Sunday, August 31, 2008

Rfid Traceless Truth

Writen by Sally Bacchetta

Life usually seems to me to be a series of Rorschach tests. We each interpret events and patterns through the filter of our personal history, and no two people experience the same stimulus in the exact same way.

RFID means "cutting-edge technology" to one and "the end of personal freedom" to another. "Big Brother" to one and "transportation efficiency" to another. "Professional development opportunity" to an RFID software engineer and "layoff" to a no-longer-necessary inventory clerk.

But now and then the ink blot is so obvious that it transcends individual interpretation. Or in the case of Canadian technology firm Creo, it is the absence of the ink blot that is so clear.

Creo has developed Traceless technology, an RFID tagging system which is described on their website as "visually and chemically undetectable, even by forensic trace methods".

On the same website, Creo details potential applications for Traceless as "Traceless taggant can be applied to the surface of articles during manufacturing. Or, more commonly, it can be mixed in paper or ink during the production of packaging, envelopes, and labels."

What?!

Do you want visually and chemically undetectable track-and-trace technology mixed into paper or ink during production? Paper and ink... that's magazines, personal letterhead, business cards, maps, loan applications, medical information forms, social security cards, coupons, prescriptions... U.S. currency. (Ironically, even Rorschach tests.)

Before you write and tell me that I'm overreacting, integrate the fact that Creo has already signed an agreement with label manufacturer Acucote to incorporate Traceless technology into Acucote labels. This is not a boardroom Development Objective, folks. This is a stealth tracking reality.

EPCglobal's Guidelines on EPC for Consumer Products establish the need for Consumer Notice and Consumer Choice. The guidelines are published on the EPCglobal website, and include:

1. Consumer Notice

Consumers will be given clear notice of the presence of EPC on products or their packaging. This notice will be given through the use of an EPC logo or identifier on the products or packaging.

2. Consumer Choice

Consumers will be informed of the choices that are available to discard or remove or in the future disable EPC tags from the products they acquire."

By design, Creo's Traceless taggant clearly circumvents both consumer notice and consumer choice.

I appreciate our general need for increased security and anti-counterfeiting measures. I am as concerned about the purity of my prescription and the safety of this country as any other reasonable person is. I have consistently supported the strengths of RFID technology in appropriate applications, and I will continue to do so.

But I can not interpret this particular picture with anything but alarm.

Plain, "old-fashioned" RFID tags -- visible and detectable -- offer a more sophisticated level of security than we have ever had before. They are unobtrusive, customizable, incorruptible and virtually impossible to counterfeit.

Creo's Traceless powder is not only unnerving and completely unnecessary, it is decidely counterproductive.

The nature of RFID technology inevitably raises public and personal sensitivity. In order for the collective "us" to gain from RFID, we must be partners in pursuit of transparent truth.

No matter how you look at it, transparent tags and transparent truth are mutually exclusive.

Sally Bacchetta - Freelance Writer/Sales Trainer

Sally Bacchetta is an award-winning freelance writer and sales trainer. She has published articles on a variety of topics, including RFID, selling skills, motivation, and pharmaceutical sales.

Visit her RFID blog for an exploration of the ethical and social considerations of RFID.

Saturday, August 30, 2008

Your Guide To Battery Types

Writen by Chris Robertson

Every mobile electronic device we own runs on battery power, yet we take batteries for granted - at least until they run out of juice. No matter what kind of device battery - laptop battery, cell phone battery, camcorder battery, remote control battery - you need, it's helpful to know the various kinds of battery types and their uses.

Gel Battery - A gel battery is also known as a sealed lead acid (SLA) battery, and its distinguishing feature is that it doesn't have to be kept upright in order to work. An SLA battery continues to perform in extreme conditions, such as hot temperatures, or under vibration. SLA batteries are often used in wheelchairs, scooters, and uninterruptible power sources. It's best to keep an SLA battery charged, or to charge it more often than you would other types of batteries.

NiMH - NiMH stands for Nickel Metal Hydride and is the battery of choice for many cell phones, camcorders, digital cameras, GPS systems, PDAs, and other personal electronics. NiMH batteries are also used in hybrid cars. An NiMH is a rechargeable battery that is similar to a nickel cadmium (NiCd) battery, but that has double or triple the capacity of a NiCd battery. It's best not to overcharge NiMH batteries.

NiCd - NiCd stands for Nickel Cadmium, and is a type of rechargeable battery commonly used in toys, electronic devices, and power tools. Although some people prefer NiMH batteries to NiCd batteries, a NiCd battery provides virtually the same level of voltage throughout its lifetime, and costs less than an NiMH battery.

LiION - LiION stands for Lithium Ion, and is one of the newest rechargeable batteries. Although they are more expensive than other types of rechargeable batteries, LiION batteries have more capacity and are often used in wireless phones, camcorders, and notebook computers. The downside of LiION batteries is that the length of their life commences from the date of manufacture, rather than from the number of times the battery is charged and discharged. It's best to regularly charge LiION batteries and store used batteries in the refrigerator. (Allow them to warm to room temperature before using them, though.)

Alkaline - Alkaline batteries are not rechargeable with a battery charger, but offer a large current over a long period of time. These batteries are often used in CD players and portable radios.

Carbon Zinc - Carbon Zinc batteries are known for their reliability over long periods of time in low-drain situations, such as for garage door openers or clocks. A Carbon Zinc battery is not rechargeable.

Chris Robertson is an author of Majon International, one of the worlds MOST popular internet marketing companies on the web. Learn more about Your Guide to Battery Types or Majon's Electronics directory.

Friday, August 29, 2008

Buying A Computer Ask These 3 Questions

Writen by Adam Fletcher

1. Why do you need a computer?

Whether you are a new user or advanced one, whether this is your first computer or second (or even third), be clear as to why you want a computer before you even think of buying one.

How will you use your computer? Are you only interested in browsing the Internet and checking e-mail? Do you plan to use your PC as a programming machine? Do desktop publishing or video editing feature on your agenda? Or is it a gaming rig? What is a computer? http://www.hardwaresoftwarearticles.com

Consider these factors before stepping into a hardware shop.

The basic components of a computer system are the motherboard (containing the processor and memory), keyboard, mouse, monitor, diskette drive, CD-ROM drive and hard drive.

In addition, there are several other types of devices you may or may not need. A trackball, joy stick, modem, tape drive, zip drive, printer, plotter, scanner, sound card and speakers, television card and video capture card, to name a few.

Whether you buy these will depend on what you need the computer for and which software applications you intend to use.

Remember the golden rule: the fastest or most expensive computer is not necessarily the one you need.

Finally, the length of time that you plan to own the computer before replacing it will also help determine which computer to buy.

2. What is your budget?

This is the next thing you need to be certain of. How much are you willing to spend on a PC?

After you arrive at a figure, keep a margin of a few thousands. It will give you some room for flexibility. If you are short on money when you buy your computer and cannot add all the peripherals you want, be smart.

Buy as much as you can afford. Don't cut corners on the main system unit (monitor, processor, memory, disk space).

Remember, you want the computer to last at least four years. You don't want to run out of disk space or memory in the very first year, all because you trimmed down on the memory or got a smaller hard drive.

Hard disk capacity matters a great deal as it takes no time for data to fill the available space. A 40 GB hard disk is sufficient disk space, but 80 GB is the standard recommendation.

Random Access Memory is the amount of memory available for use by programmes on a computer. One of the important factors to ensure the smooth running of your system is the memory available.

The more the memory, the better it is. Make sure you can upgrade your computer's memory as and when required.

The RAM chip comes in capacities of 128, 256, 512 MB, even 1 GB. Most computers function efficiently with 256 MB RAM, though a 512 MB RAM does offer you an edge.

Hold off on the printer or a software application and other accessories that you really don't need right away. You shouldn't have any problem installing these after the original purchase has been made. Just ensure you buy components that are compatible with your system.

3. Should you go for a branded PC or an assembled one?

Assembled machines are popular because they are more economically priced.

Branded PCs cost around 35 to 40% more than their assembled counterparts.

Besides, you can choose your own specifications with assembled PCs. You are not forced to accept a rigid component configuration. You cannot customise a branded PC to suit your exact requirements.

With the same price that you would pay for a branded piece, you will be able to own a superior assembled PC.

Make sure the components purchased for the assembled PC are original. Take along an informed, reliable assembler to purchase the components so that you are not fooled by counterfeit parts.

The advantage of a branded PC is the reliability of the brand, the after sales service and the technical support. On the flip side, the after sales services and repairs offered by the brands are a tad expensive and not prompt most times.

Don't forget to look at the warranty. Generally, a warranty period of a year is normal for all major parts of the PC. But there are good brands that offer either more years or the option of an additional payment to top up the warranty period.

Talk to your friends and colleagues who have assembled PCs. Ask them about their experience and recommendations on whom to approach. Question them as to what happened when they had a problem. Was the individual easy to access? Did he offer prompt service? Does their computer give a lot of trouble?

If possible, meet two or three individuals before you finally zero in on one.

Spend some time on these three issues and you will be all set to buy your very own PC!

