Thursday, November 27, 2008
Hero Honda launches CHROME karizma
The keys to this very special bike were handed over to Hrithik Roshan by Pawan Munjal, managing director, Hero Honda Motors Ltd at a special function organised in the capital on Thursday.
Speaking on this momentous occasion Munjal, said, "The Hero Honda family is elated to have achieved the landmark figure of 15 million motorcycles in the shortest ever time-span.
"To celebrate this occasion, our R&D team has created a very special 15 millionth motorcycle - the customised all-chrome Karizma, a very stylish bike that truly befits our brand ambassador and style icon Hrithik Roshan."
He further added, "This achievement is a reflection of the success of our vehicles, which truly offer customers a combination of the most advanced technology, latest innovative designs and unmatched fuel-efficiency.
"We are very pleased that Hero Honda has been successful in setting new benchmarks for the global two-wheeler industry. This year, Hero Honda will be launching 8 exciting new products to consolidate our market leadership."
Hero Honda achieved the cumulative figure of 15 million two-wheelers in March 2006, in the shortest span of 21 years. The company has recently announced its third plant in Jaipur with an investment of Rs 320 crore (Rs 3.2 billion) and will be commissioned in a year. Capacity expansion of 900,000 units has also been undertaken in the company's existing plants with an investment of Rs 141 crore (Rs 1.41 billion).
Connecting Computers over an Intranet
Connecting Networks Over the Internet
Virtual Private Networking
Transport Layer Security
What is Domain Name System (DNS)?
• A set of servers called domain name servers (DNS) maps the human-readable names to the IP addresses. These servers are simple databases that map names to IP addresses, and they are distributed all over the Internet.
• There are two kind of computer address: IP address(192.168.46.34), domain name(www.abc.com)
• The browser contacts a DNS server to get the IP address. A DNS server would start its search for an IP address by contacting one of the root DNS servers. DNS is the primary system used to resolve host names on the Internet.
• The Domain Name System was first introduced in 1984.
• With DNS, the host names reside in a database that can be distributed among multiple servers
• The name system is based on hierarchical names in a tree-type directory structure.
• Domain names follow a format of domain name system.
• The Internet Network Information Center (InterNIC) controls the top-level domains.
What is TELNET?
The term telnet also refers to software which implements the client part of the protocol. TELNET clients have been available on most Unix systems for many years and are available for virtually all platforms. Most network equipment and OSs with a TCP/IP stack support some kind of TELNET service server for their remote configuration (including ones based on Windows NT). Recently, Secure Shell has begun to dominate remote access for Unix-based machines."To telnet" is also used as a verb meaning to establish or use a TELNET or other interactive TCP connection, as in, "To change your password, telnet to the server and run the passwd command". Most often, a user will be telneting to a unix-like server system or a simple network device such as a switch. For example, a user might "telnet in from home to check his mail at school". In doing so, he would be using a telnet client to connect from his computer to one of his servers. Once the connection is established, he would then log in with his account information and execute operating system commands remotely on that computer, such as ls or cd. On many systems, the client may also be used to make interactive raw-TCP sessions, even when that option is not available, telnet sessions are equivalent to raw TCP as long as byte 255 never appears in the data.
Introduction to wi-fi
What is Wi-Fi?
What is Bluetooth?
Wednesday, November 26, 2008
Honda CBF Stunner motorcycle
Basic specifications of the Honda Stunner CBF are as follows:
125cc, 11 bhpKerb Weight: 129 kgWheelbase: 1271mmFuel tank capacity: 10 litres
Tubeless tryesFront 80/100-17 and Rear: 100/90-77Front Brakes: 240mm Disc or 130mm DrumRear Brake: 130mm drum
Starting: Kickstart / Electric
5 speed transmissionTrip meter
Honda claims acceleration figures of 0-60 kmph at 5.2 seconds for the CBF Stunner. Take it with a pinch of salt, the motorcycle weighs 129 kg, and even the iconic Yamaha RX 100 could not do that. It will be good, we are sure though.
Apart from the CBF Stunner, the company also has lined up measures to roll out two more new motorcycle models in 2008. Plus, there is an 800 cc motorcycle from Honda in the pipeline for India, though details are sketchy at this moment. We hear the 800 cc motorcycle would be priced above Rs 10 lakh, and that is real close the just-launched Suzuki Hayabusa.
Honda had posted sales figures of of 9.07 lakh units in the previous fiscal, aims at selling as many as 3 lakh motorcycles and 7 lakh scooters this fiscal.
