Name:
Location: Nashville, Tennessee, United States

I joined the ancient order of Magicians when I was in my early Twenties, this is my first attempt to share some of what that group believes.

Saturday, March 18, 2006

Computers run on Magic

The existance of magic and magicians is proven logically by Computers.

Follow me in this......
First of all no one knows how computers work. Those who claim to know, have expertise in one area, hardware, software, design, system analysis, or something similar.
Secondly, todays programs are designed to mimic intelligence and seem to actually have the ability to choose and make logical decisions without user imput. this is not the case, since all a computer can actually do is add in base two.
Thirdly, if you tried to examine your entire operating system, and the associated files, one item at a time and actually understand them, you probably wouldn't live that long. I myself am using 7 gigabytes of space to run an OS, and that is billions of bits.

Now, this must mean that the real method of computer operation is Magic.
A programmer is one who writes the spells,
A designer is one who invents the magical devices.
A computer engineer is an alchemist, who actually makes the magic device.
A user is a magician of some rank, who can cause the magical device to do something.
(possibly something totally unexpected!)

In the dark ages, Magicians were those who used arcane language and unknown devices to alter the world and gain great power and wealth. Kind of like Bill Gates and Michael Dell.
'The Craft" was something very different, but had its roots in knowlage and the use of little known substances. (not lithium ions and Gallium Arsenide, but the analogy holds)
By the use of "Power Words" , Magicians could ruin lives and sometimes even kill.
{Format C: comes to mind, as well as a Debug Script to remove addressing on the Hard Drive}
Today's magicians can facilitate healing, guide weapons to target, execute the condemned, assist a mother at birth, maximize a harvest, blight an entire forest, predict weather, cause havoc and generally do just about anything that is computer controlled/assisted.
We have both White magicians and black magicians. Decide for yourself which is which.
Here's a list of some of the Magic Spells of today's computer magicians.

Spells for computer Magicians


American Standard Code for Information Interchange (ASCII)
A standard single-byte character encoding scheme used for text-based data. ASCII uses designated 7-bit or 8-bit number combinations to represent either 128 or 256 possible characters. Standard ASCII uses 7 bits to represent all uppercase and lowercase letters, the numbers 0 through 9, punctuation marks, and special control characters used in U.S. English. Most current x86-based systems support the use of extended (or "high") ASCII. Extended ASCII allows the eighth bit of each character to identify an additional 128 special symbol characters, foreign-language letters, and graphic symbols.

Asymmetric Digital Subscriber Line (ADSL)
A high-bandwidth digital transmission technology that uses existing phone lines and also allows voice transmissions over the same lines. Most of the traffic is transmitted downstream to the user, generally at rates of 512 Kbps to about 6 Mbps.

asynchronous communication
A form of data transmission in which information is sent and received at irregular intervals, one character at a time. Because data is received at irregular intervals, the receiving modem must be signaled to let it know when the data bits of a character begin and end. This is done by means of start and stop bits.
Asynchronous Transfer Mode (ATM)
A high-speed connection-oriented protocol used to transport many different types of network traffic. ATM packages data in a 53-byte, fixed-length cell that can be switched quickly between logical connections on a network.
B-channel
A single channel of an ISDN line that is used to carry either voice or data information. ISDN Basic Rate Interface (BRI) has 2 B-channels. ISDN Primary Rate Interface (PRI) in North America has 23 B-channels. ISDN Primary Rate Interface (PRI) in Europe has 30 B-channels. B-channel is also called bearer channel.
bandwidth
In analog communications, the difference between the highest and lowest frequencies in a given range. For example, an analog telephone line accommodates a bandwidth of 3,000 hertz (Hz), the difference between the lowest (300 Hz) and highest (3,300 Hz) frequencies it can carry. In digital communications, bandwidth is expressed in bits per second (bps).
Bandwidth Allocation Protocol (BAP)
A PPP control protocol that is used on a multiprocessing connection to dynamically add and remove links.
basic input/output system (BIOS)
On x86-based computers, the set of essential software routines that test hardware at startup, start the operating system, and support the transfer of data among hardware devices. The BIOS is stored in read-only memory (ROM) so that it can be executed when you turn on the computer. Although critical to performance, the BIOS is usually invisible to computer users.
batch program
An ASCII (unformatted text) file that contains one or more operating system commands. A batch program's file name has a .cmd or .bat extension. When you type the file name at the command prompt, or when the batch program is run from another program, its commands are processed sequentially. Batch programs are also called batch files.
baud rate
The speed at which a modem communicates. Baud rate refers to the number of times the condition of the line changes. This is equal to bits per second only if each signal corresponds to one bit of transmitted data.
Modems must operate at the same baud rate in order to communicate with each other. If the baud rate of one modem is set higher than that of the other, the faster modem usually alters its baud rate to match that of the slower modem.
bits per second (bps)
The number of bits transmitted every second, used as a measure of the speed at which a device, such as a modem, can transfer data.
bootstrap protocol (BOOTP)
A protocol used primarily on TCP/IP networks to configure diskless workstations. RFCs 951 and 1542 define this protocol. DHCP is a later boot configuration protocol that uses this protocol. The Microsoft DHCP service provides limited support for BOOTP service.
> BOOTP extensions
A set of optional information types defined originally in RFC 1497 for use with BOOTP service and later supported by DHCP. In DHCP, these extensions form the legacy core set of client parameters available and supported by most standard DHCP and BOOTP servers.
broadband
Of or relating to communications systems in which the medium of transmission (such as a wire or fiber-optic cable) carries multiple messages at a time, each message modulated on its own carrier frequency by a modem.