Adam Fletcher is the webmaster of Hardware Software Articles http://www.hardwaresoftwarearticles.com.

Have You Downloaded Firefox Yet

Writen by Matthew Keegan

The internet browser market has long been dominated by Internet Explorer, but a new kid on the block -- Firefox -- is making strong inroads against the Microsoft product's dominance. To date, over 75 million copies of Firefox have been downloaded by users around the world. Here are some reasons why you should replace Explorer with Firefox.

1. No Pop Ups. Unlike Explorer, Firefox has a nifty pop up blocker in place. No more garbage to fill your screen as you search the internet with Firefox. Can't say the same for Explorer, however.

2. Your Security. Spyware, trojan horses, and ActiveX controls are stopped in their tracks. Explorer limits through unreliable third party downloads.

3. Quick Downloading. Downloading files is a snap as they are done quickly and painlessly. Once Firefox completes the download you will be prompted to clean up [remove] unneeded files.

4. Tabbed Browsing. Surfing the internet is easier as users can open up one window and set tabs for quick access to multiple web pages. Specifically, all your browser windows actually work within one window, each marked by tabs that you can click in and out of with ease.

5. Tons of extensions, themes, and plug-ins. You can customize Firefox to work the way you want it to work. Download an ad blocker, a new toolbar, a special theme, or include plug-ins such as Adobe Reader, Windows Media Player, Shockwave, Flash Player, and more.

Firefox is not perfect, but it goes a long way further than Explorer in giving users an enjoyable internet experience. For this reason alone, it is worth being downloaded by you.

Matt Keegan is The Article Writer who covers topics from Aviaition to Zoos. Please visit his site for additional samples of his work: http://www.thearticlewriter.com

Thursday, August 28, 2008

Quality Document Scanning

Writen by Leon Chaddock

Finding quality document scanning can be difficult. In many cases, that is because there are just too many services to consider that it is hard to find the one that will fill your needs right the first time. But, there are many opportunities for you in document scanning. From the latest and greatest technology that makes it so easy to do yourself to the latest companies that offer opportunities for you to store you documents safely, you have choices in document scanning.

Document scanning is the process by which you take something in real life and put it into the computer or onto the internet. Document scanning can be done by using a scanner which is like a small sized photocopier. It takes the image that you have placed on it and puts it onto your computer. In this case, document scanning is a great way to share pictures or information through the internet when the documents are not originating from the web or the computer itself.

Document scanning can also be done through many services. One such service will allow you to use image scanning to place your important documents into files and files on the web. This can help you to stay organized without the messy paperwork to deal with. These services will help you stay organized as well as help you minimize your workload. Other document scanning services offer you the ability to scan documents and send them from a remote location. Document scanning is a great way to provide communication.

To find document scanning services for you, all you need to do is to look towards the web. Compare the companies that offer the services you are after to find the best in quality and in cost for your needs. Then, you can choose the best document scanning that will provide you with highly authentic work each and every time.

For more information please see http://www.document-scanning-info.co.uk

Wednesday, August 27, 2008

Hl7 Pmi 7 Implementation Tips

Writen by Peter Gillogley

HL7 is a health data communication standard. HL7 version 2 covers the exchange of patient demographics (otherwise known as Patient Master Index or PMI). HL7 V2 also covers other types of data such as admission details, scheduling, orders and results.

1. HL7 Interfaces are not plug and play

Unfortunately the HL7 V2 standard is interpreted in different ways by implementers and software developers. The outcome is two similar but not exactly matching interfaces that require analysis in order to identify the differences.

2. Translation of HL7 messages

Once the differences have been identified, the messages from one application needs to modified before they can be processed by the other application. Some translations may be relatively simple, such as moving a particular field from one place in the message to another.

For example the sending system may place an insurance number in the insurance segment (IN1). However another vendor may not support that segment and instead expects the insurance number to be placed in the patient identification segment (PID) or perhaps in a proprietary segment.

It is also common that fields may be needed to be moved based on business rules. Fortunately specialist software called interface engines are quire good at this task. For example the iCan Integrator software from Sun Microsystems (formally Seebeyond) provides this kind of functionality.

3.Code table mismatching

HL7 messages are littered with coded data. For example the martial status field contains a coded value such as 'M' for Married, 'D' for divorced and so on. However the receiving system may expect '1' for married and '2' for divorced. National standards have gone a long way to address this issue. Still, the odds are that one or more fields in your PMI message will need to be mapped. Fortunately interface engines are also good at this task.

4.HL7 PID Identifier List

The patient identification segment has three fields dedicated to identifiers. PID-2 Patient ID (external ID), PID-3 Patient ID (internal ID) and PID-4 Alternative Patient ID. The recommended use of these fields has changed with successive revisions of HL7 (HL7 V2.1, HL7 V2.2, HL7 V2.3, HL7 V2.3.1, HL7 V2.4). Different vendors have interpreted these fields differently. Almost everyone puts the patient's medical record number (MRN) in PID-3.

If the scope of the interface is more than one hospital, then the MRN for one facility are distinguished from MRNs for other facilities by a facility code (passed as a subcomponent of the PID-3 field). The facility code may need mapping (see Tip 2!).

In another twist, the sending system may handle multiple hospitals (e.g. a patient administration system covering several hospitals) but the receiving system may only want to know about patients from just one facility. A typical example is a independent (but HL7 interfaced) applications such as an ICU clinical application. If the ICU system only manages patients from one hospital, it will only want HL7 messages for patients at that hospital. It may even only want HL7 messages for patients admitted to the ICU. Interface engines are good at the filtering, routing and translating of messages require to make this happen.

5.Repeating fields

Fields that repeat, such as the address field (PID-11) may also cause problems. The challenges include

  • Different systems support different numbers of repeats. For example the sending system may support 7 addresses and the receiving system may support only 2.
  • The sending system may add, update or delete the repeating field. Deleting a field can cause headaches for the downstream system. Sometimes this is overcome by the downstream system replacing the entire set of repeating fields each time.

6.Repeating segments

Segments that repeat, such as 'Next of Kin' (NK1) and alerts/allergies (AL1/IAM) pose similar challenges to repeating fields.

  • Different systems support different numbers of repeats. For example the sending system may support 7 patient contacts (sent as 7 NK1 segments) and the receiving system may support only 2.
  • The sending system may add, update or delete the repeating field. Deleting a field can cause headaches for the downstream system. Sometimes this is overcome by the downstream system replacing the entire set of repeating fields each time.

7.Shared fields

It is not unusual that the fields interfaced from the sending system can also be modified in the receiving system. Basically if the receiving system was not interfaced, then all of the information would need to have been duplicated by manually typing into the application. Unless the capability to edit data fields covered by the HL7 interface is 'removed' from the receiving system, changes made to the data (e.g. adding or changing an allergy, deleting a patient contact) by users in the receiving system, may be list with the next HL7 message received, process and stored for that patient.

Fortunately persistent and diligent interface analysis can overcome these and other challenges. HL7 PMI interfacing is one of the most common and best understood health application interfacing challenges. By applying these tips you will have made a good start along the road to a successful HL7 PMI interface implementation.

For more information on the HL7 standard and HL7 services please visit the Gillogley Services web site.

Peter Gillogley is the Director of Gillogley Services.

Computers Amp Internet

Writen by Sajjad Butt

One can easily say that these are the inventions of the century. It has done what one could not imagine. It has open the doors of the world to the world.

What are you thinking now? Whatever you do, just put that in a search engine, you will be amazed to see the data on that, its amazing. Information on fingertips, one just has to type that.

At this day and age, the current of terms of literacy says that a person who doesn't know about computers is not literate. It simply shows as to how deeply this is involved in every walk of life, just name it.

There is a tendency of humans to accept change with time or not accept it at all. Change does cause stress. See the bright aspect. These inventions have changed the face of the world.

Businesses are stretched from one corner of the world to another. Who says that you have to hire someone in your local area to get your work done, you can get a person have your work done on the portals that serve as a bridge between the company and the skilled.

Do you want to express yourself? Do you want to do business? Do you want to set a school? Whatever you think, you can do that here. Its a whole new world, with its own set of rules.

Its because of this the world has really shrunk into a small ball, where people can visit the jungles of Africa sitting in their homes, roaming on the islands on a starry night, being on top of the highest mountains. I believe as things are going, in a few years people will be getting transported through lines, just a vivid imagination, but thats how we see things have been coming into being. Who could have thought that we could see the world moving in a box, TV.

This is all really amazing and really cool. I just heard a statement a few days ago and was making it a part of my data bank by repeating it again and again that "Internet Is A Multi Billion Dollar Industry".

Another thing that is pretty remarkable is that the older generation is not much into using computers and have been greatly affected by it, cause they thought that they could not adapt to this change. I believe we must have something made for them that they could use it with a whole lot ease and comfort, in terms of gadgets or programs, could be anything, its just a thought.

One just can write so much on this. These are some thoughts that I wanted to share. Hope you enjoyed.

