Jumat, 30 April 2010

Best Place To Buy Macbook Cheap -- Finding Hot Deals

There's no doubt in my mind that the new Apple Macbook is one of the best laptops in the market right now. Upon release, I began to scour the internet for some great cheap Macbook deals.

I'll first teach you how to spot one yourself. This applies to any thing that you may want to purchase online.

Things to watchout for:

1) Is it in stock?

There are a lot of online dealers out there allowing you to buy the Macbook online but don't tell you that they don't have it stocked yet in their inventory, so it will actually take some time for you to order. Watch out for these people.

How can you tell? Always look for an authorized dealer. Authorized dealers usually post the information regarding the number of items left in their inventory. If it is a very reputable online site, then it's a safe bet that your future Macbook is ready for shipping.

2) Bonus deals

One of the things people don't know about is that, online dealers usually spice the item up in their online store (if they have a physical one) because they're encouraging online orders! They have to give you a better deal otherwise they would be losing a sale to a physical store such as your local BestBuy.

If you don't get Bonus deals out of it, then you may be better off going to the nearest dealer and actually buy your Macbook there.

3) Rebates

Ahhh Macbook cheap deals should have rebates! Mail-in rebates actually decrease the total cost of your Macbook. So instead of paying let's say $1100, after some time you get your $100 back.
Total cost: $1000...not bad eh?

Again, if there are no rebates... go buy your Macbook somewhere else.

4) Financing Options

A good deal offers a great financing option. Low interest payments per month, 0 payments for a certain period of time, all contribute to the overall Macbook cheap deal. The great thing about financing plans is that you really don't have to spend a big chunk of your cash at one period of time. The idea here is to spread your costs over a relatively longer period of time.

When you do this, you can be productive with your new Macbook, get some cash going, and actually pay for those small amounts over let's say 6,12,18 months?

Where to find all these?

Each and every online store will have different features, different bonuses, etc. One factor to consider is buying from a very reputable website.

I consider Macmall to be the best place to buy a Macbook. When I bought my Macbook I was only able to avail of the $50 rebate but now the rebate is already at $100! What a great deal!

Final Words

The Apple Macbook is one of my best purchases yet. No viruses, no hassles, cool eyecandy, fast and reliable performance, all in one! All my pc-using friends have envied my Macbook for a lot of reasons among them of course is the design of the Macbook, simple, classy, and it doesn't look like all the other laptops out there.

Finally, it's a joy to bring to work. I can type all day long and not feel any eye-strain, I can be sure that my Macbook won't crash on me when I have a big project to do and here's a big plus:

It runs Windows. I can still play games with my friends and switch back to OS X when I want to work! If you're still thinking twice about buying a Macbook. Don't. Stop thinking and just buy it. You'll never regret your purchase.

Super tip:

There's a super tip you can take advantage of right now, I made a site/guide for free so you can purchase your Macbook with ease.

What To Do With An Old Computer System

Anyone who has purchased a computer system has learned how quickly they lose their value, and become obsolete. This rapid devaluation often leads to the dilemma: what to do with an older system, when you’re no longer going to use it? Selling it is most often a waste of time and effort. A computer bought for $3,000.00 on January 1, 2005 and then put up for sale on December 31, 2005 will rarely bring offers of more than $100.00 - $150.00, and even these don’t come often. Older systems are proportionately less valuable. One quick, easy solution is to donate the computer system to a charity, and write-off what is appropriate. However, charities are quickly becoming more and more skeptical about accepting older computer systems, and less and less likely to surrender receipts (for use with a tax return) for very much money. Sometimes it is a wise course of action to simply 'cannibalize' the older system for components that will work in other systems. Some components can be switched between older and newer computer systems. These can include power supplies, hard drives, RAM, graphics cards, speakers, keyboards, CD and DVD readers/writers and so forth. If you have a use/need for your old DVD burner in your newer system, you're almost always best off going the 'cannibal' route. But there are some other options, some of which can be quite attractive. Sometimes, the otherwise out-of-work computer system can be set to tending some necessary and/or useful affairs and matters. Hand-in-hand with cannibalizing is stripping out components and selling them individually. This can be especially beneficial if you recently installed a hardware upgrade to the now defunct system such as a good DVD or CD reader/writer, or a new hard drive. Not only are the components often easier to sell, they will bring more money and ship much, much easier – and cheaper. DEDICATED FAX SYSTEM You can turn almost any old system into a dedicated fax receiver at either your home or office. It can be incredibly convenient to have a fax at the house! Anyone who has bought a house or car lately will attest to how nice a fax at the house would be. Remember, the system does not have to be set to always receive faxes. You can turn it on or off as you deem necessary based on your use and needs. All your system requires for this application is a phone line, a modem, and Windows®. The fax service in Windows® must be turned on and configured in order for this to work properly. This is very easily accomplished through the Control Panel of Windows. HOME ENTERTAINMENT SYSTEM Recently, manufacturers of computer systems and components have entered the home entertainment business – with a vengeance. No longer are computers just good for games and music, now you can hook them up to control your TV, cable signals, speaker systems, VCR, DVD player, etc. You can even record to and play from them. The system would need some hardware and software, but not too much, and all of the necessities can be had at reasonable (and quickly dropping) prices. You can learn more about the rapidly growing home entertainment computer systems industry on any number of sites on the Internet. A good place to start is www.microsoft.com/windowsxp/mediacenter/default.mspx. As you can see, you don't have to throw up your hands and scream when you're offered 5% of what you paid for your computer system a year earlier. There are some other options, some of which can be quite satisfying and rewarding.

What is a Runtime Error?

Runtime errors are glitches or problems that occur when a computer program is executed. Because a wide range of errors is usually grouped under the collective term of a runtime error, the operating system usually provides some information about the nature of the error that has occurred. The message provides the end user or the technician with some idea of what component has failed to launch properly, and provides a starting point for seeking resolution to the issue. A runtime error may occur due to some serious corruption within the program, or it could simply be a one time event that can be overcome by simply rebooting the program and starting over. However, when the runtime error continues to appear consistently, that is an indication that a permanent issue exists, and should be addressed as soon as possible. How Do I Report A Runtime Error? If you are at work and experience a runtime error with your workstation, your first option is to reboot the machine and see if you experience the same error a second time. It is not unusual for system support people to try this first as a way of clearing out whatever caused the runtime error, so it generally won't hurt to try it yourself. If this doesn't work, then it is time to call for technical support. In order to assist the support team in dealing with the runtime error, it is a good idea for you to record basic information about the nature of the error. The first component you should make note of is the error message you receive along with the numerical designation of the runtime error. Be sure to copy the text of the message error exactly as it appears on your screen. Do not attempt to summarize the content of substitute words in the text. Runtime error messages are standardized and providing the support team with the correct information will make it much easier to fix the issue. Second, note exactly where you were in the system when the error took place. If you were putting together a letter in your word processing program, make note of the file you were using, it you had already saved it or were using a template. Identifying what you were doing will also help isolate the origin of the problem. Next, record exactly what you were doing when the runtime error occurred. For example, if you had just attempted to save a letter, make note of that. If the error occurred when you started a new paragraph, or attempted to run the grammar or spell check feature, make sure to tell the support team that. If you know where to find this data, make sure to check the general state of the workstation when the error occurred, such as the memory, disk, and CPU usage. If you are not sure where to find this detail, simply pull back from the machine and wait for someone from the support team to provide you with further instructions.

Kamis, 29 April 2010

Best Passwords

No sane person would ever like someone else reading her email. Or for that matter some other person using her password and breaking into a financial institution. You should, therefore, choose a strong, secure password in such a manner that would be a hard nut to crack for others and easy for you to remember. The more random and mixed-up you make it, the harder it is for others to crack. Mind you, if your password is compromised, the password crackers will even take over your identity.

A password, if too short, is vulnerable to attack if an attacker gets hold of the cryptographic hash of the password. Present-day computers are fast enough to try all alphabetic passwords shorter than seven characters. We can call a password weak if it is short or is a default, or which can be rapidly guessed by searching a subset of all possible passwords such as words in the dictionary, proper names, words based on the user name or common variations on these themes.

On the other hand, a strong password would be sufficiently long, random, or which can be produced only by the user who chose it, so that 'guessing' for it will require too long a time.

For maximum security, the user should follow some simple guidelines:

1) Passwords should preferably be at least 8 characters long and not more than 14.

2) Passwords should contain a mix of numbers, letters, and special characters (%&3ac_ht4@m7).

3) Passwords should not contain a dictionary word from any dictionary, be it French, Spanish, medical, etc.

4) Each password should be different from the user's User-ID and any permutation of that User-ID.

5) New passwords and old passwords should differ by at least 3 characters.

6) Avoid picking names or nicknames of people, pets, or places, or personal information that can be easily found out, such as your birthday, address etc.

7) It’s wise to stay away from common keyboard sequences, such as dfgh678 or abc345 .

8) Never form a password by appending a digit to a word. That can be easily guessed.

9) Avoid writing your password down or storing it on your computer.

10) Never share your password with anyone else.

What Casino Games Should I Play?

