also called the video card, is the analog camera, video recorder, LD player, TV output video signal output of the video data or audio and video data is input to the computer, the computer can identify and converted into digital data, stored in the computer, can be processed video data file editor. According to its use can be divided into broadcast video capture card, professional grade video capture cards, commercial video capture card.
Video capture card is also called a video capture card, it can be used to obtain the digitized video information, and the storage and playback. A lot of video capture card can capture video information and audio, the audio portion and a portion of the video synchronization in digital preservation, synchronous playback.
Video capture card," Video Capture Card", its function is to make the video signal acquisition to the computer, in the form of data files stored in the hard disk. It is our video processing essential hardware equipment, through it, we can put the camera video signal from the camera to take onto the computer, using the related video editing software, the digital video signal processing, such as editing, add filtering ytterbium, shear picture captions and audio, set the deployment effect and adding various video effects and so on, finally will complete the editing of a video signal is converted into a standard VCD, DVD and stream media format, convenient communication.
Classification
Video capture card according to the video signal source, can be divided into data acquisition card ( using a digital interface ) and analog capture card.
Video capture card according to the installation of links, can be divided into external acquisition card ( box ) and a built-in card.
Video capture card according to the video compression, can be divided into soft press card ( consume CPU resources ) and hard press card.
Video capture card in accordance with the video signal input and output interface, can be divided into 1394 acquisition card, USB card, HDMI card, VGA video capture cards, video cards, PCI PCI-E video acquisition card.
Video capture card according to their performance, can be divided into the TV card, image acquisition card, DV card, computer video card, monitoring data acquisition card, multi-screen card, streaming media data acquisition card, component acquisition card, HD acquisition card, notebook acquisition card, DVR card, VCD card, non-linear editing card ( referred to as the NLE card ).
Video capture card in accordance with its use can be divided into the broadcast video capture card, professional grade video capture cards, commercial video capture card, their grade level is mainly the acquisition of image quality in different. The difference between them is the main index of different image acquisition.
Video image acquisition method is more, basically can be divided into 2 categories: digital signal and the analog signal acquisition. So the common image acquisition card also has a digital acquisition card and simulation acquisition card, AV+DV combo acquisition card types.
Broadcast video acquisition card with the highest acquisition resolution for general 768X576 ( RMS) for PAL, or 720X576 ( CCIR-601 ) PAL 25 frames per second, or 640X480 / 720X480 NTSC for 30 frames per second minimum compression is usually in the ratio of 4: 1. This type of product is characterized by the acquisition of high resolution images, video signal to noise ratio, disadvantage is the video file is huge, the minute data volume of at least 200MB.
Professional grade video capture card level than the broadcast video capture card performance slightly lower resolution, the two are the same, but the compression ratio is slightly larger, the minimum compression is usually in the ratio of 6: 1, input and output interfaces for AV composite terminal and S terminal.
Commercial video acquisition card dynamic resolution is typically a maximum of 384X288, PAL 25 frames per second.

"The cloud" the era of new function new features of firewall.