Tuesday, August 26, 2008

How To Choose An Id Card Printer

Writen by Marcela Devivo

Choosing an identity card printer can be easy or difficult depending on your needs and requirements. Id card printers are one of the most important components in an ID card system and deciding which one to use is an important process that shouldn't be taken lightly. A myriad of different printers are available, some more complex and others that are as simple as loading the paper and pushing a preset button.

An ID card printer should come with software; if it doesn't, take it back, as you can't install your printer without the software. The software is normally fairly intuitive and user-friendly, and if you need help, many times the place where you purchase your photo ID system will have support readily available. The printer essentially takes data and encodes it onto the magnetic strip on the back of your ID card. It also prints the high resolution photo (and holographic overlamination, UV overlay, text, and other security features) you take with your digital camera.

Speaking of extra security features, this is one of the four most important things you should take into consideration when you're looking for an ID card printer. If you are looking for top of the line, high security printers, you should probably purchase a printer that has UV overlay and holographic overlamination. Keep in mind that these are necessarily more expensive, but worth the extra dollars for added security.

The second thing you need to decide is whether you want monochromatic or color images. This can make a difference in price and the type of printer you buy; there are printers that offer both color and monochromatic options, and there are those that offer only one color, such as black. In this case your image and card would be black and white.

The third thing to think about is whether you want a single or double-sided card. A double-sided card is more secure and might fit a large company or industry that requires greater security in their work environment. In other words, there is a reason your driver's license is double-sided. Small businesses, colleges, schools, and other educational institutions often use single-sided ID cards as they are more cost efficient and the extra side generally isn't needed.

Fourth and last, you should consider whether you want encoding on your cards, such as smart card or proximity card capabilities, or magnetic stripes. Institutions like banks, hospitals, and schools are excellent candidates for proximity cards, contactless smart cards, and magnetic stripe cards. . www.alphacard.com

Monday, August 25, 2008

Hidden Video Cameras

Writen by Damian Sofsian

Hidden Video Cameras are stealth devices that are used to record activities in public places, offices or even homes. They are preferably of tiny sizes and are designed to be hidden in the surrounding environment.

People are increasingly using Hidden Video Cameras in their premises as security devices. Hidden Cameras are used in offices to supervise employees. Their screen is mostly placed in the guard cabin or the manager's office. Public places like airports, railway terminals and buses have managed to actually thwart some criminals using such hidden video cams. People even use Hidden Cameras in their houses to keep surveillance over their children's caretakers.

These cameras can be hooked to a VCR or a computer in the security office or cabin. Visuals are continuously recorded by these cameras and can be played on the screen. Hidden Video Cameras need to have a very high picture quality and frame rate because the entire recording is done through a miniature pinhole lens.

Hidden Video Cameras can be both wireless as well as wired. Wireless cameras use two 9-volt batteries for their use. Both black and white and color cameras are available. The black and white cameras are a bit cheaper and also provide higher quality pictures.

There are several designs of video cameras available in the market. The basic purpose of every design is to hide the fact that they are in fact video cameras. Video cameras can be disguised as table lamps, clocks, smoke detectors, cell phones, wristwatches and even buttons. Such disguised video cameras have a very tiny lens and are battery operated. Hidden video cams may cost from $100 to $400, depending on their fabrication and functions.

Despite the tremendous assistance hidden cams provide in preventing crime, their use has always been controversial. People subjected to such hidden scrutiny find their modesties challenged. In some places, the use of hidden video cams is banned and in almost all other places, there are proper legislative guidelines to use such cams.

Hidden Cameras provides detailed information about hidden cameras, hidden security cameras, hidden video cameras, wireless hidden cameras and more. Hidden Cameras is the sister site of Security Cameras Web.

Microphone Stands

Writen by Eric Morris

Microphone stands are used as the base for placing your microphones. They are commonly used by the musicians while performing in shows. They help you in placing the microphone in the stand kept as fixed. Microphone stands come up with new innovative designs in the recent time.

Quality, innovation and various designs in the stands are the factors that are needed by all the music professionals and other people who use the microphone. Most of the microphone stands are designed with round-base stands. The most common models that are designed recently are new: quick release models and onstage microphone stands. All these stands are 5/8 inches and use 27 standard American threads with locking washer and a solid-cast end.

Some of the major types of microphone stands are round base mic stand, boom combo stands, tripod base stands and quick release round base. These models are well designed with a great quality. These stands are normally ranged around $30. The price range usually differs slightly from each model, always resulting with a consistent quality. They are available for you in different color combinations, most commonly in black.

The Miceze M1 clamping microphone base stand is another type of stands which clamps and locks to rims and stands. There are also microphone stands which can be adjusted to any heights. The OnStage adjustable desktop microphone stand is one of the commonly used stand types which are used for adjusting the stands to any height. It has designed with adjustable-height shaft and locking clutch.

Konig & Meyer (K&M) and Hercules are the major manufacturers of microphone stands. Other various microphone stands brands are Karaoke microphone stands, Proel microphone stands, Caymon microphone stands and Gooseneck microphone stands. More sophisticated arrangements have been done in Ultimate microphone stands, with the boom and stand combination. In general, these kind of microphone stands are a bit more expensive than the ordinary stands. The price range of Ultimate microphone stands is usually around $20 to $60. Usually, these stands are very compatible and with easy-to-use facilities.

Microphones provides detailed information on Computer Microphones, Karaoke Microphones, Microphone Stands, Microphones and more. Microphones is affiliated with Discount Computer Accessories.

Sunday, August 24, 2008

A Guide To Purchasing Your Next Personal Computer

Writen by T Potter

Purchasing a personal computer is no easy task. There are hundreds of features, lots of people trying to sell you the 'perfect' one and then there is the fact that you really don't know what you need or want your computer to do. But, while it all may be confusing, educating yourself about personal computers before you head out looking for one is one of the best ways to get a great deal and know what you purchase is what you want and need. Here are some key tips to make the search easier.

• Start your search at home. Pesky salespeople can definitely convince you that you should purchase a computer based on the dollars behind it for them. What you need to know, though, is what features mean, what the computers can do and what you want from them. All you need to do is to check out the options online. Whether you purchase online or not, you'll be able to see a feature, click on it for more information about what it is, and then make a decision to determine if it is the right choice for you.

• Personal computers are not all the same. Knowing a little about each make and model is important. If you are used to using Windows and Microsoft, you may have a harder time understanding how Apple works. Not that it is a good or bad choice, but you'll need to get yourself updated on the various versions and systems out there.

• Determine your needs. While it is nice to have a fully loaded personal computer, this is likely to break the bank. You'll often need to choose between features and for that you need to know what you want and what you need. Analyze your needs. Do you need help managing your finances? Look to programs to help. Do you and your family spend a lot of time online? Then look for a faster modem or go with high speed. Do you need specific games, programs, or software?

• Compare and compare. When it comes to personal computers, everyone has something different. Compare and know what an average price is for the system that you want. And, know what adding options on will do to that price. Look at and compare features to price as well as brands to other brands.

Getting the best deal on personal computers is not hard when you are able to know what you are looking for and choose wisely.

This article was written by T.Potter. You can visit Discount Computers for further information and cheap computer resources.

Oh Boy A New To Me Toy

Writen by Mike Bryant

I am a very happy man this morning. It feels like Christmas and Santa has been good. You see, I made a purchase this past weekend that has me very excited—I now have another computer to play with. Now those of you who read my articles regularly or who know me personally know that I am, er, somewhat of a geek. So you may not be very surprised that I am so excited over the purchase of a new computer. But, that's the thing: it isn't new. It's over 20 years old and I paid only $5 for it.

There was a huge 50-mile long yard sale this past weekend. Not all, but many houses, churches and businesses along the route of KY Highway 52 had decided to participate. For those who love to shop for used clothing or go antiquing, it was wonderful. I am neither. However, I was bored, so the kids and I were driving along the highway checking out the scene. On a fluke, I decided to pull in to a school and see what sort of stuff they had to sell. My heart leapt when I saw a Commodore Vic-20 computer sitting on a table. It was in the original box, with original owner's manual and a programming guide. Also, there was for sale a Commodore tape recorder so programs could be saved to cassette tape. Wow. The owner told me that he wanted $5 for both the computer and the tape recorder. What a deal! I bought it without hesitation.

Is this computer useful? Not really. The Vic-20 had only 3.5 KB memory capacity when it was introduced in 1981 and could only be programmed in BASIC and machine language. Many calculators today have more processing power than this. So it serves no useful purpose—I can't use it for my software business; I can't even use it to check email.

So, why did I spend my $5 on it? That's easy to answer… I remember with misty-eyed nostalgia the long hours of my youth spent in front of a TV screen (this was when you plugged your computer into a TV, no monitor needed), typing away on some computer program. Many weekends I would not go to bed until the wee (very wee) hours of the morning happily hacking away. I had a TI-99/4a computer in my youth and was hopelessly addicted to it. A friend had a Commodore 64 computer that we would hack on, and another friend had a Vic-20. Back in the days when Bill Gates was trying to get someone, anyone, to listen to his crazy business idea, my friends and I were busy typing away on some program that was the focal point of our lives at the time.

