Monday, April 20, 2009

BigChampagne is Watching You

In fact, they're tracking every download and selling the data to the music industry. How one company is turning file-sharing networks into the world's biggest focus group.

By Jeff Howe

Joe Fleischer twists restlessly in his Aeron chair and nods at the voice on the other end of the telephone. Tapping his fingers on his computer's mouse, he stares out the window of his Beverly Hills office at the new BMWs and battered Celicas inching down Wilshire Boulevard. "Uh-huh, uh-huh," he says. "Got it." Fleischer is talking to a client, an executive at one of the major labels who's working a band he's sure could go platinum, if only radio would give the group a chance. The band's first two albums earned it a fervent fan base, but to get bigger, its new single needs airplay, the all-important spark of sales. "Give me a story I can take to radio," the executive on the other end of the line tells him.

Fleischer hangs up, turns to his computer, and clicks through an online database. On his screen, he can see in astonishing detail when, where, and what Internet users are sharing on peer-to-peer file-swapping services like Kazaa, Morpheus, and Grokster. He searches for cities where downloads of the band's single are outpacing its exposure on radio. He likes what he sees. In Atlanta, sharing of the group's new album is up more than 1,200 percent over the previous week; in Houston and New York, 300 percent. So Fleischer checks to see how much airplay the track is getting on alternative rock stations in those markets. Very little, it turns out - less than five spins per week in each city. "Jesus," he whispers. In Houston, "KTBZ only spun it once, and it still got into the top 15 downloads. This is hot."

In the argot of the industry, what Fleischer sees is reactivity: the single most important quality a song can have. Basically, it means listeners can't get that tune out of their heads - they probably downloaded it after hearing it only once - and radio stations ought to put the track in heavy rotation. Usually, programming executives evaluate songs by call-outs, telephone surveys in which people hear a clip and give an impression. But that information isn't very helpful to labels, Fleischer will tell you, because it doesn't apply to album sales.

Fleischer is VP of sales and marketing for a company called BigChampagne, which has a better window into consumer demand. By matching partial IP addresses to zip codes, the firm's software creates a real-time map of music downloading. The company sells subscriptions to its database that let a user track one album for $7,500; bigger labels have annual deals for up to $40,000 per month.

He calls his client and gets voicemail. "Dude, you're gonna be stoked," he says. "I'll shoot you an email in a few minutes." In the office, Fleischer seems 39 going on 18, a Valley Boy with a baby face and a sly grin. He has music in his blood - his father was a studio musician who played with Frank Sinatra and Herb Alpert and the Tijuana Brass, and Fleischer himself is a band manager in his spare time. I ask how the label executive will use the data. "He'll give this to promotions," he tells me. "They'll call these stations and say, 'You need to bang this shit. You're barely playing it, and it's already in the top 15 among alt-rock downloaders in your market. You need to step on this at least 20 more times a week, and not while people are sleeping.'"

A week later I call Fleischer to find out how his client reacted. When the executive showed the data to the label's general manager, Fleischer says, "the GM came around his desk and hugged him."

According to on-the-record statements by many major labels, the scene I witnessed in Fleischer's office couldn't possibly have happened. But Eric Garland, CEO of BigChampagne, says his firm is working with Maverick, Atlantic, Warner Bros., Interscope, DreamWorks, Elektra, and Disney's Hollywood label. The labels are reticent to admit their relationship with BigChampagne for public relations reasons, but there's a legal rationale, too. The record industry's lawsuits against file-sharing companies hang on their assertion that the programs have no use other than to help infringe copyrights. If the labels acknowledge a legitimate use for P2P programs, it would undercut their case as well as their zero-tolerance stance. "We would definitely consider gleaning marketing wisdom from these networks a non-infringing use," says Fred von Lohmann, staff counsel for the Electronic Frontier Foundation, the San Francisco-based cyber liberties group that's helping to defend Morpheus, Grokster, and Kazaa.

But even as the industry as a whole litigates, many of the individual labels are quietly reaching out to BigChampagne, turning file-sharing networks into the world's biggest focus group. In the beleaguered music business, this market research strategy that dare not speak its name is fast becoming the Nielsen ratings of the peer-to-peer world.

You can't blame the music industry for wanting to know more about its consumers. "For years," says Ted Cohen, a senior vice president at EMI, "the mantra of the record biz was, you don't need research. It was, 'This song sounds great, so just play the fucking song.'" Currently, radio relies on call-outs, and the labels rely on SoundScan, a subscription-based service that tracks album sales at the point of purchase and organizes them according to zip code. Neither offers any information on reactivity or what kind of fan is listening to what kind of music.

BigChampagne does. "It's fantastic," says Jeremy Welt, head of new media at Maverick Records, an AOL Time Warner label. "It actually shows us what people are doing of their own accord." And because radio is beginning to take BigChampagne seriously, Welt says, Maverick can use the figures to persuade stations to increase spins.

"The fact is, P2P is a likely distribution channel for our wares," says Jed Simon, head of new media for DreamWorks Records. "If we're going to be intelligent businesspeople, it behooves us to understand it." BigChampagne is happy to provide that understanding, even if it has to operate on the sly.

For most customers, Garland says, "we're the mistress." He and his colleagues once met with some executives from a major label on the street near the label's offices, just to avoid setting off gossip. But not everyone is afraid to be seen with BigChampagne. In March, the company signed a deal with Premiere Radio Networks, the subsidiary of radio giant Clear Channel that sells research products, including the airplay-tracking system Mediabase. The agreement gives the two companies access to each other's data and lets Premiere sell packages of information that include the BigChampagne product.

Radio stations need to measure reactivity even more than labels do, and Garland says the package has exceeded sales targets. Erin Bristol, program director at Clear Channel's Hot 107-9, a Top 40 station in Syracuse, New York, began looking at BigChampagne before the deal. "A lot of radio airplay is based on what other stations are doing, and that's silly," Bristol says, "because what's going on in New York or LA isn't necessarily indicative of what's going on in Syracuse." For example, she might not have added the Kid Rock- Sheryl Crow duet "Picture" to her playlist ("which leans rhythmic") until she noticed that local file-sharers were sucking down the song. "I threw it into my call-outs, and it was reactive, so we made it a subpower," a song that plays 40 to 50 times a week. Bristol says she was turned on to BigChampagne by an executive from Warner Bros. but asked me not to name him.

Have you ever watched file-sharing? I mean really watched file-sharing? I'm in BigChampagne's Atlanta office, where several of the company's dozen or so employees have gathered in the conference room to show off the firm's technology. Garland is filling me in on how he started the company, but I can't take my eyes off the green digits raining down on the big black screen behind him in a matrix of file-sharing. I interrupt him to ask the coders if they can freeze the display. One of them taps a few keys, and the blur atomizes into individual search requests. One user - BigChampagne's software doesn't retrieve actual IP addresses, only a cipher corresponding to metro area - wants to hear the Goo Goo Dolls. Another is interested in "endurance bondage-caning." "A lot of people," COO Adam Toll notes, "are looking for porn."

Garland spent much of his twenties working as a management consultant, dashing through airports and hotel restaurants telling people how to run their businesses. File-sharing was an obsessive hobby; he scoured nascent P2P networks for obscure Britpop. In early 2000, he quit his job and moved to LA. One night when he was out drinking with his friend Glen Phillips, former vocalist for Toad the Wet Sprocket, they began discussing Napster. Toad's heyday had passed, but that hadn't deterred fans from swapping warehouses' worth of the band's music. Phillips, who was trying to jump-start a solo career, "wanted to figure out a way to capitalize on that popularity."