broadband connection
A high-speed connection. Broadband connections are typically 256 kilobytes per second (KBps) or faster. Broadband includes DSL and cable modem service.

broadband integrated services digital network (B-ISDN)
An ITU-T communication standard for high-speed networking that provides services, including voice, video, and data on the same network.
built-in groups
The default security groups installed with the operating system. Built-in groups have been granted useful collections of rights and built-in abilities.
In most cases, built-in groups provide all the capabilities needed by a particular user. For example, if a domain user account belongs to the built-in Administrators group, logging on with that account gives a user administrative capabilities over the domain and the domain servers. To provide a needed set of capabilities to a user account, assign it to the appropriate built-in group.
bus
A communication line used for data transfer among the components of a computer system. A bus essentially allows different parts of the system to share data. For example, a bus connects the disk-drive controller, memory, and input/output ports to the microprocessor.
cache file (cash file)
A file used by the Domain Name System (DNS) server to preload its names cache when service is started. Also known as the root hints file because DNS uses resource records stored in this file to help locate root servers that provide referral to authoritative servers for remote names. For Windows DNS servers, the cache file is named Cache.dns and is located in the %SystemRoot%\System32\Dns folder.
caching
The process of temporarily storing recently used data values in a special pool in memory for quicker subsequent access. For DNS, typically the ability of the DNS server to store information learned about the DNS namespace during the resolution of DNS queries. (For example, the DNS server can cache DNS records received from other DNS servers.) Caching is also available through the DNS Client service as a way for DNS clients to keep a cache of information learned during recent queries.
caching resolver
A client-side DNS name resolution service that performs caching of recently learned DNS domain name information. The caching resolver service provides system-wide access to DNS-aware programs for resource records obtained from DNS servers during processing of name queries. Cached data is used for a limited period of time and aged according to the active Time-to-Live (TTL) value. You can set the TTL individually for each resource record (RR). Otherwise, it defaults to the minimum TTL set in the SOA RR for the zone.
callback number
The number that a remote access server uses to call back a user. This number can be preset by the administrator or specified by the user at the time of each call, depending on how the administrator configures the user's callback options. The callback number should be the number of the phone line to which the user's modem is connected
canonical name
An object's distinguished name presented with the root first and without the LDAP attribute tags (such as: CN=, DC=). The segments of the name are delimited with forward slashes (/). For example,
CN=MyDocuments,OU=MyOU,DC=Microsoft,DC=Com
is presented as
microsoft.com/MyOU/MyDocuments
in canonical form.
canonical (CNAME) resource record
A resource record used to map an alternate alias name to a primary canonical DNS domain name used in the zone.
cascading hubs
A network configuration in which hubs are connected to other hubs.
catalog
For Indexing Service, a collection of all index information and stored properties for a particular group of file system directories. By default, Indexing Service indexes the System and Web catalogs on your hard drive.
Challenge Handshake Authentication Protocol (CHAP)
A challenge-response authentication protocol for PPP connections documented in RFC 1994 that uses the industry-standard Message Digest 5 (MD5) one-way encryption scheme to hash the response to a challenge issued by the remote access server.
channel
A path or link through which noncontrol information passes between two devices. A single Basic Rate Interface (BRI) connection, for example, has one physical connection but two channels for exchanging information between devices. This is often called a bearer channel, implying a channel that carries information.
On the Internet, a Web site designed to deliver content from the Internet to your computer, similar to subscribing to a favorite Web site.
More on CHAP (Challenge Handshake Authentication Protocol)
An authentication protocol used by Microsoft remote access and Network Connections. Using CHAP, a remote access client can send its authentication credentials to a remote access server in a secure form. Microsoft has created a Windows-specific variant of CHAP called MS-CHAP.
Class A IP address
A unicast IP address that ranges from 1.0.0.1 through 126.255.255.254. The first octet indicates the network, and the last three octets indicate the host on the network.