Choosing the right casino game to play is very important. A novice gambler should not be playing games of skill such as blackjack and poker, and needs to be informed of what the other games have to offer. Slot Machines, in the days of the Wild West Slot Machines were known as one arm bandits because you could sit there all day putting in coins and pulling that handle without ever getting a win and the same is true today. Today's slot machines have more ways to win, so you probably will not go all day winning nothing but other then some small five dollar or less wins you probably won't do to well on the slot machines. If you insist this is the game for you try to remember that the more the machine is the better the odds of you getting a bigger win. Roulette, this is a good game for the beginner with just a little bit of knowledge you can play roulette because it requires no real skill or experience. The only thing you need to know are the procedures to playing in a casino, and the different bets you can make. All of these things can be learned by just watching the table for a few spins of the wheel before placing any bets. By sticking to what is called betting the outside of the table you can give yourself odds as low and 1 in 5 of being able to double your money. Unless you have the money to risk it is not a good idea to bet the inside of the table, the odds are bad but if you do win it can be up to a 37 to 1 payoff. Keno, this is a game that older people and people with little money enjoy. Keno is basically playing a lottery that has a drawing every 5 minutes. The object is to guess which numbers the computer is going to select. Depending on how many numbers you get right and how much you paid for the game winning can pay up to 1 million dollars. Craps, even though Roulette may be easier to play for a novice player, it offers the best odds for the player in the casino. To most people who have never played craps before it can seem like a very difficult game, but after watching a few rounds of the game for a bit you will quickly pick up on how to bet, and most players say of all the most Popular Casino Games craps is much easier to win larger sums of money in the casino. Poker an Blackjack are two games that should be avoided by beginner gamblers, the games rely on more skill then luck, and by not knowing the game you will also be messing up the other players who know what they are doing, and they are counting on the fact that if you sit down at the table with them that you know what to do. If it is these games that interest you then before you go to the casino spend some time learning the game and playing as many hands either in an online casino practice room or you can download one of the many programs available on the internet.

Types Of Paper Shredders And How They Work

Ever wondered how the high speed paper shredder you saw in your office worked? Or the industrial paper shredders at your factory? Ever marveled at its ability to take in large volumes of paper, oceans of information and effortlessly turn it into meaningless bits and pieces of paper scrap which have lost all ability to convey any information. And that these bits and pieces of paper scrap are what guarantees the security of your precious information, ensuring it doesn’t fall into the wrong hands and cause irrevocable damage. So how do these paper shredders really work? What keeps them going? Papers shredders are typically manufactured in two standard configurations depending on the mechanical operation with which they cut the documents. The first type of paper shredder is the strip cut paper shredder and like the name suggests it reduces input paper into strips of finely cut paper. A single sheet of paper fed into the average sized paper shredder will be decimated into probably 15-20 strips of cut paper. This type of paper shredders have a series of parallel serrated blades mounted on a steel frame and cut the paper sequentially in a periodic motion as the paper moves on the rollers inside the paper shredder. Several industrial paper shredders manufacturers employ this type of shredding for their high speed high volume throughput paper shredders. The second type of paper shredder is the cross cut paper shredder which has a different mechanism of shredding the document as compared to the strip cut paper shredder. In this the blades cross each other in a synchronized motion so the cuts of the paper happen cross to each other and not in parallel strips as the former case. A mechanical or electric timer inside the machine ensures that as the blades cross each other, the paper moves at the same speed so that the pieces of shredded paper are equal in size and tough to be reconstructed from. High end industrial paper shredders which have automatic feed rates and programmable shredding parameters might feature the cross cut paper shredding technique for effective and secure document shredding. Typically if you have an effective post shredding procedure for destroying the shredded paper, then the security that the strip cut paper shredder offers you should be convenient and satisfy your requirements. On the other hand if you need to personally ensure that the document shredding process has been completely executed without compromising document security and if your volumes of paper shredding required are only moderate, then you might want to adopt the cross cut paper shredder. If you have the time, do explore more of our site to find in-depth answers to all your document shredding needs and also some valuable resources on where to find the best deals on paper shredders on the net.

Rabu, 28 April 2010

Best Features Of A Digital Camera

It takes one around and through the digital camera so one knows how it works and what its features are used for as there are hundreds of links to the best sources and products so you can learn even more. There is a great variety in cameras for example the one for the beginners has E-TTL II for stable flash exposures and improved White balance compensation for the clarity of the picture. To store these cameras there is a specially designed carry case with internal pockets large enough to hold money or credit cards.

Zoom cameras:

Zoom cameras are used for a better picture and better efficiency by moving the sensor itself to give a better quality of picture. There is an image processing technology, which gives users images as beautiful as those they see with their own eyes and this makes the camera a special one. Some cameras can be described in a sentence by quoting that Good things come in small packages like this digital camera. Most of the good quality cameras are clear, high-quality prints so that one can capture the picture in a better way.

Small cameras:

The best part of a small digital camera is that this digital camera is smaller than a matchbox and stores a lot of pictures in its internal memory. Most of the manufacturers have a latest sensor, the all-new eight mega pixels four-color there was ignorance to all other changes that made a formidable combination with a high quality mechanically linked zoom lens. There are many spy cameras with functions that can be of a great use and chief among them it's super compact size and as it is of the size that is as small as a credit card that is beneficial for users to carry.

Thousands Now Adware Removal Who Never Thought They Could

The first is a non technical method which requires the use of adware removal software. Download free adware and spyware removal software and use advanced tools to help prevent getting infected. Spyware scan review is a free service for anyone interested in downloading spyware/adware removal software. Our adware remover is the most trusted adware removal software in the world. Additionally, adware operations are increasingly asking that their software no longer be uninstalled by adware/spyware removal companies. Download and run an adware or spyware removal program. Use an adware removal program to scan the system and remove adware. Spyware/adware removal software is a special kind of program that is written to isolate and remove spyware and adware from your computer. Download and run an adware or spyware removal program. GoodBye Spy is a multi-adware removal program, which supports the removal of spyware, adware, Brotherware, and more. How not to get spyware Finally you need to install and run a good spyware/adware removal program. The results displayed by a spyware/adware removal program can be disheartening. If you use programs such as KaZaA, Opera or GrokSter, adware removal can be virtually impossible without disabling the program itself. Advanced spyware removal and real time monitoring utility GoodBye Spy is a multi adware removal program which supports the... After that, restart your computer and run an adware-removal program to see whether that took care of the problem. Step 1: The first thing to do is download a free and trustworthy adware and spyware removal program. You still need run your adware removal program regularly. There are some utilities specifically designed for adware and spyware removal from your computer. All spyware/adware removal software will require periodic updating, similar in concept to updating virus definitions, so always check for updates before scanning your computer. Consult their websites and especially the Help sections for details on how to use these spyware/adware removal tools to scan your computer. However, adware removal is a difficult and complicated process for even the most experienced computer user. Fortunately, there are many options for prevention and the safe removal of Spyware/Adware from your computer. Consider adware and spyware removal an essential part of your desktop computer maintenance routine. The easiest and best way to fully detect and remove spyware/adware from a computer is to use adware removal software like Ad-Aware or PestPatrol. and protect yourself from scumware and all sorts of adware spyware, a super adware spyware removal tool for your ! The removal tool will eliminate any adware or spyware that you have in your machine for good. If you would rather not peruse endless folders or risk re-infection, a trusted tool such as Spyware Doctor should be used for adware removal. This spyware and adware removal tool detects and removes 1000 of security threats such as spyware, adware, keyloggers, browser hijackers, tracking cookies, and trojans. ITS recommends installing and using the spyware/adware removal tool "Spybot-S&D". Best free adware and spyware removal tool downloads. Next, if you're already using an adware removal tool, you should ensure that you have the latest update. Usually an adware removal tool can quickly be downloaded and installed, and are easy to use. For easily protecting yourself against such threats and to easily get rid of them, please download: free spyware adware removal tool - Spy Sweeper. http://www.adware-removal-spyware-tool.com/adware-removal/

The Real Reasons You Need A Media Converter

Let's face it. Network technology isn't sexy. Most people don't sit around debating the various forms of network technology that exist today and think to themselves 'wow, this is what I want to do in my spare time.' The fact of the matter is that computer networks can be as boring as watching paint dry. And when it comes to the underlying technology of these networks, the only people you might be find debating the various pros and cons are true geeks. Media converters are no different. And before you think that you can spend the rest of your life using copper connections to maintain your network, think again. Let's look at the top 2 reasons why you might need to invest in a quality media converter. And yes, we'll try to make this as interesting as possible. Here we go. 1)The real reason why you need a media converter is simple: distance. Copper has intrinsic limitations where it's only really good for about 300 feet (or so the popular opinion is). After that you need to add some fiber to make the network really powerful (or at least make it operational). The real reason for copper's distance limitations probably has something to do with copper's inherent physical properties, but regardless, a media converter will extend copper's effectiveness when paired up with fiber. 2)Save some money. Who doesn't like to save some money here and there? I certainly do. If you want to redo your network completely and save a whole bunch of money, there is no reason why you should completely wire your office (or building) in fiber from the start. As attractive an option as having a business that is completely fiber (the coveted 'fiber to desktop'), if you can save substantial money by investing in a simple media converter, it will be more than worth your while. There is more to media converter story than meets the eye at first glance. Get informed about media converters before you take off and invest your hard earned money. A media converter can make a lot of sense in the right situation.

