Supply of Bulldozer processors began in September of this year. , But the new chips are already a lot of negative reviews. At the same time, oddly enough, also managed to establish excellent sales growth. Therefore, cessation of supply by AMD 45nm Phenom II processors and Athlon II ( except for one model Phenom II) is a logical step.
The exception was a Phenom II X4 960T on kernel Zosma, which AMD has decided not to leave until. Of the two brands excluded - Phenom and Athlon 2 2 the latter was the most successful. Introduced back in 1999, he experienced a lot of processor architectures and models. Particularly successful was the K8 architecture, which brought the company a leader in the opposition with Intel, while the latter has not released the Core 2 Duo Conroe architecture.
Now, though, and AMD can not compete with Intel in absolute performance, she released a very successful fast-track processing elements (APU) Llano chip with integrated graphics, up to the level where solutions from Intel yet fall short. However, AMD has repeatedly produced initially seemed weak processor architectures, which are then brought to mind, and proved worthy of the products, so the Bulldozer, in the long term, still has hope for rehabilitation.
On the other hand, became aware of the significant. changes in strategy, AMD. In particular, the company plans to abandon the technological race with his arch- rival Intel in the PC and. server hardware. And focus on the mobile direction in which Intel has failed to provide any competitive solutions. Details are expected in February 2012.
According to the materials Softpedia. com ( translate oszone. net) and NStor. ru.
Wednesday, May 30, 2012
Issue 2 of the Athlon and Phenom 2 terminated
Friday, May 25, 2012
Three Men in a server, not counting the 2.0 admin.
- We must be on duty, - said Sergey significantly.
- Yes, and Misha have to keep your eyes open - agreed Cyril - Elk healthy, who knows that he comes into my head.
We cast lots by throwing fingers ( still do not understand how it works, but I always try to pretend that I understand ). I had the last duty, under the same morning, and the first watch on the atonement Sergey.
He put a piece of iron toilet door, once a broken on the rack (to fall, if open, as he explained ), and he sat in a chair, which is set right in front of the toilet door.
We Cyril spread all the same jerseys, grabbed the wires softly, and went to sleep.
I usually sleep in the new place is bad, very sensitively, and at once I wake up, if something goes wrong, but this time, it seems, nerves take a long vacation. I woke up surprisingly well rested and refreshed, so the house does not always sleep enough. If it were not screams of Cyril ...
The lighting in this local fluctuations of the concrete was artificial, and day and night did not differ, so we had to look at the clock to understand what about the third watch we are not talking: It was about half past nine.
My friends woke up and had something very worried.
- Mike was gone! .
The door was opened to the toilet.
I was made a wry face, that, say, slept, and the alarm went off, but Sergei strongly protested - piece of iron was, the door was shut, and inside - no one!.
- A server checked? . Previously, there was, that is - and now fridge has disappeared!.
- This is where the mystic - Cyril shook his head - Refrigerator very heavy, it alone does not upresh.
- Mysticism is the lack of knowledge - I could not resist to quote some of the classics of Marxism -Leninism - We must look for a hole or hatch, surely there is something. Well, some people came and rested, and refrigerator.
I myself knew that bear nonsense, but I could not stop. Misha could leave, but cooler- then why take with me?.
I tried to imagine the scene as four burly porters crept on tiptoe to us, and Misha was released, and on tiptoe, carried a refrigerator... op -pa, and the hatch is too narrow, ...
- Let's find another hatch, - said Sergey. - In another way.
And we began to search for. To start, we felt, and toilet prostukali.
There was a surprise for us - for the tank in a plastic bag, wrapped in paper, blotting paper, lay a mobile phone.
At sight of this was the usual Nokia E71, the same way as in Petit Vnukova, but instead of the inscriptions on the Nokia phone was a sign Fakia.
- Hm, - said Kirill - I do not like Nokii, but then why call names -.
We have carefully studied the inscription - it looks like it was factory, or at least as carefully etched, that the naked eye can not see differences.
I tried to turn the phone, but to no avail - it was completely discharged. For fun, I stuck to the phone micro-USB cable and put it on the exercise, sticking to a server near you.
Then we continued the search - ending with a toilet, we dug a heap of cables and spare parts in the room.
