Saturday, January 31, 2009

Employment Background Check

Writen by Stanley Alpin

Employment background checks are becoming increasingly common these days. The reasons for this include the fact that negligent hiring lawsuits that result from the actions of an errant employee can damage a company's credibility and lead to hefty fines; companies have become more selective in their choice of employees following the threat of terrorist activities; accepting a resume at face value has resulted in many companies wasting time and money due to frequent hire-and-fire situations. Also, more companies are now conducting employee background checks as information from databases all over the world is available online. Employers are not bound to conduct an employment background check in all cases; however, federal and state laws make employment background checks compulsory for jobs that require interacting with children, the infirm, and the aged.

Information that can be included in an employment background check includes driving records, details of past employments, criminal records, military records, educational records, character references, and drug test records. However, background check companies that provide information to employers have to abide by the Fair Credit Reporting Act (FCRA) which regulates the type and amount of information that an external agency can provide to an employer. Bankruptcies that are more than 10 years old as well as civil suits and records of arrest more than seven years old cannot be reported. FCRA regulations vary with the state and agencies that carry out a pre-employment background check need to ensure that they comply with the state regulations.

Employment background checks can be conducted by companies in-house or can be outsourced to third parties that may include private investigators, H.R firms that screen applicants, and data brokers who are established online. Outsourcing an employment background check has its advantages but if a third-party is conducting a background check, consent from the applicant is required and under FCRA regulations the applicant should be provided with a copy of the investigations. If the employment background check is conducted in-house, the employer is not bound to obtain the applicant's consent or apprise him in detail of the reason for rejecting his application.

Stanley Alpin recommends Background Check Guide for more information on ordering an employment background check.

Who Knew Intel Cuts 1000 In Management

Writen by Nan Wood

The computer and chip makers have had their problems in recent years. Intel, in an effort to become more efficient, is cutting management jobs. The competition is stiff and fewer personal computers are being sold.

According to Chuck Mulloy, Intel's spokesman, this is an action in a continuing effort of their broad structuring announced in the earlier part of the year. Analysts are suggesting more cuts as Intel's executives look closely at operations.

Advanced Micro Devices Inc., a smaller rival company, is challenging the supplying of microprocessors, which is Intel's core business. Since the demand for PCs is slowing and AMD is taking away business, Intel is focusing on cost reducing and eliminating inefficiencies.

Paul Otelli, CEO of Intel, announced the plan to sell a division that makes chips for cell phones and other devices. This will of course, increase cash flow while decreasing expenses. Since this division was losing money and not able to effectively challenge the entrenched competitors, it is at the top of the elimination list.

Intel grew rapidly in the last five years. Managers were hired at a faster pace than the overall increase in employees. So a reduction in this area should remove layers and improve communications.

Who knew that the environment in which computer technology evolves would change this much in a short period of time.

Nan is an Accountant and Real Estate Professional with an interest in technology. Visit Technology

Friday, January 30, 2009

Fiber Optic Connectors

Writen by Elizabeth Morgan

Compared to even a few decades back, communication has become a vital part of our lives. The world's social, economic and political system is dependent upon its ability to communicate and transmit both voice and data information. Networks of optical fiber span continents and circle the globe making this communication possible.

Rapid advances in fiber optics technology have made traditional wiring obsolete and unsuited for transferring complex data like images. Fiber optical connectors have replaced them, as they are small and transparent. They are as thin as wires and are able to transfer data via beams of light.

Fiber optic connectors comprise of a ferrule, connector body, cable and coupling device. The end of the fiber is mounted on the end of ferrule. It is bored through the center thus cladding the fiber. This often induces scratches on the fiber. Some types of fiber optic connectors are biconic D4, ESCON, FC, FDDI, LC, loopback, MTP, RJ, MU, SC, SMAand ST.

Fiber optic connectors can be installed by various methods depending on the connector types. While connecting, one has to make sure that the ends have a smooth finish and is free from defects such as hackles and fractures. It is essential to remove the coating of the fiber and connect the connector by applying epoxy or by crimping. Subsequently, the fiber end has to be given a good optical finish by cleaving and polishing. Any impurities such as dirt change the geometrical propagation patterns of light and cause scattering.

Fiber optics connectors are considered safe, as they are not affected by electromagnetic fields. They are low weight and have high electrical resistance. These connectors are cost effective and are usable even by untrained personnel.

Fiber optics connectors have low data losses over long distances and have a high transmission capacity. It is no wonder that the era of telecommunications and networking has extensively adopted fiber optic connectors. The primary market for fiber optic connectors is the optical network application. Optical networks transmit voice and data across the country and around the world. The rapid expansion in the use of the Internet drives the optical market, including fiber-optic connectors.

Connectors provides detailed information on Connectors, Electrical Connectors, Fiber Optic Connectors, USB Connectors and more. Connectors is affiliated with Wire Mesh Conveyor Belts.

Thursday, January 29, 2009

Computer Repair Services

Writen by Thomas Morva

Computer repair services are best fitted for offices and other important business firms where there are quite a number of machines. There are countless companies and service providers who repair computers for industries and offices.

Computer repair services can be classified under the following heads:

(a) Organizations who render technical support to offices and homes.

(b) Online courses on computer repair services to help an individual gather information about the computer and acquire knowledge on various aspects of both the software and hardware.

(c) Organizations as well as various websites also provide support by sending various compact discs and DVDs

There are also IT technicians seeking work who will work with businesses who their services, this is handy if you don't need a full-time IT staff but still require occasional service. Simply go to the website, punch in your ZIP code, and computer repair will immediately list technicians in your area, including their rates, hours, ratings and reviews.

Computer repair services are readily available in local computer repair shops. But there is a risqué factor involved in hiring someone local who may not have the necessary expertise to get the computer fixed correctly. Therefore, it is always advisable to call an experienced and reputable computer repair service provider to get the best of services. Most computer repair service providers are diligent and solve any sort of technical problems with great dexterity. They specialize in delivering leading edge solutions for the technology side of your business or home. Most also offer IT outsourcing, network support, service contracts, computer repair, printer repair and related technology consulting services to small and medium sized businesses.

Computer Repair provides detailed information on Computer Network Repair, Computer Repair, Computer Repair Services, Computer Repair Software and more. Computer Repair is affiliated with Computer Part Supplies.

Clutter Here Clutter There Clutter Everywhere

Writen by Katharine Silvia

Top 5 little known tricks to improve the performance of your PC.

1. TAKE OUT THE TRASH

Just because you don't see it lying about doesn't mean it doesn't need to be emptied. If you use your computer daily you should do this at least twice sometimes 3 times every day.

2.Get rid of uneccessary e-mail messages.

This again is another simple but over looked memory drain on your system.

Especially if they contain personal information.

You want to focus on,

* Sent Items - Yes that means love letters

* Deleted Items - Sad but most don't.

* Junk Email - Absolutely.

3. Delete unused programs.

This one can be tricky if your relatively new to computers. If you know Exactly which programs you use and the ones you don't, I recommend you do this.

Go to Start--> control panel-->Add remove Programs.

The longer it takes for your programs to appear you have to many. Plan on making a list of your most used programs before this step, I mean all the ones you can think of. Then compare them against what you "actually" have on your system. You in for a shock I guanty it.

4. Clean your cache.

This is HUGE. This is the Toxic waste dump of every temp file you have ever downloaded onto your system. For example, your visiting Aunt Marry's website and can't really see the pictures of her and her kids, so you enlarge it, well that is a temp file and it is now lurking on your hard drive. GET RID OF IT.

If your using IE go to the toolbar click on

Tools-->Internet Options--> Select the General Tab and click Delete Files.

5. Delete your cookies.

This one wont increase a tremendous amount of speed; however not wanting Sallys shoe store knowing you prefer pink, only gets you pink shoe coupons in your email, which you have just cleaned. There is a downside be warned so read what they are.

Now I am put together a videos, of this series to continue where we have left off. If you are interested please send me an email @

report@ask-compgeek.com

Or visit my website and sign up there.

http://www.ask-compgeek.com

Thank you

THANK YOU
=============================================
Katharine Silvia
Computer User since 1993
http://www.ask-compgeek.com
=============================================

Tuesday, January 27, 2009

It Audits How Long Do They Take

Writen by Joshua Feinberg

Keep IT audits to within a half a day as a starting point. If there's more exploratory work that needs to be done, that should be an added fee and done at a later time.

Keep IT Audits Short and Sweet

Generally within four hours on-site for IT audits, you usually figure out exactly what's going on, what should be done next, how to prioritize it, and what hardware and software and services, peripherals and other similar items they need to buy.

You'll obviously, know that you're going to be proposing a bunch of follow-up tasks, so there's plenty of time to come back and go into more depth after IT audits. When the meter isn't running, don't sit down at keyboards and do something that could end up getting you in hot water!