Garland called Zack Allison, a friend from Rice University who was exploring distributed-computing applications. Allison built a program that sent anyone sharing a Toad song an invitation to join Phillips' mailing list, and they decided that if it looked promising they would start a business. "The opt-in rate was 20 percent!" says Zack's father, Tom. "A good opt-in rate is usually 2 or 3 percent." Dapper in a mild fashion, Tom Allison, 60, approaches marketing with a near-religious zeal; he spent 36 years working with Coca-Cola's marketing department, the Los Alamos of consumer research. When Zack called to tell him about their business idea, he realized the real money was in the data and agreed to serve as an incubator and de facto den father for the startup. In a nod to the music industry's dour situation, they took their name from a line in Peter Tosh's apocalyptic "Downpressor Man": "You drink your big champagne and laugh."

In the summer of 2000, Garland and the Allisons hired coders to build software capable of recording and archiving the contents list of shared folders and 50 million search queries a day, and Garland and Tom Allison began pitching their service to labels. At first companies demurred, figuring the courts were about to solve their Napster problem. But then scores of copycats sprang up to replace Napster - the research firm NPD Group estimates that 31 million Americans shared music from a P2P service in September 2002.

Tom Allison and I leave the company's headquarters and drive to a warehouse district on the outskirts of Atlanta. Here, in the dark basement of a brick building, BigChampagne's programmers monitor the software that tracks 50 million search requests a day. "They hate natural light," Garland says of his team, several of whom scowl vaguely at the intrusion.

Although the company's storage needs are substantial, the real heavy lifting, in both bits and man-hours, involves processing the data and presenting it through an easy-to-use interface. Search entries are never uniform ("Rhonda" vs. "Help Me Rhonda") and rarely literate ("Hepl me Rhoda"), and over the past few years the company's coders have fine-tuned a series of programs that clean and organize what they pull off the Internet into a form that can feed the database. BigChampagne's clients can pull up information about popularity and market share (what percentage of file-sharers have a given song). They can also drill down into specific markets - to see, for example, that 38.35 percent of file-sharers in Omaha, Nebraska, have a song from the new 50 Cent album.

What lets the service transcend trivia is the way it establishes correlations between artists. By recording the entire contents of users' shared folders, BigChampagne can determine that, say, 58 percent of people with a Norah Jones song also have at least one track by John Mayer. This lets the company categorize users by radio format, as well as provide solid information about what kind of listener is making a certain single reactive.

To some, though, the accuracy of that information is an open question, and even BigChampagne itself cautions that its service is better at determining trends than exact quantities of downloads. File-sharing is notoriously difficult to monitor, especially since the IP addresses used to track it don't always map to individuals. Jay Samit, former digital media chief of EMI (he recently announced he was leaving to take a position at Sony), says he's skeptical of any reresearch based on IP addresses. "It's like buying gifts on Amazon: Say I get Joy of Cooking for a friend - that suddenly changes my profile." The marketing plan he might employ for an "angry rock rebel" is very different from the one he'd use on a soccer mom, and "just knowing they're both in Tulsa doesn't help me." Because AOL works with dynamic IP addresses, Samit notes, the location of its users can't be determined. (The company says that AOL subscribers account for only 15 percent of its information and that it includes them in its national, but not local, data.)

After spending three years convincing the music industry of the utility of P2P data, BigChampagne now faces challenges from a number of directions. An LA company named Webspins is offering a similar service, and the two firms have since filed lawsuits against each other for defamation and unfair business practices. And in July, Billboard launched a new chart that monitors sales of downloads from legitimate services. Right now, by monitoring peer-to-peer networks, BigChampagne tracks nearly all the music downloaded from the Internet. But that will change as industry-sanctioned music services like Apple's iTunes gain more of a foothold.

In the meantime, BigChampagne is beginning to diversify. In May, Garland started talking to two major Hollywood studios (contractual obligations prohibit saying which). Over the long term, the entertainment industry will never stop worrying and learn to love file-sharing - but BigChampagne will help them learn to live with it.


Contributing editor Jeff Howe (jeffhowe@wiredmag.com) wrote about the music business in Wired 11.02


Share/Save/Bookmark
Subscribe

The 10 Lamest Facebook Apps

Do you really need to know about your friends' bowel movements? Or what sandal they'd be? It was a tough competition, but we chose the 10 lamest apps on Facebook.

Brennon Slattery, PC World

The 10 Worst Facebook Apps

Click here for full-size image

By itself, Facebook is a bare-bones Web service--the liveliness comes from its users and from the oodles of Facebook applications that make going to this social network fun and useful. We at PC World love plenty of Facebook apps, but some that blink, flash, and serve no clear function have us scratching our heads wondering why they exist.

Others have us tearing our hair out or are just annoying. After all, what is the point of a Facebook application called Ploppy that broadcasts how our last trip to the bathroom went?

You have tens of thousands of Facebook applications to choose from. Of those thousands, here are the ten you’ll definitely want to avoid. (As already hinted, at least one pushes the boundaries of taste.)

Facebook Wall Candy Crap-letts

Click here for full-size image

Pieces of Flair, Bumper Stickers, and Super Wall are all one of a kind, Facebook applications that the creators say are meant to promote self-expression via splashy graphics, videos, and interactive gifts.

In reality, these pesky pieces of junk inundate your home page with images of snowballs, green mugs of beer, crass quotes, and what are called LOL cats sent from your flair-loving friends. Once the less-discerning among your Facebook acquaintances start using Crap-letts, you may find dozens of colorful hairballs, so to speak, littering your profile.

Pirates vs. Ninjas

Click here for full-size image

There are some great games on Facebook--Scrabble comes to mind. Then there's Pirates vs. Ninjas, a never-ending game where, in order to succeed and become a stronger character, you must virtually lasso (via Facebook invites) more of your friends to join the game.

That's what makes this game so insidious: The more friends you get to sign up, the more you advance in the game. This recruitment requirement will turn any successful Pirate or Ninja into a Facebook spammer.

Spamming friends for make-believe pirate swag? As someone said, "Arg, I think not, me hearties!"

Whopper Sacrifice

Click here for full-size image

Before the Facebook app Whopper Sacrifice was shut down in January 2009 for "creative differences" between Burger King and Facebook, the app pushed the boundaries of good manners, if not good taste. Whopper Sacrifice asked participants to delete Facebook friends in exchange for free burgers from Burger King. A whopping 233,906 complied--and looked like jerks in the process. Whopper Sacrifice earns a Facebook raspberry for its contradictory nature: Facebook is supposed to connect people, not separate them.

Honesty Box

Click here for full-size image

Honesty Box is a Facebook application to help those who apparently feel their friends aren't telling them the entire truth. The app allows you to ask any question you choose, and fellow Honesty Boxers can submit their answers anonymously. So now you’ll never know who answered your question, "Do you think I’m fat?" with the response "Absolutely YES."

Only gluttons for punishment would have the guts to hang this Facebook app on their Wall. For those who don’t think your 200-plus Facebook “friends” can sometimes be cruel, you’ve been warned.

Owned!

Click here for full-size image

Owned! allows you to place imaginary monetary bids on your friends, and, in effect, "own" them for the highest dollar. You get no actual reward, and you don’t actually spend any money. If this app feels like a big joke, it kind of is. And we think the joke is on those who install it.

How Good Are You in Bed?

Click here for full-size image

Based on a series of auto-generated questions such as how attentive are you to your partner's needs and how limber are you, the Facebook app How Good Are You in Bed? supposedly can determine your sexual value and self-worth.