The bike major which had plans to come up with a new manufacturing facility seems to have put such plans in the backburner and is focusing on improving sales. The company currently boasts of a production capacity of 1.2 million units.
VoIP Gateways:
Information and Communication Technology
Tuesday, November 25, 2008
How Nanotechnology Will Work
Monday, November 24, 2008
Web-based scripting (PHP)
The Future of Home Networking
Proxy Servers and DMZ
• Web site
• Online business
• FTP download and upload area In cases like this, you may want to create a DMZ (Demilitarized Zone). Although this sounds pretty serious, it really is just an area that is outside the firewall. Think of DMZ as the front yard of your house. It belongs to you and you may put some things there, but you would put anything valuable inside the house where it can be properly secured. Setting up a DMZ is very easy. If you have multiple computers, you can choose to simply place one of the computers between the Internet connection and the firewall. Most of the software firewalls available will allow you to designate a directory on the gateway computer as a DMZ. Once you have a firewall in place, you should test it. A great way to do this is to go to www.grc.com and try their free Shields Up! security test. You will get immediate feedback on just how secure your system is!
Saturday, November 22, 2008
Configuring Virtual Memory
What is Virtual Memory
For example, if you load the operating system, an e-mail program, a Web browser and word processor into RAM simultaneously, 32 megabytes is not enough to hold it all. If there were no such thing as virtual memory, then once you filled up the available RAM your computer would have to say, "Sorry, you can not load any more applications. Please close another application to load a new one." With virtual memory, what the computer can do is look at RAM for areas that have not been used recently and copy them onto the hard disk. This frees up space in RAM to load the new application.
Because this copying happens automatically, you don't even know it is happening, and it makes your computer feel like is has unlimited RAM space even though it only has 32 megabytes installed. Because hard disk space is so much cheaper than RAM chips, it also has a nice economic benefit.
Friday, November 21, 2008
Aigo Vodafone McLaren Mercedes MP5 player
It has an excellent battery life which shall give you ariound 10 hours of continuous audio playback and around 4 hours of video playback. It ahs a weight of 185 gms and other stats as 133mm x 87mm x 154 mm.
Wednesday, November 19, 2008
Network monitoring
Major design areas of network monitoring:
1. Access to monitored informations.
2. Design of monitoring mechanism.
3. Application of monitored information
Network monitoring Architecture - Informations:
The information that should be available for network monitoring can be classified as
- Static
- Dynamic
- Statistical
Static information characterizes the current configuration and the elements in the current configuration such as number and identification of ports on a router. This information will change only infrequently.
Dynamic information is related to events in the network, such as a change of state of a protocol machine or the transmission of a packet on a network.
Statistical information may be derived from dynamic information, such as the average number of packets transmitted per unit time by an end system.
Collection and storing of monitored information:
Static information is typically generated by the element involved.
- Dynamic information is generated, collected and stored by the network element responsible for the underlying events or by the remote monitor.
- Statistical information can be generated by any system that has access to underlying synamic information.
Suzuki A-Star car launched
The A-Star has been jointly designed by Maruti Suzuki and Suzuki Motor Corporation. The design is mainly European with some Indian accents. Designed by two Indians, Saurabh Singh and Kumar Gogu, at Maruti Suzuki India's research and development team, the A-Star has a design that derives its inspiration from an elephant's trunk, its eyes and curves of flower petals.
The Suzuki launch coincided with the unveiling of other car makers’ vehicles at the Pragati Maidan. While General Motors launched its premier sports utility vehicle, Chevrolet Captiva, expected to take on the Honda CR-V and Mitsubishi Pajero, German giant Volkswagen said that it would introduce new models including Jetta and Phaeton in 2008.
Quick Specs:
Powertrain: Font engined, front wheel drive 1.0L engine
Tyres: 205/45 R17
Transmission: 5 speed manual
Length: 3580mm
Width: 1680mmHeight: 1400mm
Wheelbase: 2360mm
Tuesday, November 18, 2008
Listening to Live365 Broadcasts
What is Live365?
Monday, November 17, 2008
Cowon O2 PMP is coming out In the Japanese Market
Google is taking questions via IPhone
Hey IPhone Lovers.... Thats a great news for you. The Giant Google is about to release a new application for iPhone that will allow you to make a search through voice. For that you will need to speak the search term inside the application to get the search results. For a minute, you might feel why this move by Google!! The only reason I can make out is that this application will be convenient while you are on the move lets say driving or maybe you want to give some rest to your fingers by not pecking out your search query on the Apple IPhone's keyboard.
