CSS: How to play with a and a div class and make changes in the style block by overwriting the old css style

•July 29, 2008 • 1 Comment

<style type=”text/css”>
.yui-u p{margin-left:1em; }
.yui-ge p{margin-bottom:8em;}
</style>

An Embedded Code in an HTML to overwrite the referring CSS:

In Example above we see here that .yui-u is a div class which inherits the style functions of a certain css file(eg. say style.css which doesn’t have the margin left in the css.)

So in order to make changes in the inherited CSS emdebing above ling of .yui-u would refer that too a div class, and after a space p would refer to allĀ  the p tags and in {} we mention the attribute which we want it to be acted like.

similarly is for the second line .yui-ge p{} as shown above.

-sahil chokshi

Windows XP Myths-About Dll Unloading

•April 7, 2006 • 1 Comment

Always Unload DLL TweakMyth – “Enabling this frees up more memory and improves performance”Reality – “Adding this Registry Key in Windows 2000 or XP has no effect since this registry key is no longer supported in Microsoft Windows 2000 or later. The Shell automatically unloads a DLL when its usage count is zero, but only after the DLL has not been used for a period of time. This inactive period might be unacceptably long at times, especially when a Shell extension DLL is being debugged. For operating systems prior to Windows 2000, you can shorten the inactive period by adding this registry key.” – SourceSource 2

Alternative for Enabling TAsk MAnager-Sahil

•March 28, 2006 • Leave a Comment

Gpedit.msc:
Go, go gadget commandBoth BeerMonster and skc@irmphila.com point to the Gpedit.msc command and the group policy configuration. Perform the following steps to gain access to the group policy settings in Windows XP:
1. Click Start Run.
2. Enter gpedit.msc at the command line and click OK. This will open the Group Policy settings window shown in Figure B.
3. Select User Configuration Administrative Templates System Ctrl+Alt+Delete Options Remove Task Manager.
4. Double-click the Remove Task Manager option from the Group Policy menu. You can then disable, enable, or set the policy to Not Configured. Remember: Since the policy in question is called Remove Task Manager, by disabling the policy, you are actually enabling the Task Manager. Disabling or setting this policy to Not Configured should alleviate Main’s problem.

Task Manager Enabling/Disabling in WIndows XP

•March 28, 2006 • Leave a Comment

Hive: HKEY_CURRENT_USER Key: Software\Microsoft\Windows\CurrentVersion\Policies\System Name: DisableTaskMgr Type: REG_DWORDValue: 1=Enablethis key, that is DISABLE TaskManagerValue: 0=Disablethis key, that is Don’t Disable, Enable TaskManager
As part of the enhanced management available in Windows 2000 and Windows XP, rather than risking a registry change, as an administrator you can enable or disable Windows 2000 Pro or Windows XP Pro’s TaskManager using Group Policy Editor. This can be applied to the local policy. Note: if you are trying to override your organizations group policy, you can’t. As soon as you re-authenticate to the domain, the domain or OU Group Policy will rewrite the registry setting. But if the TaskManager was accidently disabled or you need to control this item for a set of standalone boxes this is for you:
Click Start Click Run Enter gpedit.msc in the Open box and click OK In the Group Policy settings window Select User Configuration Select Administrative Templates Select System Select Ctrl+Alt+Delete options Select Remove Task Manager Double-click the Remove Task Manager option

Cognitive Radio:A Solution to Wireless Jamming

•March 24, 2006 • Leave a Comment

Cognitive Radio:To avoid future wireless traffic jams, Heather “Haitao” Zheng is finding ways to exploit unused radio spectrum.It’s a local effect — within 30 to 60 meters of a transceiver — but there’s just no more space in the part of the radio spectrum designated for Wi-Fi.
Imagine, then, what happens as more devices go wireless — not just laptops, or cell phones and BlackBerrys, but sensor networks that monitor everything from temperature in office buildings to moisture in cornfields, radio frequency ID tags that track merchandise at the local Wal-Mart, devices that monitor nursing-home patients. All these gadgets have to share a finite — and increasingly crowded — amount of radio spectrum.
Heather Zheng, an assistant professor of computer science at the University of California, Santa Barbara, is working on ways to allow wireless devices to more efficiently share the airwaves. The problem, she says, is not a dearth of radio spectrum; it’s the way that spectrum is used.
The Federal Communications Commission in the United States, and its counterparts around the world, allocate the radio spectrum in swaths of frequency of varying widths. One band covers AM radio, another VHF television, still others cell phones, citizen’s-band radio, pagers, and so on; now, just as wireless devices have begun proliferating, there’s little left over to dole out.
But as anyone who has twirled a radio dial knows, not every channel in every band is always in use. In fact, the FCC has determined that, in some locations or at some times of day, 70 percent of the allocated spectrum may be sitting idle, even though it’s officially spoken for.
Zheng thinks the solution lies with cognitive radios, devices that figure out which frequencies are quiet and pick one or more over which to transmit and receive data. Without careful planning, however, certain bands could still end up jammed. Zheng’s answer is to teach cognitive radios to negotiate with other devices in their vicinity. In Zheng’s scheme, the FCC-designated owner of the spectrum gets priority, but other devices can divvy up unused spectrum among themselves.
But negotiation between devices uses bandwidth in itself, so Zheng simplified the process. She selected a set of rules based on “game theory” — a type of mathematical modeling often used to find the optimal solutions to economics problems — and designed software that made the devices follow those rules. Instead of each radio’s having to tell its neighbor what it’s doing, it simply observes its neighbors to see if they are transmitting and makes its own decisions.