Selasa, 27 April 2010

Benefits Of Digital Linear Tape Drives

In our world where data is power, large companies put a high priority on their data back-up and data storage. Unfortunately, this kind of data storage is typically very expensive and impractical for the small home PC user. Luckily, with the introduction of two new formats of digital storage that are now available, there is a solution. With the DLT or Digital Linear Tape and the LTO or Linear Tape Open, the need for data storage has far exceeded past levels (as compared to previous had 8mm or DDS backups).

1. Recent Boost In Performance

The Digital Linear Tape or DLT systems have been available for use to everyone since 1985, and recent increases in both speed and capacity has given this technology a new lease on life. In fact, they have been the leading technology in the past several years for small to medium-sized systems. The only competitors for DLT were DDS or DAT tapes. The advantage of DLT tapes above these two leading competitors is that the tape heads had a tendency to drift that meant technicians had to constantly monitor them to ensure storage. Unlike DLT reliability that is based on a straight up and down recording mode.

2. Super DLT

A newer version with higher capacity and improved features is called Super DLT (SDLT). Super DLT uses a new recording format, but it also maintains a limited form of backwards compatibility with previous iterations of DLT. It incorporates the ability to read older tapes, although it cannot write to them. This means it would probably be quite useful in allowing organizations to maintain their present archives in a useable form. This would mean that there can be a very big saving both in time and money for companies because older tapes don't have to be re-recorded onto newer ones.

4. Tremendous Boost In Speed And Capacity

With the introduction of Super DLT earlier this year, the capacity has soared as much as 110 gigabytes on one cartridge, at a speed of 10 megabytes per second. A tremendous boost in performance was seen with the speed of backup doubled, and capacity more than doubled, the technology is now capable to handle large systems and networks that DLT previously couldn't handle. Competing technologies can offer very fast backups, but the tapes themselves contain very little data - hundreds of megabytes as opposed to the hundreds of gigabytes that DLT offers.

5. Linear Tape Open

Another technology that has recently emerged that is comparable, if not a bit more advanced than DLT is LTO or Linear Tape Open. A consortium product from Seagate, IBM and Hewlett-Packard. LTO can put 100 gigabytes on a cartridge and can store data at speeds up to 15 megabytes per second. But there are a lot who still prefer to use the more known and reliable Super DLT. There are very cautious system administrators who don't wish to try LTO, one technician even said that DLT is a more than acceptable choice: Thirty million cartridges and a million tape drives can't be wrong. Of course, LTO can’t be totally neglected. Of course, Super DLT uses a good deal of new technology as well, so even though LTO is a completely new technology, it has able to pave a nice pathway for it that may help establish itself for future preference.

6. Long Life

These kinds of storage media are guaranteed to last for 30 years of data retention under very specific environmental conditions; however, mishandling can easily damage these storage devices for example, dropping or improper packaging during shipment may easily damage or destroy the device’s capability to store data properly. With today's ever increasing demands for storage capacity because of our need to protect and store our data, it is possible that there is going to be more pressure on hardware developers to produce a lot more faster and bigger storage and backup devices to back up, store, protect and retrieve important data be it business or personal. Now both medium and small size users are given a choice: Super DLT, based on generations of thorough development and refinement, or LTO, a new technology from a high-powered and stable group of advance technological companies.

The Benefits Of Myspace Backgrounds

While many people may register on Myspace as a regular user, they might want to know what the use of Myspace backgrounds are. Not all of them will take an effort to find good backgrounds and apply them. Instead they might just keep using what is available by default. However they are making a mistake, as there are so many benefits with Myspace backgrounds. For one the profile becomes more appealing than ever. Because these backgrounds are available in various colors and designs, there will be no end to the versatility of these options. Members may take advantage of the fact that they are free, and they may browse through and use as many backgrounds as they want. Applying them is not difficult too, so you can make your profile appealing and creative within a few minutes. You need not be a computer savvy person to do this, as all you need is a little patience to choose from the various Myspace backgrounds available. Since there are various sections in the profile, there is bound to be a little bit of creativity required. This is where Myspace backgrounds will comes in. Members will be allowed to apply what they want, and in any color that they want. These backgrounds are completely free of cost, and they are posted on many sites. They are so easy to find and so easy to use, that the profile begins looking wonderful without any effort at all. Other benefits will be the fact that the profile will also not look boring to you, who will be the owner of the profile. If you are the type who has various interests, then accordingly you may keep changing the backgrounds according to your needs. The variety of categories is anyway available, so there is no need to even think twice about using them as you please. Without spending any money, members can make the profile extremely exciting and colorful. Various free benefits can be gotten with these backgrounds, so members should jump at the chance at make their profiles look the best. Since it is a networking site, there are the possibilities of umpteen numbers of people visiting such profiles. Myspace backgrounds are available in plenty and will keep the users occupied for hours, as there are so many to choose from. They come in such various categories that no one would be bored of using them. This also gives a chance to the profile owners to showcase their interests, as they need not really meet people to do so. By just choosing the right type of Myspace backgrounds, they can speak about what they like with the choice of the theme. These benefits should not be missed, as they will surely play a role in the members getting themselves more friends. As they are free, one should spend a little time and they should pick the right ones, so that the profile looks better.

Senin, 26 April 2010

Becoming A DVD Repair Expert Online

Many conventional colleges and universities are now offering online DVD repair courses, which are the exact same as those taught on a traditional college campus, to distance learners. Online education is generally taught through the use of several different methods, including online satellite feeds, correspondence or online lessons. This technique permits the student to obtain a DVD repair degree without ever having to step inside of a classroom. An online education, providing that it is granted by a regionally accredited college or university, is broadly accepted as worthy training for any job in the direct field of study.

Online education is approachable in many ways, but students often neglect the fact that it is much more economical than a traditional campus degree. Why? When factoring in the costs associated with student housing & meals, which often begins at a total of $6,000 or more every year, the savings are evident. With an online DVD repair education, students pay only for the courses that they are taking and they often choose to do so on a per credit hour basis rather than paying the full tuition each year.

The type of distance education degree that everyone should abstain from is what is known as a ‘diploma mill.’ In exchange for a specified sum of money, which is often $1,000.00 or more, they will issue a life experience degree with little or no investigation into the applicant’s background. These businesses often feature a very professionally designed website and appear to be very much legitimate. In fact, they even guarantee potential students that they are issuing legal degrees. Upon further examination of these so-called colleges, students will learn that they can even purchase a transcript with any letter grade that they choose. But, what is the basis for the grade? No classes were ever required, no tests taken and no valid grades were issued. Individuals who are interested in earning a legitimate degree should be very wary of any college or institution that offers to provide a life experience degree based only on the word of applicant and does little, or no, investigation into the student’s background.

The truth is that the only actual way to receive life experience credit is to take the CLEP test, which is given periodically at local colleges and universities. In addition, a number of universities are willing to accept portfolio assessments in exchange for possible life experience credit. These are legitimate ways to earn life experience, or knowledge-based, DVD repair college credit.

Technology And The Whistleblower

As the meeting comes to a close, your boss smirks with an self assured arrogance. He then says that you should seriously consider his offer, because he has it on good authority, that there may be a very localized downsizing in your department. Wouldn’t it be nice to smirk back and just say “no thanks”. This scenario plays out more often then most people realize. With all of the recent business and government scandals there were a lot of people who knew that books were being cooked, laws being broken and the health of the public being put at risk, just to keep profits high and investors content. Many people felt that there was nothing they could do against powerful executives and corrupt bureaucrats. The credibility of a low level employee compared to that of a ‘successful’ corporate executive is a huge hurdle to overcome. Also, corporate lawyers are there to defend the company, even from internal hazards. So, once a person decides to speak up, they must be prepared to have their credibility brutally attacked and the onslaught of legal preceding from an all-star team of corporate lawyers. Just the thought of legal proceedings can stop a person from making the ethical choice. It’s easy for people to be vilified by their employer, at which point the credibility of the person speaking out is destroyed. How is possible for a single person to fight a company or government with infinite resources? Many years ago, it was practically impossible. However, the “digital revolution” may have changed the balance of power. For a “whistleblower” to be effective they need proof of wrong doing and a method to communicate those issues to the public. The availability of compact electronic devices such as digital audio recorders and digital cameras allow an individual to document many of the issues and bring the power back to the whistleblower. The first piece of technology that should be in every whistleblowers repertoire is a digital audio recorder. These devices are so small that they can be put in a shirt pocket without being noticed. Once you decide to “blow the whistle” you should start recording all of your conversations. Keep a log of the items discussed, so that you can refer to the appropriate recording when needed, otherwise you can spend hours going back over the content. The best part is that these devices are not expensive. A digital voice recorder costs about $100, or many times MP3 players have a microphone built into the device, so they can be used to record conversations. Another device that is very handy is a voice modem with telephone recording software. This will allow you to, hook up your phone, and record any conversations that occur over the phone. If you get fired before you have all the evidence, sometimes telephone conversations, with the people in power, can help to document important facts, because people very rarely think they are being recorded and say things that they probably should not have. Make sure you check your local laws regarding conversation recording. In most places it is legal to record with one-party consent. One-party consent means that if you are involved in the conversation, you do not need to notify the other parties that you are recording the conversation. In Canada, one-party consent is the law. In the United States it is a little more complicated, as some states have their own regulations. You can refer to this recording law chart (http://www.snakeoil.ca/docs/recordinglaw.html) to determine what laws affect you. If in doubt, speak with a lawyer. The third device every whistleblower should have is a digital camera. Many times the violations are in manufacturing or packaging, which could be a public health concern. These can be very hard to document and prove, since the paper records may be manipulated. A picture says a thousand words though, and will help authorities uncover doctored documents. When taking pictures be very cautious as most companies prohibit camera’s on their premises. Many cell phones are now equipped with digital camera’s, so they are easier to conceal. Take as many pictures as you can and try to prove the date you took them. Some camera have a date stamp feature, even though this is easy to manipulate. The best option is to take a picture of the daily newspaper beside the offending subject. This is very hard for lawyers to argue against and disprove that the violations did occurred on that particular date. The last piece of equipment needed is a computer. When the authorities begin investigating your complaint, you will need to produce your evidence such as documents pointing to the issues. Most corporations are moving towards a paperless environment, which means that these documents will only be accessible by a computer. The other important part your computer plays, is to backup all of those images and audio recordings. Make sure your computer has a CD writer or DVD writer. Take these backups and put them somewhere secure, like a bank deposit box. One area of concern is the removal of corporate documents from the office. This can violate many legal agreements you may have signed. If you are worried about this, there is a very simple solution. Backup all of the evidence files at work and stash them somewhere in the office. In the ceiling or in duct work is a great place. Basically, anywhere nobody ever looks. When it is time to produce these documents, simply tell the authorities that you have stashed them in a safe place at the office. The evidence is kept safe and you haven’t violated any agreements, a win-win situation. In the future, companies may begin banning digital devices from the workplace for the exact reasons being discussed here. However, if were are persistent, it may go the other way and corporate behaviour may change, which is the ultimate goal of being a whistleblower. The days of “plausible deniability” and “disgruntled employees” are disappearing quickly.