Your Timing Checklist

The way to keep IT audits limited to 4 hours is by coming up with a dozen or so different areas that you will look at. In that four hours, there's no way that you're going to be able to hit every PC or every issue. Here is how to allocate the timing.

o Half hour to an hour on a primary server.

o If they have a secondary server, maybe another 15 or 20 minutes,

o A few minutes on LAN hub infrastructure,

o Looking at routers, CSUs, DSUs, DSL routers, hub switches in blocks of 10 or 15 minutes, making some general notes as to how it looks on visual inspection and some things you may notice with LADs or surge protection

o Half hour to 45 minutes on a couple representative PCs

What are Representative PCs?

Who are the most important PC users in the company? Ask your main company contact. They will point you in the right direction. They might say something like, "Bob, he's the one that takes care of all the billing and accounts payable. You should definitely look at him. And you should definitely look at mine because I'm the owner of the company."

You should be able to look at two to four PCs and get a pretty good idea as to what's actually going on there with configurations, drive mappings, network protocols, whether they're in relatively good shape or whether they're a complete mess.

The Bottom Line about IT Audits

From IT audits, you should get a pretty good idea as to what the hottest priorities are, what should be addressed within the next week or two, what should be addressed in the next month or two and then what should go into more long-range planning.

Copyright MMI-MMVI, Small Business Computer Consulting .com. All Worldwide Rights Reserved. {Attention Publishers: Live hyperlink in author resource box required for copyright compliance}

Joshua Feinberg has helped thousands of small business computer consulting firms get more steady, high-paying clients. Now you can too. Sign-up now for your free access a one-hour audio training program featuring field-tested, proven Small Business Computer Consulting Secrets.

Monday, January 26, 2009

Building A Computer Is It Right For You

Writen by Ryan Griffith

The parameters used to be a little more clear. You could easily save money by building your own computer. All you needed was the basic know-how, the time and initiative, and wah-la! You had a good computer at a better price than you could buy new.

But things have changed over time. As technology improved and prices dropped, suddenly the the savings benefit seemingly dwindled away. However, that is not always the case and there are still many excellent reasons for building your own computer!

Customize to Your Needs

By building your own computer, you can customize it exactly to your needs. Whether you're into gaming, video production, audio recording, autocad, or just general word processing and internet surfing, you can build a computer specifically suited to your task.

Easier Upgrades

By using non-proprietary, quality parts, your new home-built computer will be much more easy to upgrade than its store-bought counterpart. Many retail computers have proprietary components that are tied together in such a way as to make part replacement or upgrade difficult. Your customized computer should be easy to work on, repair, and upgrade for a good while.

Learning Experience

Building a computer is a great learning experience. You get to see firsthand just what all the parts do and how they work together. Not only is it educational, but it's great fun too! And you get the satisfaction and pride of having a tangible result of your labor at the end of your project.

Drawbacks of a Retail Computer

There are a number of reasons why most store-purchased computers today are inferior to a custom-built machine. Retail computers often come with bundled software packages that are average at best. The quality level of much of the software is quite low, and most of it is probably unnecessary. It's often poorly-written proprietary software (specifically written for that computer manufacturer) and is usually infesting every nook and cranny of the computer, slowing down performance and taking up storage space.

Much of the brand-name software included in these bundles are basic versions and even trial versions. If you need quality software (and who doesn't), you're most likely going to have to buy it separately anyway.

Many of the computer components are also proprietary, making repairs and upgrades difficult. Sometimes off-the-shelf components just won't work well or at all with a retail computer. And they are often not designed for much room to expand or upgrade.

Warranties

One argument for purchasing a computer from a retailer is to obtain a good warranty. This has some merit, but keep in mind that redeeming warranties is usually not a walk in the park! You may also be without your machine for a while during the time it is being repaired or replaced.

Individually-purchased components most likely also come with a warranty, so if one fails there may be recourse for replacement. The warranty issue probably is about equal with either method you choose.

Partial Upgrade vs. Replacement

An alternative to building a computer from stratch is to perform a major upgrade. This should be cheaper compared to total replacement, and can still give you an excellent machine well-suited to your needs. You must already have an upgradeable computer though, and it needs to have a few key components which you can build around. Perform a cost/benefit analysis and determine which method would best serve you.

A Personal Experience

In the late '90's, my Win95 Pentium 100 (retail purchased) desktop computer was getting pretty inadequate. It was virtually non-upgradeable, there was no room for expansion and key components (motherboard, case) were getting obsolete. So I purchased a custom built computer (tower only, no monitor or peripherals) from an experienced friend, and it served me well for a number of years.

Several years later I got into audio recording and upgraded to larger hard drives. I also purchased a larger monitor.

Last year I made significant upgrades, specifically centered around my needs for audio recording. I purchased a new case and motherboard while utilizing my existing hard drives and all peripherals. Down the road I'll upgrade further to more hard drives (the new motherboard is SATA compatible) and a new flat panel monitor.

You can see that over the years I kept my computer system relatively current and meeting my needs for less than I would have spent in complete replacement for a comparable machine. I've had fun and learned a lot in the process, too.

Not only that, but I took the case and motherboard I replaced, bought some used large hard drives from a friend, and turned my old computer into a backup machine. You can see how much flexibility custom computer building can give.

What's Right for You?

That's something only you can decide. But if you have the interest, a willingness to learn, a need for customization, and the desire for a solid, quality system, I believe you're a perfect candidate to build your own computer!

Ryan Griffith is the webmaster of Build-My-Computer.com. He loves his home computer network and thinks more people should build their own computers!

What Do I Do With All These Ugly Cables

Writen by Mark Boehm

So you have worked hard to get everything just right with that great stereo system or home theatre system in your arsenal of Audio/Video equipment. Everything looks great except for all those wires, what to do with all those wires. It is a problem that most of us will encounter even if you are not working with a home theatre system or audio system.

There are video cables, audio cables, speaker cables, cables for cables. Your Audio

System or other types of electronic equipment look great, but all those wires just hanging around look awful. Somewhere in our home there are wires that we would like to hide or at least make them look more appealing to the eye.

So what is the answer to all of this? Cable raceways may just be the answer you are looking for. If you have all those cables and wires running along floor and walls without any type of organization, then cable raceways may be a way to eliminate those unsightly wires.

Cable management solutions include items like cable raceways, cinch straps, hook and loop cable tie rolls, cable ties and cable tie mounts. All of these items make addressing your nest of wires so much easier to deal with, but cable raceways offer a great way to run long lengths of wire while making them pleasing to the eye.

Cable raceway systems generally come with straight lengths of raceway up to six feet. Then to make your bends there are inside and outside elbows. You can also purchase raceway splices which allow you to connect additional lengths of straight raceways.

Cable raceways come in a variety of sizes like 1.6", .8" and 1.25 "and other sizes. Depending on the type and size of the wire you will be running will help you determine which size of raceway works best for you.

Cable raceways generally come in the color of white, but do offer the capability of being painted. The raceways are generally attached to wood moldings, floors and in some cases ceilings. With the use of double sided tape, the cable raceways are easily attached to these surfaces, making them quite easy for most people to install.

One item I would advise on using is a cable raceway tool. It is specifically made for cutting cable raceways and provides a nice even cut every time. It is available for a minimum amount of dollars spent and will save you many hours of aggravation, especially when making long runs of cable raceways.

There are of course many other cable management solutions available when addressing the problem of multiple wire runs, but cable raceways in many instances are a very affordable and eye pleasing method of cable management.

Mark Boehm is the president of M-B Electronics. He has over 25 years of experience in the Audio Visual and Electronics Industry. You can contact him by calling 800-872-9456 ar e-mail him at etbinc@comcast.net

Visit here for more information on Cable management solutions or Cable raceways.

Sunday, January 25, 2009

How To Resolve Cable Dsl And Dialup Modem Problems

Writen by Otis Cooper

When it comes to diagnosing the modem and any other computer problem,always start with the most obvious first.Modem problems may be repaired as fast as re-booting the computer or can be as complex as resolving hardware conflicts.

First remember to check for the most obvious signs of trouble,such as loose connections at the rear of the computer for external modems.

Internal modems may have their retaining screw at the expansion slot loose are missing.Phone line connections may simply be inserted in the wrong connector.

Nearly all internal modems are inserted into the PCI or Peripheral Component Interconnect slot in the system unit.

NO POWER AT THE MODEM

For Internal Modems,first try inserting the modem in a different PCI Slot.Reboot the computer and click on Start,Control Panel,and click the Phone And Modems icon if you have Windows XP as your operating system.

Then click on modems,properties,and look for the statement "This Device Is Working Properly". You can click on Diagnostics and run a test to see if the modem has power as well.

External modems can be checked for power by inspecting the adapter plug to see if it is plugged in completely.Look to see if any indicator lights flashing and be certain you are using the adapter for your modem.

Be sure the surge protector or wall outlet is providing power by plugging in a lamp or a radio.If the radio works,the culprit may be the adapter or the external modem itself.

If you purchased the modem in your town,you may have the chance to return to the store and ask the technician to test it with a known good power adapter.You can been replace either the adapter or modem.

MODEM DISCONNECTS OFTEN

If your modem,whether internal or external,is working but disconnects from the Internet very often,without warning,check to be sure your call waiting option is not enabled.

