ராஜா ராஜ்யம்

ராஜா எப்போதும் ராஜா தான்

purushothkn's avatarpurushothkn

ரசனை நம் தாத்தா ,அப்பா ,பேரன் முதல் கண்டிப்பாக வேறுபடும்.பாகவதர் முதல் ரகுமான் வரை இசையில் கொடி நாட்டியவர்கள் பல அதில் இன்றும் நிலைத்து நிற்பவர்கள் சில. அப்படி “சில” த்தின் ராஜா தான் நம் இசைஞானி.லண்டனுக்குப் போய் இசையை கற்றுகொண்டு வந்தாலும் சிலர் அமைக்கும் இசைஅவர்களாலேயே கேட்க முடியாத அளவிற்கு ரம்மியமாக(???) இருக்கிறது. அப்படி இருக்கையில் பண்ணைபுரத்தில் இருந்து கூட ஒரு பீத்தோவன் வர முடியும் என்பதற்கு ராஜாவைத் தவிர வேறுயாரு சான்று. அவரின் படைப்புகளை தரவரிசை படுத்த எவராலும் முடியாது.இருப்பினும் எனது ப்ளே லிஸ்டில் அதிகமாக கேட்கப்பட்ட பாடல்கள் என்ற வகையில் ஒரு தரவரிசை
10. ராஜ ராஜ சோழன்-ரெட்டைவால் குருவி
9.மண்ணில் இந்த காதல்-கேளடி கண்மணி
8.கண்மணியே காதல்-ஆறிலிருந்து அறுபதுவரை
7.ஆலபோல்- எஜமான்
6.சுந்தரி கண்ணால்-தளபதி
5.பூங்காற்று புதிதானது-மூன்றாம் பிறை
4.என் வானிலே-ஜானி
3.மன்றம் வந்த-மௌன ராகம்
2.நீ பார்த்த பார்வை-ஹே ராம்
1.தென்றல் வந்து தீண்டும்போது-அவதாரம்

இதில் முதல் இரண்டு பாடல்கள் ராஜாவின் ஆளுமையை உலகமறிய செய்தவை.”நீ பார்த்த பார்வைக்கொரு நன்றி” ஒரு கேன்வாஸ் பெய்ன்டிங் போல விரிந்து வார்த்தைகள் வற்றி காதல் மட்டுமே மிஞ்சிய நிலைக்கு நம்மை இட்டு செல்லும்.”தென்றல் வந்து தீண்டும்போது” தூரிகையில் தேன் வடித்து இழைத்த ஓவியம்.
பாடல்கள் பல ராஜாவின் மகுடங்களாக இருப்பினும் அதில் வைரமாக இருப்பது அவரின் பிண்ணணி இசை. இப்போது பிண்ணணி இசை என்பது படம் பார்ப்பவரை படுக்க…

View original post 66 more words

Video Annotation

Video Annotations is a new way for you to add interactive commentary to your videos! Use it to:

  • Add background information about the video
  • Create stories with multiple possibilities (viewers click to choose the next scene)
  • Link to related YouTube videos, channels, or search results from within a video
  • All of the above!

You control what the annotations say, where they appear on the video, and when they appear and disappear.

Ref:

http://www.youtube.com/t/annotations_about

https://support.google.com/youtube/answer/92710?hl=en

 

Microsoft Virtual WiFi Miniport Adapter

Virtual WiFi is a technology that virtualizes your network adapter much in the same way VMWare virtualizes your entire operating system. Once virtualized, you can basically convert one physical wireless adapter into two virtual ones. This allows you to then connect one virtual network adapter to your regular wireless network and use the other virtual adapter to connect to another network such as an ad-hoc network or to create a WiFi hotspot and allow other to connect to your Windows 7 machine wireless like they would connect to a normal wireless access point.

Creating your own wireless access point, you can go about it in two ways: use the command line in Windows 7

  • The first thing you can to do is share the Internet connection on your main network adapter so that when people connect using the virtual network adapter, they will be able to access the Internet through your Windows 7 computer. You can do this by going to
    * Network and Sharing Center and clicking on
    * Change Adapter Settings. Click on the network-right click -properties
    * Sharing tab and check the box that says
    * Allow other network users to connect through this computer’s Internet connection.
    * under Home networking connection, make sure to pick the name of the virtual WiFi mini port adapter. It may be something like Wireless Network Connection 2 or 3, etc.
    * Now to setup the wireless access point on the virtual network adapter, open the command prompt (Start, type run[run as adminstrator,Press and hold down the SHIFT key while you right-click the program icon, and then click Run as.]) and type in the following command:

    netsh wlan set hostednetwork mode=allow ssid=VirtualNetworkName key=Password

    In the line above, you need to change VirtualNetworkName to the desired name of your wireless network and change Password to whatever password you want on the network. Note that all virtual wireless access points have to use WPA2-PSK (AES) encryption no matter what. Once it has been setup, you can enable it by typing in the following line:

    netsh wlan start hostednetwork

    To see details about the hosted network, such as how many clients are connected, type in the following command:

    netsh wlan show hostednetwork

    And that’s about it! Other users should now be able to see your newly created wireless access point in their list of wireless networks. They should also be able to connect and connect to the Internet.