This free application is expected to be out this Friday through Apple iTunes store. The users are required to place the phone to their ear and ask the question like "Who is the best batsmen in the world?" The application will encode the sound to a digital stream and sent to Google's servers which will decode the digital stream again to the words spoken and then pass them on to the Google search engine.
Now the most important thing is : whether the results are displayed quickly or not. As expected, the results will be displayed in few seconds only on the fast wireless network and may also include local search information taking advantage of IPhone feature which can determine the location of the user. Moreover, Google executives are claiming that the search results will be accurate enough to be useful who wants o avoid typing their search queries on the Apple IPhone's touch screen virtual keyboard.
Just like other Google products, this application is available to consumers for no extra money and the Giant is planning to make this application for other phones as well.
Genetic Engineering info
It involves the isolation, manipulation and reintroduction of DNA into cells or model organisms, usually to express a protein. The aim is to introduce new characteristics or attributes physiologically or physically, such as making a crop resistant to a herbicide, introducing a novel trait, or producing a new protein or enzyme, along with altering the organism to produce more of certain traits.
Examples can include the production of human insulin through the use of modified bacteria, the production of erythropoietin in Chinese Hamster Ovary cells, and the production of new types of experimental mice such as the OncoMouse (cancer mouse) for research, through genetic redesign.
Since a protein is specified by a segment of DNA called a gene, future versions of that protein can be modified by changing the gene's underlying DNA. One way to do this is to isolate the piece of DNA containing the gene, precisely cut the gene out, and then reintroduce (splice) the gene into a different DNA segment.
Since a protein is specified by a segment of DNA called a gene, future versions of that protein can be modified by changing the gene's underlying DNA. One way to do this is to isolate the piece of DNA containing the gene, precisely cut the gene out, and then reintroduce (splice) the gene into a different DNA segment. Daniel Nathans and Hamilton Smith received the 1978 Nobel Prize in physiology or medicine for their isolation of restriction endonucleases, which are able to cut DNA at specific sites. Together with ligase, which can join fragments of DNA together, restriction enzymes formed the initial basis of recombinant DNA technology.
Ichthyosaurs
This is a high resolution model of Ichthyosaurs with high resolution texture.
Volkswagen Bora
Volkswagen Bora or VW Jetta, the name depends on model and country was introduced in 1979 by Volkswagen. This is the fourth generation model of Volkswagen Bora.
Highly detailed and neatly textured 3d model comes with standard materials for 3dsmax 8 and finalrender materials for 3dsmax 2009.
Creating a Virtual Stink
Cellular Telephone Basics
When showing a cellular system we want to depict an area totally covered by radio, without any gaps. Any cellular system will have gaps in coverage, but the hexagonal shape lets us more neatly visualize, in theory, how the system is laid out. Notice how the circles below would leave gaps in our layout. Still, why hexagons and not triangles or rhomboids? Read the text below and we'll come to that discussion in just a bit.
Notice the illustration below. The middle circles represent cell sites. This is where the base station radio equipment and their antennas are located. A cell site gives radio coverage to a cell. Do you understand the difference between these two terms? The cell site is a location or a point, the cell is a wide geographical area. Okay?
Most cells have been split into sectors or individual areas to make them more efficient and to let them to carry more calls. Antennas transmit inward to each cell. That's very important to remember. They cover a portion or a sector of each cell, not the whole thing. Antennas from other cell sites cover the other portions. The covered area, if you look closely, resembles a sort of rhomboid, as you'll see in the diagram after this one. The cell site equipment provides each sector with its own set of channels. In this example, just below , the cell site transmits and receives on three different sets of channels, one for each part or sector of the three cells it covers.
Is this discussion clear or still muddy? Skip ahead if you understand cells and sectors or come back if you get hung up on the terms at some later point. For most of us, let's go through this again, this time from another point of view. Mark provides the diagram and makes some key points here:"Most people see the cell as the blue hexagon, being defined by the tower in the center, with the antennae pointing in the directions indicated by the arrows. In reality, the cell is the red hexagon, with the towers at the corners, as you depict it above and I illustrate it below. The confusion comes from not realizing that a cell is a geographic area, not a point. We use the terms 'cell' (the coverage area) and 'cell site' (the base station location) interchangeably, but they are not the same thing.