We’re not sure what kind of person might want to advertise their How Good Are You in Bed? test results on their Facebook page. But if you have to advertise it, the odds are good that you may have cheated on the test--just a theory.

Compare People

Click here for full-size image

Performing precisely as advertised, Compare People delves into the pit of superficiality and trivializes the friends you've collected by showing you two of your friends side-by-side and forcing you to find one of them superior. Who's the most datable? Who has the better fashion sense?

The questions keep coming and so do the bruises to your Facebook friends. The results of your comparisons remain private--which is fortunate considering you’d likely lose about 50 percent of your friends overnight if you did post the results on your Facebook page.

What Kind of Sandal Are You?

Click here for full-size image

Based on five simple questions such as, "What's in your closet?" and "What color pedicure would you get?" and so on, the Facebook app What Kind of Sandal Are You? reveals, at long last, what breed of open-toed piece of footwear you are.

According to the app, this reviewer is Slingback Sandals--"classy and sophisticated, I dress to the nines wherever I go, even if it's in my Couture sweats!" This stuff is obviously culled from a space-age algorithm crafted by Harvard graduate scientists and the top social researchers in the world.

Question: What kind of person is a Croc?

Ploppy

Click here for full-size image

Yes, there exists a Facebook app that tracks your bowel movements. Its name is aptly Ploppy, and it's probably supposed to be good old-fashioned potty humor. But this app excretes no joy from us when it comes to the prospect of informing people how we spent our time in the bathroom. We think it would be equally as stinky to know about our friends' … you know.

The Most Useless Application Ever

Click here for full-size image

The ultimate ineffectual Facebook add-on is The Most Useless Application Ever. Yep, you heard right. The name of the app is The Most Useless Application Ever. Guess what it does? Nothing. It updates your newsfeed to indicate the app has been added to your stockpile--and that's it. When clicked, The Most Useless Application Ever cynically informs you with quips such as "Eliminated potential of usefulness." Perhaps, in its simplicity, it is, in fact, refreshingly honest. Or maybe it's just stupid.

1998-2009, PC World Communications, Inc.


Share/Save/Bookmark
Subscribe

Will Search Engines Become The Next Pirate Bay?

by

Pirate Bay Going Down In Flames

The pirate bay is taking on water at a frantic pace, and while an appeal in the trial is still likely, odds are pretty good that site may soon be brought down once and for all through a court injunction. Truth is though; the Pirate Bay brought this down on themselves. By picking up the torch that Napster and Kazaa dropped, they painted a huge bulls eye on their chest and blatantly taunted the movie and music industry by posting take down notices on the site, a sign of open defiance.

Though they may soon pay the price for these actions, it remains to be seen who the movie and music industry would consider to be “next on the list”. Tracker sites like Mininova, isoHunt, and Demonoid come to mind, but one searching tool rules them all, Google. Type any movie or TV show into Google followed by the word “torrent” and every tracking site, including many lesser known domains; spill their results for the world to see. In fact according to Google Trends, searches for the term “wolverine torrent” quadrupled after the movie was leaked onto peer-to-peer networks.

Google claims they are quick to remove offending content, but it’s a never ending battle. When one torrent link dies, dozens more take their place.

Can Google be held legally liable for this? It’s hard to say but with the Pirate Bay gone, we may soon find out! What do you think?


Share/Save/Bookmark
Subscribe

SMS Hack could Hijack Cell Phones

by

According to mobile security firm Trust Digital, you're at a real risk of falling prey to an SMS attack while you sleep. Dubbed the "Midnight Raid Attack," because it's mostly run at night, a hacker who has the right toolkits and know-how could send a malicious text message to your phone capable of firing up the web browser and navigating to a harmful website. Once there, the site downloads a dirty executable to your phone intended to steal your private data, said Trust Digital.

"This is a completely real threat," said Phillippe Winthrop, a director in the global wireless practice at Strategy Analytics. "We will see these attacks. It's a matter of time."

Another type of attack has a hacker sending a malicious SMS 'control message' over the GSM network to a victim's phone using a WiFi network, like you might be using at a coffee shop. The attack turns off SSL on the victim's phone, allowing the hacker to sniff your exposed traffic and steal your email credentials.

Trust Digital posted a pair of YouTube videos demonstrating the above attacks, which you can view here and here.


Share/Save/Bookmark
Subscribe

An Inexpensive Anti-Piracy Policy That Will Work!

by

Okay, how 'bout this for dealing with the problem of piracy against US ships. It's cheap, easy to set up and doesn't require a lot of resources.

1. Place two ships in the Somali corridor, one at each end.

2. Put a bunch of heavily armed seals on board both ships.

3. US flagged merchant ships swing by one of the ships as they enter the Somali corridor and pick up one heavily armed Navy Seal.

4. The Seal travels aboard the cargo ship for a small fee paid to the US Navy.

5. Somali pirates approach the ship, the Seal unlimbers a 50 caliber sniper rifle and picks off pirates as they approach and finishes by putting a few rounds through the bottom of the boat. If the pirates are more heavily armed, the Seal unlimbers an anti-ship rocket and blows up all of the attacking vessels.

6. The US Flagged ship continues on its merry way and drops the Seal off at the other Navy vessel at the other end of the Somali corridor. Ships going the other way pick Seals up and take them back up the corridor back to the first ship. No weapons go into foreign ports aboard American ships, so no problem with local authorities. Seals take their weapons with them.

7. Somali pirates go out, nobody comes back. After losing a hundred or so pirate ships, the Somalis begin to put two and two together and decide another line of work might be more lucrative.

How expensive would that be? One Seal would be all you'd need to take out one of those little boats. If they were attacking they wouldn't have hostages yet, so instead of needing 3 Seals to shoot 3 at once, you'd only need one to shoot 'em one at a time.

Sounds cold, but these aren't nice people and they do kill hostages. If you wanted to discourage them, you could shoot out the bottom of their little boats and let 'em swim home, but that might give them experience they could share to develop new tactics, which would endanger our Seals.

It's a tough call, but I think it would work. One Seal would be all I would need if I were a ship's captain and I'd certainly feed him well!

I'm just sayin'

Tom

-
---- That awful power, the public opinion of a nation, is created in America by a horde of ignorant, self-complacent simpletons who failed at ditching and shoe-making and fetched up in journalism on their way to the poorhouse. -Mark Twain

Share/Save/Bookmark
Subscribe

Best Free Linux Book: Ubuntu Pocket Guide and Reference

by

ubuntu pocket guide

Website www.ubuntupocketguide.com
Author Keir Thomas
Format PDF
Pages 152

This book is a concise companion for everyday Ubuntu use. It provides a good grounding in getting to grips with the Ubuntu 8.04 and 8.10 distributions.

Topics covered include:

  • Installing & Configuring Ubuntu
  • Learning how to use the desktop covering logging in, layout, virtual desktops, and useful applications
  • Understanding how user accounts and the filesystem work
  • Getting to grips with the command-line
  • Software management including an overview of Synaptic, working with repositories, and a basic overview of compiling from source code
  • Securing the system, including configuring a firewall, antivirus, and how to encrypt file and folders

Share/Save/Bookmark
Subscribe

Sunday, April 19, 2009

RIM finally distributes BlackBerry System 4.5, enables Pandora

By Scott M. Fulton, III

The real reason people started buying Windows 3.0 wasn't really because of the wealth of new software made for Windows for the first time. Seriously, that wasn't the reason. By the time people learned about stuff like Lotus 1-2-3G and WordPerfect for Windows -- which were both going to change the world, if you'll recall -- they were already sold on Windows 3.0 for another reason: the smooth on-screen fonts. Because let's face it, Windows/386 looked like it belonged on an 8-bit computer, compared to Macintosh.