At the same time rose so thick pylischa, consisting of clumps of dust rolled up ( one of my friends admin, inclined to poetry, and called them ... And once rested with a refrigerator. Shaitan is simple, and not a system administrator.
We obstukali all the walls, pulled and almost sniffed all ventilation grates as the ... Everything was so worthless, Misha, and a refrigerator as a leaked through the wall, had disappeared without a trace. More precisely, it remained on track - it is blocked (hell, do not keep track!) Laptop that way, and stood in the same place, huge columns, and the base of wireless headphones KOSS. Headphones seem to have remained on Misha.
Not finding out, and pretty tired, we returned to the upper room, where it was at least warm.
- Time is almost lunch, and we have not had breakfast, - said Sergei, stroking his belly rumble. - Where is Chief, why are we not begun to look for? .
I was more skeptical:.
- Probably the chief picked up yesterday and woke up in the evening, and he alone is not up to the server and reports.
We were silent, and then upset Cyril said:.
- Grandson is now required to use this against us. We sit here like idiots... It is ridiculous to tell the same.
- And he got to do with it? - Sergey interested.
- You know what he said at the meeting, when he was appointed prokyugrammorom? .
- What good is it for... prokyugrammor? .
- Who knows - shrugged Cyril.
We sat in silence, pondering the lingering intrigue within our office. Although our department maintained an armed neutrality, understanding of the situation was a necessary condition for survival.
- Let's try to go once again to all messages that we have left today in the internet and see how things are, - Sergey stopped thinking - Perhaps there is in the internet at least one smart person, call for the protection? .
I think I already said that Sergei great optimist? .
The maximum effect is given, of course, Learn. Not in the sense of usefulness, but in terms of volume. User 3vservernoy scored almost two hundred friends, who were mainly that did whatever over each other. There were people 1vservernoy, 2yvservernoy, and a dozen clones that were told all sorts of stories about life in the back, mostly with sexually perverted bias. In short, Learn happened that the line. However, as usual.
But the situation was no better at blogspot. Some people picked up a bad password, and began to publish youtube videos with amateur footage filmed in some (obviously not ours) server.
Rollers transparently hinted at a homosexual nature of the relationship trapped in a server.
The man bedecked the entire (former ) blog banners and our Adsense and rubbed his hands gleefully, looking at the counter of perverts who have not had enough home -2, and it 's hot like, right out of the Server -2! .
There were some well-wishers who ...
The story turned even beyond the Internet: flash mob took two: one at the Tretyakov metro station in Moscow and one in St. Petersburg 's Palace - the group, 50 people sat on their heels together and simultaneously clothed striped cap.
Arrested for 2 very drunken parties that have declared themselves as members of the party ... User 1vservernoy announced raising funds for our defense, a couple of foreign human rights organizations issued a cautious statement condemning the oppression of the peoples of the server.
One angry MP went on television to stop ' internet hooliganism ' in his blog:.
- I write from a server so I called some number, and sent to me there, excuse me, help- desk. Do not send in Russian, I am a simple man, in Russian, I would understand, but just did perversely, some aunt did not live, that is mechanical! .
Pro-government websites came up with a sharp condemnation of ...
But amidst the clouds of homophobic comments, and advocates gomofilov nerds ( who occupied the third position of some part of them even demanded the recognition of individual system administrators biological species) found a thread in which several people have reported that a call to the specified number us, and hear only beeps.
- It looks like we ourselves have painted themselves into a trap - too many people rang in the guard, and the number of disabled or simply not taken up now - Cyril shook his head, - We are overzealous in trying to attract attention, it seems.
' Server ' has become universal, and flash-mobs gegom: each wanted to mention ... At anekdot. ru opened a special section called ' We the server ', full of idiotic jokes, and ...
It seems a long weekend cause acute attacks of ennui, and internet dwellers are willing to inflate any topic. Username and krevedko -mania rest compared with all of this madness.
All Internet happily entertained ... In an attempt to post the request for assistance or zakontachit on ICQ or Skype with someone, we immediately sent to either ignore the comment ' zadolbali ' or start [very stupid ] Stebaev.
In the end we gave it a futile exercise, and gathered to discuss the current situation.