Of course times have changed and so have I, for the most part. Sometimes, even today, I find the morning sun coming up to remind me that I should probably stop banging away on a keyboard and get some sleep. It is truly a joy when one realizes that he has been blessed with the gift of his greatest hobby becoming a career.

As always, if you have any questions or suggestions for future articles, please email me at mike@MikeBryant.com.

Mike Bryant has worked as a professional software developer for over ten years. A born entrepreneur, he currently owns Centrant, LLC, a software consulting firm specializing in custom software for small businesses. He currently resides in Jackson, Kentucky with his wife, two kids, and five computers. For more information, please visit MikeBryant.com

Saturday, August 23, 2008

The History Of Video Surveillance From Vcrs To Eyes In The Sky

Writen by Lucy P. Roberts

Mention video surveillance and most people think of video cameras mounted in the corners of train stations and banks or private detectives video taping an erring spouse for a messy divorce case. The truth is that the history of video surveillance is much more complex and goes back much farther than most people realize.

If you consider video in the simplest of terms, video surveillance began with simple closed circuit television monitoring. As early as 1965, there were press reports in the United States suggesting police use of surveillance cameras in public places. In 1969, police cameras were installed in the New York City Municipal Building near City Hall. The practice soon spread to other cities, with closed circuit television (CCTV) systems watched by officers at all times.

Analog beginnings spur video surveillance

When video cassette recorders hit the market, video surveillance really hit its stride. Analog technology using taped video cassette recordings meant surveillance could be preserved on tape as evidence. The seventies saw an explosion around the world in the use of video surveillance in everything from law enforcement to traffic control and divorce proceedings.

England installed video surveillance systems in four major Underground Train Stations in 1975 and began monitoring traffic flow on major highway arteries about the same time. In the United States, the use of video surveillance wasn't quite as prevalent until the 1980's for public areas, but store owners and banks quickly understood the value of it.

Businesses that were prone to theft, including banks, mini-marts and gas stations, began mounting video surveillance systems as a deterrent and in hopes of apprehending thieves, particularly in high crime areas.

The insurance industry also found video surveillance compelling – worker's compensation fraud, bogus accident claims and a variety of other cases began to turn in the industry's favor when they could provide tapes of supposedly disabled workers doing the limbo at a family reunion.

For the private citizen, analog technology was primarily used in the 1970's and 1980's for capturing the worst side of human nature – cheating spouses and poor parenting. Private detectives were able to provide more graphic and compelling evidence of affairs and parental stupidity with film than with still shots, and video tapes became frequent evidence in family court.

The drawback in many cases was that after a while, owners and employees would become complacent and not change the tapes daily or the tapes would wear out after months of being re-used. There was also the problem of recording at night or in low light. While the concept was good, the technology hadn't yet peaked. The next step was the Charged Coupled Device camera (CCD), which used microchip computer technology. These new cameras broadened the practical applications of video surveillance by allowing low light and night recording possible.

In the 1990's another advancement in the history of video surveillance made great strides in practicality – Digital Multiplexing. When digital multiplexer units became affordable it revolutionized the surveillance industry by enabling recording on several cameras at once (more than a dozen at time in most cases). Digital multiplex also added features like time-lapse and motion-only recording, which saved a great deal of wasted videotape.

By the mid-1990's, ATM's across the United States and in most parts of the world had video cameras installed to record all transactions. After the first attack on the World Trade Center in February of 1993, the New York Police Department, FBI and CIA all install surveillance cameras throughout the area. Soon many countries are also using either CCTV or video taped surveillance to cover major sporting events that could be potential hot spots, including the World Cup Soccer games at Giants Stadium in 1994.

Digital makes video surveillance faster, clearer, more efficient

Digital video surveillance made complete sense as the price of digital recording dropped with the computer revolution. Rather than changing tapes daily, the user could reliably record a month's worth of surveillance on hard drive because of compression capability and low cost.

The images recorded digitally were so much clearer than the often grainy images recorded with analog that recognition was immediately improved for police, private investigators and others utilizing video surveillance for identification purposes. With digital technology you could also manipulate the images to improve clarity even further by adding light, enhancing the image, zooming in on frames, etc.

The second wave of increased video surveillance corresponded with the emergence of digital in the United States. From 1997 on, police departments across the country installed more and more video surveillance cameras in public buildings, housing projects and areas like New York's Washington Square Park. The NYPD also began using mobile surveillance vans at political rallies and other large gatherings (including festivals and parades) under the auspices of the Technical Assistance Response Unit (TARU).

In-home use soars with advent of nanny cams

As more women went back to full-time careers in the 90's, digital video surveillance manufacturers found a niche market that hadn't previously been tapped – monitoring what was going on at home when parents were gone. The nanny cam was a huge success, providing a way for parents to observe what nannies and housekeepers were really doing while at home with the kids.

The popularity of these cameras pushed the industry to develop ever-smaller, higher resolution cameras that could be hidden almost anywhere. The result was a boon to industry development, with new versions of digital video surveillance cameras coming out nearly every month.

9/11 redefines video surveillance for the future

Nothing changed the concept of or the public's awareness of video surveillance as much as the tragic events of September 11, 2001 when the World Trade Center was attacked by terrorists. Where once people saw video surveillance as an issue that might never affect them, it was now an issue of immediate and lasting importance.

Software developers began refining programs that would enhance video surveillance, including facial recognition programs that could compare various key facial feature points in order to match recorded faces to known mug shots or photographs of terrorists or criminals. While the earlier versions weren't always reliable, the later versions became more refined and were phased into use by law enforcement in some areas. In May of 2002, the United States Parks Service installed face recognition software on the computer video surveillance cameras at the Statue of Liberty and Ellis Island.

That same year, the Sydney International Airport in Australia installed SmartGate, an automated border crossing system used for all airline crew members. Using photo biometrics, the video surveillance systems scans the crew member's face and compares it to the passport photo and confirms the match in less than ten seconds, speeding the border process markedly.

In December of 2003, Royal Palm Middle School in Phoenix, Arizona installed face recognition video surveillance as a pilot program for tracking missing children and registered sex offenders. It has split the community, but is supported by many in favor of it as a potential way to track abductors and child molesters.

The Internet revolution in video surveillance

The internet has enabled video surveillance to be instituted virtually anywhere and be watched from anywhere in the world. With satellites bouncing signals around the globe, you can now watch anyone anywhere from your laptop. The eye in the sky is a reality with digital streaming video.

Sadly, the least common denominator in streaming video is the peek-a-boo industry of amateur porn sites that have proliferated on the web, but these real-time streaming videos use the same technology as many genuine surveillance operations.

Streaming video is set up as a remote system so that you can monitor your site from anywhere in the world with Internet access because the images are video archived on a remote web server. The quality is outstanding, with high compression (1800:1 in some cases) for storage and features like motion-activation and email alerting when there is activity if you wish. The Internet has truly revolutionized video surveillance by removing all boundaries for viewing anywhere in the world.

What does the future hold for video surveillance?

The newest trendy, must-have fun gadget for consumers these days is the picture phone that can instantly send snapshots and streaming video to family and friends with just a click. What those fun television ads don't say is that those telephones can just as easily be used for video surveillance. Nearly everyone has a cell phone in their hands these days, so someone standing on a street corner is so unremarkable that virtually anyone could be filming you without your knowledge.

Rather than mounting obtrusive cameras, future law enforcement agencies may begin using these phones as integrated devices, combining video surveillance with public phones in one package for 24/7 public watch dogging. Police officers and federal agents may eventually be issued phones with streaming video so that they can immediately send pics of suspects they are tailing back to a database for matching against a face recognition program. When new Amber alerts are issued, video clips could be sent to all law officers quickly and efficiently.

It's clear that with digital technology and streaming video we've moved into the era of being able to conduct comprehensive video surveillance and store the resulting evidence indefinitely. We can reach around the world or across the street with surveillance equipment, but we are still making advances, as the new video cell phones clearly illustrate. The future is sure to see even greater strides that will eventually become part of the history of video surveillance.

This article on the "The History of Video Surveillance" reprinted with permission.

Copyright © 2004-2005 Evaluseek Publishing.

About the Author
Lucy P. Roberts is a successful freelance writer providing practical information and advice about everything related to video surveillance and related topics. Her numerous articles include tips for saving both time and money when shopping for video security products; equipment reviews and reports; and other valuable insights. Find important information about deploying surveillance cameras and wireless security cameras when you visit Video-Surveillance-Guide.com today!

Friday, August 22, 2008

Benefits Of Portal Content Management

Writen by Balaji B

Organizations need to provide timely, relevant information to customers, partners, and employees anywhere in the world, to meet today's business requirements. Some of the hurdles that the organizations face in achieving this are IT bottlenecks, information getting lost, irrelevant and outdated information. If these problems are not looked at properly, then this will lead to escalating costs and erode customer satisfaction which will be a great loss for the organization. One good solution for all these problems is to create and deliver highly relevant content on a portal.