Late last night, the BlackBerry System 4.5 upgrade finally came through for users of those older-style units that actually look like BlackBerrys. In it, you'll find relief...in the form of the replacement of the thing that made the 8800s and older units look pale compared to the (slow) Storm, or the iPhone: the disgusting looking default system font.

Okay, so the font file itself is still in the system, but you won't actually use it or want it. The old system fonts looked like something spat out of a Centronics dot-matrix printer, circa 1978. I remember selling dot-matrix printers in the early days, including one of the first to offer a switch that converted you from "sans-serif" to "serif," or in that particular case, from "legible" to "illegible." Until today, we 8800 users had something called "BBClarity" (which at least meant, devoid of junk) and "BBMilbank," which looked like it belonged on one of those programmable highway warning signs, shouting, "BEWARE OF ZOMBIES."

The new fonts in System 4.5 -- BBAlphaSans and BBAlphaSerif -- are both pleasant, legible, and non-offensive. Most importantly, they actually enable the use of some applications that have been either available for multiple BlackBerry models, or waiting around until someone finally gave the word. BlackBerry System 4.5 running on an 8800 World Edition handset.One of those apps is the mobile edition of Pandora, the original programmable radio stream that learns your musical tastes as you listen. Having Pandora in my pocket is reason alone to own a mobile handset; my friend Angela can have her YouTube, thank you, I'll stick with my own channel of music made by musicians and not machines.

BlackBerry System 4.5 running on an 8800 World Edition handset.The Mobile Pandora isn't as conversational as the PC edition -- for instance, you can't go into your profile and load up all your bookmarks. You can get an explanation why you're hearing the song you're hearing, and this little feature alone shows you why the System upgrade was necessary -- on the old system, there's no way this information would be the least bit legible in a single alert box.

But this version appears to have been built with the understanding that Pandora users will most likely use their PCs to program their personal stations, not their BlackBerrys. And that's fine, because while we're working out in the gym or riding our bicycles or tuning out the noise of something else purporting to be music, you don't really have that much time to go poking buttons.

BlackBerry users take note: You shouldn't try to upgrade your systems using your BlackBerry Desktop Software for Windows until you've upgraded that too. The only way you can move up from version 4.2.x to 4.5 safely is to use Internet Explorer (not Firefox or any other browser, thanks to the use of an ActiveX control), and link to this address. Download the new version of the ActiveX control, which will then bootstrap a process that will enable you to download the new version of the Application Loader for your desktop. The old Application Loader will not work for this purpose, and you might find that out the hard way unless you upgrade this way. Then be sure to exit IE and unplug your BlackBerry from the USB cable for a moment (the software should tell you when), then reconnect it before starting the upgrade.

What passes for entertainment in BlackBerry App World.The upgrade process will back up your existing calendar, e-mail, media, and personal applications automatically, and will restore them after the new modules are loaded in and verified. The verification process, for some reason, is the longest stage -- be prepared to wait as long as 45 minutes. The process in its entirety could take an hour, maybe a little longer.

Not all your old applications may work in the upgraded system without being replaced. Most surprisingly, BlackBerry App World is one of them. You'll need to manually uninstall it, then reinstall it from this address.

BlackBerry System 4.5 running on an 8800 World Edition handset.You'll notice some differences right away, some thanks to the new system, others on account of smart users who truly appreciate the low value of farting apps. The catalog is much more pleasant to read, even if -- sadly -- some of the entries haven't changed all that much since App World's premiere earlier this month. The "before" and "after" pictures above tell the story. ("ECOE" isn't very self-explanatory, is it? It's a Ticketmaster application, so you'd think it would have been named something like "Ticketmaster Application.")

Nothing makes a smartphone user happier than not being embarrassed. So much applause to the folks at RIM who, while they've been busy concocting all sorts of new goodies for the Storm (I hear something called speed is in the works), they decide to throw us old-timers from '07 and '08 a bone every now and then.


Share/Save/Bookmark
Subscribe

Friday, April 17, 2009

The History of Pizza

Carlos has some really great articles.
I don't eat Pizza but since most of you do you might find this interesting.

by

PizzaThis is the history of the most relevant food for human

Circa 1000 A.D.: Pizza gets its start when peasants begin baking leftover, covered dough.

Early 1500s: Spanish conquistadors bring tomatoes to Europe from the New World.

Late 1500s: The first known recipes for the production of mozzarella cheese begin popping up in cookbooks.

Late 1600s: Although tomatoes are feared to be poisonous, peasants in Naples are the first to add them to their pizza.

1830: Port’Alba the world’s first pizzeria, opens in Naples. The proprietor bakes pizzas in an oven lined with lava harvested from Mount Vesuvius.

1889: Naples chef Raffaele Esposito prepares a red, white, and green pizza of tomatoes, mozzarella, and basil to honor a visit by Queen Margherita Teresa Giovanna. He names the pie the margherita.

1905: Gennaro Lombardi opens the first American pizzeria: Lombardi’s pizzeria, which was located at 53 ½ Spring St. in New York City. (The restaurant would later move to 32 Spring St.).

1943: Ric Riccardo Sr. and Ike Sewell invent a deep-dish pizza and begin serving it at their new Chicago restaurant, Pizzeria Uno — creating a flagship for the future chain.

1945: Buying a slice becomes increasingly popular as WWII veterans return from Italy and spread the pizza gospel.

1957:
The first frozen pizza — Celentano’s — appears in supermarkets.

1958: The first Pizza Hut opens in Wichita, Kansas. The first Domino’s opens just two years later in Ypsilanti, Michigan.

Mid-1970s: Chicago pizzerias add a top layer to their deep-dish pie, creating the miracle of stuffed pizza.

Early 1980s: Pizza goes gourmet, with upscale toppings such as duck and Gorgonzola.

1995: Kraft introduces DiGiorno pizza, the first “self-rising” frozen pie.


Share/Save/Bookmark
Subscribe

Minicars perform poorly in crash tests, study says

Minicars made by Toyota, Honda and Daimler AG did poorly on frontal crash tests with mid-sized automobiles, prompting an influential safety organization to suggest consumers consider buying larger cars that have comparable fuel economy.

The Toyota Yaris, Honda Fit and Smart ForTwo all collapsed upon impact into the space around the driver dummy, according to the study released today by the Insurance Institute for Highway Safety.

Drivers in all three vehicles faced high risk of head and leg injuries after test collisions at 40 miles an hour, even after airbags inflated, said the non-profit group funded by auto insurers.

The study could prompt more debate on minicar safety as several automakers continue developing such vehicles for North America. Just last week, Stefan Jacoby, CEO of Volkswagen Group of America, said VW would consider bringing its European Up minicar brand to the U.S. in future years.

"Size still matters," Institute President Adrian Lund said in a statement. "Though much safer than they were a few years ago, minicars as a group do a comparatively poor job of protecting people in crashes."

Safer options recommended

The group recommended that consumers consider purchasing some larger cars that offer superior safety to the mini and micro autos.

It cited the VW Jetta diesel, the Toyota Camry hybrid and the Ford Fusion hybrid.

"Many cars just a little bit bigger get close to, or the same mpg as the mini and micro cars we tested," Institute spokesman Russ Rader said in an e-mail.