- A) We can not anyone say that we are locked in a server - it causes a reaction, the desired feedback;.
b) It can be assumed that the phone protection is unavailable, probably because of the large number of disconnected calls;.
c) Mike was lost - listed Cyril and concluded:.
- We will either throw the whole thing and wait for 2 more days, until someone comes to work or continue to look for other ways to.
- Do - it still has nothing, let's try to somehow play - Sergei, as always, expressed an optimistic view.
In general, we do not lose, trying to get out of here. It became clear that the fast path will not work, and we must approach the problem thoroughly.
I have noticed that when you try to do something -quick, get a long, dreary, and usually not the first or even second attempt. And if you approach the matter thoroughly, slowly, it all turns out to quickly and easily. unless, of course, the case was not fundamentally flawed from the first attempt, as in this case.
Reflecting in a quiet manner, I suddenly remembered that we have a Nokia / Fakia long enough to charge the costs. You could try to turn it on and see are there any contacts or notes, which could shed light on the strange behavior of Misha.
Do not care was nothing special, skirmishes in the comments with some fools I'm tired, and besides, it was cold in the server, which exacerbated the feeling of hunger.
Thank God that we have at least had water, which we gained from the toilet tank and filter through paper found immediately, and then shoved back Sergei two live wires and a little spark to kill the infection, he said.
I got into the server and looked at Fakia - judging by the charging indicator, it is recharged enough to start, and I turned on the phone.
Here I was expecting an interesting surprise: instead of vodka advertising (Connecting people) came out of a log loading options for Linux: little black and shaped as letters greenbacks [Ok], who cheerfully ran across the screen. It seems that it was difficult telefonchik.
I called Sergey and Kirill and we have to wait for the miracle of the miniature vehicles loaded.
If you recall, in the 99th year on my desk was a Pentium- 133 c 32Mb on board, and it was insanely cool, and very quickly (and at Kvaka2 RivaTNT, just the song!). Now, every other phone is a faster processor, more memory, too, and runs slower, but there is something in your phone to work - address book, browser and photo gallery.
Finally, the phone booted - and, oddly enough, there was no PIN or password. Despite the fact that inside was a clone of Fakia Linux, the interface looked pretty usual, t. e. is unclear nokievski.
But the most unusual was the fact that the phone would catch the signal - the indicator showed the first one, then two sticks pchelayna! .
Continued here.
Migrating databases to SQL Azure.
Hello, everyone! . It will be pretty much of screenshots, so gently traffic:). As we all know. SQL Azure. is based on. Microsoft SQL Server. But despite this, most developers having some difficulties with the process of migrating an existing database in the cloud. In today's publication, I will tell you how this can be done with a pretty brute force, namely the BCP command utility.
So, to begin with, we naturally need a blank database in the cloud. To do this, we proceed to the portal developer in Section. Database. click on the project, which is associated with an active subscription, after which the selected server will create a new database.
In the resulting dialog, enter the name of the new framework and its maximum size ( fast enough for me to head to the 1 GB version). After an empty database is created we need to add an exception to the firewall rules, so that he missed incoming requests. To do this, go to the site in the configuration section and add a firewall exception ( for simplicity, I'm allowed to connect to the entire spectrum of possible incoming IP-addresses ).
Generating DDL- scripts.
As soon as we finish all the preparations on the site we need to generate the DDL- scripts to transfer (remember DDL stands for ... Data Definition Language. ... To generate first need to connect in SSMS to the selected database and in the context menu select. >Tasks Generate Scripts. then select the first three points as shown in the screenshot.
* Unfortunately at the moment SQL Azure does not support DDL triggers.
Next we need to disclose in the same sub- window. Tables. and to choose where all the necessary tables with clustered indexes (this requirement. SQL Azure. ). Once all the necessary tables are selected, proceed to the next step of the dialogue and there is press the button. Advanced.
![SQL Azure Migration SQL Azure Migration](http://lh4.ggpht.com/-YPtPuaE4jjo/Too3-I0pJlI/AAAAAAAAAT0/8paC1AyREQQ/azure1_thumb%25255B17%25255D.png?imgmax=800)
By clicking opens another window with the advanced settings in which the option. >General Script for database. set to ... SQL Azure Database. ... >Table / View Options Script Indexes. in the value of. True.
