Friday, December 16, 2005


They are the devices that are helpful in getting the purest form of waters in domestic and commercial usage. They are Ideal for allergy sufferer’s .The distillers are widely used in laboratories, pharmacies, hospitals, doctors and surgeries. When they are filled with distilled waters they make 4 liters of distilled water in approximately 5 hours.
Steam distilled water: These are the purest form of water. A water distiller takes in nature's process of evaporation and condensation in a chamber, leaving all impurities after such as inorganic minerals, chemicals etc.
The Distillation procedure takes off waterborne contaminants, which are furnished such as:
Organic and inorganic chemicals
Toxic metals (including fluoride)
Volatile gases
Cysts and other contaminants

The distilled waters are free from inorganic minerals of any kind and hence they are the best cleansing agents the body can always have. Distilled water is always necessary for making colloidal silver.

Sunday, November 27, 2005

Grisaille Paintings

Grisaille is not a paintings type by its own but an initial step in oil painting. It is the step representing lighter shades of the image to be painted. This type grisaille grey is basically a painting in lighter grey shade (followed as per the rules of oil painting the darker painting section follows the lighter colors to be implemented in oil painting) before the whole painting is all done. This painting is executed entirely on monochrome in various shades of grey which can also be used for decorative purposes such as representing an object in relief.

Wednesday, September 21, 2005

orlando villas

Sitting here in early August gazing at the grey English skies makes me long to
return to sunnier climates. My thoughts turn firmly to Florida and I find myself
browsing for Orlando villas to rent on orlando

I remember my last trip as if it was only yesterday, especially my close encounter
whilst absorbing one of Central Florida’s natural attractions, the swamps.

Although we were staying in an Orlando vacation rental home which are mainly
filled with out-of-state tourists, I bumped into a local called Carl who was
working for who suggested that our families meet up one
Sunday afternoon at a country park about 30 miles North West of Orlando. Eager
to see more of Florida’s natural beauty, sure enough one week later we
found ourselves heading up to Wekiva. We met with our new friends and decided
to rent some canoes and head north upriver.

The shallow river was fairly dense with fallen trees and navigating them was
difficult. Whilst rowing with one ore and two you kids was hard-work heading
up-stream, the current made it fairly easy to control the canoe and navigate
the tight corners. As we passed one particularly hairy tight spot, a 7ft alligator
was clearly visible. The kids, aged 4 and 5, were already on the lookout for
alligators and they fell very silent as we passed.

Eventually we found a sand island in the middle of the river and stopped for
refreshment. My 4 year old picked up a stick that was floating down-stream.
When he asked me why the stick was moving I shouted to him to drop it, fortunately
it looked like it was just a water snake.

I need some excitement in my life again, time to fins another Florida vacation
villa for rent on If I can, I’ll try to stay at Emerald
Retreat again as it was a wonderful villa with everything that I could have
dreamed of, details can be found at