Class C IP address
A unicast IP address that ranges from 192.0.0.1 to 223.255.255.254. The first three octets indicate the network, and the last octet indicates the host on the network. Network Load Balancing provides optional session support for Class C IP addresses (in addition to support for single IP addresses) to accommodate clients that make use of multiple proxy servers at the client site.
client
Any computer or program connecting to, or requesting the services of, another computer or program. Client can also refer to the software that enables the computer or program to establish the connection.
For a local area network (LAN) or the Internet, a computer that uses shared network resources provided by another computer (called a server).
client request
A service request from a client computer to a server computer or, for Network Load Balancing, a cluster of computers. Network Load Balancing forwards each client request to a specific host within the cluster according to the system administrator's load-balancing policy.
cluster
In data storage, the smallest amount of disk space that can be allocated to hold a file. All file systems used by Windows organize hard disks based on clusters, which consist of one or more contiguous sectors. The smaller the cluster size, the more efficiently a disk stores information. If no cluster size is specified during formatting, Windows picks defaults based on the size of the volume. These defaults are selected to reduce the amount of space that is lost and the amount of fragmentation on the volume. A cluster is also called an allocation unit.
In computer networking, a group of independent computers that work together to provide a common set of services and present a single-system image to clients. The use of a cluster enhances the availability of the services and the scalability and manageability of the operating system that provides the services.
cluster adapter
The adapter that, when using multiple network adapters in each host of a Network Load Balancing cluster, handles the network traffic for cluster operations (the traffic for all hosts in the cluster). This adapter is programmed with the host's cluster IP address.
Cluster Administrator
An application that is used to configure a cluster and its nodes, groups, and resources. Cluster Administrator can run on any member of the trusted domain regardless of whether the computer is a cluster node.
Cluster API
A collection of functions that are implemented by the cluster software and used by a cluster-aware client or server application, a cluster management application, or a Resource DLL. The Cluster API is used to manage the cluster, cluster objects, and the cluster database.
cluster-aware application
An application that can run on a cluster node and that can be managed as a cluster resource. Cluster-aware applications use the Cluster API to receive status and notification information from the server cluster.
duplex
A system capable of transmitting information in both directions over a communications channel.
full-duplex
A system capable of simultaneously transmitting information in both directions over a communications channel.
half-duplex
A system capable of transmitting information in only one direction at a time over a communications channel.
Dynamic Host Configuration Protocol (DHCP)
A TCP/IP service protocol that offers dynamic leased configuration of host IP addresses and distributes other configuration parameters to eligible network clients. DHCP provides safe, reliable, and simple TCP/IP network configuration, prevents address conflicts, and helps conserve the use of client IP addresses on the network.
DHCP uses a client/server model where the DHCP server maintains centralized management of IP addresses that are used on the network. DHCP-supporting clients can then request and obtain lease of an IP address from a DHCP server as part of their network boot process.
dynamic update
An updated specification to the Domain Name System (DNS) standard that permits hosts that store name information in DNS to dynamically register and update their records in zones maintained by DNS servers that can accept and process dynamic update messages.
embedded object
Information created in another program that has been pasted inside your document. When information is embedded, you can edit the information in the new document using toolbars and menus from the original program.
To edit the embedded information, double-click it and the toolbars and menus from the program used to create the information appear. Embedded information is not linked to the original source. If you change information in one place, it is not updated in the other.
OLE
A way to transfer and share information between applications by pasting information created in one application into a document created in another application, such as a spreadsheet or word processing file


Now, can you honestly say that some of that didn't sound like a 16th century Magician casting a spell?

0 Comments:

Post a Comment

<< Home