The final step is to select the storage location of the resulting SQL-code and review. Summary. page. As soon as our scripts to create database objects will be ready we will need to change the connection in SSMS and connect to the cloud base is.
The new connection will fulfill pre-generated scripts, and upon completion we obtain a cloud database that contains all the necessary facilities.
Create procedures to support data migration.
As soon as our structure will be restored, we will create two auxiliary stored procedures to simplify the data migration. Hranimka. SetForeignKeyEnabledStatus. will be used to disable foreign key constraints during the data transfer. This allows us to load the data tables in any order without primary / foreign key constraints. This procedure is called as before ( to disable the checks) and after data transfer ( to return all konstreyntov ). Hranimka. SetIndexEnabledStatus. will be used to disable all non-clustered indexes during data transfer. This will speed up the process of loading data. This procedure will also be run before and after transfer. The code listing above procedures presented below:.
IF OBJECT_ID ('[dbo]. [SetForeignKeyEnabledStatus] ',' P ') IS NOT NULL.
DROP PROCEDURE [dbo]. [SetForeignKeyEnabledStatus];.
GO.
CREATE PROCEDURE [dbo]. [SetForeignKeyEnabledStatus].
(.
@ enabled bit.
).
AS.
BEGIN.
DECLARE.
@ schema_name sysname,.
@ table_name sysname,.
@ fk_constraint_name sysname,.
@ cmd_txt varchar ( 8000);.
DECLARE fk_cursor CURSOR FOR.
SELECT.
sc. name AS schema_name,.
so. name AS table_name,.
so2. name AS fk_constraint_name.
FROM.
sys. objects so.
inner join sys. schemas sc ON so. schema_id = sc. schema_id.
inner join sys. foreign_key_columns fk ON so. object_id = fk. parent_object_id.
inner join sys. objects so2 ON so2. object_id = fk. constraint_object_id.
WHERE.
so. type = 'U';.
OPEN fk_cursor;.
FETCH NEXT FROM fk_cursor INTO.
@ schema_name,.
@ table_name,.
@ fk_constraint_name;.
WHILE @ @ FETCH_STATUS = 0.
BEGIN.
IF @ enabled = 0.
SET @ cmd_txt = 'ALTER TABLE [' @ schema_name ']. ['@ Table_name'] NOCHECK CONSTRAINT ['@ fk_constraint_name']; '.
ELSE.
SET @ cmd_txt = 'ALTER TABLE [' @ schema_name ']. ['@ Table_name'] WITH CHECK CHECK CONSTRAINT ['@ fk_constraint_name']; ';.
PRINT @ cmd_txt;.
EXECUTE (@ cmd_txt);.
FETCH NEXT FROM fk_cursor INTO.
@ schema_name,.
@ table_name,.
@ fk_constraint_name;.
END;.
CLOSE fk_cursor;.
DEALLOCATE fk_cursor;.
END;.
GO.
IF OBJECT_ID ('[dbo]. [SetIndexEnabledStatus] ',' P ') IS NOT NULL.
DROP PROCEDURE [dbo]. [SetIndexEnabledStatus];.
GO.
CREATE PROCEDURE [dbo]. [SetIndexEnabledStatus].
(.
@ enabled bit.
).
AS.
BEGIN.
DECLARE.
@ schema_name sysname,.
@ table_name sysname,.
@ index_name sysname,.
@ cmd_txt varchar ( 8000);.
DECLARE idx_cursor CURSOR FOR.
SELECT.
sc. name AS schema_name,.
so. name AS table_name,.
si. name AS index_name.
FROM.
sys. objects so.
inner join sys. schemas sc ON so. schema_id = sc. schema_id.
inner join sys. indexes si ON so. object_id = si. object_id.
WHERE.
so. type = 'U'.
>AND si. index_id 1;.
OPEN idx_cursor;.
FETCH NEXT FROM idx_cursor INTO.
@ schema_name,.
@ table_name,.
@ index_name;.
WHILE @ @ FETCH_STATUS = 0.
BEGIN.
IF @ enabled = 0.
SET @ cmd_txt = 'ALTER INDEX [' @ index_name '] ON [' @ schema_name ']. ['@ Table_name'] DISABLE; '.