Companies can deploy a unified content and portal infrastructure to meet its business goals. This infrastructure should have tools that can unify content and infrastructure between portals to provide a consistent user experience and tools that can empower non-technical users within the organization to create, manage, and publish their own information to enterprise portals. In addition, the tools enable distribution of trusted, up-to-date, and accurate information to support multiple portal initiatives including partner extranets, and employee intranets and add content intelligence to increase the relevance and targeting of information for end users.

Problems that arise due to IT bottlenecks in the content contribution process and problems due to administrative overhead in the portal publishing process can be solved by empowering non-technical business users to contribute content to the portal. When you need to provide a unique infrastructure for the portals of partners, employers, and customers, you can unify the content and content infrastructure between portals to provide a consistent user experience. When end users need to access multiple applications and repositories for all of their content, content across enterprise applications can be integrated and delivered to accessed portals. Portal content management solutions not only empower non-technical users to within your organization to create and publish their own portal content but also ensures that the information published is relevant and personalized to serve multiple portal audiences

Some of the key benefits of portal content management include the ability to manage more content assets at lower cost, publish portal content faster and improves the reach of relevant content to the appropriate audiences. In addition, portal content management also empowers non-technical users to easily publish content on their own, increase online collaboration with partners or customers, and achieves better, faster integration of content via integrations with enterprise applications.

Portal content management software provide a simple, web-based user interface for creating and publishing content to portals, to empower non-technical, line-of-business users to create, manage, and publish their own content. The Portal content management software also provides a powerful navigation system for editing and updating content within the portal. Portal content management solutions ensure that only relevant content is delivered to each audience based on an enterprise taxonomy that drives content tagging and categorization for creation and powerful attribute search within the portal. This ensures that the content and metadata published are mapped to personalization rules created and deployed in the enterprise portal.

Powerful attribute finders of Portal content management software enable end users to easily locate content within the enterprise taxonomy that is exposed as intuitive, browseable categories in the enterprise portal. The enterprise content management platform of Portal content management software provide robust enterprise content management services such as workflow, versioning, lifecycle management, and security. Enterprise integration services provided by Portal content management solutions enable easy integration of transactional data from enterprise applications such as ERP, CRM, etc.

To access online version of the above article, go to http://www.content-management-junction.com/portal-cm.html

To learn how to create, manage and publish content using different types of content management systems, solutions & softwares visit http://www.content-management-junction.com

Hidden Cameras

Writen by Damian Sofsian

Hidden Cameras are covert camera devices that are used to keep surveillance over a particular area. They are usually installed at hidden places or cleverly disguised in other unsuspicious articles. The camera continuously records images in its field of vision, which can be retrieved and seen on a computer or TV monitor. Both simultaneous as well as recorded telecasts are possible.

The major use of Hidden Cameras is security. Almost all department stores, banks, hospitals, airports, casinos, etc. have Hidden Camera security systems. These cameras are connected to a monitor in the security cabin, which is continuously manned. Several cameras can be hooked onto the same monitor forming a CCTV network. CCTV Hidden Cameras are very popular security devices.

For home use, smaller Hidden Cameras are available, which are also called as spy cams or nanny cams. They are installed at secret places inside the homes so that people can keep a watch over their children's nannies or caretakers of senior citizens while they are not at home.

Earlier Hidden Cameras used to be big devices which were not easy to conceal. But present-day cameras are so small that they can even be disguised as a shirt button. The most important component of the camera is its lens, which must be kept clear so as not to obtain muddled images. Lenses are available in miniature sizes so that the size of the camera itself can be very small. The beauty of a Hidden Camera is that it can have a clear field of vision without itself being seen.

Hidden Cameras also have many other uses. Such cameras are installed on traffic signals in order to control traffic. People running down signals can be nabbed by viewing them on the screen. Even impending accidents can be avoided.

However, the use of Hidden Cameras is also a controversial issue. Many people think a Hidden Camera is an invasion of privacy. Though Hidden Cameras have managed to book several shoplifters, the very aspect that Hidden Cameras treat everyone as guilty is gaining controversy. Another major controversy is the use of Hidden Cameras in private places such as hotel bedrooms and restrooms, and using the images for pornographic purposes over the internet. The use of Hidden Cameras is bound by several legislations, which differ from state to state. Despite that, Hidden Cameras are being progressively used all over the world for security and crime prevention.

Hidden Cameras provides detailed information about hidden cameras, hidden security cameras, hidden video cameras, wireless hidden cameras and more. Hidden Cameras is the sister site of Security Cameras Web.

Thursday, August 21, 2008

Rfid A Smart Tag Primer

Writen by Dennis Bacchetta

Good things come in small packages. This familiar cliché usually refers to precious stones, but today it's taken on new meaning, in that small things are now protecting items we deem valuable.

Analysts estimate that the retail industry loses US $50B a year to theft and up to ten times that much to counterfeiting. High-end products such as cosmetics, fragrances and pharmaceuticals are most likely to be stolen or counterfeited. Many retailers and manufacturers believe that this big problem may have a tiny solution – RFID smart tags.

RFID (Radio Frequency Identification) is an automatic data capture technology that offers unparalleled accuracy in inventory control and supply chain management. Although RFID is a relative newcomer to the media spotlight, the technology has been quietly working its way into our culture and into our lives since it was drafted by the military 60 years ago.

The US Department of Defense first used RFID to track military aircraft during World War II. Since then, this compelling technology has been used extensively in highway toll collection, building security, library circulation, parcel delivery and airport luggage transportation.

What exactly is RFID and how does it affect the future of packaging?

RFID functions as a network of microchip "smart tags" and receivers. Each smart tag is embedded with a unique electronic product code (EPC) and a micro-antenna. Once assigned, the EPC becomes a DNA-like marker for the item, identifying it from every other item in the world. When a tagged item passes within range of a reader, the reader retrieves the EPC via radio waves, identifies the item and its exact location, and relays this real-time information to a central computer. Taken together, the series of transactions comprise a comprehensive record of the tagged item's movement from point of origin to point of sale.

The greatest promise of RFID lies in its application versatility. Smart tags can be affixed to either individual products or to pallets containing multiple units, and can be "read" through most materials. RFID readers can scan multiple items at one time, making them functionally superior to traditional, uni-task bar code scanners.

Scientists at the Massachusetts Institute of Technology (MIT) Auto-ID Center began to explore commercial applications of RFID in 1999. Wal-Mart, The Gillette Company and Proctor & Gamble were among the first to conduct pallet-level pilot tests. They quickly found that RFID offers improved supply chain visibility and more accurate inventory forecasting. Because RFID does not require line-of-sight operations (contrary to manual bar code scanning) the end users achieved improved inventory control with reduced labor costs.

Encouraged by their success, British retailers Marks & Spencer and Germany's Metro AG quickly adopted RFID applications in their production and distribution channels. The US Department of Defense, Benetton, CVS, Home Depot, Gap, Target, Kohl's, Tesco, Coca Cola and Albertsons have all begun incorporating RFID into their supply chain operations. In 2004 Wal-Mart issued a mandate that their Top 100 suppliers become RFID compliant by 2005, and the FDA plans to convert to item-level RFID distribution tracking by 2007.

In spite of strong industry support for RFID, widespread adoption of the technology has been slow. One reason for the delay is the lack of uniform standards for network and data management. For example, smart tags are currently available in low, high or ultra-high frequency versions, with read ranges of as little as a few inches to as much as 30 feet. AIM Global is a consortium of RFID developers and suppliers who are working to establish global RFID standards. Their goal is to educate manufacturers and suppliers about the potential benefits of RFID, and to provide the education and resources necessary to realize ROI from the use of this technology.

Cost and quality concerns have further dampened enthusiasm for RFID. Tag failure rates are reported to be as high as 20% to 30%. At an average cost of $.30 per tag, many suppliers find the prospect of item-level tagging prohibitive.

So far, RFID compliance has been the responsibility of suppliers. Retailers have generally refused to accept any price increases resultant from RFID start-up expenses. As a result, suppliers have had to either absorb the cost of becoming RFID compliant or risk losing lucrative commercial contracts.

However, as RFID becomes the norm manufacturers will look for converters who can provide pre-tagged packaging that is market-standard compliant and ready for entry into the RFID regulated supply chain.

Technology is inherently evolutionary. The logistics of RFID are changing rapidly, with ongoing advancements in ink, labels and methods of smart tag attachment. In a future article I will explore specific developments in converting techniques and the impact of this compelling technology on the packaging industry.

Copyright ©2005 by Dennis Bacchetta. All rights reserved.

Dennis Bacchetta is the Marketing Manager at Diamond Packaging, a leading folding carton and contract packaging supplier. He frequently writes on a variety of topics including industry news and technical issues.

You may contact him at dbacchetta@diamondpkg.com or visit the Diamond Packaging website.

Computer Service Agreements Looking Beyond The First Find

Writen by Joshua Feinberg

It seems that everyone is offering computer service agreements. Most IT consulting firms are capable of telling you what you need for your company, but not so many can actually combine expertise and hands-on training with invaluable diagnostic tools and speedy service all at prices your company can afford. These important attributes are what you should look for in your computer service agreements.