Scalability testing: 7 steps to success

Systems that work well during development, deployed on a small scale, can fail to meet performance goals when the deployment is scaled up to support real levels of use. An apposite example of this comes from a major blue chip company that recently outsourced the development of an innovative high technology platform. Though development was behind schedule this was deemed acceptable. The system gradually passed through functional elements of the user acceptance testing and eventually it looked like a deployment date could be set. But then the supplier started load testing and scalability testing. There followed a prolonged and costly period of architectural changes and changes to the system requirements. The supplier battled heroically to provide an acceptable system, until finally the project was mothballed. This is not an isolated case. IT folklore abounds with similar tales. From ambulance dispatch systems to web-sites for the electronic submission of tax returns, systems fail as they scale and experience peak demands. All of these projects appear not to have identified and ordered the major risks they faced. This is a fundamental stage of risk based testing, and applies equally to scalability testing or load testing as it does to functionality testing or business continuity testing. With no risk assessment they did not recognise that scaling was amongst the biggest risks, far more so that delivering all the functionality Recent trends towards Service Oriented Architecture (SOA) attempt to address the issue of scalability but also introduce new issues. Incorporating externally provided services into your overall solution means that your ability to scale now depends upon these external system operate under load. Assuring this is a demanding task and sadly the load testing and stress testing here is often overlooked. Better practice is to start the development of a large scale software system with its performance clearly in mind, particularly scalability testing, volume testing and load testing. To create this performance testing focus: 1. Research and quantify the data volumes and transaction volumes the target market implies. Some of these figures can be eye openers and help the business users realise the full scale of the system. This alone can lead to reassessment of the priority of many features. 2, Determine the way features could be presented to users and the system structured in order to make scaling of the system easier. Do not try and have the same functionality you would have for a single user desktop solution provide an appropriate scalable alternative. 3. Recognise that an intrinsic part of the development process is load testing at representative scale on each incremental software release. This is continual testing, focusing on the biggest risk to the project: the ability to operate at full scale. 4. Ensure load testing is adequate both in scope and rigour. Load testing is not just about measuring response times with a performance test. The load testing programme needs to include other types of load testing including stress testing, reliability testing, and endurance testing. 5. Don’t forget that failures will occur. Large scale systems generally include server clusters with fail-over behaviour. Failure testing, fail-over testing and recovery testing carried out on representative scale systems operating under load should be included. 6. Don’t forget catastrophic failure could occur. For large scale problems, disaster testing and disaster recovery testing should be carried out at representative scale and loads. These activities can be considered the technical layers of business continuity testing. 7. Recognise external services if you use them. Where you are adopting an SOA approach and are dependent on external services you need to be certain that the throughput and turnaround time on these services will remain acceptable as your system scales and its demands increase. A smart system architecture will include a graceful response and fall-back operation should the external service behaviour deteriorate or fail. © Acutest Ltd 2005 – http://www.acutest.co.uk

Minggu, 25 April 2010

review the usb hub

The hub has its own transformer and it supplies power to the bus so that the devices do not overload the computer 's supply. If you have lots of unpowered devices like mice and cameras, you probably need a powered hub. If you have lots of self-powered devices (like printers and scanners), then your hub does not need to be powered -- none of the devices connecting to the hub needs additional power, so the computer can handle it. The power (up to 500 milliamps at 5 volts) comes from the computer. Obviously, a high-power device like a printer or scanner will have its own power supply, but low-power devices like mice and digital cameras get their power from the bus in order to simplify them. As you will see on the next page, the USB standard allows for devices to draw their power from their USB connection. Hubs can be powered or unpowered. By chaining hubs together, you can build up dozens of available USB ports on a single computer. You plug the hub into your computer, and then plug your devices (or other hubs) into the hub. hub typically has four new ports, but may have many more. The USB standard supports up to 127 devices, and USB hubs are a part of the standard. My computer has only one USB connector on it, so the obvious question is, "How do you hook up all the devices?" The easy solution to the problem is to buy an inexpensive USB hub. For example, on the computer that I am typing on right now, I have a USB printer, a USB scanner, a USB Webcam and a USB network connection. With so many USB devices on the market today, you easily run out of sockets very quickly. USB Hubs Most computers that you buy today come with one or two USB sockets.

Protect Your Online Accounts from Phishing Scams

What is phishing? Phishing involves the sending of an e-mail falsely claiming to be from an established legitimate enterprise in an attempt to scam the user into surrendering private information that will be used for identity theft. The e-mail directs the user to visit a Web site where they are asked to update personal information, such as passwords and credit card, social security number, and bank account numbers. It is relatively simple to make a Web site look like the legitimate site by mimicking the HTML code or by framing parts of the pages. Many people fall victim to email scams designed to steal log-in information for accounts such as PayPal, eBay, online banking accounts and more. Scammers send emails to every address they can obtain so you may receive these even if you dont have an account with the targeted enterprise, site or company. The scam emails keep getting better and better in their appearance. You may receive an email that pretends to be sent from eBay. The email will have all the appropriate logos and will often be formatted in the same way. The links within the email can even appear to be directed to legitimate pages within eBay. For example, e-mails supposedly from eBay claim that the user's account is about to be suspended unless they clicked on the provided link and updated the credit card information. Recently I received an email claiming to be from PayPal. It appears to be a receipt for an eBay purchase that I know nothing about. The subject line is "Receipt for Your Payment" The body of the email included a description of the ebay item that had allegedly been purchased using my PayPal account. Below that was a notice that said: Note: If you haven't authorized this charge, click the link below to dispute transaction and get full refund I wonder how many people receiving a similar email would quickly click on the link provided in order to contest the charges. OK, I know to be cautious with this sort of thing so I did not click on anything in the email. Instead I went to PayPal on my own and logged in. Guess what? There is no record there of the purchase! Then I started looking at the formatting of the email. When I viewed the properties of the message I found that it was actually from a takethatfanclub.com sender and NOT paypal. Just because it says that it is from such and such.com at the top of the email doesn't always mean that is who it is from. The "From" name in an email can easily be altered. This email was formatted more like a received payment PayPal email than it was an actual receipt. I looked at all of my other emails titled "Receipt for your payment" and not one of the others was formatted like this one. Other types of scams that involve PayPal usually involve a message about unauthorized access attempts. The sender will tell you that someone has tried to get into your account. As a result your account is in danger of being "frozen". However if you click the link in the email (You are told) you will be able to enter your password to avoid the loss of your account. Naturally, those unfortunate enough to give their log in information will have given it to strangers. Remember that this is not limited to PayPal. Users of Storm Pay, e gold, eBay and more will see similar emails. Watch out for scams like this that are designed to trick you into submitting information (like passwords) to allow the sender to access your account. Whenever you receive any suspicious messages go to your account via a new browser and by typing in the url. Never click a link in an email that is supposed to take you to your PayPal account. If you make that the rule then your account information (and funds!) will be much safer. If you believe that you have provided sensitive financial information about yourself or any accounts through a phishing scam, you should: - Contact your financial institution or account immediately - Contact the three major credit bureaus and request that a fraud alert be placed on your credit report. Bureaus and phone numbers are: Equifax - 1-800-525-6285 Experian - 1-888-397-3742 TransUnion - 1-800-680-7289 - File a complaint with the Federal Trade Commission at www.ftc.gov or call 1-877-382-4357 - You can also contact the Internet Crime Complaint Center at www.ifccfbi.gov if you think you have been a victim of a phishing scam.

Be Smart Partition Your Drive.

