Friday, May 12, 2017

The World's First Underwater Tennis Court



Dubai is one of the best places on Earth that you can see wonderful things in your lifetime.
The people living in Dubai seem to love their tennis courts. Because in the year 2005, the world'1 heighest tennis court was built by them on top of one thousand feet tall burl-A-Arab Hotel. And now, the city may venture beneath the sea with the amazing world’s first underwater tennis court.



 This underwater complex is proposed by earlier in this year by well known Polish architect named Krystztof Kotala who is also the Founder of the  8+8 Concept Studio.This is  situated at offshore in the Persian Gulf, between the Burj al Arab and the Palm Jumeirah islands in the United Arab Emirates. The full proposed structure will house to seven courts, each with  rooftop a coral reef is designed to build an illusion of a natural atoll.

                                While this creative idea drew so much interest from worldwide spectators, it also comeup with many technical and engineering concerns for engineers. Sara Fray, who is the director of Engineering and Technical Services at the Institution of Structural Engineers in London, has reported to "MailOnline" that the transparent ceiling would need a continuous pane which is made of glass measuring at leaat 180 feet-wide and weigh possibly 100 tons to accommodate the court and spectators . Aside from the major concern of leakage of water, Fray also noted a few important things that the complex would need, including a feasible and strong structure that could withstand earthquakes and tsunamis, and an efficient connection which is to the surface as emergency exit. Not only that she even questioned whether tennis players could play in these courts, as it would be difficult to control the light refraction inside the courts.


Beyond these technical issues, this entire project is also extremely expensive to build. Currently this is estimated to cost a whooping $1.7 -$2.5 billion, according to reviewers in an interview with CNN, the architect hopes the project to be a “combination of ecology, technology and sport” which has a strong commercial potential.
There is no doubt this will multiply the tourist attraction in the country..


Wednesday, May 10, 2017

Find your BMI...






BMI can be considered as a successful way to measure the level of health of a person.It confirms that your weight is appropriate to height.

BMI stands for Body Mass Index and given by following formula.


B.M.I=Weight(kilograms)/Height(meters)^2

It is recommend to maintain BMI within sustainable range.

*    Underweight: BMI is less than 18.5.
*    Normal weight: BMI is 18.5 to 24.9.
*    Overweight: BMI is 25 to 29.9.
*    Obese: BMI is 30 or more.


Engage in exercise everyday,have a balance diet,reduce consumption of sugar,junk food and fat will bring you a regular amount of BMI.

Frequently checking BMI using this application will prevent you from obesity and underweight!

Tuesday, May 9, 2017

Find your missing Mobile Phone in few seconds!!




Android Device Manager





                                  Google can be considered as one of the best user friendly companies around the world which provides you wonderful services through-out the past couple of years.By this service you can easily find your missing android device with few seconds.
                                  If you've lost a device (mobile etc.), you can use Android Device Manager to find its approximate location on a map and when it was last used within just few seconds. When Android Device Manager locates your device, that device also will get a notification.

Before you can use Android Device Manager to locate your device:
 Your device's location access need to be turned on and be signed in to your Google Account too. Obviously these two things will be already done as you already signed in with your email and play-store accounts. Note that: Android Device Manager won't work for devices that are turned off or that don't have a mobile data or Wi-Fi connection.
Note: If you've linked your phone to Google (learn how), you can find or ring it by simply searching for “find my phone” on google.com.
You can also ring your mobile/lock it or erase your data too.
Locate a lost device using Android Device Manager

  1. Sign in to your Google Account on android.com/devicemanager (If you are not singed up yet).
  2. If you have more than one device, click the arrow next to the device name to select a different device(Your most frequently used device will appear first).
  3. Android Device Manager will show you the approximate location in a map of the device selected.
If you have another mobile device, you can use the Android Device Manager application to locate your lost device. You need to have the Android Device Manager app installed on the particular device that you plan to use.
  1. First on the device that you have with you, open the Android Device Manager app Android Device Manager app.
  2. Log in to your Google Account.
  3. Change the device displayed:
    • On your phone: Swipe along the bottom of the screen to see devices you are using.
    • On your tablet: Press on the arrow next to the device to select a device.
  4. Android Device Manager will show you the approximate location on a map of the device selected.
For Android Wear users(Smart watches), you can also use your watch to find your device if it's connected by Bluetooth.
 