Another culprit that cause this headache is line noise.This noise and interference can be caused by such things as loose wiring.

Poor waterproofing,old wiring,worn phone jacks are some causes that will result in line noise. Make sure no other equipment is using the same line that your modem is on.

Be sure other devices as your fax machine, answering machines or even security alarms are not sharing the same line as your modem.

Other PCI devices may be causing conflicts with your modem.Clicking the Control Panel ,and clicking the modem icon will show the message "This Device Has A Problem" or somthing similar if there is a conflict.

Windows will offer ways to resolve the conflict. Take the time to carefully follow instructions tocorrect any conflicts that may be present.

Loose data lines for Internal modems and loose or damaged connectors for External modems can cause data lost as well.Visual check and double check these connections.

MODEM IS PRESENT BUT WILL NOT WORK

The external and internal modem must have device drivers installed before they will work. Bad or incorrect drivers can cause the modem to disconnect as well as not work at all

If you noticed that the device driver was either missing or corrupt in the modem icon,follow the instructions to update the device driver.

If some cases,you may have to completely remove the old modem from thw Windows Device Manager.

Once it has been removed from Windows, reboot the computer and Windows will detect the modem and automatically re-installs the the device driver.

If your modem came with an installation cdrom or diskette,use the software the disk rather than the one in Windows.

Once you are up and running,the first thing you should do is to visit the modem's support web site and search for any software patches or updated drivers to download.

COMMON BROADBAND PROBLEMS

The most common high speed internet problems whether its dsl or cable connections are not being able to log on and poor signal.

If the Cable modem often reboots,you should check to see if your signal indicator is strong.If the signal seems good,electronic signal from mobile phones and other devices nearby may be interfering with the signal.

Stop and look behind the cable or dsl modem to see if the connections have worked themselves loose or have come off completely.Be sure the connections have not be damaged in any way.

The modem is connected to an Ethernet card which will receive and send signals to the computer.Look at the rear of the card and see if the green indicator is on.If not,there is a problem with the card installation or the card may be faulty.

If the ehthernet card in the computer become loose, your high speed Internet reception will be interruppted. Place a finger on the ethernet card and try to move it. If you can,open the system unit case and tighten the card.

If the ethernet card has become loose,it may be a good idea to remove it and inspect the yellow contacts to be certain they are not dirty or damaged.Power will not transfer to the card should this be the case.

Other causes may be the main wiring to the modem may be faulty.The vacuum cleaner or the power tools your son is using in the garage may be causing the problem as well.And we cannot omit the idea that the cable or dsl modem themselves may be faulty.

While you're learning about your computer,understand the modem at every level and do so now while it is still in good operating order.Print or write down modem and all troubleshooting tips.

Put these troubleshooting tips in a binder or at least in a safe place so you can refer to them should your PC fail to boot.Knowing about your computer takes time and effect but you be glad you took the time should your system goes on the blink.

Otis F. Cooper is solely dedicated to boosting the knowledge and confidence of every computer user. Use his informative articles and videos to understand all about the PC. Read more in depth articles for pc training and repair at http://www.repairarticles.com.

Saturday, January 24, 2009

Wirelesss Networking Security 5 Reasons To Use A Radius Server

Writen by Eric Meyer

1. Wireless Authentication - This is a huge part of why wireless networking is so secure, you know exactly who is accessing your LAN. With out a RADIUS Server anyone who has happened upon your passpharse has open access to your WLAN. IF someone steals your passphrase some how they won't be able to access your lan because they still need user creditials.

2. Wireless Policy - You can set any number of policies you like but my favorite is limiting the time and days that users can access the wireless network. Most often if a hacker is going to try and crack your network it's going to be at night, so don't let users authenticate at night or on the weekends.

3. DMZ or Subnet - You can assign wireless clients to a subnet that is locked down or keep them in a DMZ. If a hacker starts probing the network he won't be able to see much.

4. Limit Access time - You can limit your access time of wireless clients. If a hacker can't hack the LAN he might try to hack the wireless clients, kick idol users off after couple hours.

5. Per user or group Control - You can give specific users certain access or you can give whole groups different access policies. A common senerio is that you have contractors or out of town sales employees visiting and need temporary access to the wireless network. You won't want to let them have the same access that the normal employees do so limit them as needed.

I will be posting a tutorial soon about how to setup a wireless RADIUS server

Join the most popular wireless networking newsletter on the internet http://www.wirelessninja.com Don't miss out on the fastest wireless routers ever http://wirelessninja.com/?page_id=7

Overview Of Http

Writen by Chris Inga

If you have been using the internet for a while, you have probably typed into your browser something that starts with "http:" and ends with ".html", hit "Go", watched your modem lights flicker on and off, and a couple of seconds later you are magically looking at page of todays news or a page of pictures. Let's try and take some of the magic away ...

I thought about calling this article a "Geeks view of HTTP"; I am not going into the nitty gritty, but rather present a sketch of how a geek might see something like HTTP, how they can think something like HTTP is simple, and why they are not trying to make things complicated just for the sake of it!

--* Layers *--

The background to the sketch is that computers are full of layers. Programmers and designers think in layers, because organizing in layers makes it easier to build things.

You don't need to know what or where the layers are in your computer, or where one starts and another stops, but it is helpful to remember that they are everywhere because that is how geeks organize things.

--* Specifications and Protocols *--

Specifications and Protocols are the things that are the mostly likely cause of all your computer frustrations ... but they are a necessary evil. A wise man once said that any specification longer than one line will have ambiguities and be a source of problems. There are lots of specifications and protocols in everyday life. An example of a protocol is when you are driving and see a red light you slow down and stop until it turns green. The specification of this protocol is the rule that is (probably) written down in the road-rule book. But we don't need to read the road rules, it is just common sense to know to stop for a red light. Of course we all know the words computers and common sense don't belong in the same sentence, and that is why there are so many computer specifications and they are generally so long and detailed.

A common sentiment is "you really need to spell things out for a computer". I think this is a bit misleading. It isn't the computer that needs things spelt out, it is the programmers and designers who build the higher layers who need to spell things out for other programmers creating other higher layers.

If one programmer ignores the rules of a specification, or doesn't know there is a rule to follow, the result can be the same as if a driver runs a red light ... a crash.

--* Connection *--

I have finished with the background of the sketch, and now I am going to draw a picture of a couple of boats in a bay, each with a two- way radio. I grew up around boats and always liked listening into the chatter on the two-way radios. The following conversations are from my memories of growing up, but the ideas are probably the same for cb and other forms of radio.

The first boat we will call "Rock n Roll" the second "Jazz". There was only one channel, and I noticed that there was a protocol that everyone seemed to follow (except on Sunday afternoons) to keep things orderly. I don't know if this protocol was written down anywhere as a set of specification rules or was just common sense. If Jazz wanted to call Rock n Roll they would wait until they heard the current conversation end with an "Over and Out". They would wait a couple of seconds and then say something like "Rock n Roll, Rock n Roll, this is Jazz, do you read me, over". If someone on Jazz was listening, they would say "Rock n Roll, this is Jazz, go ahead, over". Bingo!, they have a connection.

The same kind of thing happens when you type an address into your web browser and hit "Go". Your computer is just moving a bunch of numbers to the modem. To keep things simple, lets ignore that the modem is converting those numbers into sounds, and pretend that it is those numbers that are traveling out along your phone line. The reason sending numbers out along your phone can work, is that at the other end of the line is your ISP's computer. This computer, and all the other computers on the internet, have layers written by programmers and designed by computer architects, that follow strict and detailed specifications of what to do with the numbers coming out of your computer.

This sounds complex (and the details are!), but it is just the same as the person on Rock n Roll knowing to wait until they heard "over and out" before calling Jazz, and saying "over" at the end of each sentence. If no one followed these protocols the channel would have been chaos, everyone trying to talk over everyone else. In the same way, if your computer and the other computers on the internet did not follow the specifications, the fact that your computer sends out some numbers over your phone line would be as useless as it sounds in the first place! ... but, if the rules are followed, it works.

I am not going to go into the actual details of these specifications, but you have probably seen the acronyms; TCP/IP and DNS (and a heap more!)

--* HTTP *--

Lets say that someone on Rock n Roll knows there is a football almanac onboard Jazz which will confirm the score of a particular game and settle an argument onboard Rock n Roll. When Rock n Roll hears Jazz say "this is Jazz, go ahead, over" they know they have a connection to Jazz and can start a conversation. Rock n Roll might say "Jazz can you get me the score of the 1987 Superbowl, over", and Jazz comes back with the answer finishing with an "over". Rock n Roll might ask for another score, or might ask for the list of players, or might just say "thanks, over" and which point Jazz would say, "See ya, over and out".

--* http://Jazz/SuperbowlScore1987 *--

That is really what HTTP is doing. The connection has been made at lower separate layers which are handling the numbers traveling out of your computer and moving them to the computer you are connecting to. HTTP is a fairly simple specification that allows one computer to ask another for some information (by naming it), and for that information to be returned. It doesn't say anything about where that information comes from; as far as the HTTP specification is concerned, somebody could be sitting at the other computer typing in the response. However, usually the information that is asked for is the name of a file, which is a bunch of numbers on the hard drive. Those numbers get moved from the hard drive into memory into the modem and back to your computer.