Being in the computer field for some years, I've seen many people being afraid to save data on their computers. People are so paranoid, but don't really know what to do unless they're willing to spend a little time to learn about the box with a cup holder built into it (CD ROM tray)=0).

Anytime I build a computer or reinstall Windows on someone's computer, I always partition the hard drive into C: and D:. Partitioning is the process in which is installing one hard drive and making your computer see itself as having two hard drives. The C drive is always going to be the Primary Partition and the D and any other drive letter is always going to be a Logical Partition. He or she can use the FDISK utility in a Windows 98 Boot up floppy (XP already has the utility in the install cd and will ask if you want to create partitions)to create two partitions in one hard drive. This is good practice because when something goes wrong with Windows, all the data that's saved in the D drive is in tact since Windows is installed in the C drive (remember, your computer is thinking that it has two hard drives instead of one).

Another good practice is to buy an external hard drive, Zip, or a tape drive depending on how large your data is, to have extra backup just in case, which is rare but does happen, the partition gets corrupted and the Logical drive is no longer there. I always tell my clients to save data that is critical to be on an external drive and to turn it off or at least take the connection out from the computer after every backup session, so that in case there's a total system crash, or a hacker getting into the system, the data is not there to be damaged or tampered with.

Stopping Spyware From Stopping You

Spyware can be a real time waster. It makes its way onto your machine, usually without you knowing it, and eventually becomes a problem which causes you stress, costs you time and money and possibly leads to even worse consequences if not dealt with quickly. Learning how to eliminate spyware before it becomes a problem is critical for every computer user today. Spyware is written with the intent to intercept or take partial control of your computer without your informed consent or knowledge. While the name suggests it is created to simply spy on you, spyware also refers to software that subverts the operation of your computer for the benefit of someone else. While the motivations of those who write software like this is beyond the scope of this article, it is important to at least understand that spyware certainly does not exist for your benefit and you should take regular steps to remove it. By using a simple spyware scanning program, detection and removal of spyware is generally a quick and painless process. Instead of waiting for the results of spyware on your computer to become a problem, run a spyware scanner at a regular schedule to find and eliminate spyware software that has found its way on your computer. It typically is something you can start and leave running on your computer without any intervention on your part. If you look at it this way, keeping your computer safe, and operating at its best shouldn't take more than 5 minutes of your time a week! New spyware is created constantly and your spyware scanning software should have a simple way to check for updated information to detect the latest threats. Again, this process is usually automatic and should require very little intervention on your part. Be sure to choose the option to check for updates in your spyware scanner before you scan your computer. This simple two step process will help ensure that you are always free from the latest threats. It is unfortunate that it is necessary to deal with threats like spyware, adware, viruses and Trojan horses, but it is a simple reality. Fortunately there are excellent programs out there that will work to protect you from these threats and allow you to focus on the fun, enjoyment and utility your computer should offer you. By taking a few, regular steps to maintain your computer you will keep it running better longer. Just like a well-maintained car.

Sabtu, 24 April 2010

Printer Toner Safety: The Dust Musts

When changing printer toner, one's first priority is often getting the printer running as quickly as possible to finish the project at hand. But it's best to slow down and take the time to follow necessary safety precautions. While printer toner itself isn't a health hazard, its fine powder in high concentration can be. This powder can stay in the air for quite a while, and is similar to dust when it comes to its effects on our body, resulting in irritations like sneezing and coughing. Add any respiratory conditions like bronchitis or asthma and these effects worsen. How can this dust become airborne? You'd be surprised at how easy it is. Improper disposal of printer toner in waste baskets can quickly spread dust through the air. Machine spills can cycle through the ventilator fan. Over-filled waste toner compartments can overflow within the machine. Some laser printer toners are considered carcinogens, or cancer causing, increasing the risk of those individuals facing extremely heavy and long-term exposure. Nevertheless, typical office and personal use is deemed safe. So take precautions. Vacuum, don't sweep or brush, spilled toner dust. Clean up desktops or surfaces with a damp cloth. Should toner get on your hands, wash them thoroughly and immediately with soap and cold water, which keeps your pores closed and protects your hands from becoming stained. Avoid any contact with your eyes or mouth, and never ingest. To play it extra safe, put the toner in a zipped plastic bag to avoid possible dust emissions. If you experience shortness of breath or persistent coughing, stop working with the printer toner, if applicable, and get fresh air immediately. Then seek medical attention if your symptoms persist. Since 1999, http://www.TonerDealers.com has been one of the largest toner resources online, saving customers up to 60% on nearly 4,000 unique toner and cartridge models everyday.

Battery Sizes And Types

In both science and in technology, a battery is used as a type of device that is used to store energy, making it available for use in an electrical form. They consist of electrochemical devices, including one or even more galvanic cells.

Baghdad Batteries are thought to be the first known in history, dating back from sometime between the years of 250 BCE and 640 BCE. The modern battery began with the Voltaic pile, which was developed by Alessandro Volta, an Italian physicist, in 1800. As of a 2005 estimate, the battery industry generates, no pun intended, around 48 billion dollars in annual sales.

Batteries can be divided into two main categories, rechargeable batteries and non-rechargeable, or disposable, batteries.

Disposable batteries are also known as primary cells. They are intended for a one time use only, to be used until the chemical changes used to induce its electrical current supply have been finished. Their common usages include smaller, more portable devices that have either a low current drain or are used away from any alternative power source.

Rechargeable batteries, also known as secondary cells, have a longer usage life since they can be recharged after their power has been drained. You can do so by applying an externally supplied electrical current. This causes a reversal in the chemical changes that occur during the battery’s use. These devices used to do this are commonly known as rechargers or chargers.

The ‘wet cell,’ or lead-acid, battery is the oldest form of the rechargeable battery that is still in today’s use. This battery contains a liquid found in an unsealed container that requires the battery to be kept in an upright position. The area in which it is used must be well-ventilated so as not to cause the ventilated, hydrogen gas to display its explosive qualities.

The lead-acid battery is quite heavy, although its cost to manufacture is low and the high surge content levels allow it to be a commonly used battery in places where its weight and handling ease are not of any concern.

The most common form of a lead-acid battery is the car battery.

A gel battery is known to be an expensive lead-acid battery type, containing a semi-solid electrolyte that is used to prevent spillage.

The portable types are considered to be ‘dry cells.’ They are sealed units that are useful in appliances such as cell phones and laptop computers. These types of cells also include, nickel-cadmium or NiCd, nickel metal hydride or NiMH, and lithium-ion or Li-Ion, listed in the order of their increasing power density and also their cost.

Both disposable batteries and rechargeable batteries come in various standard sizes. This is so they can easily be used in a wider amount of appliances. The most commonly known types of batteries are the A-series, including A, AA, AAA, and AAAA. Also known are B, C, D, F, G, J, and N. Other variants include 3R12, 4R25, PP3, PP9, and the 996 and PC926 that are used in lanterns. There are many, many more less common battery types, and their usages vary greatly.

Jumat, 23 April 2010

Party Jokes: Startling But Unnecessary

Here, I focus on a range of items and features that we use in life without giving them a second thought such as Coca Cola, body muscles and holding ones own breath. Though, most of these notes are not fundamentally necessary, they are such that you can use them for a good laugh, at a drinks party or for picking up women or men. 1) Coca-Cola: Did you know that its original colour was green? 2) Mohammed: Did you know that this is the most used name in the entire world? 3) Geographical Letters: Did you know that the name of each of the continents begins and concludes with the exact same alphabet? Do not believe that? Look up Asia, Europe, Africa, America, Antarctica and the rest. 4) Muscle Strength: Did you know that the strongest muscle in the entire body is that one which we use to lick a popsicle? Your tongue. 5) Credit Cards: In the United States, were you aware that each and every person has at least two credit cards? 6) An Antique Machine: The word for an old machine that was once used for writing letters and other documents is the largest word that one can make if they click only on a single row of their computer's keyboard: typewriter! 7) Blink: Men wink at women, but research has found out that the average woman blinks nearly two times more than the average man. 8) Suicide: Even though you might have wondered if it was possible, studies have discovered that it is impossible to kill oneself by simply holding in your breath. 9) Licking: However much you may try, you will never be able to lick your elbows. 10) Sneeze: Try sneezing. People will automatically answer you with a bless you greeting. Have you ever imagined why? Some say that this happens because a sneeze stops the functioning of the heart for a very tiny second. 11) The Blue Sky: Did you know that a pig, no matter how much they try, cannot look up into the sky? 12) Twisting Your Tongue: We have all dabbled with different tongue-twisters in our day. But do you know which is the toughest? Sixth sick sheiks sixth sheeps sick. 13) Ribs: Did you know that you should try not to sneeze too strongly. Why? A very powerful sneeze has the ability to cause a fracture in your ribcage. But, then again, if you try and withhold one, you stand the chance of breaking one of the many blood vessels in your neck or head. This could cause death. 14) Cards: Did you think that the Kings are all just random cards referring to random figures? No. Each one signifies a different king: Diamonds for Julius Caesar, Clubs for Alexander the Great, Spades for David and Hearts for Charlemagne. 15) And finally: Most everyone reading this (Caught You!) are trying to lick their elbows at this exact moment! Conclusion: Most of these are not scientific facts, but they are hilarious, funny and can be used to lighten up the ambience when a conversation has gone dull. Use any and see your popularity rise up to great heights. Visit http://www.gambling-portal.com for more jokes.