Smart called the 40 mph test and the frontal crash position "rare and extreme" in the case of the ForTwo.

The severity of the test collision "is unlikely to occur in real world crashes," Smart USA President Dave Schembri said in a statement. "Smart has a proven track record of safety with approximately one million cars on the road in 37 countries."

Customers drive small cars for reasons other than fuel economy, including value, parking convenience, and fun, he added.

Spokesmen for Honda and Toyota did not immediately respond to requests for comment.

All three mini and micro cars had performed well in more typical crash tests with vehicles smashing into a barrier.

While these tests showed how well the small cars matched up against each other, they didn't reveal their safety performance in crashes with larger cars, Lund said.

In the latest tests, the Toyota Yaris crashed into a Toyota Camry, the Honda Fit collided with a Honda Accord, and a Smart ForTwo crashed into a Mercedes C Class.

In these collisions, the driver dummies in the smaller cars faced "intrusions" on their space from windshield pillars, instrument panels, toe boards and steering wheels, Lund said.

"While head-on collisions at 40 miles an hour are rare, it's these crashes that often cause serious injury and death," Lund said.

The medium-sized cars fared far better in the tests.

Analysis of fuel economy

A look at fuel economy confirms the Institute's claims that some larger cars get results comparable to those of the mini and micro models.

The 2009 Yaris gets fuel economy of 29 mpg in the city and 35 on the highway, according to Environmental Protection Agency results published on Department of Energy Web site www.fueleconomy.gov.

The 2009 Fit gets 28 mpg in the city and 35 on the highway, while the Smart ForTwo convertible gets 33 mpg in the city and 41 on the highway, according to the site.

Among the larger cars recommended by the Institute, the Jetta diesel gets 29 mpg in the city and 40 on the highway, while the Camry hybrid gets 33 mpg in the city and 34 on the highway.

According to a Ford spokesman, the 2010 Fusion hybrid gets 41 mpg in the city and 36 on the highway.

In 2007, the death rate for minicars was substantially higher than those for larger cars in both single-vehicle and multiple-vehicle crashes, the Institute said.

The death rate was almost twice as high for one- to-three-year-old mini cars in multiple-vehicle crashes as the rate for very large cars, it said. In single-vehicle crashes, the death rate for minis was more than three times as great as for very large cars.


Share/Save/Bookmark
Subscribe

The Pirate Bay loss: What it could mean

It's not just about copyright infringement. It's about using the media as a political tool.

By Tim Conneally, Betanews

The four men behind the Pirate Bay torrent sharing site were sentenced to one year in prison and fined 30 million Kronor in damages this morning, after having faced charges from the Stockholm District Court of "promoting other people's infringement of copyright laws."

The court's statement to the media said, "By providing a Web site with...well-developed search functions, easy uploading and storage possibilities, and with a tracker linked to the Web site, the accused have incited the crimes that the filesharers have committed."

But the war of ideals in the Internet age rages on, and the real victor in this could be the political Pirate Party.

Daniel Goldberg of ComputerSweden traces the beginning of the Pirate Bay's struggles to March 2005, when the Economic Crimes Bureau and the National Police began to review law enforcement practices in the field of internet software piracy. It wasn't until nearly a year later that the Pirate Party entered the political arena on the platform of copyright and patent reform.

By politicizing the Pirate Bay's trial, the Pirate Party secured a guaranteed outlet for evangelism and party-building rhetoric. For example, calling today's sentence a miscarriage of justice, the head of Sweden's Pirate Party Richard Falkvinge has organized large-scale demonstrations for tomorrow in Stockholm and Lund.

Meanwhile, he says that membership in Sweden's pirate party has "gone vertical at ultrasonic speeds." More members have signed up for the party in the four hours following the trial than have in the last three years of its existence.

"As it is right now," said Falkvinge, "the 'Young Pirates' will be Sweden's largest youth organization when the clock strikes midnight on Saturday, and will probably have more members than the Liberal Party."

Today's ruling and the process of appeals could add significant muscle to the Party as the June 4-7 EU Parliamentary elections approach. There, the Pirate Party's Christian Engström is making an all-or-nothing bid for a seat. The Party is funded only by member donations, has no paid employees, and needs at least 100,000 votes to secure a seat among the 785 Parliamentary representatives in Brussels. The last time the party ran in 2006, it only had 35,000 votes.

If the Pirate Party joined the EU's Parliament, it would be another leftist group to balance out the current right-leaning majority. It would have to contend or ally with majority groups the European People's Party (EPP) and the Socialist Party, which hold 249 and 209 seats respectively.

But really, what does all this have to do with file sharing?

At this point, very little. Think of the impact a major drug bust has on the consumption of illegal substances: While it puts a crimp in the supply chain, the demand is starkly unaffected.

Peter Kolmisoppi, also known as Brokep said on Twitter today, "Stay calm - Nothing will happen to TPB, us personally or file sharing what so ever. This is just a theater for the media."

True. The Pirate Bay was not taken down, and the group is expected to appeal the ruling, which could spin out the hearings as much as another three years. So it has been a media theater indeed, but one that could successfully help the Pirate Party into Parliament, however small an accomplishment that may be in the end.

Copyright Betanews, Inc. 2009
Share/Save/Bookmark
Subscribe

Windows XP Performance Tweaking guide

Windows XP

1. Stop the ‘last access update’ stamp

Every time a directory on an NTFS drive is accessed by Windows XP, it updates that directory and every subdirectory with a time stamp to indicate the date of access. In folders with a lot of subdirectories, this can add considerable overhead to whatever your PC happens to be doing.
This process can be disabled through the registry:
Open REGEDIT and Navigate to

HKEY_LOCAL_MACHINES\System\CurrentControlSet\Contr ol\FileSystem.

Create a new DWORD value called ‘NtfsDisableLastAccessUpdate’ and set the value to ‘1′

2. Disable the 8.3 naming convention

Windows XP uses two different names for each and every file on your system. One is the name that you see in explorer and in the command prompt, and the other is an MSDOS compatible 8.3 (8 character title followed by a ‘.’ Then three more characters to indicate the type of file) name. If you are intending to run DOS only software, or connect to pre-Windows 95 computers, you will need this second set of names. If not, you are simply wasting resources.
To disable the 8.3 naming convention:
Open REGEDIT
Navigate to HKEY_LOCAL_MACHINE\System\CurrentControlSet\Contro l\FileSystem
Change the value of the NtfsDisable8dot3NameCreation key to ‘1′
Note that some popular programs, including Norton Antivirus, use the 8.3 naming convention.

3. Keep Windows operating data in main memory

Windows XP contains several tweakable memory settings in the registry, one of which is the DisablePagingExecutive registry key. This controls whether the operating system will transfer its essential driver and kernel files to the ‘virtual memory’ (the page file on the hard disk). It defaults to allowing this.
Obviously, transferring portions of the system to hard drive memory can considerably slow things down, and it appears that Windows XP does this periodically, whether or not the system is actually low on physical memory (RAM). If you have 256MB of system memory or more, try this registry tweak to force Windows to keep its operating data in main memory:
Open Regedit.
Navigate to: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Se ssionManager\MemoryManagement.
Select the DisablePagingExecutive value to ‘1′

4. Obtain the newest drivers for your hardware

This may seem a bit obvious, but keeping your system’s drivers up to date can give both your performance and stability a boost. Video card manufacturers release updates especially often, and these can often give “significant boosts” to gaming performance as video card in question is “optimized.”