ELSE.
SET @ cmd_txt = 'ALTER INDEX [' @ index_name '] ON [' @ schema_name ']. ['@ Table_name'] REBUILD; '.
PRINT @ cmd_txt;.
EXECUTE (@ cmd_txt);.
FETCH NEXT FROM idx_cursor INTO.
@ schema_name,.
@ table_name,.
@ index_name;.
END;.
CLOSE idx_cursor;.
DEALLOCATE idx_cursor;.
END;.
GO.
These two stored procedures sorted out objects ( foreign keys and indexes ) from the system view. For each object dynamically formed a team to turn it on or off.
Use BCP to export / import data source database.
To export data, use the command utility ... Bulk copy program. ... Let's look at the format used by the command:.
@ ECHO OFF.
SET SourceSqlServerName = [REPLACE_SERVER].
SET SourceSqlDbName = [MY_SOURCE_DB_NAME].
SET TableName = [dbo. MY_FIRST_TABLE].
ECHO ******************************.
ECHO Migrating data for% TableName%.
ECHO ******************************.
bcp% SourceSqlDbName%. % TableName% out% TableName%. dat-n-S% SourceSqlServerName%-T.
IF ERRORLEVEL 1 GOTO ABORT.
As we can see, we need to register in the batch file server address, the name of the original database and in turn to overtake all the tables ( to save space, I exported a table [. dbo. MY_FIRST_TABLE]. ). At the end of the script will create the necessary dat- files for each prescription in the script table. All that's left - is to load our data into the target database, again using the BCP. Let's look at a script that helps in this simple problem:.
@ ECHO OFF.
SET DestSqlServerName = [REPLACE_SQLAZURE_SERVER].
SET DestSqlDbName = [REPLACE_AZURE_DB_NAME].
SET DestSqlUserName = [REPLACE_USERNAME].
SET DestSqlUserPassword = [REPLACE_PASSWORD].
SET TableName = [dbo. MY_FIRST_TABLE].
ECHO ******************************.
ECHO Migrating data for% TableName%.
ECHO ******************************.
bcp % YustSqlDbName. % TableName% in% TableName%. dat-n-S YustSqlServerName UYustSqlUserName % % %-E PYustSqlUserPassword.
IF ERRORLEVEL 1 GOTO ABORT.
As you can see the import process uses pre-prepared dat- files. Be very careful with the option -E. If we forget this option, then IDENTITY- fields are generated by the new values instead of values of the dat- file. In principle, this process of migrating a database in SQL Azure can be considered complete. And do not forget to run previously created auxiliary procedures. Before importing data, you must run hranimki like this:.
EXECUTE [dbo]. [SetForeignKeyEnabledStatus] 0.
GO.
EXECUTE [dbo]. [SetIndexEnabledStatus] 0.
GO.
After you import like this:.
EXECUTE [dbo]. [SetForeignKeyEnabledStatus] 1.
GO.
EXECUTE [dbo]. [SetIndexEnabledStatus] 1.
GO.
Thank you for your attention! .
Blogpost sources:. http://msdn. microsoft. com/en-us/gg282151. ,. http://msdn. microsoft. com/en-us/library/windowsazure/ee730904. aspx. ,. http://www. sqlazureperformance. com/2010/migrating-sql-server-database-to-sql-azure /.
Tuesday, May 22, 2012
The most expensive woman in Hollywood
Until quite recently, to the advanced Hollywood existed gender discrimination - the actresses ' fees, even with a worldwide reputation, were significantly lower fees to male colleagues. Today, the injustice done away with - the stars are the true. The authoritative American edition compiled a list of favorite people whose salary is between 15 and 20 million dollars per film.
Julia Roberts. is considered a pioneer in the ' case of understated fees '. Actress one of the first to earn the sum equivalent to those paid to male stars. Since then, as Julia woke up famous for his role as a prostitute in the movie ... The winner of ...
Reese Witherspoon. ... immediately after. starring in the film, Reese hit the top list of Hollywood stars. And for his role in the film ' Walk the Line ' in 2005. Home cinema was awarded the ' Oscar'. In addition to filming a movie, Witherspoon has two children, owns his own film company and produced films.