Thats it! That is the essence of HTTP.

The point is, to see why a geek can think something like HTTP is simple you need to think in layers like a geek. Thinking in layers is not some kind of zen like discipline for them, they probably do it without even being aware of it as that is what their tools and languages encourage. If a programmer was writing an HTTP program they may write something like:

LowerLayer connectTo: "Jazz".


LowerLayer send: "GET SuperbowlScore1987".


LowerLayer out.

The programmer who writes this is not thinking about the details of how the connection is established or how the message is sent. They may have no idea! When they are working with HTTP they just assume the lower layer works. If they, or you, do want to understand the lower layer, then put HTTP out of your mind and read up on the TCP/IP and DNS layers and specifications (have fun, and have a good supply of coffee ready).

Similarly, they are not trying to understand how the information that is received is displayed so nicely in your browser. That is a higher layer and yet another specification (HTML).

I hope you enjoyed reading this article, it has taken an unusual perspective of HTTP! If you want to read up on the details there are a number of good articles on the web and the HTTP specification itself.

About The Author

Chris Inga is the programmer of the Nici picture downloader software for windows which uses the HTTP protocol to download pictures from the web. See http://www.nicisoft.com for more information; pictures@nicisoft.com

Friday, January 23, 2009

The Butterfly Effect Part I Microsoft Security And The Developing World

Writen by Charles Spencer

Much has been made of the argument in Open Source circles about the benefits that Open Source offers developing countries, as opposed to expensive or pirated versions of Microsoft. Some of the more common arguments run, contra-Microsoft, that the expensive and proprietary software that runs on Windows is holding back the developing world. Most imply, directly or indirectly, that somehow Microsoft is haggling with poverty. That is, school kids in China, Pakistan, and Guatemala are being denied access to modern education and technology via the proprietary licensing schemes of MS and the Software that runs on it. So it might be. However, what seems to escape such poverty calculations is the true impact of network security and viruses on developing countries and the impact on the World in general. Specifically, the impact that computer security has on development when networks are based on pirated, outdated, or generally insecure software. The largest and most obvious case would be China.

My experience in China:
I recently completed a year teaching English, Computers, and Philosophy at a Chinese university. Around the university, a copy of Windows, on the street, cost the same as a copy of Red Hat Linux or about $1 US. Of course, most Windows software is similarly priced. You can literally find 1-10 guys on every neighborhood block selling copies.

The official university computers also had hot copies of Windows installed in every classroom. In fact, I am not sure I encountered a licensed copy of Windows in my entire year in China. This possibly includes most of the new computers with Windows XP installed at the factory. The Microsoft certified laser stickers are copied almost as frequently as the software. This is in spite of the official best efforts by Beijing to legitimize its entry into the WTO, and promote the use of Linux on government computers.

However, after 10 years of traveling and working in developing countries, I did not consider this so terribly unusual. The World over, hot copies of Windows are the standard in developing computer networks. It was only the very public nature and acceptability of it that seems different in China. As for the social acceptability, it seems to be more a function of Chinese culture than the state of technology or some sort of official public policy. One hazard of being a hardcore Open Source advocate, and coming from a tech world where the software is free (or mostly free), is that in certain respects it tends to make you a bit too comfortable with the concept of software piracy.

What opened my eyes to the true danger of pirated copies, was the first day I entered a classroom, with my 30 gig portable USB drive. My poor little hard drive, that had been kept safe, sound, and innocent behind a Linux firewall, and never mounted with anything but Linux, was suddenly exposed to the reality of computing in China. It was a virgin drive in the Windows Red Light district of a Chinese university. I had spent so much time on only Linux systems, that I had forgot what it was to battle Viruses and Spyware with every click of the mouse. I no sooner plugged it in, then a complete ecosystem of viruses promptly installed themselves to every directory on the drive. At that moment, it occurred to me that I had never seen a copy of a virus scanner or a firewall like Norton or Trend Micro alongside any of those copies of Windows or the latest Hollywood movies.

I also had at that moment a captive audience of more than a hundred Chinese students. So I went about taking an informal survey of how many students knew about viruses and virus scanners. My students where at first confused in the sense they thought they did not understand my English. I then carefully explained what a virus was, and what a virus scanner does. After rebooting to a Mandrake Move CD, I even dissected a virus on the overhead projector for them.

Once I was convinced they understood the English word and concept, I asked them again. This time, I received more of a confused look in the sense of 'why would you waste the money'. I repeated this with all my classes at the University. In total, I asked about 1,000 students over the course of the school year, and received more or less the same answer from all of them. They simply did not have antivirus software, or would not buy them if they did sell them. I am aware that companies like Trend Micro are moving into the Chinese market; however, I believe it will be hard to sell virus software in China for a long time to come.

After that first class, I returned home and turned on my Internet connection to confirm what I suspected. My Linux firewall, connected via ADSL, was being bombarded by thousands of viruses and worms. In fact, it was hard to distinguish any legitimate traffic from all the white noise of worms and viruses. Many, like their biological counterparts such as polio, are rarely seen in the West; and A few, like Asian bird flue, have not yet been monitored or detected in the West. I am aware of at least one case of a virus that started life in a Chinese University stealing term papers, later being modified to gather classified documents from companies in England.

The Implications:

It seems a better part of the already limited bandwidth and resources of China are being consumed by infected windows computers. Let me multiply this times an estimate 10,000,000 (official) new users of the Internet a month in China. From personal experience, I can say with a great deal of certainty, although perhaps not to the extent of China, the Internet in most developing countries is in a similar state. In such developing technological environments, the consumption of valuable resources is in many ways far more of a barrier to development than the simple dollar cost of Microsoft based software.

Consider just a few of the implications. If just 50% of all Internet and computing resources are consumed by malicious activity in a country or region, and it appears to be far more than that in most countries, then the country must devote that much more resources to its development. According to an official Chinese Central Government report, over 80% of all computers in China have been penetrated. Similar studies in the West, have reported upwards of 90% percent of the computers in developed countries. Granted, it depends on how and who reads those types of reports; but the very idea that those are the numbers we are talking about is food for thought alone.

What is of a more critical consideration is the impact on any economy and society at large. How easy is it for Hospital in Guatemala to clean up a computer database after a virus outbreak, as opposed to say a hospital in New York or Paris? How many people do not get treated for real viruses because the hospital spent the money treating digital viruses? As for the implications for the Internet at large, we only need to chant our liberal mantra a little louder about how no one can control the Internet to really see the dark side of things. I will just site the very active issue of the impact of zombies and bot nets on the World.

Our responsibility:

Thus, I would say, that in our rush to help countries develop with food aid, economic aid, and such, that we also lend relief in the areas of technological aid. The obvious, and affordable solution: (drum role please) Linux and Open Source solutions. However, simply carpet bombing the developing world with Linux will not be sufficient. It will require the support of the developed countries and experts to aid in the training and deployment of Open Source solutions. As another Western IT worker in China pointed out, what is often overlooked outside China is that most systems administrators in China never even touched a computer until a few years ago. Further, if I may remind the reader, that poorly deployed servers and software, of any sort, are just as dangerous as Windows. The true doomsday scenario would be networks of millions of zombie computers running on fast, versatile, and stable Linux platforms across the developing world.
On the other hand, I would say that Microsoft in its rush to lock out the developing countries with disabled operating systems, restrictive licenses, and jack-booted copyright enforcement might not be such a bad thing in the long run; however, it is up to the Linux and Open source community to fill the vacuum that we so strongly advocated. Both Nature and the Internet abhor a vacuum.

Chales Spencer is the founder of Spencer Global International with members in 10 countries across North and South America, Europe, and Asia. He currently heads up IT projects for SGmedia, the IT division of Spencer Global.
http://www.spencerglobal.com

Charles Spencer is also currently the editor of http://www.allsouthernchile.com, a development project for the promotion of Southern Chile in English.
http://www.allsouthernchile.com

Thursday, January 22, 2009

History Of The Computer Cache Memory Part 2 Of 2

Writen by Tony Stockill

(Times and speeds quoted are typical, but do not refer to any specific hardware, merely give an illustration of the principles involved.)

Now we introduce a 'high speed' memory with a cycle time of, say 250 nanoseconds between the CPU and the core memory. When we request the first instruction, at location 100, the cache memory requests addresses 100,101,102 and 103 from the core memory all at the same time, and retains them 'in cache'. Instruction 100 is passed to the CPU for processing, and the next request, for 101, is filled from the cache. Similarly 102 and 103 are handled at the much increased repeat speed of 250ns. In the meantime the cache memory has requested the next 4 addresses, 104 to 107. This continues until the predicted 'next location' is incorrect. The process is then repeated to reload the cache with data for the new address range. A correctly predicted address, when the requested location is in cache is known as a cache 'hit'.