Batteries Q&A: Understanding Different Types Of Batteries

* What are the different types of batteries?

Batteries are grouped in two ways. It is by application and by the process of construction. The major type of application batteries are the automotive, marine, and deep cycled. While the construction type are flooded, gelled and AGM.

The deep cycled types of batteries have a capacity for solar electric for back up energy. As for a technical description... Compared to AGM battery, this type has a starve electrolyte or dry mechanism. Most of the application batteries are made of fiberglass mat with a high-density compound of sulfuric acid, which applies a “no excess liquid” compounds.

Construction batteries have a standard and removable cap. It is sometimes called as maintenance-free battery. It also has a regulated sealed valve. The valve contributes the slight regulated pressures.

For a complete chart of all types of batteries, see the link in the author's signature.


* What is a DC battery?

Direct current is a kind of electricity supplied. By using a DC battery, the electric charge moves in a single direction. It can cause an imbalance to the electric charges.

The side of the DC battery is sealed with electrolyte and several forms of metal. The electrolytes have a different form of electrons, which is positively charge.

The terminal of the battery has positive and negative poles. These poles are connected which each other. The current flows with the connection of the poles.


* What are sealed batteries?

Sealed batteries are non-spoilable and a maintenance-free battery. They have no liquid, therefore, there is no corrosion. A sealed battery has a characteristic of low self-discharging and cracking amperage.

A sealed battery is designed to supply both starting and reserve applications. It has a longer life and more competent outline. Most of the sealed batteries are used in order to have a more “cost cutting” battery and to minimize the price to the user.


* What is a deep cycle battery?

A deep cycle battery usually has a thick, heavy lead plate. This plate helps the battery withstand deep charging. It cannot dispense a charge rapidly compared to a starter battery. It can also be used to initiate combustion in engines. It is a kind of battery with a longer life span because of its thick plates.


* What is a starting battery?

A starting battery is intended for engines for combustion to continue without interruption. It has multiple thin plates which enable it to release a large amount of current very quickly for just a small amount of time.

On the other hand, a starting battery cannot stand being discharged deeply. The majority of the starter batteries can only withstand a complete discharge a few minute before spoiled.


* What is a gel cell battery?

A gel battery is also called a gel cell. It has a quantity of silica gel that converts the acids into a solid mass. The great benefit of these batteries is that it is unfeasible to drip acid even if they are broken.

This kind of battery charges slowly. They cannot cope up with the conventional automotive charger. The current flow is also limited. Furthermore, they can be damaged easily.


* What is an AGM battery?

AGM stands for “Absorbed Glass Mats.” It is the newest type of sealed battery that is used between plates. The plates are composed of a very fine fiber made of Boron and Silicon glass. This kind of battery has the same features as a gelled type, but it can take more of a discharge.

It does not spill out evenly if it is broken. Glass mats assist in holding together the acid and electrolytes. It is also immune from spilling damage because it has no liquid on its inner layer.

Kamis, 22 April 2010

No Discount For Xbox 360

For the past weeks, there were talks that Microsoft is going to take advantage of the holiday season to offset the launch of the PS3 from Sony. It was speculated that there would be Xbox 360 price slash. As a result, most gamers waited for the price slash and the PS3's release before deciding which console to get. However, to the disappointment of everyone, John Porcaro, US Microsoft's PR guy recently came out with a statement from the MS bigwigs that there would be no price slash for the newest Xbox model. Quite understandably, since Xbox 360 is already selling at half the value of the new Sony console. The cheaper Nintendo Wii targets a different gaming audience so Microsoft does not consider it as a threat. Also, perhaps, there is some truth in what the UBS analysts predicted last year. According to UBS analysts, Microsoft subsidizes the cost of their new console by $75. This is the reason they are able to sell for a lower price. Some rumors even persist that other than the subsidized $75, Microsoft is losing as much as $100 per console. This is due to Microsoft's inability to produce their own core manufacturing systems. They get the parts of their core hardware still from Intel and NVIDIA which require them to pay royalties. To add insult to injury, the company is reported to be still suffering from losses incurred from Xbox sales. They reportedly used the same subsidy system for the older Microsoft console. The math goes pretty bad for Microsoft since the consoles have high production costs but are only sold at a meager price. Microsoft neither confirm nor deny these reports but they report that they have hit their mark for the year. It is not a mystery how Microsoft was able to survive the losses. The company sells different console accessories and do effective marketing. Statistics reveal that most Microsoft console users have at least one accessory for enhancement of the game experience. Let's not even talk about the games. Most analysts suggest that the bulk of the gains Microsoft received this year was from the sales of game titles. With a new title release almost every month and DRM protection, games are mostly bought and owned individually. The games do not cost much when taken individually; the cost only becomes staggering when you think about the accumulated price. Microsoft gains from all these. Regarding Xbox 360 price slash, I think that consumers can still hope. The holiday market is a big one. It is also the time when people are more generous to themselves and others. Microsoft and their new Xbox would have trouble resisting an opportunity such as this. Sony is pushing for a close to $600 price, and though expensive, there is somebody out there who would buy it. The holidays are times of giving and sharing, isn't it? But if the consumer is faced with a more difficult choice, say, three Xbox 360s for one PS3, the balance usually tips to the more economical side. Same quality, cheaper price, more people can enjoy it. That is what you call spreading holiday cheer.

Basics Of A Router

Router is a computer device that receives or forwards data packets to and from the Internet towards a destination in the process called routing. Router is the essential component of the computer networking that enables any sent data to arrive at the right destination.

As an illustration, imagine that the Internet is the world and one computer is one household. Other computers connected through the Internet are households around the world. Say one household will send a letter to another household in any part of the world. The letter has an address right? And that address would determine the destination of the letter. But without one reading the address, the letter would not arrive to the right receiver. The letter also would not be able to reach the intended receiver if there is not medium. This medium would be the courier. And the courier of the computer data is the router.

A router (broadband router) is also a device that enables two or more computer to receive data packets from the Internet under one IP address at the same time.

Remember that to be able to connect to the Internet, a computer must have an IP address unique from the rest of the computers. Therefore, every computer connected to the Internet has it own IP address. It is like having a fingerprint or ID as an access pass to be able to enter the web. With the presence of the router, this “fingerprint” or “ID” could be shared by two or more computer at the same time.

In simplest form, a router makes two or more computer use the Internet at the same with one access pass.

One more thing: a computer with cable modem could also be considered as a router. In this, the computer would do the process of routing like normal routers do. Other computers are then connected to the computer with Internet connection that would give it with the Internet connection. The computer with cable modem has the direct contact with the Internet and the ones connected to it are sharing the connection.

Why would anyone need a router?

For households with two or more computers who would want to have Internet connection to every computers they have, taking subscription for each would be too much. The solution is to buy a router that would enable every computer in the house to have an Internet connection. In the definition above, the broadband router would act as a hub to the existing Internet connection.

If the router is comparable to a hub, would it affect the Internet speed?

It should be taken into consideration that once a single Internet connection is divided, the connection speed is affected. But there are some broadband routers that would bring minimal slowdown to the Internet speed and the effect might not even be big.

Internet speed would also depend on the type of application used in a router. While some would inflict little effect on the speed like online games, others would terribly slowdown your connection and even hinder you to use the Internet at all.

Usually, offices use a more sophisticated router to redirect Internet connections to the large number of computers. These routers would give better data packeting compared to a typical router used at home that results to faster Internet speed.

Rabu, 21 April 2010

My Troubles With Wordpress Themes

It all began in the late 90's. I wanted to put some news on my website. A diary. A list of forthcoming events. I started with simple HTML. One page, with sections for every post. Simple. Then I heard about 'blogs' and 'blogging'. Being smart, I picked Wordpress, the most popular software. How clever, I thought. If you get the WYSIWYG editor going, anyone can put up a web site. Very democratic. This encouraged my to post my outermost thoughts; on politics, London, and personal gripes. As a webmaster, I watched to see Google index them. "Here we go", I thought, "soon, my jewels of extrospection will belong to the ages". Except Google didn't like my blog. It wouldn't index much beyond the front page. Why, why, why? Duplicate content? I set it to put only one post per page. No improvement. I looked at what Google was indexing. Then I looked at the blog HTML. Soon, all became clear. In sum: - Wordpress was still duplicating my content, and
- It had no proper META tags, and
- There was a lot irrelevant HTML, and
- The layout obscured the content. I had a quick search on Google to find search engine optimisation tips. There is a plugin 'head META description' ( http://guff.szub.net/plugins/ ). But I didn't use that, oh no. For some reason, I got the notion that a complete theme would be the ticket. I tried modifying an existing one myself. Better, but not perfect. Google was starting to index more pages, but they all had the same title. My missives to an uncaring world were being ignored. So I got someone else to do one, based on my criteria, which were: - Grab a META 'title' from the blog post 'title';
- Grab a META 'description' from the blog 'excerpts';
- Put a ROBOTS 'noindex' tag in non-content pages.
But that wasn't enough. For best SEO results you need to configure Wordpress brutally. You have to be _mean_ to it. You have to _man_ enough. I did a bit of research and came up with to following tips. WARNING: They are extreme. If you already have good rankings, making radical changes to your URLs may affect them. In my case: - Moving my blog http://www.ttblog.co.uk to the root web directory,
- MOD_REWRITING its URLs, and
- Removing a 301 redirect, ... caused my PageRank to go to 0. BUT, page indexing was unaffected. This was temporary, as Google saw it as 'suspect' behaviour. I had radically changed my site. Here are the tips, for real _men_, who can look in the face of internet death and laugh: 1. Activate permalinks by going to 'Options/Permalinks'. You may have to enable Apache MOD_REWRITE on your web account. 1a. Shorten the permalinks code to just the %postname% variable. Don't bother with the date codes. This keeps your URLs short. 2. Point your blog in the uppermost directory possible. http://www.ttblog.co.uk is better than http://www.ttblog.co.uk/wordpress/ So a typical post would look like
http://www.ttblog.co.uk/Im-hard-as-nails-me/
rather than
http://www.ttblog.co.uk/wordpress/2006/08/03/Im-hard-as-nails-me/
3. Then install an SEO'd theme. My blog posts are now being indexed beautifully. The Google 'site:' command returns all my posts, and little else. For my next challenge, I take on Windows XP, and turn it into an operating system.