The presence of six children, engaging in social activities, participation in charity events did not become an obstacle to a successful creative career. Angelina Jolie. For several years one of the most beautiful women of our time headed a variety of ratings: the highest paid, most influential, the sexiest women in the world.
Kemeron Diaz. began his career as a model. But after the movie ' Mask ' in 1994. instantly rocketed to the top of Hollywood's Olympian. Since then, the actress starred in many top films from famous directors. Nicole Kidman. the first time topped the list of highest paid actresses in 2006. The actress was able to declare itself until after her divorce from Tom Cruise. Until then, Kidman did not take seriously any criticism, no spectators, no directors - considering its application to stellar spouse. After a divorce, career, Nicole quickly went up the hill, and the main female role in the film 'The Hours ' has brought award 'Oscar'.
Rene Zelveger. , Polyubishayasya audience primarily as Bridget Jones, the actress -round talent. The owner of ' Oscar ' proved to be a singer and dancer in the musical 'Chicago '. The heroine of ' Speed '. Sandra Bullock. once selected the title of Queen of Romantic Comedy with Meg Ryan and Julia Roberts.
44- year-old star is still in demand - her shooting days are planned for the next few years.
Star of ' Charlie's Angels '. Drew Barrymore. co-starred in the first 6 years of age, not anyone, but his Steven Spielberg. Girl difficult destiny, winning alcohol and drugs, 33 -year-old Drew - one of the most popular actresses in Hollywood. In addition, Barrymore tries himself as a director.
Halle Berry - a former ' Miss America ' and a friend of James Bond - the first and only actress to date African-American, which won Oscar for the lead female role. Glory of the actress brought such films as ...
Discuss.
Sunday, May 13, 2012
7 rules for electronic mailings
During testing, promotion channels. our service. , Turned out that the most appropriate channel at this stage are the mailing lists. For this we use as the basis of their own subscribers, and base of third-party resources ( forums, web portals).
And in the course of working with channel direct mail were born a few guidelines that may be useful for you:.
To find a contractor base of email addresses which you can use - look for specialized resources (forums, portals, e- mailing ). And even if the resource was not originally declared distribution services to negotiate - for example, we have one of the most effective bases were found in this way - just the owner of the service never really thought about this method of advertising and conducting a test mailing to us, I saw that people loyal to the resource .
Always Find out the size of the database of addresses, relevance, and how it is sending - the usual e-mail address or addresses within the service. We got on this negative experience, when a post- factum found that 60% of mailing consists of sending a message to the private boxes at the web portal and on the fact that users do not read.
Always Find out how long the delivery will occur and what measures are taken to verify that the mail reaches the recipient and does not get in the spam filters in e-mail systems and special blacklist spam servers. Subscribe to one million addresses may take a week or more for this reason.
Whenever there is a possibility - requires testing - partial mailing list subscriber base of different advertising messages, to select the best conversion rates on your website and converting into customers. By the way is necessary to distinguish these characteristics - greater number of hits on the website does not automatically mean a greater number of purchases or registrations, on the contrary a larger number of purchases, registrations in absolute terms, will bring another letter with a smaller percentage of hits to the site.
And most importantly - always insert (and especially in the test distribution ) parameters links to your site so you can keep track of the web according to analysts on how the links in the letter is most often passed, and what percentage end up registered or made a purchase.
Do you have any errors, advances in electronic mailing lists?.
Tuesday, May 8, 2012
Integrate Skype with a PBX (service 'Skype for SIP')
But now the problem is solved! . And for very funny money and even free.
This short video presentation tells you about the features of Skype integration with a variety of PBXs, as well as five very interesting advantages that Skype can provide your business.
Integrate Skype with a PBX.
ru.
And another interesting news.
Konftel confirmed the status of Siemens Advanced Partner.
Long-term cooperation of leaders of the world market of telecommunications equipment companies. Konftel. and Siemens was the key to another successful test. conference phones. Swedish manufacturer in the laboratory of German vendor.
Test results was confirmation of full compatibility cordless DECT conference Konftel 300W unit with telephone exchanges Siemens HiPath 3500/3800/4000 and conference consoles Konftel 50 and Konftel 60W with system phones Siemens series and Optiset Optipoint.