If the main memory is not core, but a slower chip memory, the gains are not as great, but still an improvement. Expensive high speed memory is only required for a fraction of the capacity of the cheaper main memory. Also programmers can design programs to suit the cache operation, for instance by making a branch instruction in a loop take the next instruction for all cases except the final test, maybe count=0, when the branch occurs.

Now consider the speed gains to be made with disks. Being a mechanical device, a disk works in milliseconds, so loading a program or data from disk is extremely slow in comparison, even to core memory - 1000 times faster! Also there is a seek time and latency to be considered. (This is covered in another article on disks.)

You may have heard the term DMA in relation to PCs. This refers to Direct Memory Access. Which means that data can be transferred to or from the disk directly to memory, without passing through any other component. In a mainframe computer, typically the I/O or Input/Output processor has direct access to memory, using data placed there by the Processor. This path is also boosted by using cache memory.

In the PC, the CPU chip now has built-in cache. Level 1, or L1, cache is the primary cache in the CPU which is SRAM or Static RAM. This is high speed (and more expensive) memory compared to DRAM or Dynamic RAM, which is used for system memory. L2 cache, also SRAM, may be incorporated in the CPU or externally on the Motherboard. It has a larger capacity than L1 cache.

Tony is an experienced computer engineer. He is currently webmaster and contributor to http://www.what-why-wisdom.com. A set of diagrams accompanying these articles may be seen at http://www.what-why-wisdom.com/history-of-the-computer-0.html. RSS feed also available - use http://www.what-why-wisdom.com/Educational.xml

Ad Hoc Definition

Writen by Marc Keller

We have all heard the term ad hoc. What does this word actually mean? How do I use it properly? I have been asking these same questions for years. However, today I have decided to solve the mystery and find the ad hoc definition. I did what every inquisitive scholar does and looked it up on google. Here is what I found on the ad hoc definition. Directly translated from its Latin origin, ad hoc means "for this"—the term is generally used to imply that something is intended for a particular situation or purpose. Hence, an ad hoc committee is one that is formed to handle a particular issue. Something that is ad hoc or that is done on an ad hoc basis happens or is done only when the situation makes it necessary or desirable, rather than being arranged in advance or being part of a general plan. Interesting, huh.

So now that we have the ad hoc definition let's see if we can use it in a sentence that will impress your friends. For example, "On an ad hoc basis, Congress has placed ceilings on military aid to specific countries". In this case ad hoc is used as an adjective meaning improvised or impromptu. Now I suggest trying to make up a few of your own sentences and explain the use of ad hoc in each sentence. This will help you use the term in more impromptu occasions. While this has been a good ad hoc definition in general, ad hoc takes on a more precise meaning in different applications. In truth, the ad hoc definition is exactly that: ad hoc.

Common terms using this word are found in the IT industry and include: ah hoc network, ad hoc query, ad hoc surveys, ad hoc testing, ad hoc report, ad hoc analysis, and ad hoc protocol list. Actually, ad hoc has several specific applications in the world of Information Technology. The ad hoc definition as used in; ad hoc networks, ad hoc reporting and ad hoc testing has a very precise meaning pertaining to the Information Technology Industry.

When it comes to computer networks, ad hoc is typically associated with wireless devices. When a connection is established between two or more computers without having a base station, they have formed an ad hoc network. The ad hoc definition still holds in this case because the connection is not permanent but rather has been formed temporarily to meet a particular need. Ad hoc reporting, also called ad hoc querying, refers to a system that permits users to customize a data query from a database instead of limiting them to preset, "canned" options. Since the results of the query are dependent on the specific query submitted, they are created for the specific moment, ad hoc.

For software development companies, the ad hoc definition applies most frequently to testing. Ad hoc testing is a type of quality control testing that operates on randomization rather than on a fixed technique. Each test is created for a specific purpose it wasn't grabbed off a shelf. If you are developing software and don't have the time or resources to invest in properly testing it, Software development companies provides a host of testing services, including ad hoc testing.

My thirst for knowledge was been momentarily quenched with a sweet glass of ad hoc definitions. Ad hoc is a versatile term that properly used will impress your friends, and Information Technology group. Good luck in expanding your vocabulary and understanding of IT terminology.

Mark Keller is a Client Specialist with 10xmarketing.com, an internet marketing company. For more information on ad hoc definition visit http://www.aculis.com/testing/ad_hoc_definition.html at Aculis.com.

Wednesday, January 21, 2009

Reasoning Without Data

Writen by Lance Winslow

Some believe that there is no point in reasoning without data. Others cannot accept this and instead get by on reasoning based on intuition and even simply the belief that they should instinctively know. Many of the greatest theories in the world have come thru very little data or none at all. So many of these theories of past periods are later proven with data in subsequent future periods, thus proving you can reason without data.

Speaking from my own point of view and often working on intuition I believe that it is dangerous for innovation and the forward progression of the species to accept the notion that there is no point in reasoning without data. Often, I myself have no data for many of the concepts that I come up with. Indeed this may not mean they are always correct, in fact although many of my concepts or innovation could be said to be outright brilliant, some completely irrelevant, while others absolutely and utterly worthless. Of the ones, which are brilliant most are derived on "gut instinct," perhaps maybe based only slightly on observation and experience. If you work in a job, which requires innovative decision making; you may have enjoyed the same scenario. I have noticed that some of my best innovations that come from just thinking out in the blue in hindsight of the innovative thought in fact could not have been reasoned with data, for many times no data exists or worse of they are contrary to popular belief of current data.

So with this said, it might be reasoned without data that nothing completely out of the blue or a revelation type event in a completely new concept can ever be created if we do not allow ourselves to think and reason without data. Because no data has been created on something we do not know, to prove it would work or not work? If these folks who say you cannot reason without data really believe that it is not possible, then we ought to move them out of the way, as they are a barrier of nay Sayers which are impeding the forward progression of mankind. If they were right, and thank god they are not, then we would never create anything new at all. Think on that.

Lance Winslow - Online Think Tank forum board. If you have innovative thoughts and unique perspectives, come think with Lance; www.WorldThinkTank.net/wttbbs/

Tuesday, January 20, 2009

Read This Article If You Want To Know What A Uav Is

Writen by Lance Winslow

You have probably heard of the term UAV, it is an Unmanned Aerial Vehicle. It is a plane that flies by its self. Think of it as a Remote Control "RC" model airplane only it can be full size. The military has operated "Drones" or aircraft without pilots of almost four decades and many an aircraft has been used in this way as target practice for missile practice.

Today UAVs have so many different shapes and sizes. Some are for combat and some for surveillance. They are not just used in the military either. They can be used to scout fires, track drug traffickers or even survey the New Orleans area after Hurricane Katrina. The commercial uses are endless and there are endless types of unmanned vehicles today.

There are Unmanned Ground Vehicles UGVs like the ones in the DARPA Grand Challenge when they drove vehicles through the desert with no people in them autonomously, without remote control, fully autonomous. Vehicles like this might prevent soldiers dying from roadside bombs or patrol the US Borders, Power Plants or Military installations.

Then there are also AUV or Autonomous Underwater Vehicles, like submarines with no people. Some look like mini submersibles, some like small submarines and even some look like fish or sharks? Pretty cool, you will certainly wish to search this and learn all you can about AUVs.

Next up is MAV or Micro-Air Vehicles some are very small with wing spans the width of a mere piece of paper and some of these researchers are out to out do Moore's Law making mini insects that fly and they will be able to fly through debris for earthquake survivors, thru tree branches, windows and maybe even rotating fans. Can you believe it?

This new technologically advanced age of robotics will growing in the future and you owe it to yourself to learn all you can about these rapid advances. Think about it.

Lance Winslow - Online Think Tank forum board. If you have innovative thoughts and unique perspectives, come think with Lance; www.WorldThinkTank.net/wttbbs/

Reasons Why The Ipod Needs To Evolve Or Die

Writen by Dhruv Kumar

Since its launch, the iPod has become one of Apple's major products and sources of income. It has, arguably, been one of Steve Jobs's biggest successes after his return to Apple.

At the Macworld Expo keynote speech on January 10, 2006, Steve Jobs reported sales of over 42 million iPods in all, and 14 million in the first quarter of 2006. The iPod's market share accounts for about 75% of the mp3 player market. Calling it a runaway success wouldn't be too far from the truth.

All this may soon change, as the iPod is bound to take a hit in sales, unless it evolves with the changing needs of consumers.

The day consumers saw the entry of mobile phones with inbuilt mp3 players, all standalone mp3 players were issued a warning of things to come in the future. However, they still faced no real threat as these mobile-phone-cum-mp3 players just couldn't match the capability of a standard mp3 player. Sound quality wasn't as good, storage space was limited, and they were too expensive to realistically affect the mp3 player market.

But now, with hard-disk based phone-cum-mp3-players invading world markets, they may ring a death knell for iPods and the like. Soon, within the next year, if not today.

These so-called convergence devices not only have mp3 players, they also come equipped with digital cameras of fairly decent merit, some PDA functionality, 3G/EDGE, WiFi, etc. making these packages increasingly attractive to consumers.