Once you find your device, you can remotely ring, lock, or erase it using the Android Device Manager. 
NOTE: Android Device Manager doesn't collect and store location history of your device. It requests your device's approximate location when you first sign in and this location data is deleted when you sign out of the device manager.

Sunday, May 7, 2017

What is Deep Web??








Deep Web, also known as “Deepnet,” the “Invisible Web,” the “Undernet” or the “hidden Web,” are parts of the Internet that are not considered part of the “surface web,” or the portion of the World Wide Web(WWW) that is indexed by conventional search engines. Many deep web sites are not indexed because they use dynamic databases that are devoid of hyperlinks and can only be found by performing an internal search query.
Put simply, it is the partion of the internet that is hidden from viewing by typical browsers.
  • Surface Web
·          
    • 4% of the WWW content
    • Also known as the ‘Visible Web’, it is content that can be found and frequently using by search engines such as Google or Yahoo. It is controlled under constant surveillance by the government.
  • Deep Web
·          
    • 96% of the WWW content
    • Also known as the ‘Invisible Web’, it is the content of the internet that cannot be indexed by search engines. And it is hard to keep track of and thus not in control.
The Deep Web is estimated to be at least 500x the size of the Surface Web which we use day-today life.


According to The New York Times, computer scientist Mike Bergman is credited with coining the term of “deep web” in a paper which is titled “The Deep Web: Surfacing Hidden Value” published in The Journal of Electronic Publishing in August year of 2001. In the paper, Bergman mentions that Internet business author Dr. Jill Ellsworth coined the phrase “invisible Web” in 1994 when referring to websites that were not viewed by common search engines. Addition to that the paper also estimated that at the time of publication, information on the deep Web was “400 to 550 times larger than the commonly defined World Wide Web,” or approximately 7,500 terabytes of data.

Methods which prevent web pages from being indexed by traditional search engines and belongs to deep web can be categorized in to following areas:
  1. Contextual Web: pages with content differs for different access contexts (e.g., ranges of client IP addresses or previous navigation sequence).
  2. Dynamic content: dynamic pages which are returned in response to a submitted query or accessed only by using a form, specially if open-domain input elements (such as text fields) are used; such fields are hard to navigate without domain knowledge.
  3. Limited access content: sites that limit access to their pages in a technical method (e.g., using the Robots Exclusion Standard or CAPTCHAs, or no-store directive which prohibit search engines from browsing them and creating cached copies).
  4. Non-HTML/text content: textual content which is encoded in multimedia (image or video) files or specific file formats not handled by search engines.
  5. Private Web: sites that require registration and login to be accessed (password-protected resources).
  6. Scripted content: pages that are only accessible through links produced by JavaScript as well as content dynamically downloaded from Web servers such as via Flash or Ajax solutions.
  7. Software: certain content is intentionally hidden from the regular Internet which we are using, accessible only with special software, such as Tor, I2P, or other darknet software. For example, Tor allows users to access websites using the .onion server address anonymously, hiding their IP address.
  8. Unlinked content: pages which are not directly linked to by other pages, which may prevent web crawling programs from accessing the content. This content is referred to as pages without backlinks (also mentioned as inlinks). Also, search engines do not always detect all backlinks from searched web pages.
  9. Web archives: Web archival services such as the Wayback Machine enable to people who use internet to see archived versions of web pages across time, including websites which have become inaccessible, and are not indexed by search engines such as Google/yahoo.
Is it legal?
Yes. You use it as you are using any internet browser. Many people are now started to use TOR as a way to maintain their privacy whilst online.
  • Who else uses it:
·          
    • In Military Cases
    • Police and crime units worldwide
    • Journalists worldwide
    • Whistleblowers
o     
      • Edward Snowden
      • Julian Assange
Due to the anonymity that TOR offers, the Deep Web has also become a popular nesting ground for various criminal activity. This includes things such as:
  • Drug dealing
  • Weapons trading illegally
  • Child pornography

Privacy Policy Python Basics app

  Privacy Policy 1. Introduction Welcome to the Privacy Policy for the Python Basics Android application ("Python Basics", "w...