Basic Changes To Make In Your Internet Explorer Options

Most people get their computer with Internet Explorer already installed and set to all the default settings. The default settings are what Microsoft calls “recommended settings”. These settings are not always the best for your usage. One size does not always fit all. But how do you change the settings and what do they all mean? I’m glad you asked...

In this article I am going to take you step by step through these settings to explain them to you. Open a new browser window before you start, so you can follow these steps as you read the article. At the top of your new browser window, click on “tools” then “Internet Options”.

The first tab you will see is the “general” tab. The very first option you have is where to set your home page. Type in http://forum.dugancom.com/. I’m just kidding. That is my website. Pick a website that you want your browser to open to every time you go online. If you have a favorite search engine, put it there. If you have a home page enter that. Hit apply when you have done this and that will be your home page from now on. Anytime you hit the home button at the top of your browser it will automatically go to that page.

The next option you have is to “delete cookies”. There is a lot said about how to manage cookies and what they are for on the Internet. But for the purposes of this article I will just tell you that cookies store information like websites where you want to be automatically logged in rather than having to type in a username and password every time. There are other cookie uses and hopefully I will have time to write about that in another article. If you delete the cookies, you will have to login to websites you use often and it won’t remember your username etc.

The next button says “delete files”. These are the temporary files Internet Explorer stores on your hard drive so if you go back to them they will load faster because the images and other files are already downloaded. Later we will get to another area with a setting that will help you manage this. You can go ahead and delete these files if you want to and every now and then you should.

The next button is called “settings”. Click on that button now. It says, “Check for newer versions of stored pages... “ then gives you several options. Clicking “every visit to the page” will cause pages to load slower because rather than going into the temporary Internet files for cached files, it queries the server for the newest version of any files on that page.

“Every time I open Internet Explorer” means that the first time you visit that website, “this session”, it will check for a newer version of the page. After that, it will refer to the cached page on your hard drive. “Automatically” means you let Internet Explorer manage this for you and that is the recommended setting. “Never” means it will always use the cached version on your hard drive rather than check for newer versions.

I recommend either auto or never, because if you want to check for newer versions of a page all you have to do is push shift and hit the refresh button on your browser tool bar.

The next option in settings is how much space to allow for temporary Internet files. Five to Twenty megabytes is plenty. Internet Explorer tends to override your choice here anyway. Bill knows best I guess.

The next button is “move folder”. Don’t click that. Back away slowly and do not touch that button. It sends nuclear missiles at several minor countries. Seriously, moving the location of your temporary Internet files is not a good idea. The next button, “view files” is pretty boring stuff and you don’t need to do anything here. The same can be said for “view objects”. Those three can all be left alone.

Go ahead and click ok so we can go back to the general tab. You will see the next option is about computer history. Now this is a personal choice. You know how links you have clicked on before are a different color than those that you have not clicked on? Well history remembers that for you so you know which pages you have or have not visited. It also records the history of all the websites you or anyone else on your computer has visited. In your address bar, the drop down arrow that shows you all the websites you have been to is put there by the “history” option. It is also used if you have auto-complete enabled for web addresses you are typing into your address bar.

You can set this for the number of days you want to save history for. If you have kids, you can access these files to see where they are going on the Internet as well. If you are using a computer at work you might want to set this to 1 day. To the right of where you enter the number of days is the button to erase history now. Computer experts can still find your history. This is not absolute.

Next button is “colors”. The best setting is “use windows colors, but experiment if you want to. Next button is “fonts” and if you click on that, it’s pretty self-explanatory. This is not where you choose font size. That is in the “view” part of your browser rather than the “tools” area we are in now. “Languages” is also self-explanatory. “Accessibility” is where you can alter settings if you have special needs.

Ok, now let’s move on to the “Security” tab. “Medium” is the best setting for most users and probably is already set there. Be careful when changing security options that you do not understand. Click “custom level”. Scroll through. If there are things you are absolutely sure about and want to change, then do so. But if you are not sure, don’t change it.

You will see that when we first came to the tab the “Internet” icon was selected in the window at the top. You can also click on “Local Internet” and do the same for your settings there. This is for your local network if you have one. The next icons are, “trusted sites” and “restricted sites”. You can add websites to either area that you wish to allow or disallow no matter what other settings are on your computer. This is one way to block your child from visiting a particular website.

Go to the next tab at the top called “privacy”. Now this is another area where you need to be careful and understand what you are changing before doing so. This is probably already set to “medium” which is fine for most users. The “import” button probably doesn’t apply to you. Click the “advanced” button. Everything here is probably grayed out except the option to check override cookie handling.

Automatic settings mean that you accept both first party and third party cookies. That means you accept cookies from the website you are visiting and from any other websites that the website you are visiting has chosen to set cookies on your hard drive like their advertisers or others who want to track user’s habits.

Click ‘override automatic cookie handling”, then check “block” for the third party cookies and you will block some spyware or adware being placed on your system. If you want to block cookies from a particular website or you want to only allow cookies from specific websites, this is where you add those websites.

Next, we go to the “Content” tab. Again, this is an area that you need to know what you are changing before you change anything. You can click “enable” for content advisor. The first slider bar can be changed to block different types of content. First you can start with types of language you wish to block, then nudity, sex, and violence by clicking the icons in the window and using the slider bar. The “more info” button will help you understand this more.

The “approved sites” tab at the top will let you enter websites that you want to access regardless of the settings you just made with the slider bar. On the “general” tab, you should click allow websites that have no rating because not all websites are rated. You can also check the box that says a supervisor, you, can use a password to access restricted websites.

If you share your computer with your children, this is an option where you can visit restricted websites but they cannot. Be careful when setting this password. If you forget it, you will not be able to make changes to these settings later. If you lose this password, you have to know how to go into the registry to get it removed. Unless you know about rating systems, you don’t need to worry about the two buttons at the bottom of this tab or the “advanced tab”.

Click ok to make any changes you made and to enter a password if you decided you wanted one. If you understand about “certificates” and “publishers” then you don’t need my help here. If you don’t understand them, leave those buttons alone.

Click the “autocomplete” button. This is pretty easy to understand. Autocomplete works to help you not have to type the same information on forms and in your Internet Explorer address bar. You can also clear any previous information here. Click prompt me to save passwords and it will ask you each time you enter a password if you want Internet Explorer to remember your password for this website so you don’t have to type it in every time. I don’t recommend you allow it to remember banking and financial passwords.

“My Profile” is where you can enter information about yourself and use that whenever asked for your profile on a website or it can be automatically accessed by some applications saving you time.

Now, click the “connections” tab. If you are currently connected to the web and reading this article, then it is safe to assume your settings here are correct and you should leave them alone.

Click the “programs” tab at the top. There are drop down menus to help you set the default program for each of the tasks. This is a personal choice that will let you set your default web browser, html editor, and email program.

Now we reach the “advanced” tab at the top. Scary hunh? No, this area is mostly personal choices and your choices don’t have near the serious consequences of your settings in “content”, “privacy”, and “security”.

Most of the choices should be left where they are as the default settings. I will only talk here about the ones you may want to change. Do not check notification for EVERY script error unless you want to be annoyed a lot. Not every script in every webpage is error-free and there will be a lot of popups about them if you check that box.

Notify me when downloads complete if checked will give you a sound when a download is done. Underline links is a personal choice. I leave it set on always so I know when I see a link. The next ones again are a choice of whether you want to use Autocomplete.

You can scroll through the rest of the choices and change the ones you understand. Likely if you don’t understand an option you don’t need to change it anyway. I hope this article has been helpful to you and has helped you personalize your settings rather than have Bill Gates do it for you.