Although these devices are right now rather expensive, costing about $600-$800 a piece for a (unlocked) 4GB hard-disk based version, they also have a slew of features missing in standalone mp3 players like the iPod. Most come equipped with integrated digital cameras (>2.0 megapixels in most cases), PIM facilities and 3G/EDGE (service provider dependent), and of course mp3 players running off of a hard disk. With dipping technology prices, these devices will become increasingly more affordable to consumers throughout the world, hence eating into the iPods pie, particularly damaging the Nano's marketshare.

Another advantage that these devices have over standalone devices is their single-package form factor, which enables users to carry a combination of 3 devices while populating just 1 pocket. And you only need to charge one devices instead of hooking up 3 devices to the power supply. Neat. All this makes it much more convenient for users to effectively utilize the vast range of functions present in these devices.

How often have you thought that you'd like to click a pic, but couldn't merely because you weren't carrying a camera? Haven't you found yourself wanting to listen to a particular song, but, once again, couldn't because you weren't carrying your mp3 player? All these problems will be things of the past with these convergence phones: this problem will vaporize as these phones are bound to be in your pocket at nearly all times (after all, how many of us would leave our homes without a mobile phone?). What this means is that you have all your coolest devices built into one, with you, at nearly all times, allowing you to use all these features whenever you want, wherever you want. Neat, once again.

Phones like the upcoming Sony-Ericsson W950 and the Nokia N91 are examples of such devices.

The Nokia N91 comes equipped with a 4GB HDD, 2MP camera, Symbian OS 9.1 and a slew of PIM features. It can be purchased for about $650 (unlocked). It's (and other similar devices') main advantage over the iPod is its vast range of functions, as well as the previously mentioned single-package form factor.

The moment devices like the N91 are available between $400-$450, they're bound to eat in to the market of standalone mp3 players, in particular the iPod Nano. At present, the 4GB iPod nano costs a cool $250. A lot of people wouldn't mind paying an additional 150 dollars to get these convergence devices, with a whole range of other features.

I'm not saying that the iPod will die – I'm saying it's going to be hit hard by such devices, some time next year – but it will eventually die unless it evolves (the concept of survival of the fittest). These new convergence phones just make much more sense than standalone mp3 players.

But, as seen in the past, Apple is a particularly robust and sound company, with strong fundamentals. It might quite easily be able to steer the iPod clear of any danger by releasing such a device of its own - that would be a coup of its own.

However, partnerships like the Motorola-Apple partnership yielded nothing, and had a minimal impact on the music player industry. Apple has to take this up more seriously, and, hopefully, independently. Maybe the Apple-Softbank collaboration will yield better results in making a proper mp3-player-phone.

And I'm also not saying that the iPod alone will be hit. All standalone mp3 players await the same fate. That of a shrinking market.

In any case, the iPod either needs to evolve, incorporating other features like a camera/phone, or face a shrinking market for stand-alone mp3 players and eventually die. Only the fittest will survive in this world of cut-throat competition. It remains to be seen whether the iPod is fit enough.

See the author's personal blog at Tech Quotient

Monday, January 19, 2009

An Ounce Of Prevention Protect Your Pc From Spyware And Surf Safe

Writen by Maureen Arnold

Spyware and Adware programs are the latest tools in the insidious world of information farming and computer hacking. The terms Adware, Spyware and Malware are typically used in an interchangeable manner by many end-users of PCs, but in truth, the definitions of the programs are different.

Spyware programs and applications are often downloaded unbeknownst to the end user, and installed in the computer's hard drive. These applications then (as their name implies) spy on the user, transmitting surfing habits, sites visited, demographic information and more to the company that inserted the program. A tremendous concern about spyware is not only breach of privacy for the end user, but a growing trend in identity theft, credit theft and other forms of illegal usage of the information harvested. Spyware programs are rife among sites that employ shareware downloads, such as Kazaa, Bonzi Buddy, Morpheus and other shareware sites.

Adware applications are generally applications that come bundled in with a software program in order to encourage the consumer to purchase more products, upgrade to a pricier version or to test out other programs.

Malware programs are programs designed specifically to destroy or bring harm to a PC and its functionality. Malware includes the typical viruses, Trojans and worms that are typically protected against by anti-virus programs such as Trend Micro's PC-Cillin.

While most end users typically employ some type of anti-virus shield, an alarming number of PCs are vulnerable to a spyware or adware program. Specialized programs exist which will shield computers from these specific threats. These specialized programs protect the end users in two ways. First, they protect the end user by employing a scanning technology similar to an anti-virus program. They will scan the PC and identify and remove and existing spyware on the PC. The second functionality is real-time protection, which prevents the re-infestation of the cleaned PC from any additional programs by notifying the end user of potential threats and preventing insertion of malicious code into the registry or other programs and downloads.

Most Spyware protection programs are downloadable from the internet, and several of them, such as NoAdware (downloadable at www.spybreaker.com">), offer a free scan of the end-user's PC before purchase. An ounce of prevention, though, is worth a pound of cure, though, and I highly recommend downloading a spyware protection program before your information gets hi-jacked.

www.spybreaker.com">Protect Remove Spyware, Adware & Toolbars

Sunday, January 18, 2009

The New Generation Of Apple Computers

Writen by Yina Dong

Despite losing ground to Microsoft and clone PCs, Macs still have a strong following, especially since an Apple Computer rarely becomes affected by viruses. Also, Mac enthusiasts, especially those in the design and journalism fields will attest to the power of the Macintosh in these environments.

Apple Computer is still adding new lines to the brand. Also, they once more revolutionized the computing industry a few years ago when they came out the the iPod.

iMac This is the Company's leading desktop computer, and the popular iPod was developed along with it. The introduction of the iMac in 1998 was directly responsible for Apple Computer's rising profit margins.

Power Mac This is Apple's high end personal computer; it is also referred to as a Power Macintosh.

MacBook The current Apple MacBook laptops come in three models, 1.83GHz, and two 2.0GHz, one white and one black; all using Intel Core Duo processors and equipped with 13-inch monitors. These replaced the previous PowerBook laptops.

MacBook Pro This is the high-end version of the MacBook, designed especially for business and other professional applications. There are currently three models available, two 15.4-inch models, a 2GHz and a 2.16GHz version, as well as a 17-inch 2.16 GHz model.

Mac Mini This PC is similar to the very first Apple I; the Mini Mac is the lowest price Mac on the market. This Mac is available in two versions and comes without a keyboard, monitor or mouse. They also use Intel processors.

Xserve Apple's contribution to the server business, Xserve, was first released in 2002. The Xserve can be used in a wide number of applications.

iPod This portable media player was another in a line of innovative designs from Apple Computer. This device has undergone various improvements since it was first introduced in 2002, the latest being the addition of video capabilities. Many now act as external flash drives as well, allowing the storage of photos and videos in addition to music.

Apple computers have come a long way since they were first introduced and continue to fire the imagination of Mac users worldwide.

Click here now to find more observations from Yina.

Saturday, January 17, 2009

Computer Training Your Gateway To The Competitive It World

Writen by Thomas DeReyna

Computers have been long since introduced among mankind; and it was not so long after people adopted it and became iconic as they are now. Most residence, nowadays, own a set or two of computers; varying from desktops, laptops, notebooks and the sophisticated palm versions. Computers have opened the Information World; and Information Technology now dominates most aspects of living from the outskirts of business districts to the desks of those rendering public service in the government, from the armed forces to the school grounds.

Amidst these overwhelming innovations, though, there are still those who're left with their simple beliefs and lifestyle; not even knowing how to perform a simple operation in a personal or desktop computer. And if you're among them, there's still time for you to catch up and start computer training.

Computer training will help you get familiarized with computers, its applications, dynamics and the technologies incorporated with them. You will be assisted by the knowledge you'll acquire throughout your journey while living in the computer age.

Advantages of Computer Training

Since your everyday life will mostly involve the use of computers and other digital facilities; it will do you better to gain proficiency with each of them. Computer training will arm you with the knowledge you need in operating computers and the things associated with it such as hardware, software and computer applications.

Most jobs and employment opportunities nowadays also require proficiency in computer and IT matters; most computer and IT-related careers commands high salaries and an employee's marketability largely depends on the diversity of his/her computer skills. Thus, being acquainted with every aspect of computers through computer training will give you the edge and high possibility of getting hired especially in multi-national companies.

Also, the business sectors and other aspects of society have evolved along with the evolution of computer technology; and most business establishments run their entities with computers. It is advantageous to have systematic business processes like staffing, accounting, filing and other transactions made possible with computers; thus, if you're planning to start-up a business or wants to establish your business, it will help you a lot if you're aiding your daily business routines with computers. Hence, the need for you to undergo computer training for improved business handlings.

Computer Training Schools

Computer training is mainly divided into several divisions of learning so as to have organized learning process; these are mainly hardware, software, networking and web development. Other computer training will also include basic computer safety, maintenance and troubleshooting. And you'll learn all these in computer training schools and centers.