WFI's Mark goes on to talk about cells and sectors and the kind of antennas needed: "These days most cells are divided into sectors. Typically three but you might see just two or rarely six. Six sectored sites have been touted as a Great Thing by manufacturers such as Hughes and Motorola who want to sell you more equipment. In practice six sectors sites have been more trouble than they're worth. So, typically, you have three antenna per sector or 'face'. You'll have one antenna for the voice transmit channel, one antenna for the set up or control channel, and two antennas to receive. Or you may duplex one of the transmits onto a receive. By sectorising you gain better control of interference issues. That is, you're transmitting in one direction instead of broadcasting all around, like with an omnidirectional antenna, so you can tighten up your frequency re-use"
"This is a large point of confusion with, I think, most RF or radio frequency engineers, so you'll see it written about incorrectly. While at AirTouch, I had the good fortune to work for a few months with a consultant who was retired from Bell Labs. He was one of the engineers who worked on cellular in the 60s and 70s. We had a few discussions on this at AirTouch, and many of the engineers still didn't get it. And, of course, I had access to Dr. Lee frequently during my years there. It doesn't get much more authoritative than the guys who developed the stuff!"Jim Harless, a regular contributor, recently checked in regarding six sector cells. He agrees with Mark about the early days, that six sector cells in AMPS did not work out. He notes that "At Metawave (link now dead) I've been actively involved in converting some busy CDMA cells to 6-sector using our smart antenna platform. Although our technology is vendor specific, you can't use it with all equipment, it actually works quite well, regardless of the added number of pilots and increase in soft handoffs. In short, six sector simply allows carriers to populate the cell with more channel elements. Also, they are looking for improved cell performance, which we have been able to provide. By the way, I think the reason early CDMA papers had inflated capacity numbers were because they had six sector cells in mind."Mark says "I don't recall any discussion of anything like that. But Qualcomm knew next to nothing about a commercial mobile radio environment. They had been strictly military contractors. So they had a lot to learn, and I think they made some bad assumptions early on. I think they just underestimated the noise levels that would exist in the real world. I do know for sure that the 'other carrier jammer' problem caught them completely by surprise. That's what we encountered when mobiles would drive next to a competitors site and get knocked off the air. They had to re-design the phone.Now, what about those hexagon shaped cell sites?Mark van der Hoek says the answer has to do with frequency planning and vehicle traffic. "After much experimenting and calculating, the Bell team came up with the solution that the honeybee has known about all along -- the hex system. Using 3 sectored sites, major roads could be served by one dominant sector, and a frequency re-use pattern of 7 could be applied that would allow the most efficient re-use of the available channels."
A cell cluster. Note how neatly seven hexagon shaped cells fit together. Try that with a triangle. Clusters of four and twelve are also possible but frequency re-use patterns based on seven are most common.Mark continues, "Cellular pioneers knew most sites would be in cities using a road system based on a grid. Site arrangement must allow efficient frequency planning. If sites with the same channels are located too closely together, there will be interference. So what configuration of antennas will best serve those city streeets?""If we use 4 sectors, with a box shape for cells, we either have all of the antennas pointing along most of the streets, or we have them offset from the streets. Having the borders of the sites or sectors pointing along the streets will cause too many handoffs between cells and sectors -- the signal will vary continously and the mobile will 'ping-pong' from one sector to another. This puts too much load on the system and increases the probablity of dropped calls. The streets need to be served by ONE dominant sector."Do you understand that? Imagine the dots below are a road. If you have two sectors facing the same way, even if they are some distance apart, you'll have the problems Mark just discussed. You need them to be offset.
Sunday, November 16, 2008
RAID
Digital video is another prime example of the right time to use SCSI. Because of the demanding storage and speed requirements of full-motion, uncompressed video, most video workstations use a SCSI RAID with extremely fast SCSI hard drives.
Freedom of the Airwaves
How Internet Radio Works
A college student in Wisconsin listens to a disc jockey in Jamaica play the latest rapso (calypso rap) music. A children’s advocacy group unites its geographically diverse members via private broadcast. A radio listener hears an ad for a computer printer and places an order immediately using the same medium on which he heard the ad. All of this is possible with Internet radio, the latest technological innovation in radio broadcasting since the business began in the early 1920s.
Internet radio has been around since the late 1990s. Traditional radio broadcasters have used the Internet to simulcast their programming. But, Internet radio is undergoing a revolution that will expand its reach from your desktop computer to access broadcasts anywhere, anytime, and expand its programming from traditional broadcasters to individuals, organizations and government.