Don’t neglect the other components of your system either. Your motherboard manufacturer may have released newer versions of its Input/output drivers for your board, and sound cards and other peripherals can also benefit from newer software.

5. Move the page file from system drive

The page file is the area of a hard drive which Windows reserves for use as virtual memory when there is more data than can be stored in the actual physical memory of the system.

Page file access is extremely slow as compared to standard memory, since the hard disk, as a mechanical device, is slower to read and write information than the purely electronic memory. There are still some ways to optimize your page file use so it is a bit less of a burden on your system, however.
One of the best of these methods, provided you have two physical hard drives, is to move the page file off the disk which hosts the Windows system files. This ensures that Windows is not constantly accessing the disk for the system files as well as the page file.
To do this in Windows XP:
Right click on ‘my computer’ and select ‘properties.’
Select the ‘advanced’ tab.
Under ‘performance’ choose the ’settings’ button.
Select the ‘advanced’ tab again and under ‘virtual memory’ select ‘change.’
The virtual memory window allows you to select and change the allocation of hard disk space to be used as virtual memory for your system. For best performance; if you have two physical hard disks of roughly equivalent speed, remove the page file from your system disk c: and place it on the other drive.

6. Create a ‘permanent’ page file

Make the minimum size of the page file the same as the maximum size. This saves the operating system from needing to resize the page file, and does not lose you any extra space, since the ‘maximum’ size the page file can reach is the amount of hard disk space that is reserved by the OS.
Right click on ‘my computer’ and select ‘properties.’
Select the ‘advanced’ tab.
Under ‘performance’ choose the ’settings’ button.
Select the ‘advanced’ tab again and under ‘virtual memory’ select ‘change.’
Highlight the drive containing your page file and make the ‘initial size’ of the file the same as the ‘maximum size’ of the file.

7. Optimize your page file size

Windows XP sizes the page file to about 1.5X the amount of actual physical memory by default. While this is good for systems with smaller amounts of memory (under 512MB) it is unlikely that a typical XP desktop system will ever need 1.5 X 512MB or more of virtual memory. As a simplified guideline. If you have less than 512MB of memory, leave the page file at its default size. If you have 512MB or more, change the ratio to 1:1 page file size to physical memory size.

8. Enable UDMA/66 mode on IDE Channels

Even if DMA is enabled on IDE channels, by default UDMA/66 mode is disabled. You can improved disc performance by enabling it.
Open registry by going to START-RUN and entering REGEDIT and Navigating to:
[HKEY_LOCAL_MACHINE\System\CurrentControlSet\Contro l\Class\ {4D36E96A-E325-11CE-BFC1-08002BE10318}\0000].

In right pane look for a key by the name “EnableUDMA66″. If it is there, set its value to 1 if it is not already set to 1. If not, add a dword entry by the name “EnableUDMA66″ and set its value to 1.

10 How to improve on shutdown time ? Close apps automatically & quickly at shutdown

Open Registry by going to START-RUN and typing REGEDIT. Navigate to:
HKEY_CURRENT_USER\CONTROL PANEL\DESKTOP

and look for AutoEndTasks. On my computer default value is 0. Change it to 1. Thats all. Further more you can reduce the time it takes for Windows to issue kill directive to all active/hung applications. In doing this only constraint that you should make sure exists is that HungAppTimeout is greater than WaitToKillAppTimeout. Change the values of WaitToKillAppTimeout to say 3500 (since default value for HungAppTimeout 5000 and for WaitToKillAppTimeout is 20000)

11. Speedup boot up sequence by defragmenting all key boot files

Open Registry by going to START-RUN and typing REGEDIT. Navigate to
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Dfrg\BootOpt imizeFunction

In right hand panel look for Enable. Right click on it and set it ‘Y’ for enable. This is the way I have it set on my computer. This will help speedup boot time.

12. Create your own customized legal notice at Windows Startup
This tip won’t make your computer any faster but may help personalize your computer experience. Open Registry by going to START-RUN and typing REGEDIT. Navigate to:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft NT\CurrentVersion\Winlogon.

In right hand panel look for two fields by the name legalnoticecaption and legalnoticetext. Modify legalnoticecaption to what you want popup window caption should read and change legalnoticetext to customize whatever message you want.

13. Disable Remote Registry

This service allows your registry to be edited from a remote computer. It is most likely the case that this service is not needed, not to mention a possible security risk for people concerned about their system security.
To turn it off, go to Start > Run and type services.msc.
Set the startup type to““Manual” or “Disabled” for XP’s “Remote Registry”or 2000’s “Remote Registry Service”.

14. Visual Effects

Both Windows 2000 and XP have all sorts of fade and other fancy effects turned on as default. All right, so they look pretty, however, they can really bog down systems.
Under XP, in the Control Panel, go to System >“Advanced” tab and under “Performance”, click “Settings”. The two I suggest to uncheck here are “Fade or slide menus into view” and “Fade menu items after clicking”. You can turn off and on any effects you want in order to find a good balance between visual effects and performance Hit Apply and OK after you’’re done.
In 2000, Right click on the desktop, click “Properties” and go to the “Effects” tab.

15. Turn Off Terminal Services

If you are experiencing slow shutdowns, one tweak you can try is turning off Ternimal Services. If you do not use remote desktop, fast user switching, remote assistance or the terminal server, then proceed with this tweak.
Go to Start > Run and type services.msc /s.

Find “Terminal Services” on the list and double click on it (If it’’s not there, it isn’’t installed). Change startup type to ““disabled”” or ““manual”” and click OK.

16.Winodws Sharing

It’’s fairly common nowadays to have more than one computer in the house on LAN so they can each connect to the Internet. It’s also common to share and transfer files between the computers. When you try to access one computer from another, there is often a significant delay while trying to connect. This is because your computer will check the remote computer you are accessing for any scheduled tasks. The more there are on the remote PC, the longer it takes to connect.

To avoid this delay, go into regedit, and go to

HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\Curr entVersion\Explorer
\RemoteComputer\NameSpace.
Delete the {D6277990-4C6A-8D87-00AA0060F5BF} key and reboot.

The next time you try to access the shared files on a remote computer, you will probably notice your computer gets there faster.

17. Disable Windows Messenger

To stop Windows Messenger from loading, there is a registry tweak you can try out. If you use MSN Messenger, it can be run without Windows Messenger. If you install MSN Messenger after applying this tweak, the tweak will be reset by the installation and it will need to be done again.
First, if you have it open, close MSN Messenger and make sure it is not open in the system tray. Open up regedit and go to

HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Mes senger\Client.

Create/modify these to DWORD values: “PreventRun” set to the value of 1; and “PreventAutoRun” also set to the value of 1.

If you are experiencing a slow down opening OE as a result of the above tweak, try this:
Open regedit and go to
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID.
Find the key {FB7199AB-79BF-11d2-8D94-0000F875C541}
and under it select the folder IniProcServer32.
In the right panel of regedit double-click on the “(Default)” entry at the top and completely delete the value data it contains. Now do the same for the LocalServer32 folder as well.

18. Delay When Opening “My Computer”

It is a sure thing that you have sat in front of your monitor more than a few times and waited for ““My Computer”” to load. There is a simple fix to eliminate the wait time.

Open up “My Computer”, go to Tools > Folder Options and select the “View” tab. Uncheck “Automatically search for network folders and printers” and hit OK. Now try opening up “My Computer”. Notice a difference?