There are many schools and training centers that offer computer training and educations; they mostly offer certification courses or degree programs. Here are few tips on how you can find good schools for your computer training:

- Consider the size of the class. It is better to enroll in a computer training course where there are fewer students for the instructor to attend to; you'd be given more attention and guidance through the learning process in this case.

- Look for a school that offers enough training facilities. It is better to learn computers through hands-on process, thus, it would be better if each student is provided a computer. It is also good to learn in a more conducive place.

- The school you're planning to attend for computer training should be certified so you'll be assured of the quality of teaching that you'll get from them. And they should issue certificates for your training; you can use these as proof of your computer studies.

- Your school should also have convenient location and scheduling. Especially for those who are already working and needs certification, you should find schools that offer classes in your most convenient time and are located in a more accessible area.

- Lastly, you must look for computer training schools that offer reasonable training costs and fees. There are also available financial aids that may help you out.

There are also many programs and software available on the Internet that can aid you with your computer training; thus, you can have self-taught computer training at home in your most convenient time.

Thomas DeReyna is a freelance publisher based in Cupertino, California. He publishes articles and reports in various ezines and provides a news blog.

Why Every Company Needs A Fax Server

Writen by Chris Norwood

Every day more and more businesses of all sizes and types are developing or refining their strategy to transmit, store and retrieve their business documents electronically. And while the majority of all electronic document transmission is primarily conducted via email, or downloaded from the internet, smart organizations realize a critical part of this strategy also involves the handling of their inbound and outbound fax traffic.

Every company needs a fax server for the following reasons:

  1. Competitive necessity. The faster business documents transmitted by fax, either sent or received, reach the proper destination the higher probability of increased organizational efficiency.
  2. Increase employee productivity. Fax Servers allow users to send/receive faxes from their computers without leaving their desks. These faxes can be sent either from thin, thick or internet based fax client (Microsoft Internet Explorer) or email application such as MS Outlook/Exchange, Lotus Notes, Novell Groupwise. The most common operating systems used are Microsoft Windows XP and Microsoft Windows 2000.
  3. Minimize consumable costs such as paper, toner. The typical fax transaction first requires the document to be printed to a printer and delivered to a fax machine via sneaker net. Documents that are transmitted via fax server start electronically as word processing documents and end electronically as digital images at the recipients' destination.
  4. Documents transmitted via fax server are recognized as legal documents in a court of law. Once a document has been transmitted by fax, information about the fax transmission is recorded during the process, including date/time of transaction, duration and total # of pages.
  5. Improve Customer Relationships and Find New Opportunities. Fax documents are always read or at least perused. If the information on the fax properly addressed to a particular recipient or addresses an immediate business need, there is a good probability of some sort of response. Many fax savvy organizations use fax for newsletters, press releases, billing, product announcements and expedited contract delivery.

    Try the following: Go into your existing customer database and choose an existing client. Send a fax concerning a new product release or update directly to his or her attention. In addition, within the fax, provide multiple methods of return correspondence i.e. email, website, telephone and a deadline for response. Chances are you will receive some level of response faster than email!

  6. Email Alternative. While sending emails is extremely reliable and common practice, it has its draw backs when dealing with loan applications, purchase orders and signed contracts. Business conducted with these types of documents typically occurs via fax machine or fax server.
Technically, what do Fax Servers do?

Fax Servers compliment all business units in one form or another. They convert documents from their native format into Black and White Tiff G3 or DCX format. These tiff documents are then sent over the PSTN (Public Switched Telephone Network) or IP (Internet Protocol). Fax Servers can integrate into any application, Email system, ERP, CRM or operating system in the world. They can interrogate raw text from any AS400 or Host based output system and convert it into a legible formatted document (either PDF or Tiff). Some Fax Servers can also send email, act as middleware, fax enable websites, operate as a back office application or be used in an ASP service bureau model.

Summary

Fax Server technology has been around since the late 1980's. Even though all fax servers are not created equal, there are fax servers available for every platform i.e. Microsoft Windows, Unix, Linux. The most reliable fax servers primarily support intelligent fax cards such as Brooktrout, Eicon, Pika Technologies or Natural Microsystems. Depending on your organizations needs, infrastructure and budget, there is a fax server solution out there for you. If you are entire organization is sending or receiving more than 20 pages of fax per day, ROI cost justification can be 3 months or less.

TargetFax Document Imaging - Chris Norwood has been in this industry for over 13 years and is currently the Business Development Manager for One Touch Global Technologies. One Touch Global Technologies is a Platinum Solution Provider, Specialized Software Developer and Systems Integrator for several of the leading fax server and document management technologies on the market. Chris may be reached directly at cnorwood@otgt.com. http://www.targetfax.com

Friday, January 16, 2009

Build Your Own Computer Or Buy

Writen by Ron King

Just look inside a computer case. At first glance, all those wires and components can look terrifyingly complex. And thinking about putting them all together by yourself may seem impossible.

Not to worry! Even though they are the products of advanced technology, the various pieces of a personal computer (PC) fit together with simple connections. If you can use a screwdriver and follow simple instructions, you can build your own PC.

Don't be intimidated by the task of connecting the computer components together. Many of the internal connections are molded so that it is impossible to fit them together the wrong way. If you have ever assembled a child's toy, you are more than capable of assembling a computer.

Advantages Of Building Your Own

You are probably asking yourself why anyone would bother to build a PC. After all, you can buy a cheap computer in almost any retail store.

If cost is your only consideration, you probably are better off buying one of those cheap machines. But if you have any special requirements for software or hardware, you'll benefit from the total control over the type and quality of components you get from building your own PC.

You can save some money, too. Although you probably can't match the price of the cheapest preassembled PC, once you begin adding on the inevitable customized hardware, the costs go up anyway. Suddenly building your own computer starts looking cheaper. And don't forget--those super-cheap PCs are bare-boned systems. Unless you need a computer only for basic word processing and e-mail, you will probably have to upgrade anyway.

Building your own PC can be a great learning experience. You will gain a better understanding of how the various components work together, knowledge that can be useful for troubleshooting. If your computer ever breaks down, you may be able to pinpoint the problem and fix it yourself, saving money on expensive repair bills.

You are virtually guaranteed to get the best computer when you build your own system. Big retailers often use cheaper OEM (Original Equipment Manufacturer) components to cut down on costs. Components like these can compromise the performance of a computer system. Although you can buy OEM components yourself, the trade-off in reliability and stability is usually not worth it. Brand name components are just a bit more expensive, but are well worth the cost.

Disadvantages

The major disadvantage in building your own PC is that you don't get a system-wide warranty. For example, if a malfunctioning motherboard fries your memory chips, you may not be able to get compensation for the damaged memory. If something like this happens with a store-bought system you could probably get the whole computer repaired under the warranty.

However, if you buy all your components at the same time from the same retailer, you are more likely to be compensated for this kind of situation.

Time is, of course, a factor. But it is educational time. And if you enjoy tinkering at all, it counts as fun time as well.

The Bottom Line

Building your own PC has a lot to offer. You'll be assured of getting the best components available, which translates to the best and most reliable computer for your money. You will learn about computer components and how to choose parts with the best performance. When it comes to servicing your computer, you may be able to solve and fix the problem yourself.

Oh, and one final advantage. The bragging rights of telling your friends that you built your own computer. Priceless!

About The Author
Ron King is a full-time researcher, writer, and web developer. Visit http://www.build-computer-now.com to learn more about this fascinating subject. Copyright 2005 Ron King. This article may be reprinted if the resource box is left intact.

Computer Projector Rentals

Writen by Eric Morris

Computer projectors have become indispensable for company presentations. The audio-visual impact alone really drives a difficult point home.

Most computer renting companies also provide computer projectors. However renting a computer projector can be complex as projectors are custom-designed for different operating systems and even processors. Before renting, a company will ask what computer will be used: iMac computers use different types of projectors than IBM. The resolution and the video card of the computer also matter in the final output on the projector.

Another factor is the room size and lighting. Rooms that cannot be darkened would preferably need a LCD screen. LCD screen would also Plasma monitors would suffice if the assembly will be small. The size of the monitor would also depend on the size of the room and how far the people are going to sit from the display. Sound quality is also affected by the size of the room.

Before renting a projector, inform the renting company whether videos are to be shown or just slides and transparencies.

Computer projector renting companies usually setup the entire audio-visual equipment when a rental order is placed. Get the whole thing checked, for video and sound quality. Also try out the projector before hand, especially if there are laptops to be used. The renting company also undertakes the dismantling of the unit after the program is completed.

Renting companies allow their projectors to travel with the business if necessary. For portable projectors, insist on a case to pack the equipment. Also the projector itself should be lightweight, not weighing more than 10 pounds.

Costs of renting computer projectors are tax deductible if they are used for business. Companies may pay for them using checks or their company credit card.

Computer Rentals provides detailed information about computer rentals, laptop computer rentals, computer projector rentals, desktop computer rentals and more. Computer Rentals is the sister site of Nature Screensavers.

Thursday, January 15, 2009

Quotspybot2bsearch2band2bdestroyquot Who Else Wants An Explanation

Writen by Jack Smersh

SpySheriff Activation Code- Warning! 29 Adware PC Removal Spyware Programs Are Fake!