WorldSpace
Sirius Satellite Radio
Web Development
It’s not uncommon for those who deal in full time web design to have individuals contact them for a site design, but have absolutely no idea what they want. Furthermore when the designer questions them the response might be, “I don’t know, just make it look nice.”
Let’s not forget the core values or mission of the business. Many business owners have no idea how to answer those kinds of questions. They may stare blankly for a moment or two and there’s no more time for further deep thought so they go back to action – without answers.
In many cases it is possible to answer some of the questions needed, but it may require taking time away from a familiar setting. It may also require more time than you think you want to give.
If you can get to a place of concentrated contemplation you are likely to find yourself stripping ideas to their core to find out what your business is trying to accomplish and what your ultimate goals might be.
As with almost any project you can turn frustration around if you will just take the time to come to terms with your vision.
Sometimes we spend so much time ‘doing’ we never stop to ask the question, “Why?”
This process can be a bit like taking a bus that drives around the park. You keep looking at the flowers and the park bench and long to sit in the quiet shade of a tree and just absorb the calming atmosphere. You know they will have a positive effect on you, but for some reason you just can’t seem to find the energy to get off the bus.
It seems to me there are some sites that are misguided or rarely guided that could benefit from the process of self-evaluation. These sites may look nice, but there is a sense of disconnection that may not be easy to identify, but it’s fairly obvious to visitors.
Creative energy is at a minimum while business owners simply tackle what seem to be the most urgent details.
As more people gravitate to online business there needs to be a shift in the thinking of how one goes about doing business online. In many ways it can’t be approached in the same way a traditional business is developed, yet that is typically the way many new web commerce ventures choose to tackle the subject.
You may discover your business will be more successful if you take some time for rigorous reflection. The time set aside can be a bit like an architect that takes the time to develop plans for a new building. You wouldn’t expect the architect to simply tell a construction crew to, “Go out there and build – something.”
Work at ‘building’ your online business in a comprehensive way. Your effort can develop a firm foundation for long-term success.
Thursday, November 13, 2008
The Internet: Computer Network Hierarchy
Most large communications companies have their own dedicated backbones connecting various regions. In each region, the company has a Point of Presence (POP). The POP is a place for local users to access the company's network, often through a local phone number or dedicated line. The amazing thing here is that there is no overall controlling network. Instead, there are several high-level networks connecting to each other through Network Access Points or NAPs.
Monday, November 10, 2008
Windows XP Tips
Disabling Display of Drives in My Computer
This is trick you can play on your geek friend. To disable the display of local or networked drives when you click My Computer go to :
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer
Now in the right pane create a new DWORD item and name it NoDrives. Now modify it’s value and set it to 3FFFFFF (Hexadecimal) Now press F5 to refresh. When you click on My Computer, no drives will be shown. To enable display of drives in My Computer, simply delete this DWORD item. It’s .reg file is as follows:
REGEDIT4
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer]
“NoDrives”=dword:03ffffff
WWBan Shutdowns
This is a neat trick you can play on that lamer that has a huge ego, in this section I teach you, how to disable the Shut Down option in the Shut Down Dialog Box. This trick involves editing the registry, so please make backups. Launch regedit.exe and go to :
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer
In the right pane look for the NoClose Key. If it is not already there then create it by right clicking in the right pane and selecting New > String Value.(Name it NoCloseKey ) Now once you see the NoCloseKey in the right pane, right click on it and select Modify. Then Type 1 in the Value Data Box.
Doing the above on a Win98 system disables the Shut Down option in the Shut Down Dialog Box. But on a Win95 machine if the value of NoCloseKey is set to 1 then click on the Start > Shut Down button displays the following error message:
This operation has been cancelled due to restrictions in effect on this computer. Please contact your system administrator.
You can enable the shut down option by changing the value of NoCloseKey to 0 or simply deleting the particular entry i.e. deleting NoCloseKey.
Instead of performing the above difficult to remember process, simply save the following with an extension of .reg and add it’s contents to the registry by double clicking on it.
Change Internet Explorer’s Caption
Don’t like the caption of Internet Explorer caption? Want to change it? Open the registry editor and go to
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Main.
In the right pane create a new String Value names Window Title (Note the space between Window and Title). Right click on this newly created String Value and select Modify. Type in the new caption you want to be displayed. Restart for the settings to take place.
Exiting Windows the Cool and Quick Way
Normally it takes lot of time just Shutting down Windows, you have to move your mouse to the Start Button, click on it, move it again over Shut Down, click, then move it over the necessary option and click, then move the cursor over the OK button and once again (you guessed it) click.This whole process can be shortened by creating shortcuts on the Desktop which will shut down Windows at the click of a button. Start by creating a new shortcut( right click and select New> Shortcut). Then in the command line box, type (without the quotes.)