19 Disable anonymous NetBIOS connections

Some computers are vulnerable to a NetBIOS attack, where a hacker uses a rather simple method to connect to somebody’s computer. From there, the hacker can essentially do more to that person’s computer than that person can do. It is a good idea to do this tweak if you are not behind a firewall. Must be familiar with the Windows registry.
Open Regedit (go to start > run and type in regedit and press enter)

Navigate to the following folder:

HKEY_LOCAL_MACHINE/System/CurrentControl/SetControl/LSA

Right-click a white area in the left pane.

Select New > DWORD Value.

For the name of the value, type “RestrictAnonymous”.

Double-click the name of the value.

For the “Value Data” field, type 1.

Press OK.

Close regedit.

Note: The settings will change when your computer is restarted.

21. Check your hard drives with scandisk

With time and heavy use, a myriad of data problems and physical problems can develop and mar the performance of your hard drive, not to mention cost you precious space. While defragmenting the drive can help restore much of the performance you might have lost, there are other issues such as lost clusters and bad sectors which the defragmentation utility cannot touch.
Because of this, it is a good idea to run XP’s built in error checking utility on your drives once in a while. This utility will scan your disks for errors and optionally attempt to correct them.
Open ‘my computer.’
Right click the hard disk you wish to check and select ‘properties.’
Choose the ‘tools’ tab and under ‘error checking’ select the ‘check now……’ button.
Check both options. You will need to restart the computer to do the full disk check.
Your disk will be fully checked for errors upon reboot, but be aware that this can take quite a while.

22. Force XP to unload DLL files after closing a program

Dynamic Link Libraries, or DLLs, are files containing data or functions that Windows programs can call when needed by linking to them. Every piece of windows software will include instructions to the operating system as to which DLLs it will need to access, and XP will cache these particular files in memory for faster access.
The trouble is, Windows XP keeps these DLLs cached after the relevant program has closed, wasting memory space. While DLLs are generally tiny, enough of them can make a dent, so it’s worthwhile to implement this registry tweak, which will force Windows XP to unload DLLs used by a specific program when that program halts.
To do this, first run REGEDIT. Navigate to HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Curr entVersion\Explorer

Create a new key named ‘AlwaysUnloadDLL’ and set the default value to equal ‘1.’

23. Disable the themes service

If you are not a fan of the appearance of Windows XP, there is an easy way to turn it off and go back to the more traditional Windows style. Simply disable the ‘themes’ service to restore a classic windows desktop appearance.

To do this, right click on ‘my computer’ and select ‘manage.’

In the computer management windows, expand ’services and applications’ and select ’services.’
In the right hand window, highlight the ‘themes’ service. Right click it and select ‘properties.’
In the ’startup type’ dropdown box, select ‘disabled.’

24. Remove the desktop picture

Your desktop background consumes a fair amount of memory and can slow the loading time of your system. If you are more concerned with performance than looks, remove your picture and go with a blank, colored background.
Right click on an open area of the desktop and select ‘properties.’
Select the ‘desktop’ tab and in the ‘background’ window, highlight ‘none.’ Press ‘ok.’

25. Reduce recycling bin reserved space

By default, Windows XP reserves 10 percent of each hard drive to store deleted files in the recycling bin. This is a bit excessive. Actually it’s a lot excessive, unless you habitually delete files a gigabyte in size or more. Fortunately, there is an easy way to reduce the amount of hard disk space that is reserved for the recycling bins on each drive.
Right click on the recycling bin and select ‘properties.’
Choose the ‘global’ tab.
The slider shows the percentage of each drive that is reserved by the recycling bin. Reduce this to a more appropriate amount, like 2-3% or more depending on the size of your drives. The larger the drives, the smaller the number you should use. If you wish to configure each drive independently, check the ‘configure drives independently’ button and adjust the slider to the desired amount in each of your hard disk’s tabs. The advantage to doing things this way instead of using the ‘global’ setting is that you can see the actual amount of space on each drive that is being reserved.
Note that files larger than the recycling bin’s capacity on a given drive are deleted for good. Windows XP will warn you when this condition occurs.

26. Enable write caching on hard disks

If it is not already selected, enabling the hard drive write-back cache setting on each of your hard drives can improve their performance by making the transferring of data between the drive and the memory more efficient. The only reasons not to enable this setting would be if the drive in question is in a hot-swappable drive rack, or if you expect your PC to be shut down incorrectly (I.E. not through the windows shutdown procedure) often.
To enable write caching right click on my computer and select ‘properties.’
Select the hardware tab, then ‘device manager.’ From the device manager window, expand ‘disk drives’ and highlight your hard disk. Select ‘properties’ then the ‘policies’ tab.
Check the ‘enable write caching on the disk’ box.
Repeat the above steps for all hard drives in your system.

27. Defragment your hard disk(s)

When an operating system writes data onto a hard drive, it will generally attempt to place the data on the drive as sequentially as possible, in order to facilitate faster retrieval of the information. Over the operational life of the drive, various factors can cause data to become scattered, or fragmented, over the surface of the drive.
This does not mean it cannot be read, since the file system retains a table which links each cluster (the smallest unit of storage available on a hard drive) of data with the other clusters on the disk that contain data for a particular file.
Fragmentation does slow down drive access considerably though, since the drive has to constantly seek for a new disk location to piece a file it is reading together from the fragmented clusters, rather than just being able to grab it off the disk in one continuous stream of data. Factors that can cause fragmentation include incomplete uninstalls of software, system crashes while the disk is in use, improper shutdown of the operating system, etc.
Defragmentation is the process of reassembling the data on the disk into coherent and sequential order, making disk access easier and faster. If your drive has gone a long while without being defragmented, you may find that this process restores a lot of zip to your Windows install. All recent versions of Windows include a built-in defragmentation utility.
To access this utility in Windows XP, go to ’start\programs\accessories\system tools\disk defragmenter.’
To begin with, you need to analyze your hard disk(s) to see if defragmentation is needed. Select a drive and hit the ‘analyze’ button. This could take a little while depending on the amount of data on the drive.
Once the analysis is finished, you will have a graphical representation of your disk’s level of fragmentation. See the pic below for an example of a highly fragmented drive (red indicates fragmented files).
Windows will also inform you if it recommends defragmenting the drive. You must have 15% of the drive free in order to fully defragment it. Anything less will result in only a partial re-ordering of the files. You may need to delete a few things to obtain this free space.
To defragment the drive, select it and hit the ‘defragment’ button. Note that depending on the size of the drive and the level of fragmentation, this can take a long time. It’s a good thing to leave overnight, since you should not run anything else while doing the defrag.

28- Turn off the indexing service

Windows XP includes a new feature called ‘indexing’ which constantly creates and updates an index of files in your PC. This index is mainly used for speeding up file searches. The indexing feature is largely useless unless you find yourself using file search a lot, and it sucks up system resources, so it is recommended that you disable it for performance purposes.
To turn off file indexing go to Control Panel\Add/Remove Programs\Windows Components. and uncheck ‘Indexing Service.’