    Ref:

  • Run as Administrator: http://support.microsoft.com/kb/305780
  • http://helpdeskgeek.com/windows-7/what-is-microsoft-virtual-wifi-miniport-adapter/
  • Time Complexity

    Constant Time
    An algorithm is said to be constant time (also written as O(1) time) if the value of T(n) is bounded by a value that does not depend on the size of the input
    T(n)=O(1).
    For example, accessing any single element in an array takes constant time
    the number of elements is known in advance and does not change, however, such an algorithm can still be said to run in constant time.
    Linear Time
    T(n)=O(n)

    src:
    http://en.wikipedia.org/wiki/Logarithmic_time#Logarithmic_time

    Data Structure Tree Basics

    Data Type-List
    Data Strucutre-Linked List

    Tree:
    As a data type, a tree has a value and children, and the children are themselves trees; the value and children of the tree are interpreted as the value of the root node and the subtrees of the children of the root node.
    As a data structure, a linked tree is a group of nodes, where each node has a value and a list of references to other nodes (its children). This data structure actually defines a directed graph,[a] because it may have loops or several references to the same node, just as a (corrupt) linked list may have a loop. Thus there is also the requirement that no two references point to the same node (that each node has at most a single parent, and in fact exactly one parent, except for the root), and a tree that violates this is “corrupt”.
    a tree is always non-empty, but a reference to a tree may be null.
    Recursive
    As a Data Type

    • t: v [t[1], …, t[k]] -(A tree t consists of a value v and a list of other trees.)
    • f: [t[1], …, t[[k]]
      t: v f -(a tree can be defined in terms of a forest (a list of trees), where a tree consists of a value and a forest (the subtrees of its children):

    As a data structure

  • n: v [&n[1], …, &n[k]] -((A node n consists of a value v and a list of other references to other nodes.)
  • Terminology
    node:
    An internal node (also known as an inner node, inode for short, or branch node) is any node of a tree that has child nodes.
    External node (also known as an outer node, leaf node, or terminal node) is any node that does not have child nodes.
    height of a node is the length of the longest downward path to a leaf from that node. The height of the root is the height of the tree
    The depth of a node is the length of the path to its root (i.e., its root path

    Ref:
    http://mathworld.wolfram.com/RootedTree.html
    http://en.wikipedia.org/wiki/Tree_(data_structure)

    JAVA Performance -Memory,Runtime

    Escape Analysis

    • The JVM uses therefore internally escape analysis to check if an object is used only with a thread or method. If the JVM identify this it may decide to create the object on the stack, increasing performance of the Java program.

    Garbage collector

    • java -verbose:gc myProgram
    • How to enable Garbage Collection (GC) logs To enable GC logs, the -Xloggc:logFileName option will have to be passed when java command is being executed. Additionally if the detailed log of the GC is required, then an additional -XX:+PrintGCDetails option will have to be passed.Example: java -Xloggc:D:/log/myLogFile.log -XX:+PrintGCDetails myProg

    calculate Interest on your Policy

    What is the interest earned on this investment ? 31,000 per year for 30 years becomes 23,10,000 .

    Annuity formula is :

    Maturity value = Amount paid per year * [ {(1+r)^n – 1}/r ] * (1+r)
    Here n = 30 years
    and r = rate of interest earned

    Putting all these values

    23,10,000 = 31,000 * [{(1+r)^30 -1}/r] * (1+r)

    The value of r which satisfies this equation is 5.4 .

    ref:http://www.jagoinvestor.com/2008/10/why-endowment-policy-are-never-best_08.html
    know your maturity amount : http://licpolizy.com

    My First Post

    Perform Logarithms in Your Head

    1. When someone gives you any positive number, you should immediately ‘write’ that number in scientific notation in your head.

    2. Next, focus only on the exponent of the number (written in scientific notation). This number will be the basis of you answer.

    3. Estimate the logarithm of the abscissa in your head (thats the number between 1 and 9.999999…, not part of the exponent). Note: you’ll need to memorize the table below (its not that hard).

    4. Add the logarithm of the abscissa to the exponent you found in step 2.

    What follows are the values for the logs you’ll need to have memorized for step 3…

    log(1)=0
    log(2)=.3010
    log(3)=.4771
    log(4)=.6020
    log(5)=.6990
    log(6)=.7781
    log(7)=.8451
    log(8)=.9031
    log(9)=.9542

    As an example, lets find the logarithm of 29,012. Written in scientific notation, that would be 2.9012 X 10^4. So, the exponent is 4. Now, we need to concentrate on the abscissa (2.9012 is very very close to 3). From our table above (which we have memorized for the trick), the logarithm of 3 is 0.4771. So, we add the exponent (4), to the log of the abscissa (0.48), to get a value of 4.4771

    Perform Logarithms in Your Head