Tuesday, September 20, 2005


A wireless LAN or WLAN is a wireless local area network that uses radio waves as its carrier: the last link with the users is wireless, to give a network connection to all users in the surrounding area. Areas may range from a single room to an entire campus. The backbone network usually uses cables, with one or more wireless access points connecting the wireless users to the wired network.
WLAN is expected to continue to be an important form of connection in many business areas. The market is expected to grow as the benefits of WLAN are recognized. Frost and Sullivan estimate the WLAN market to have been 0.3 billion US dollars in 1998 and 1.6 billion dollars in 2005. So far WLANs have been installed in universities, airports, and other major public places. Decreasing costs of WLAN equipment has also brought it to many homes. However, in the UK the exorbitant cost of using such connections in public has so far limited use to airports' Business Class lounges, etc. Large future markets are estimated to be in health care, corporate offices and the downtown area of major cities. New York City has even begun a pilot program to cover all five boroughs of the city with wireless internet.
Originally WLAN hardware was so expensive that it was only used as an alternative to cabled LAN in places where cabling was difficult or impossible. Such places could be old protected buildings or classrooms, although the restricted range of the 802.11b (typically 30ft.) limits its use to smaller buildings. WLAN components are now cheap enough to be used in the home, with many being set-up so that one PC (a parent's PC, for example) can be used to share an internet connection with the whole family (whilst retaining access control at the parents' PC).
Early development included industry-specific solutions and proprietary protocols, but at the end of the 1990s these were replaced by standards, primarily the various versions of IEEE 802.11 (Wi-Fi) (see separate articles) and HomeRF (2 Mbit/s, intended for home use, unknown in the UK). An alternative ATM-like 5 GHz standardized technology, HIPERLAN, has so far not succeeded in the market, and with the release of the faster 54 Mbit/s 802.11a (5 GHz) and 802.11g (2.4 GHz) standards, almost certainly never will.
The lack of default security of Wireless connections is fast becoming an issue, especially in the UK, where many Broadband (ADSL) connections are now offered together with a Wireless Basestation/ADSL Modem/firewall/Router access point. Further, many laptop PCs now have Wireless Networking built in (cf. Intel 'Centrino' campaign) thus eliminating the need for an additional plug-in (PCMCIA) card. This might even be enabled, by default, without the owner ever realising it, thus 'broadcasting' the laptop's accessibility to any computer nearby.
The basic security used for a WLAN was originally Wired Equivalent Privacy (WEP), but this was shown to provide minimal security due to serious weaknesses. The alternate Wi-Fi Protected Access (WPA) security protocol was later created to address these problems. Since then software solutions such as SSL, SSH, and various types of software encryption have become the prefered methods of securing wireless information transmission.
Modern operating systems such as Linux, Mac OS, or Microsoft Windows XP as the 'standard' in home PCs makes it very easy to setup a PC as a Wireless LAN 'basestation' and using Internet Connection Sharing allows all the PCs in the home to access the Internet via the 'base' PC. However, lack of expertise in setting up such systems often means that someone nearby, such as a next-door neighbor, may also share the internet connection. This is typically without the wireless network owner's knowledge; it may even be without the knowledge of the user (the neighbor) if his computer automatically selects a nearby wireless network. Nowadays it has become etiquette to leave wireless access points open for others to use just as one expects to find open access points while on the road. This freely sharing of bandwith is the basis of free wireless community networks which are often considered the future of the internet.
The frequency which 802.11b operates at is 2.4GHz, which can lead to interference with cordless phones on the same frequency. If one wants to use a cordless telephone on the same premises, one should ensure that the cordless set uses a different frequency, such as 900Mhz or 5.8 Ghz. However, any wireless router has the ability to operate in different channels. Using channel 11 is most often the best situation for a wireless access point.
There are two possible types of operation:
Peer-to-peer or ad-hoc mode This mode is a method for wireless devices to directly communicate with each other. Operating in ad-hoc mode allows wireless devices within range of each other to discover and communicate in peer-to-peer fashion without involving central access points. This is typically used by two PCs to connect to one another, so that one can share the other's Internet connection for example, as well as for wireless mesh networks. Infrastructure mode This mode of wireless networking bridges a wireless network to a wired Ethernet network. Infrastructure mode wireless also supports central connection points for WLAN clients. A wireless access point is required for infrastructure mode wireless networking, which serves as the central WLAN communication station. This is typically used by a stand-alone base-station (such as a Broadband/ADSL connection box).

Marked cards

Saturday, August 20, 2005

Democrats' Centre Union

The Democrats Centre Union or Union of Christian and Centre Democrats (Italian: Unione Democratici di Centro or Unione dei Democratici Cristiani e Democratici di Centro) is a political party in Italy formed by a merger of the former Centro Cristiano Democratico and Cristiani Democratici Uniti parties. The two parties had formerly co-operated as the Biancofiore or Whiteflower Alliance as part of the House of Freedoms coalition. The new party is led by Marco Follini.

Friday, February 25, 2005


Computer programs are simply large lists of instructions for the computer to execute, perhaps with tables of data. Many computer programs contain millions of instructions, and many of those instructions are executed repeatedly. A typical modern PC(in the year 2003) can execute around 2-3 billion instructions per second. Computers do not gain their extraordinary capabilities through the ability to execute complex instructions. Rather, they do millions of simple instructions arranged by people known as "programmers." Good programmers develop sets of instructions to do common tasks (for instance, draw a dot on screen) and then make those sets of instructions available to other programmers.
Nowadays, most computers appear to execute several programs at the same time. This is usually referred to as multitasking. In reality, the CPU executes instructions from one program, then after a short period of time, it switches to a second program and executes some of its instructions. This small interval of time is often referred to as a time slice. This creates the illusion of multiple programs being executed simultaneously by sharing the CPU's time between the programs. This is similar to how a movie is simply a rapid succession of still frames. The operating system is the program that usually controls this time sharing.