29- Increasing Options In Add/Remove Menu

by default none of Windows XP’s ‘built in’ programs are visible. it’s fairly easy to change, though… just open the file X:\Windows\inf\sysoc.inf (where X: is the drive letter where Windows XP is installed) in Notepad. You should see a section of the file something like this:

[Components]
NtComponents=ntoc.dll,NtOcSetupProc,,4
WBEM=ocgen.dll,OcEntry,wbemoc.inf,hide,7
Display=desk.cpl,DisplayOcSetupProc,,7
Fax=fxsocm.dll,FaxOcmSetupProc,fxsocm.inf,,7
NetOC=netoc.dll,NetOcSetupProc,netoc.inf,,7
iis=iis.dll,OcEntry,iis.inf,,7
com=comsetup.dll,OcEntry,comnt5.inf,hide,7
dtc=msdtcstp.dll,OcEntry,dtcnt5.inf,hide,7
IndexSrv_System = setupqry.dll,IndexSrv,setupqry.inf,,7
TerminalServer=TsOc.dll, HydraOc, TsOc.inf,hide,2
msmq=msmqocm.dll,MsmqOcm,msmqocm.inf,,6
ims=imsinsnt.dll,OcEntry,ims.inf,,7
fp_extensions=fp40ext.dll,FrontPage4Extensions,fp4 0ext.inf,,7
AutoUpdate=ocgen.dll,OcEntry,au.inf,hide,7
msmsgs=msgrocm.dll,OcEntry,msmsgs.inf,hide,7
RootAutoUpdate=ocgen.dll,OcEntry,rootau.inf,,7
IEAccess=ocgen.dll,OcEntry,ieaccess.inf,,7

This is a list of all components installed at the moment. I’ve taken the example of MSN Messenger - the program entry called ‘msmsgs’, third-last line. You can see the word ‘hide’ highlighted - this is the string which tells Windows not to display the component in the Add/Remove Programs list. Fix this up by simply deleting the word ‘hide’ like so:

msmsgs=msgrocm.dll,OcEntry,msmsgs.inf,hide,7

To this:

msmsgs=msgrocm.dll,OcEntry,msmsgs.inf,,7

Now, after restarting, you should be able to see MSN Messenger in the Add/Remove Programs list. If you want to be able to quickly view and remove all components, simply open the sysoc.inf file and do a global find and replace for the word “,hide” and replace it with a single comma “,”.

30 - Accelerate Your WinXP by Speeding Diskcache

Diskcache plays a very important role in WinXP. However, the default I/O pagefile setting of XP is conservative, which limits the performance. Some better values for different RAM are given below.

1. run “regedit”;
2. goto [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Contro l\Session Manager\Memory Management\IoPageLockLimit];
3. modify the value in Hex depending on the size of your RAM:
RAM: modified value(Hex)
64M: 1000;
128M: 4000;
256M: 10000;
512M or more: 40000.
4. reboot.

Though some good tools (such as “Cacheman”) can do this, it is an interesting experience for you to work it out by yourself and let your XP fly.

31 - Clean your prefetch to improve performance

This is an unique technique for WinXP. We know that it is necessary to wash registry and TEMP files for Win9X/ME/2000 periodly. Prefetch is a new and very useful technique in Windows XP. However, after using XP some time, the prefetch directory can get full of junk and obsolete links in the Prefetch catalog, which can slow down your computer notablely. My suggestion is: open C(system drive):/windows/prefetch, delete those junk and obsolete files,reboot. It is recommended that you do this every month.

32 - Improve NTFS Performance

Reserve appropriate space for the master file table.

Add the “NtfsMftZoneReservation” entry to the registry as a REG_DWORD in HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Contro l\FileSystem. When you add this entry to the registry, the system reserves space on the volume for the master file table. Reserving space in this manner allows the master file table to grow optimally. If your NTFS volumes generally contain relatively few files that are typically large, set value of this registry entry to 1 (the default). Typically you can use a value of 2 or 3 for moderate numbers of files, and 4 (the maximum) if your volumes tend to contain a relatively large number of files. However, be sure to test any settings greater than 2 because these higher values cause the system to reserve a much larger portion of the disk for the master file table.

Reboot after making changes.

33. Creating a Bat file for shutting down and starting up services

You want to free up as much of your memory as possible for gaming? I will show you how to VERY quickly turn off all the services you don’t need for gaming.

First browse to your C drive in windows explorer. Right click and select new text document.

Name it netstop.txt

After this rename it to netstop.bat

After this right click the file and select edit
Now we’ll need to figure out what services we need to stop.
Hit Start –> Run –> Type: services.msc

Have it sort by status to show you what is currently running. You’ll want to take a look at what’s running and then reference blackvipers site to figure out what it means.

http://www.blackviper.com/WinXP/servicecfg.htm

Now go back to your open window of netstop.bat

Every service you want to stop should be on its own line. I’ll provide you with an example of what I’m choosing to stop. Yours will vary so please don’t just copy and paste this into yours.

NET STOP “Automatic Updates”
NET STOP “Computer Browser”
NET STOP “Cryptographic Services”
NET STOP “Diskeeper”
NET STOP “Distributed Link Tracking Client”
NET STOP “DNS Client”
NET STOP “Error Reporting Service”
NET STOP “FireDaemon Service:FAH”
NET STOP “Help and Support”
NET STOP “IPSEC Services”
NET STOP “Messenger”
NET STOP “Network Connections”
NET STOP “Norton AntiVirus Auto Protect Service”
NET STOP “Print Spooler”
NET STOP “Protected Storage”
NET STOP “Remote Access Auto Connection Manager”
NET STOP “Secondary Logon”
NET STOP “Security Accounts Manager”
NET STOP “Server”
NET STOP “Shell Hardware Detection
NET STOP “System Event Notification”
NET STOP “System Restore Service”
NET STOP “Task Scheduler”
NET STOP “Themes”
NET STOP “Upload Manager”
NET STOP “Windows Management Instrumentation”
NET STOP “Windows Time”

After you put all of the services you’d like to stop in the file save it, close the editor and double click on netstop.bat

it may take a couple minutes to take down all of these services if the list is rather long. When you would like to start them back up you can either restart your system or

create a netstart.bat and copy your contents from netstop.bat and everywhere that says STOP replace it with START.A rather easy way to help you gain a bit of extra power good for benchmarking too.

20. Disable the boot screen

This is a nice way to speed up your boot time.
Click on Start and right-click “My Computer”.
Click “Properties”.
Click on the “Advanced” tab.
In the “Startup and Recovery” box, click “Settings”.
In the “System Startup” box, click “Edit”.
On the end of the line with Windows XP in it, add “/sos”.
Your line should like similar to the following (although it may not be quite the same):
multi(0)disk(0)rdisk(0)partition(1)WINDOWS=”Micros oft Windows XP Home Edition” /fastdetect /sos
Go to File > Save (Click on Save).
Go to File > Exit (Click on Exit).
Click OK.
Click OK.

The autor of the guide is “HotDog”, i was sent by email.


Share/Save/Bookmark
Subscribe

Microsoft Security Bulletin MS09-014 - Critical

This security update resolves four privately reported vulnerabilities and two publicly disclosed vulnerabilities in Internet Explorer. The vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer or if a user connects to an attacker's server by way of the HTTP protocol. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.

This security update is rated Critical for Internet Explorer 5.01 and Internet Explorer 6 Service Pack 1, running on supported editions of Microsoft Windows 2000; Internet Explorer 6 and Internet Explorer 7 running on supported editions of Windows XP; and Internet Explorer 7 running on supported editions of Windows Vista. For Internet Explorer 6 and Internet Explorer 7 running on supported editions of Windows Server 2003 and Windows Server 2008, this security update is rated Important. For more information, see the subsection, Affected and Non-Affected Software, in this section.

The security update addresses these vulnerabilities by modifying the way that Internet Explorer searches the system for files to load, performs authentication reply validation, handles transition errors when navigating between Web pages, and handles memory objects. For more information about the vulnerabilities, see the Frequently Asked Questions (FAQ) subsection under the next section, Vulnerability Information.


Share/Save/Bookmark
Subscribe