Cloud firewall is a new concept, first by IT giant Cisco proposes, their practice is: the firewall to upgrade to a" cloud" of fire prevention, realize the dynamic, active safety.
Cisco thinks, cloud firewall means that the emergence of the fifth generation of firewall 's birth (the first four generations are: firewall software, hardware firewall firewall, ASIC, UTM ). Cloud firewall 4 features include: anti zombie network / Trojan, prevent network internal host infection; cloud detection - Global IPS linkage; cloud access - SSL VPN; cloud monitoring - the only supports Netflow firewall, realize the NOC and SOC combo.
Cloud firewall "brain" is SensorBase, SensorBase formerly known as SenderBase. In Cisco 's $830000000 purchase of IronPort, Cisco has been SenderBase, SenderBase is the world's largest mail traffic monitoring network, to provide a real-time view of global security threats and email" credit reporting service". Cisco will be renamed SensorBase SenderBase, and SensorBase joined botnets master database, enable sensitive monitoring zombie network dynamics. SensorBase also increases the dynamic strategy, if an Internet address a problem will be blocked.
Cisco Security experts said, SensorBase is the premise of cloud firewall. Cisco will strive to be updated every 15 minutes SensorBase information, and synchronized to the all cloud firewall. A variety of security information not only from the SensorBase to the cloud firewall, but also from the cloud firewall to SensorBase, cloud firewall in IPS can in the first time to attack synchronization to the SensorBase, SensorBase resynchronization to other cloud firewall.
Cloud security key to success is enough information collection and computation ability, which is the advantage of cisco. Cisco in the world has about 700000 sensors, almost all of the global Internet service provider for the Internet are Cisco sensor; has more than 500 third party security agencies to provide timely security Cisco Cisco monitor message; over 30% of the world's Email flow.
For the SensorBase, Chinese users may have such doubt: is a global SensorBase network, but the timely analysis of geographical characteristics of threat? In fact, the user need not worry about, because the SensorBase address pool 30% is the home address, this is quite high proportion.
Cloud firewall looks is a brand new product, but in fact the user get cloud firewall method is very simple, as long as the ASA firewall software upgrade to version 8.2 can, without changing the hardware. Produced by the SensorBase updated volume is very small, only 70K.
Why to activate the cloud firewall, original to the enterprise, buy the firewall is a border security idea and concept, but there is no thought carefully, some of this article.
Because the firewall is the default trust network, and suspected outside, thus protecting wall security strategy is the basic rule of wide out Yan Jin, this default rule is sometimes fatal.

On tiptoe to help men and women stovepipe

According to experts: if one day you can do 7 times around such a movement, not only can you can achieve success is strongly the role of kidney. The above is to introduce the tiptoe weight loss method, can let everybody down leg fat while still do good health care work.
On tiptoe health care function:
This seemingly simple little movement, can stretch to the brain can also eliminate the long time excessive use of the brain to solve problems, with brain transition induced vertigo.
On renal protective effect on tiptoe: Men urinate, can play a strong kidney function, because the association also strongly effect; woman in the squatting toilet when also can let the first toe and second toe forced landing, on a stand, shake, can also play the effect of tonifying kidney diuresis.
On tiptoe stovepipe:
On tiptoe small meeting is the body to maintain balance, focus before toe, heel followed up, is slowly improving, rhythmic repeated this action, be hard on and under pressure, and can be trained to.
Looking for something, to maintain the balance of the body. To do so is to let you tight calf stimulation and slowly the consumption of fat, the long run will eliminate fatigue and can increase the elasticity of the calf. To speed up the elimination of the effect of fat.

Wednesday, November 2, 2011

JDK (Java Development Kit)

JDK (Java Development Kit) is a Sun Microsystems product for Java developers. Since its inception Java, JDK has become the most widely used Java SDK. Is the core of the Java JDK, including Java runtime environment, Java tools and Java-based library. The first step is to learn the Java JDK. Specifically to run on x86 platform Jrocket efficiency in the service side also much better than the Sun JDK. SUN's JDK5.0 from the beginning, providing a generic and other very useful features, and its updated versions, operating efficiency has been a very large increase.VersionSE (J2SE), standard edition, standard edition, is usually a version of the JDK 5.0 from the start, renamed Java SE.EE (J2EE), enterprise edition, enterprise edition, use this JDK to develop J2EE applications, starting from JDK 5.0, renamed Java EE.ME (J2ME), micro edition, mainly for mobile devices, embedded devices, java application, starting from JDK 5.0, renamed Java ME.
 