‘C:\windows\rundll.exe user.exe,exitwindowsexec’
This Shortcut on clicking will restart Windows immediately without any Warning. To create a Shortcut to Restarting Windows, type the following in the Command Line box:
‘c:\windows\rundll.exe user.exe,exitwindows’
This Shortcut on clicking will shut down Windows immediately without any Warning.
Disable MS-DOS Prompt
To disable the MS-DOS command prompt in Windows 95/98/Me open the registry and navigate to either [HKEY_CURRENT_USER\
Software\Microsoft\Windows\
CurrentVersion\Policies\
WinOldApp] or [HKEY_LOCAL_MACHINE\Software\Microsoft\
Windows\CurrentVersion\Policies\WinOldApp] and then either modify or create a new DWORD value named Disabled and set the value data to 1. Now exit the registry, and restart your computer for the change to take effect.
New Informations
Convert To Basic And Dynamic Disks In Windows Xp
Windows XP Professional supports two types of disk storage: basic and dynamic. Basic disk storage uses partition-oriented disks. A basic disk contains basic volumes (primary partitions, extended partitions, and logical drives).
Dynamic disk storage uses volume-oriented disks, and includes features that basic disks do not, such as the ability to create volumes that span multiple disks (spanned and striped volumes).
General Notes
Before you change a basic disk to a dynamic disk, note these items:
You must have at least 1 megabyte (MB) of free space on any master boot record (MBR) disk that you want to convert. This space is automatically reserved when the partition or volume is created in Microsoft Windows 2000 or Windows XP Professional. However, it may not be available on partitions or volumes that are created in other operating systems.
When you convert to a dynamic disk, the existing partitions or logical drives on the basic disk are converted to simple volumes on the dynamic disk.
After you convert to a dynamic disk, the dynamic volumes cannot be changed back to partitions. You must first delete all dynamic volumes on the disk, and then convert the dynamic disk back to a basic disk. If you want to keep your data, you must first back up or move the data to another volume.
After you convert to a dynamic disk, local access to the dynamic disk is limited to Windows XP Professional and Windows 2000.
If your disk contains multiple installations of Windows XP Professional or Windows 2000, do not convert to a dynamic disk. The conversion operation removes partition entries for all partitions on the disk with the exception of the system and boot volumes for the current operating system.
Dynamic disks are not supported on portable computers or Microsoft Windows XP Home Edition.
Before you change a dynamic disk back to a basic disk, note that all existing volumes must be deleted from the disk before you can convert it back to a basic disk. If you want to keep your data, back up the data, or move your data to another volume.
How to Convert a Basic Disk to a Dynamic Disk
To convert a basic disk to a dynamic disk:
1) Log on as Administrator or as a member of the Administrators group.
2) Click Start, and then click Control Panel.
3) Click Performance and Maintenance, click Administrative Tools, and then double-click Computer Management.
4) In the left pane, click Disk Management.
5) In the lower-right pane, right-click the basic disk that you want to convert, and then click Convert to Dynamic Disk.
NOTE:You must right-click the gray area that contains the disk title on the left side of the Details pane. For example, right-click Disk 0.
6) Select the check box that is next to the disk that you want to convert (if it is not already selected), and then clickOK.
7) Click Details if you want to view the list of volumes in the disk.
8 ) Click Convert.
9) Click Yes when you are prompted to convert, and then click OK.
How to Convert a Dynamic Disk to a Basic Disk
To change a dynamic disk back to a basic disk:
1) Back up all the data on all the volumes on the disk you want to convert to a basic disk.
2) Log on as Administrator or as a member of the Administrators group.
3) Click Start, and then click Control Panel.
4) Click Performance and Maintenance, click Administrative Tools, and then double-click Computer Management.
5) In the left pane, click Disk Management.
6) Right-click a volume on the dynamic disk that you want to change to a basic disk, and then click Delete Volume.
7) Click Yes when you are prompted to delete the volume.
8 ) Repeat steps 4 and 5 for each volume on the dynamic disk.
9) After you have deleted all the volumes on the dynamic disk, right-click the dynamic disk that you want to change to a basic disk, and then click Convert to Basic Disk.
NOTE:You must right-click the gray area that contains the disk title on the left side of the Details pane. For example, right-click Disk 1.