Thus, Konftel has once again successfully confirmed the status of Siemens Advanced Partner.
Saturday, May 5, 2012
Chapman - booed her students
In response to the provocative questions about the success of a bed, and author of ...
In St. Petersburg State University, Anna Chapman came to share their knowledge.
Sharing the secrets of his success with students SPSU Anna Chapman did not call.
- She suggested that - talk at the University of. - We have not denied.
Unveiled spy was going to give a lecture on ...
- Let's just Berkova 'll call what trifles? .
And prepared to ... Instead of bread and salt, Anna Chapman prepared posters with insulting allusions: ... As a true scout Anna Chapman entered a lecture at the back door. I had to get the protesters in the audience already whatman.
- We have nothing to learn from you - the students chanted in the back row, belatedly deploying posters.
- Well, if nothing, the door is open - spread her hands scout. And suddenly Superbad. - You do not know me at all. Everything you heard about me, this is information from the custom-made articles. But I still thank you. Have not faced with such aggression in the address. You lowered me down to earth.
- Thanks, we still stand up here, listen to.
During the lecture, Anna Chapman was distracted several times and asked to repeat silently protesting: ... Lecture was itself an ideology, the state and the spirit of. About how dwarfish Vatican dominion over the souls of millions, that replaced it came to the dictates of American democracy. And Russia should not copy their examples, but you need to become leaders.
- Things are obvious - students said in a conversation with the correspondent ... - Nothing new. Max Weber also wrote about the Protestant ethic as the spiritual core of capitalism. And the way Russia has sought to dispute the Westerners and the Slavophiles.
- And what should be a national ideology in Russia? .
Intelligence officer admitted that she does not know.
Therefore, the lecture to find the answer to that question - she explained. - Can you tell me?.
The first series of silent. And the rear, where all the students stood firm and with posters, asked him if Anna Chapman 's book ...
- You are a member of the organization with a similar name - said one of the protesters.
- It's a provocative question - has kept the intrigue scout. - I will not answer it.
After the lecture, student protestors came out with head held high. Those who remained, after all learned how to ...
- All the real talent has always punched - encouraged by a student who dreams to get on TV Anna Chapman. - Act is always from the heart and you will succeed.
- That is what everyone is saying that you have become famous through the bed is not true? .
Anna Chapman could not think what to say. Just shook her head.
In response to criticism spy smiling.
QUOTES:.
Students: What are the moral values of the people you are, and how this correlates with shooting for Maxim Magazine?.
Anna Chapman: I'm not ashamed. And I will not make excuses to you. I have a faith that can overshadow even the most intellectual and moral student from any university. And with this faith I will go to the people. Because it is a positive.
Since when do you educate people?.
Since I was released from prison, and I realized that besides Russian passport, I have not.
On the difference between the political and spiritual leader.
The political leader can be a leader or chief. And the man of whom are men, one who can not love and can not be assigned, the spiritual leader.
Can a woman in Russia to become president?.
I do not think that it is possible.
Discuss.
Thursday, May 3, 2012
Scientists have discovered evidence of ancient oceans on Mars
Scientists have found further evidence in favor of the fact that Mars was once (about 3 billion years ago) was filled with water - groundwater, lakes, rivers, hot springs - and, according to some models, even boasted its own ocean in the northern hemisphere.
New data MARSIS radar spacecraft Mars Express Orbiter, according to Jeremy Muzhino University of California at Irvine (USA ) and his colleagues argue in favor of Oceanus Borealis, transfers Kompyulenta.
Radar recorded the sediments in the geological region Vastitas Borealis thickness of about 100 m, which are located on the volcanic rocks. It is important to note that the rate of deposition of the dielectric constant has a value of 4-5, whereas the volcanic rocks - 9-10 and above. ( In pure ice, he is equal to 3.1. ) Scientists believe that such a low value can be explained only by the deposition of large deposits of water or sediment, mixed with plenty of ice.
Answering yes to the question of the existence of an ancient ocean, can not escape the following issues: where did the water? .
I should also mention that the lander Phoenix, which sat in the Vastitas Borealis in 2008, discovered deposits of water ice just a few inches under the ground.