A Firm That Believes Fully In Its Claims

Anyone in business is familiar with how frustrating it can be when a computer system fails; you don't want to choose any random consulting firm, and particularly those without professional-looking computer service agreements that show a sense of responsibility and firm belief in the services provided. The firm you choose should be able to fix your problems the first time and follow through with the claims made in the original agreement.

Look For A Back-Up Plan

Broken networks and computers are a daily occurrence in the world of technology. You can prepare for these phenomena by backing up your data on secure servers. Planning ahead like this with back-up can ensure you get your information back again when disaster strikes. A good IT consulting firm will help you design your office from the beginning with this back-up contingency in mind. You should look for this feature as a part of reliable computer service agreements.

The Right Design From The Start

Your best bet at avoiding catastrophe is to have your consultant design a good network from the inception of your business and give you present and future support through computer service agreements. Work stations, digital hubs, phone jacks and all other ports and devices need to be in the best places for your particular office. Having everything in its place will speed up network activity and ease communication within your office. Knowing you have someone to rely on that knows your office inside and out is another benefit.

Even with the best networking plan, you will run into problems. A good computer consulting service offered through computer service agreements will be standing by, even in the middle of the night.

Copyright MMI-MMVII, Computer Consulting 101. All Worldwide Rights Reserved. {Attention Publishers: Live hyperlink in author resource box required for copyright compliance}

Joshua Feinberg, co-owner of Computer Consulting 101, gets computer consulting businesses more steady, high-paying consulting clients. Now you can too. Just sign-up now for your free access pass to these field-tested, proven computer consulting secrets at Computer Consulting 101.

Tuesday, August 19, 2008

Digital Camera Printer Making The Printing Process Easier

Writen by Ismael Tabije

Gone are the days of the box-camera – it is the age of digital technology and digital cameras have taken over the entire range of photography. However, at its early stages, digital photography had eclipsed the most exciting aspect of seeing what you have clicked on photographic prints. Things have changed and various digital camera printers with many unique and useful features are now available to take care of this deficiency

As these digital camera printers do not need a computer to give you the prints, you can print directly from the camera and this makes it very convenient and portable. However, deciding which printer, out of the hundreds flooding the market, would suit you best is the most important question. Given below are the special features and other information relating to these cameras that will help you make the right choice

In order to get prints at home, digital camera printers have special features ranging from paper sensors that recognize photo media to built-in editing tools. The other special features are given below

• Memory Card Slots: If you have a memory card slot, all that you have to do is to insert your camera's memory card and print. You don't need a computer or any cables.

• Color LCD screen: You can see the photos on a color LCD screen before you print.

• Front-panel buttons: If you want to preview, edit or remove the red eyes, you should choose a printer that has front-panel buttons for this purpose.

• Photo proof sheets: Thumbnail images on a printed page can be displayed on photo proof sheets to enable you to preview and choose the photos you wish to print.

• One-touch connections: You can have one-touch connections to your printer, TV, and PC if you place your camera in a built-in dock for printing directly from your camera. The other advantage is that you can recharge your batteries every time you connect

Besides considering the above factors you should also consider the following paper-handling factors before you decide which digital camera printer you wish to buy.

• Capacity: It is cumbersome to keep on adding paper to the printer. As such the number of sheets a printer can hold is important. Generally personal printers hold between 100 and 300 sheets.

• Versatility: Choose the printer that can print on the type of paper you wish to use. Some printers cannot print on certain types of papers that other printers can.

• Paper size: Your choice of a printer should be such that it can handle letter (8 1/2" x 11") and legal (8 1/2" x 14") sizes, as well as borderless 4" x 6" and 5" x 7" photo paper, panoramic paper, and envelopes.

• Image Quality: The prices of the printers of color photographs, though high in the beginning, have now come down and are within the reach of the average buyer but you must ensure that the printer can deliver photo realistic results, which should be as close to real photographic prints as possible.

• Print Resolution: For fine details and smooth gradation the print resolution should be about 2,400 x 1,200 dpi and this would be more than sufficient.

These digital camera printers store the images we capture on a memory storage device like a memory stick, a memory card, or even the camera's built-in memory. There are many people who would also like to have actual copies of their photographs. It is a matter of choice and depending on your needs you can choose the best digital camera printer. The above-mentioned features will help you in making the right choice.

The writer, Ismael D. Tabije, runs the website, http://www.bestlaptopnotebookdeal.com , where one can buy cheap laptop and notebook computers of top brands like Acer, Apple, Compaq, Dell, HP, IBM, Sony and Toshiba. The site also offers tips on buying laptops, ink cartridges, computer rentals, choosing PDAs, and care of your laptop batteries.

Monday, August 18, 2008

A Brief History Of Computer Based Training

Writen by Natalie Aranda

Computer Based Training or CBT is now widely adopted in education, corporate training for learning any subject from math, history to sales skill, customer support and project management. The driving force behind the maturity of CBT industry, however, has been aviation industry.

In the 1980's, Computer based training and simulation were introduced to pilot training programs to reduce the training cost and avoid the safety issue in on-site training. The Aviation Industry Computer-Based Training Committee (AICC), an international association of technology-based training professionals, oversees and develops guidelines for aviation industry in the design, implementation, delivery, and evaluation of CBT.

In the early 90's, CBT had made its way into educational institutes and corporate market. These instructional manuals were text based and often taught the user how to complete particular lessons. Unfortunately, computers were still progressing at that time, which made it difficult to add into classrooms. At the time, teachers still did not agree with using strictly based CBT programs. While this was a great way to learn topics without having to be rushed, the technology fell short. It wasn't until the later years that full multimedia, which included audio and video, was integrated into these lessons. From there, computer based training only got more popular.

As technology progressed, computer based training courses were also getting better. By the late 90's, CBT was full of video, streaming audio, and a wide array of topics. This type of computer based training was picked up by universities worldwide. This is when online courses began to take full form. Universities provided online classes to those who just couldn't attend real courses. Filled with video lectures and practice exams, students were able to work at their own pace. Although this sounded like a tough idea, students loved the invention. It not only allowed the already employed to get more education, but it helped those with learning disabilities work on their own time.

CBT has gone far beyond the minds of college students. Amazingly, it has also reached aviation training. Computer based training now allows potential pilots to use simulated airfare and courses designed to help them understand the concepts involved. Due to the fact that many people prefer learning in a quiet environment, so that they can review frequently, CBT has become widely popular among aviation schools. These computer programs also teach aviation supplies information, and other necessities. As a result, pilots can fly easily with their david clark headsets, knowing that they know everything about aircraft supplies.

Although CBT is still controversial, most universities and aviation schools have accepted the new form of learning. With students having specific learning disabilities, and tough schedules, this type of e-learning helps everyone get a great education. It is possible to do achieve more when convenience and flexibility is present. You no longer have to worry about getting to campus on time, or juggling three jobs with an array of different courses. Even aviation pilots can dream of educational freedom, if it means spending extra hours at home studying the latest aviation supplies. For the majority of learners, computer based training has allowed society to open their minds to schooling. Students no longer have to worry about getting behind. CBT makes it possible, no matter what level you are at.

Natalie Aranda writes on computer and technology. CBT has gone far beyond the minds of college students. Amazingly, it has also reached aviation training. Computer based training now allows potential pilots to use simulated airfare and courses designed to help them understand the concepts involved. Due to the fact that many people prefer learning in a quiet environment, so that they can review frequently, CBT has become widely popular among aviation schools. These computer programs also teach aviation supplies information, and other necessities. As a result, pilots can fly easily with their david clark headsets, knowing that they know everything about aircraft supplies.

Sunday, August 17, 2008

Java Virtual Machine

Writen by Rahim V.

Java is a high level object oriented language. When we compile java code it first gets converted into highly efficient byte code by the java compiler. The generated byte code is then interpreted by a peace of software called java virtual machine.

What is java virtual machine?
Java virtual machine is the software which interprets compiled java byte code and runs the java program. Java virtual machine is also known as JVM.
As Java code is first compiled into byte code and then the java virtual machine interprets and runs the code, java has achieved the platform independence. Java virtual machine is available for almost all the platforms, right from windows to various handheld devices.

How Java Virtual Machine works ?
JVM does not have any information regarding the programming language. It knows only binary format of the byte code. The class file generated by the java compiler contains the byte code in the format which JVM can understand. We can generate the byte code that adhers to this format in any programming language.
Every java program must run within the boundries defined by the JVM. The code run inside the JVM can not go beyond the security constaints defined by the JVM. This is one of the reason why java application are considered as secure applications over internet.

Saturday, August 16, 2008

India As An Offshoring Destination A Historical Perspective

Writen by Vijay Bhat

As debates rage on across the globe on the economics of Offshoring work to India in the IT & ITES space (BPO), it is time to view outsourcing from the right perspectives. The Cost perspective is often harped upon by both Indian companies and their offshoring clients. However the root of Indian competitiveness in this space is not often discussed. This article only offers that historical perspective on why India is suited to be BPO Hub of the world.

"Off shoring" is the system of packaging a set of your organization's tasks and hiring another company situated in another country to perform these tasks for you as a Billable Service. The service providing company provides you a dedicated workforce to perform these tasks for mutually agreed cost and quality terms.