Selasa, 20 April 2010

Microsoft Patch Management For Home Users

With easy access to Broadband and DSL the number of people using the Internet has skyrocket in recent years. Email, instant messaging and file sharing with other Internet users has also provided a platform for faster spreading of viruses, Trojans and Spyware. Being on the Internet without proper protection is like walking in the rain with no umbrella - you're gonna get wet no matter how fast you run. With so many computers installed in home offices it becomes critical that home users install the latest Microsoft patches when they become available. Older operating systems like Windows 98, Windows Millennium, Windows 2000, or Windows XP prior to Service Pack require the user to initiate the process of checking for security patches. Windows XP Service Pack 2 has changed this and the default settings are now notifying the user of available updates automatically. This has increased the level of security in some areas, but there is a very large number of users and computers that do not install security patches or hot fixes provided by Microsoft. How should home users actually handle the task of patching their computers? Like businesses home users should do some research about the patches that are being installed. Just installing them and walking away will work for a while, but sooner or later home users will run into an issue that a patch breaks something and eventually renders the system useless. So, what should home users do when new Microsoft patches become available? First of all - patches are usually released the second Tuesday of every month. Often these events are commented in the news and other media. Users should also signup for email alerts or MSN Messenger alerts at Microsoft's security website at http://www.microsoft.com/security to be aware about updates. Once patches are available Microsoft recommends to install them immediately. Depending on the confidence level of the user this should be done fairly soon after the patch release. If a users has several systems available it is recommended to test the patches on the least critical system first before updating all machines. Only one machine at a time is recommended to keep track of things and to be able to fix problems. In Windows XP it is also recommended to create a restore point first so that the system can revert back to the existing state before patching. Home users should closely follow the media about virus outbreaks and updates. Waiting a few days with patching a machine can make sense if some critical work is done on the computer an important deadline needs to be kept. Nothing is more annoying than having to fight computer problems with limited time at hand. Speaking of time - never install patches without having enough time at hand. Users should allocate 60 minutes of time just in case. If something goes wrong time pressure is the last thing you want to face when troubleshooting a machine that is down.

Baseball Betting: How to Bet Basics

If you know nothing about sports and you still feel the urge to wager, baseball is the easiest sports to wager on. As opposed to football and basketball, where you are mixed up with the point spreads and other confusing calculations, in baseball betting you simply put your money on the outcome of the game. In addition, the baseball season lasts longer, which means more matches and bigger chances to go home with the winning money. Here is a step to step guide to baseball betting.

The main difference between baseball betting and other team sports betting such as football and basketball is that while the latter ones use point spreads, the former uses the money line.

What is a Point Spread?
Point spread is the most common betting type offered in football and basketball betting. The sportsbook spreads the odd of a certain match by subtracting points from the favorite team, which is the team most likely to win and adding points to the underdog, which is the team that will raise a lot of eyebrows if wins.

What is a Money Line?
In baseball betting, the sportsbook sets the odds strictly on the outcome of the match. In order to even the action, bettors would have to risk more money on the favorite and risk less on the underdog. This is called the money line.

For example, if the money line is minus 170 on the favorite and plus 150 on the underdog, then you would have to bet 170 dollars on the favorite in order to earn 100 dollars. On the other hand, if you bet 100 dollars on the underdog, you would win 150 dollars if they would eventually win the match.

The difference between the minus 170 on the favorite and the plus 150 on the underdog is known as the twenty cent line. If the money line was minus on the favorite and plus 150 on the underdog, it is called the ten cent line or dime line. The fifteen cent line is also common in baseball betting.

Sportsbooks also offer total bets and run lines in baseball betting.

1) Total Bets:
These wagers are based on the sum of the runs scored by both of the teams. For example, if the sportsbook sets the over under total of a match as 7, the over wins if the sum of the runs scored by both teams exceeds 7 and the under wins if it sums up to less than 7.

2) The Run Line:
This wager is the baseball variation of point spread. When you are betting on the run line, you are betting on whether one of the teams wins by more than one run, which is marked as minus 1.5 or stays within one run, marked as plus 1.5.

Conclusion:
Although the money line makes baseball betting simpler than football and basketball betting, it causes the payoffs calculation to be more complicated:

1) In order to calculate the payoff when wagering on the favorite you should add 1 to the favorite price and divide it with the favorite price.

2) In order to calculate the payoff when wagering on the underdog you should add 1 to the underdog price.

Senin, 19 April 2010

Lost Something On Your Computer? It May Not Be As Bad As You Think

Just because you can't see it, or can't find it doesn't mean that its not there! I would say at least 90% of people who use a computer on a regular basis have no idea how it actually works. They think that things like icons on their desktop will make their computer run slow. Many things that because they have a slow computer it will cause their Internet to be slow. Others think that "Windows" is the computer and they don’t realize that it’s just another piece of software like every other program running on a computer. Finally many people think that when they click and delete something off of their computer, and wipe it from their trash bin that the information is actually gone. If you think that is the case, and you think you have lost your information for good, think again, cause you might just be in luck! When information is stored on your hard drive or hard disk, it is stored in things called sectors. When you delete something off of your computer through Windows or Linux or Dos all it is doing is telling the computer that those sectors are now available to be written over. The computer doesn’t actually wipe them clean, which would be useless when it could just as easily write over them. So if you have a virus or a computer illiterate roommate that happens to delete the important files off your computer, then you might just be able to get that information back. There is one catch, its not easy! Not only is it not easy, but also 99% of people don’t have the technology, know-how or resources and education to do it themselves. This is why there are professional companies that specialize in data recovery, and believe me, they charge tons of money. Data loss occurring from an actual hard drive failure such as overheating and melting important sensors or an electric shock that fries components might actually result in permanent data loss. Yep, so sometimes data recovery cannot restore lost files. This is why data security is a smart, preventative measure. Backing up data on multiple hard drives and CDs and DVDs and on multiple computers will prevent disastrous things like permanent data loss from occurring. Be smart – back your files up, it will cost you less to back up on hard drives than it will cost you to recover files directly from your hard disk.

Bag Those Apples

Honestly, I'm not a bag person. I don't even know the difference between a tote and a handbag. (Wait, they are different, right?) Anyway, I don't like carrying bags and my general rule is, if I can't fit it in my pocket, it's not going with me. However, all these changed when I went freelance and got myself an Apple laptop. I mean, I carry my business with me, and often I need to give presentations to prospective clients. Apple would give me the sophistication I lacked. Back to bags, a friend gave me one as a gift to my new freelance business. I told him that I don't need nor want one. Then he asked me the question I haven't even thought about. How am I going to carry my laptop? I gave him a grin and asked for the bag back. Call these things anything you want: computer bags, laptop bags, laptop cases, computer carrying case, laptop carrying case; I call them lifesavers. I am now a proud owner of three: black, checked, and in print.

Laptop bags are essential bags you use to carry your laptop around. Thinking that you're old backpack would do? Think again, because computer bags, laptop bags, laptop cases, computer carrying case, laptop carrying case, and other gadget carrying cases are made specifically for carrying electronics. This means that they have features that your ordinary bag can't match. First, they are usually made with leather, or other waterproof material so water can't get in to your thousand-dollar Apple during a downpour. This will also keep your computer safe against accidental spills which can damage your whole system. Second, they have built-in padding and other shock absorbing material so your laptop does not absorb the sudden shock when dropped. These padding would also cushion your laptop when if you set it quickly or suddenly on the ground or tabletop. Third, a computer case would also protect your laptop from dust, smoke particles, or other foreign debris. This is especially a necessity when you are moving out and taking your computer to your new home. You can cover your home computers with computer bags. Do this to avoid exposing it to extreme temperature, foreign debris, and humidity during the course of your move. Fourth, computer bags usually features different compartments for your other computer accessories. This is a lot different from a normal bag wherein compartments are usually big pockets where smaller objects can't help but roll around. Computer or laptop bag compartments usually a special storage for wires, tools, mouse, adaptor, a webcam and even batteries. These hooks and individual pockets prevent wire tangles and rolling around of objects.

Though computer bags, laptop bags, laptop cases, computer carrying case, laptop carrying case, and other gadget carrying cases come in varying kinds, it is important to choose good quality bags. They may be more expensive but you are assured of better protection for your laptops and computers. They are also long wearing and with proper use, can even last you for years. They are also easily available through the Internet and gadget stores. Invest in a good quality bag and you save yourself hundreds of dollars from computer repairs.

Minggu, 18 April 2010

Mac Data Recovery Explained

HPS and HFS+ are the Apple Macintosh systems for referencing stored data and hard drives. HFS and HFS+ data recovery methods are uniquely adept for Apple and are not to be confused with NTFS and “fat file” systems, used by Microsoft. So what are some examples of errors that might require data recovery for Mac’s? - Unreadable disks - General disk errors - No Volume (or Volume that isn’t HFS) - An uninstalled drive - Computer cannot find the directory - Internal file system errors - Flawed master directory block - Non-Macintosh disks - Improper file names - Segment Loader Error If you use a Mac, whether for business or pleasure, you must protect your valuable data from hackers, viruses, human error, power surges, hard drive failures, and other unexpected problems. The most essential step to keeping your data safe is to back up files regularly – you should always be prepared for the worst-case scenario. Files, databases, emails, spreadsheets, and all other important data can be easily salvaged if this step is taken. Mac’s and PC’s both offer limited solutions for data loss. Mac’s are especially susceptible to data loss! But with data recovery, all bets are on. When encountering data recovery problems, don’t try and fix the problem alone. A hard drive is complicated and repair requires special tools, a clean room environment, and expert technological know-how. If you attempt to take on this task by yourself, not only may you be unable to retrieve the data, but you may also incur further damage on the drive. But that’s okay, because data recovery assistance and service is only a call away. Skilled technicians can evaluate the lost data and instruct you on how to solve the problem. But don’t expect the job to be done in one day. This kind of repair is challenging; it can take almost a week before your data is recovered.