No JDK, then, can not install or run eclipsecharacteristics of the various versions of jdk1997 Servlet JSP technology generation and followed by the generation of Java against PHP, ASP server-side language, so bring chips. 1998, Sun released the EJB1.0 standard, bringing the three core J2EE platform technologies have emerged. Thus, in 1999, Sun released the first version of J2EE. And the end of 1999 released J2EE1.2, released in 2001 J2EE1.3, 2003 was released in J2EE1.4. 2.J2EE1.3 J2EE1.3 architecture, which consists mainly of the Applet container, Application Client container, Web container and EJB container, and includes a Web Component, EJB Component, Application Client Component, the JMS, JAAS, JAXP, JDBC, JAF, JavaMail, JTA and other technologies as the foundation. 1.3 introduces several noteworthy features: Java Message Service (JMS defines a set of API), J2EE connector technology (as defined in the extension services to non-J2EE application standard J2EE), XML parser, a set of Java API, Servlet2.3, JSP1.2 also been expanded and optimized performance, the new CMP component model and MDB (Message Bean).3.J2EE1.4 J2EE1.4 general framework and is consistent J2EE1.3, 1.4 adds support for Web services, mainly Web Service, JAX-RPC, SAAJ, JAXR, but also to an EJB message-passing mechanism perfect (EJB2.1), enhanced deployment and management tools (JMX), and the new version of the Servlet2.4 and JSP2.0 make Web applications easier.
4.JAVA EE 5JAVA EE 5 has many noteworthy features. One of them is the new Java Standard Tag Library (JSTL) 1.2 specification. JSTL 1.2 is the key to a unified expression language, it allows us to JavaServer Faces (JSF) in combination with the best features of JSTL.

Multi-touch

Multi-touch (also known as multi-touch, multi-sensor, multiple sensors, translated as Multitouch or Multi-touch) is a number from the computer through the fingers of the user to control the input image application technology. Is the use of interactive technology and hardware to achieve a common technique in the absence of traditional input devices (such as a mouse, keyboard, etc.) in the conduct of human computer interaction.Feature1, multi-touch display interface in the same multi-point or multi-user interactive mode of operation, to abandon the keyboard, mouse, single-point operation. 2, the user can touch a single point through his hands, but also can click, double click, pan, pressing, rolling and rotating touch screen, various gestures, to achieve arbitrary control to better and more comprehensive understanding of the relevant characteristics of the object (text , video, photos, satellite images, three-dimensional simulations and other information). 3, according to customer demand, the appropriate custom touch panels, touch software and multimedia systems; can be used in conjunction with professional graphics software.Edit this paragraph direction gesture recognitionMulti-touch technologyWe now see the most is the Multi-Touch Gesture, the two fingers touch, you can identify the direction of movement of two fingers, but can not determine the specific location, you can zoom, pan, rotate. This multi-touch implementation is relatively simple, axes coordinates, can be realized. The ITO into X, Y axis, can be sensitive to the two-touch operation, but sensitive to touch and touch to detect the exact location of the two concepts. XY axis touch screen can detect the way to the 2nd touch, but can not know the exact location of the second touch. A single touch on each axis produces a single maximum, to conclude that the position of the touch, if there is a second finger touch screen surface, there will be two in each axis maximum. Both the maximum by two different touch to produce, so the system can not accurately judge. Timing for the introduction of some system to determine, if not also put up two fingers, but there is always the same time touching the case, then, the system can not guess. We can not really touch the point called "ghost point", shown in Figure 1. Multi-touch technologyEdit this section identify the location of the fingerMulti-touch technologyMulti-Touch All-Point is a popular topic recently. It can identify the specific location of the touch point, that there is no "ghost point" phenomenon. Identify location of multi-touch gestures can be applied to any touch detection, can be detected, while the ten fingers touch his hands, but also allow other forms of non-finger touch, such as hands, face, fist, and even gloves can be, it is the most user-friendly man-machine interface mode, it is suitable for the application of multi-hand simultaneously, such as game control. Multi-Touch All-Point of scanning each row and each column is the intersection are required to detect a single scan, the scan frequency is the number of rows and columns of the product. For example, a 10-line line, 15 column lines consisting of the touch screen, use the Multi-Touch Gesture axis coordinates, the number of scans required 25 times, and location of multi-touch recognition method requires 150 times. Multi-touch technology Multi-Touch All-Point mutual capacitance-based detection, rather than self-capacitance, self capacitance of each sensor unit detects the capacitance (that is, parasitic capacitance Cp) of the changes, there is the presence of parasitic capacitance finger increase, in order to determine a touch there, and the ranks of mutual capacitance is detected at the intersection of the mutual capacitance (coupling capacitance is Cm) changes, shown in Figure 2, when the cross through the ranks, the ranks of the mutual capacitance between the cause (including : the ranks of the edge capacitance between the sensor unit, the ranks of cross-coupling capacitance generated by overlap), there is the presence of inter-finger capacitance is reduced, we can determine the existence of touch, and accurately determine the location of each touch point.