Why India?

The crux of "Off shoring" is "COST" and better operating margins for the companies' off shoring to India, China or any other country. But "COST" and "PREDICTABLE & CONSISTENT QUALITY" would be more like it.

India has an edge because you have decent quality English speaking people who are willing to do routine work ("Grunt Work") at a highly competitive price. As long as it maintains that edge, remains consistent and predictable, India has a place as the Software backyard and the BackOffice of the world. A large IT Manpower pool and dominance of English in higher education system only helps to build India as a preferred choice for "Offshoring".

The reason why India is able to have such consistent IT & ITES workforce has nothing to do with India becoming a big power in the IT Space or brilliance of Indian Programmers or the fantastic engineers of our IITs. It is a consequence of our McCaulay System of Education which over 170 years old .

McCaulay & India

Thomas Babington McCaulay (1800-1859) was posted in India in the first half of the 19th Century (1835 -1837) under Governor General William Bentick when India was just brought fully under the control of the British Empire. The British throne exercised control on India through its agency the British "East India Company". The Company waged bloody battles for most part of the 18th Century in India to control political power and every possible resource in India. From 1784 onwards there was a "Board of Control" with members from the House of Commons which defined the relations between the Crown and the Directors of the East India Company.

Coming back to McCaulay; Thomas Babington McCaulay, a master of English prose and literature, was elected twice as the member of the House of Commons, and served as one of the commissioners of the Board of Control for 18 months (1831-1832) whereon he got involved in Indian affairs. The British crown wanted to appoint a person who was not in the offices of the East India Company as a member of the Supreme Council in India. In 1833 McCaulay was appointed to the Supreme Council of India and traveled to India. By the time he sailed backed in 1837, he laid the foundation for two of the most important systems which would change India as a country - the Indian Penal Code and the education system.

The foundation for English Education

In one of his speeches to the House of Commons in 1833 before coming to India, McCaulay outlined his plan for perpetuation of British governance in India through representative institutions of the government similar to the European model of governance. This institutional framework designed to manage the British supremacy required to be staffed with people who understood the language and the systems. So came up the need for training Indians to occupy these positions. McCaulay was of the opinion that Indians were perfectly in position to be trained to staff a new system of governance. To quote McCaulay "That the average of intelligence and virtue is very high in this country is matter for honest exultation. But it is no reason for employing average men where you can obtain superior men. Consider too, Sir, how rapidly the public mind in India is advancing , how much attention is already paid by the higher classes of the natives to those intellectual pursuits on the cultivation of which the superiority of the European race to the rest of mankind principally depends. . . ." . This observation made 172 years back is relevant even today and will find a familiar echo with many supporters of Offshoring to India.

McCaulay outlaid the plans for Indian Education System in the McCaulay' Minute of Education which was reviewed and passed by Governor General William Bentick in 1835. William Bentick agreeing to McCaulay's view concurred that the true objective of the British government should be the promotion of European Literature and Culture in India thus laying the foundation for a permanent position for use of English Language in Indian Education. Today English has come to stay in Free India. Whether the supporters of Indian languages like it or not, it is impossible to replace English as the medium of instruction in higher education, language of governance and the language of technology long after McCaulay and the British have gone. The medium of instruction in Colleges and Universities across India is English and will remain so for a long time in future.

It is this very foundation of English based education rooted in history that makes it easier for Indians to be a preferred choice for BPOs and offshoring work from US other English Speaking countries.

The root of Indian Work Ethic The other important perspective which often is ignored is that McCaulay education plan was not just about teaching English to Indians. It was propagating a system of governance and making Indians suitable to occupy positions in the Institutions which represented this system.

To quote "We will create a system of education that will not change their color but will make them 'white' in their thoughts." (There is no record to show McCaulay actually used these exact words but he must have said something on similar lines). Here we have to remember that in 1830s - "white" meant largely European. At that time Europe was in the post Renaissance era where most of the foundations for what would come to be called modern science and technology was already laid. The use of mechanization was dawning upon the modern world; this would eventually lead to the Industrial Revolution and the birth of the factory system which is the rock bed of any economy even to this day. McCaulay's remarks on "white in thoughts" should be viewed from this perspective. McCaulay would never have realized that one day this bridge built to advance British dominance in India would also help free India to be able to do business and be on par with technological advances of other erstwhile British Colonies.

By the beginning of 19th Century the British dominance in India was complete. What was earlier a conglomeration of princely states with independent rulers had to be brought under a single system of governance. While the military power which helped British gain control over India in the 18th century was important, it would not help maintain a civil framework and also allow for the British rulers to discharge the fundamental duties of any ruler - to collect taxes and maintain law & order. They needed a framework of administrative and judicial institutions in India. The senior positions in these Institutions would for almost a century later be the exclusive preserve of the British, it did not make economic sense to employ British for staff positions in the offices of the government and many civil institutions. The only option was to train Indians for these positions. In a country as complex and elaborate as India it meant creation of an elaborate education system which would ultimately enable Indians to exploit job opportunities being thrown up by the British Indian Government.

The British Indian Government offered Indians the first real opportunity to be exposed to western Work Ethic. Some of the precepts of this Work Ethic would be

(a) Employment based on Qualification

(b) Fixed Work Timings,

(c) Designations associated with Job Roles

(d) Defined nature of Work

(e) Documenting work activities

(f) Job Hierarchy and promotion based on Seniority (it would still take sometime for Indians to break the Glass Ceiling and become officers in British Indian Government) and most importantly

(f) Fixed Monthly Salary.

This would be the first exposure of Indians to a new work ethic which they imbibed for over a century and would eventually build what is known as the Indian Middle Class. More than anything else, the last precept was a major attraction for a large majority of Indians. For somebody who could not suffer the vagaries of an agrarian life or did not have acumen of a trader, a job with a government institution offered opportunity for a decent livelihood as long as you had western education, communicated in English, where disciplined and obedient. That, being a part of the government increased your social standing was only a bonus. This was the primary reason Indians immediately gravitated towards this new work ethic and the education system which was the stepping stone for this opportunity. Today a large part of Indian government, trade, business and Industry still runs because of this Work ethic.

The Work Force to Staff Offices

McCaulay's contribution through his education plan, more than teaching English, was to create a system which would churn out disciplined, obedient and productive staff to man the offices of the British Indian Government.

For more than 170 years later this system of Education has remained largely unchanged. It is too elaborate and too complex for anybody to change. The precepts of the system are so fundamentally strong that it would be impossible to change. Only new layers of Higher Learning have been added to the existing system through the IITs, IIMs and other Institutions of higher learning. But the Core of the education system, the Work Ethic it imbibes and the predictability of work force it produces is the same for the last couple of centuries. Individuals vary in the degree of their learning depending on the opportunities presented to them and their individual competencies. This self sustained system of English based Western Education and Work Ethic which offers Predictability of the work force are fundamental reasons which will help India to be a preferred choice for off shoring work and establish itself in the BPO Sector. China has only now realized the importance of using English as the business transaction language and is all set to teach English to its populace with vigor. Lower Employment Cost is no doubt a distinct advantage, but a history and system which is designed to produce predictable people to handle office jobs in English is a supremely distinct advantage.

The Flip Side

This 200 year old system of Education and all its associated values has its flip side. As I have stated in the above passages, irrespective of the nature of higher learning, the core of the educational system is to produce a work force which is predictable and obedient. The Work Ethic for which the British set the foundation has predictability, obedience and repetitiveness as cornerstones. This makes a large part of the Indian workforce very good at predictable and carrying out defined activities.

Questioning things the way they are done, trying to change the rules of the game, Innovation and Creativity are something which cannot be expected out the products of this system. This is primarily the reason that even in the IT space we have a very large number of IT Services and ITES companies. The largest number of CMM Level 5 Companies (CMM is all about Consistency!) but not a single IT Product company. The situation is no different in traditional manufacturing sectors. TATAs being able to design and manufacture a passenger car named - Indica was considered a breakthrough in the Indian industry, which almost 50 years after Independence was stilling producing vehicles on western and Japanese designs. Coming out with a new product in IT or any other Industry requires individuals who are not only Innovative and Creative (Latest buzzwords) but are strongly committed to Question the very existence of things as they are now. There are no doubt positive movements towards this direction, but it will be a while before our education system can produce such individuals.

Vijay V Bhat, Mechanical Engineer and MBA from Symbiosis Centre for Management & HRD,India, currently employed as a Consultant with Infosys Technologies Ltd. The views expressed here are his and does not represent his employer. He has previously worked with manufacturing and automotive companies in India in the sales and marketing arena. He has also taught students in the Engineering and Management fields in Indian Colleges.(Also Visit :http://www.competeindia.blogspot.com)

Electronic Component Suppliers

Writen by Alison Cole

You will find many suppliers of electronic components who will sell them in small quantities. Suppliers of new components, or in a few cases "new and some used" components, include Digi-Key (having blue LEDs, prices reasonable), Mouser Electronics (Fast service, $20 minimum, $5 charge under $20, export orders $100 minimum), Ocean State Electronics (good collection of RF parts, especially air variables and B&W coils), Radiokit (lots of components), Circuit Specialists Inc ( no minimum with check or money order, or else $15, good RF collection), Active Electronics (many stores across the US and Canada, $25 minimum), Maplin Electronics Ltd. (UK), Newark Electronics ($25 minimum, prices on the higher side but have a lot of things that are hard to find elsewhere), Arrow Electronics, Inc. (minimum $25, accepts personal order also), MCM Electronics (minimum $20, mostly VCR parts and lots of useful stuff difficult to find elsewhere), and Fordham Radio Supply (tools for technicians).