"Spybot%2BSearch%2Band%2BDestroy". OK, I said it again. But, what does it mean? Spybot%2BSearch%2Band%2BDestroy is they way your computer files will read after a spyware program has scrambled your data.

For example, it will happen after you enter the SpySheriff Activation Code or SpySheriff Activation Key when installing the fake SpySheriff anti-spyware program.

It's also a literary device to wholesomely represent profanity. It is what you'll utter after your system is infected with spyware as in saying, "Spybot%2BSearch%2Band%2BDestroy"!

Spybot%2BSearch%2Band%2BDestroy is what your bank account and credit report will look like after SpySheriff or other spyware have stolen your personal information, Social Security Number and passwords.

COMING CLEAN ABOUT "Spybot%2BSearch%2Band%2BDestroy"

OK. OK. I'm making a little joke about what Spybot%2BSearch%2Band%2BDestroy really means. Spybot%2BSearch%2Band%2BDestroy is actually the FREEEE Spybot Search and Destroy when written in clear text. The "%2B" is HTML for a blank space between 2 or more HTML file names.

However, I'm NOT joking about spyware stealing your personal information and possible identity theft.

As you read each word in this article you will sink deeper and deeper into the thought, "I've got to do something fast about the spyware on my computer".

29 ADWARE PC REMOVAL SPYWARE- FAKE ANTI-SPYWARE PROGRAMS

There are a minimum of 29 Adware PC Removal Spyware Programs that are fake. There may be hundreds.

This means you are risking your personal data and normal computer operation if you download just any old spyware program from XYZ website.

These fake anti-spyware programs like Spysheriff and SpyFalcon purport to find spyware on your computer. They then entice you to download and install the fake anti-spyware program. The fake program opens the door to real spyware.

Use only those anti-spyware programs that have well reviewed by the major computer magazines.

THE REAL WORLD

Recently a client presented me with a laptop infected with a variant of SpySheriff. After booting up, the normal Windows XP wallpaper was replaced with a stridently worded blue screen error message.

The message stated, "Warning Spyware Threat Detected! System Error #1752". At the end of the message there were two hyperlinks to click on to remove SpySheriff.

What do you think my client was saying about now? You guessed it. She was saying, "Spybot%2BSearch%2Band%2BDestroy"!

There was also a red dot in her System Tray on the Windows Taskbar. This was another symptom of SpySheriff and its clones. Had my client clicked on it and entered the SpySheriff Activation Key she eventually would have unleashed a Pandora's Box of spyware on her system.

Did my anti-spyware weapons fix my client's laptop? Unfortunately, I never got to use them because she also had 15 viruses. The viruses corrupted the boot sector of the hard drive and resulted in a "Missing Operating System" error.

I won't bore you with the bloody repair details.

IT ALL COMES DOWN TO THIS

Are you beginning to see you have to take action on the spyware menace now? Of course you are.

And as you absorb this information you'll feel the need to get one anti-spyware program to start. The best thing to do is talk to your local computer professional.

PUTTING IT ALL TOGETHER

Let's summarize. You like playing Russian Roulette if you don't have anti-spyware tools. You're just asking for spies inside your computer. About eighty per cent of all PC's have spyware according to industry estimates.

Spyware on your computer is like having an electronic bug in your physical home or office.

Do not download and install the fake anti-spyware program SpySheriff. Do not input the SpySheriff Activation Code when prompted. Ignore my advice and you'll be saying naughty things like "Spybot%2BSearch%2Band%2BDestroy"!

ABOUT THE AUTHOR
Jack Smersh is a self-confessed spyware killer. Who else wants to kill the spyware on their computers? Protect your privacy. Stop the theft of your identity with right weapons. Click Here Now ==> Spyware Remover. Hankering for more info? Get the full version of this article. Click Here Now ==> Spybot%2BSearch%2Band%2BDestroy.

Wednesday, January 14, 2009

It Service Contracts Essential Recurring Revenue

Writen by Joshua Feinberg

Professional companies need consultants that offer IT service contracts, not simply those that handle emergencies on an as-needed basis. If you don't offer on-going IT service contracts, you end up with either too many people calling you, or not enough. IT service contracts allow your clients to get the most out of their IT investments because it helps them implement long-term fixes and plan for the future. They can also make your life easier by providing a schedule and a plan for dealing with the needs of your customers and bring you a source of dependable revenue.

Recurring Revenue

The best companies will request IT service contracts to handle their many needs. Your success or failure in the future will depend upon the service you provide through these contracts and will in turn determine their importance to your business. One-shot deals and simply relying on emergency work and spot-checking will leave you both frazzled and uncertain.

You can use recurring revenues obtained through dependable IT service contracts to help build your business foundation. There is no way to determine how long your company will last unless you implement this type of revenue into your business plan from the very beginning.

It Service Contracts Are Essential

Once you start to use IT service contracts as part of your major business plan to provide recurring revenue, you need to start thinking about whether or not you want to get involved with clients that don't want to sign long-term clients. The ones that do are asking specifically for your services, and want to develop a relationship with you that will last into the future. Their investment will be essential to building and growing your business, and will help you plan what shape and form your growth will take.

Copyright MMI-MMVII, Computer Consulting 101 Blog. All Worldwide Rights Reserved. {Attention Publishers: Live hyperlink in author resource box required for copyright compliance}

Joshua Feinberg, co-founder of Computer Consulting 101, helps computer consulting businesses get more steady, high-paying clients. Learn how you can too. Sign-up now for your free access to these field-tested, proven business strategies on the Computer Consulting 101 Blog.

Getting Back To Basics Creating A Logo From Start To Finish

Writen by Bernard Peh

When I began my career in the graphics industry, almost 17 years ago, I would approach the design of any new logo by first taking out a pad of paper and a pencil and sketching out basic ideas before diving into any real concept creation. As computers and design software became more and more a part of the design process I tended to find myself heading to the computer immediately to put together my ideas. This only tended to result in a lot of time spent staring at a blank computer screen. As my business expanded and time became a more precious commodity I began to head back to my early days and approached my designs again with a pencil and paper before sitting down at the computer. This not only gave me more free time but helped me to increase the profitability of my business. The following is an outline of the design process I now take whenever I am creating a logo for a client. I hope it will inspire some of you to take pencil in hand prior to sitting down in front of the computer.

Core Practice Partners is a leading international expert in Labor Management for companies that don't work a traditional "9 to 5" schedule. Their clients have included such industry leaders as Kraft, BMW, and General Electric. Their approach to creating solutions for their clients is unique and their desire was to have a logo that was both professional and creative. They approached my company with a few ideas of their own, but were very uncertain whether the look they truly wanted could be achieved. I first set up a phone conference with their president, John Frehse, to discuss the goals he had for the logo and how he wanted to be perceived by the clients he serviced. After our initial discussion I sat down at the drawing board to rough out some ideas for the logo. This is the normal approach that I take in the designing of any logo. It allows for the creation of many concepts within a short period of time and dramatically decreases the amount of time spent producing the initial concepts to be presented to the client.

Once I had 6-8 rough ideas conceived I then scanned in the designs and used them as templates for the creation of computer generated concepts. I typically place them in the background and insert text and graphics over the top. Once the groundwork has been laid in I then remove the sketch from the background and add the finishing touches.

The initial presentation to the client contained anywhere 4 concepts that I felt worked best with the impression they were looking to achieve. These first ideas were presented in black & white. I have found that clients will initially lose interest in a concept if the colors are not to their liking. On more than one occasion I have seen ideas rejected solely on the basis of the colors used without the client giving any regard to the overall design presented.

Once a concept was chosen by the client the design was revised, if necessary, and then rendered in color and resubmitted to the client for approval. There are usually 6-8 color renderings for the client to choose from, in this case there were 8. Most of these featured colors from the same palette (warm, cool, etc.) and there will be perhaps one or two ideas that could be considered "outside the box". It is these additional color options that will either direct the client towards the preferred palette or will illicit a sense of excitement from the client about color choices they never imagined would be appealing. This can be one of the steps where a real sense of creativity can be injected into the design process.

The client immediately accepted one of the designs and now the only step left was to finalize the project. I provide most of my clients with a CD that contains their logo design in a number of different formats. Some designers may feel this enables the client to take the design and use other sources for the rest of their design work, but I have found that this merely gives the client a sense that they have recieved something concrete and if I have done my job correctly and have fulfilled all their desires then they will certainly use my services again.

As it turned out in this case I was hired by Core Practice Partners to design their stationery as well as numerous marketing materials. The logo of a company is an integral part of their brand identity. By establishing a good relationship with a client in this critical step towards creating the brand that will become their public presence you can build a solid foundation to creating a long term position as their designer of choice.

More images and details could be seen at http://www.sitecritic.net/projectDetail.php?id=8/

Sitecritic.net Web Site Reviews is formed by a group of web addicts, mainly volunteers from all over the world. Our goal is to create a community of web designers and developers who share the common interest in bringing out the best in creatiing effective web sites.