Other companies include Jameco (computer parts and electronic components), JDR Microdevices (now no minimum order), Johnson Shop Products (new and some used electronic components), DC Electronics (good collection of ICs and electronic components), International Components Corporation (capacitors, diodes, ICs, potentiometers, resistors, sockets; transistors), Kelvin Electronics (minimum $20, lots of electronic parts and tools), H & R Company (Herbach and Rademan) (minimum $25), John Birkitt (good stocks of new components and tools), N R Bardwell (cheap, good stocks of ICs), Surplus Electronics ( resistors, capacitors, and some semiconductors),

All Electronics Corp. (minimum $10, new and surplus electronics), Alltronics (surplus electronics, $12 minimum), American Science and Surplus (formerly JerryCo),

Hosfelt Electronics (surplus electronics), and Marlin P. Jones & Assoc.(surplus electronics).

For specialty components, JAN Crystals, Crystek Corporation, International Crystal Manufacturing Co., Inc., Amidon Associates, Palomar Engineers, RF PARTS can be contacted.

You can also consult wholesale directories to find details about suppliers of electronic components, compare prices and features, and finally make your choice.

Electronic Components provides detailed information on Electronic Components, Surplus Electronic Components, Electronic Component Distributors, Electronic Component Suppliers and more. Electronic Components is affiliated with Electronic Data Discovery.

Friday, August 15, 2008

Different Types Of Computer Viruses

Writen by Tyrone O. Lindsay

Different Types of Computer Viruses don't come from way out in cyberspace. The genesis of the attack of the computer virus comes out of the bedrooms and living rooms of these cyberspace criminals.

Many of these viruses take on innocent-looking forms. They are set up very sneakily. The virus can be looking you directly in the face or doing their damage behind the scenes.

It's best that you know how to get rid of a computer virus even if you don't currently have a virus. Learn how to deal with them long before you get one. Because getting a computer virus will always happen at an inconvenient time.

The answer to battling the Different Types of Computer Viruses lies in anti-virus software. There is much software out there for anti-virus protection.

Select your anti-virus software based on the recommendations of independent testing agencies. Checkmark, AV-test.org and PC World magazine are among the most respected independent testers of anti-virus software.

Try and use more than one anti-virus program. Very few programs can detect all problems, but what one program misses, another may find and defeat.

It is commonly known that new viruses are found daily. Anti-virus program patches that find and destroy them are usually ready within hours or days.

However, in order to take advantage of these rapid movements you must update your computer consistently. If you don't, you'll still be vulnerable to the new viruses.

Different Types of Computer Viruses run rampant all over the internet. You couldn't possibly know them all. But you can adequately protect yourself. Would you like to know how? This link will give you the best info on the Different Types of Computer Viruses current computer viruses computer virus

Your Friendly Neighborhood Database

Writen by James Monahan

For the lay person, the term database is just another geek word that is just so prevalent in today's society. From the office, to the home, and to just about any industry, people refer to their information as being kept in a 'database'.

So somehow, we all get this idea that the database is some cabinet that holds all the data for a given organization.

But what is a database, anyway?

A database is any collection of data organized for storage in a computer memory and designed for easy access by authorized users. The data may be in the form of text, numbers, dates, or encoded graphics.

Since databases made their debut 1950s, they have become mightily important in the everyday operations of every major and even minor industry.

Databases make the output of needed data and reports easy, convenient, and almost instantaneous. This is a far cry from the 'barbaric' methods once employed by every industry.

Those outdated methods included collating data from paper files whenever a report was needed. That process wasted a lot of time and effort. With the help of databases, these manual methods quickly found their demise.

Small databases were first developed or funded by the U.S. government for agency or professional use. But in the 1960s, databases became commercially available to the public.

However, their use was channeled through a few so-called research centers that collected information inquiries and performed them in batches. Online databases—that is, databases available to anyone who could link up to them by computer—first appeared in the 1970's.

Computer programs that manage and query a database are known as database management systems (DBMS). Database systems are actively studied in information science.

The overriding concept of databases is the idea of a collection of facts, or pieces of information. Databases may be structured in a number of ways, known as database models.

Database Models

Flat Model

The flat (or table) model consists of a single, two-dimensional array of data elements. All members of a given column are assumed to be similar values, and all members of a row are assumed to be related to one another. For instance, columns for name and password might be used as a part of a system security database.

Each row would have the specific password associated with a specific user. Columns of the table often have a type associated with them, defining them as character data, date or time information, integers, or floating point numbers.

This model is the basis spreadsheet systems such as Lotus 123 or Microsoft Excel. However, these applications are not typically thought of as databases per se.

Network Model

The network model allows multiple datasets to be used together through the use of pointers (or references). Some columns contain pointers to different tables instead of data. Many major industries adopted this model in the past few decades.

Relational Model

The relational model is the most popular of the database models today. This model is the basis for such database systems as Oracle, mySQL, and even Microsoft Access.

In this model, logically related data is kept in tables not unlike the flat model. However, unlike the network model in which tables are connected via pointers, the relational model is interconnected using keys or values within data rows in tables that point to other tables.

The SQL or Structured Query Language is used to manipulate and derive data from such databases.

James Monahan is the owner and Senior Editor of TopDatabaseSites.com and writes expert articles about databases.

Thursday, August 14, 2008

Dont Byte The Phish Bait How To Avoid Phishing And Other Internet Scams

Writen by Sylvia Breau

As if we didn't have our hands full enough with viruses, adware, spyware, trojans and all the other nasties, we also have worry about phishing?!

What is phishing, and why should you care?

The word is pronounced "fishing." When someone phishes, their goal is to lure people into giving them personal or financial information that they can use to their advantage. Their motivation is greed.

A common ploy is to send out an e-mail that is made to look like it's from a legitimate financial institution (such as PayPal, or your bank). The text of the e-mail gives some reason why you should click on the link they provide in the e-mail and log into your account on the Web page it takes you to.

If you do log into your account like they want you to, you're the phish, and you took the bait -- hook, line, and sinker.

The goal of the phisher is to get you to give them your bank account logon name and password. They use legitimate-looking e-mail to send people to legitimate-looking Web sites, where they capture and record your username and password as you type it in. As soon as they have that, they can log into your bank account and conduct transactions, just as if they were you.

How do you avoid falling prey to these tricksters? The very fact that they are asking for your account information marks them as imposters. Banks and other institutions and businesses don't contact their customers to update account information. They wait until the next time their customer goes to them.

Think about it: Have you ever received a phone call or letter from your bank asking you to contact them so they can verify something about your account? If they don't contact you by telephone or regular mail, why would they do so in e-mail?

Our rule of thumb is, if we receive ANY e-mail asking us to go to a Web site and log onto our account, we automatically assume it's a phishing attempt and delete it, 100% of the time. No exceptions. The very request itself is like a big red sign that says "Phishing Attempt!"

Phishers don't always try to pass themselves off as financial institutions. Businesses like eBay and amazon.com are also represented in phishing scams. Mortgage companies are another target. Phishers send e-mails offering low rates on on mortgages or other loans to lure people into going to a false Web site and typing in their Social Security number. Another ploy is to offer low-interest credit cards, credit reports, or credit repair -- anything that will get you to enter your Social Security number or other personal or financial information.

Most Internet threats are handled with software, like anti-spyware or anti-virus software. Phishing is different: Your best protection lies between your ears. Train yourself to be habitually aware of phishing possibilities. Don't automatically click the link in an e-mail and do what they tell you to do. Raise your suspicion level. Don't be paranoid, but do be careful.

If you receive an e-mail that wants information from you, and you really think it's legitimate, be smart. Call the business or institution on the phone to check. If it is a fake request, they will be very glad that you reported it to them. Phishing hurts them as well.

If it turns out the e-mail really is from them, then it's an opportunity for you, the consumer, to tell them that their practice of requesting information through e-mail is making them susceptible to phishing attempts. It is important to communicate with the companies you have accounts with. Consumers and businesses can work together to create a safer Internet.

You can see some examples of phishing attempts at our web site.

Sylvia Breau is a long-time computer consultant to small businesses. She is committed to helping computer owners break through the "technology gap" that occurs when regular people can't understand what computer geeks are saying. In the case of Internet security, this technology gap is beyond being simply frustrating or costly. It becomes downright dangerous. The author wishes to convey to all computer users the importance of devoting just a bit of time and energy to knowing what they need to do and have to stay safe online.

Please see our Six Steps to Internet Security, a practical, easy-to-use guide to online safety.

For a "snapshot" of your computer security, please use our Computer Security Score Card.