Pages

Sunday 29 March 2015

Email Management

email


You have plenty of free mail service and want to finally own email address? Then you've come to the right place! By applying your desired domain to setup your email addresses, we take care of everything for you.

All e-mails you get over us are first tested on all major viruses. So you do not get lost in the chaos of the many spam emails, we filter all emails before you.

When connecting and setting up your PC with Outlook, Tobit, Firefox, etc. We are happy to help you. And you should be on the road and need urgent access your emails again, this is not a problem. About our webmail frontend you can access them from anywhere and at any time on your emails.

We offer:

Domain booking of more than 100 top-level domains

Full-service management of your email accounts. You need not worry about anything!

Establishment of Office Assistant

Forwarding of incoming emails when you are traveling

Infrared Radiation



In physics, the infrared radiation (IR) is electromagnetic radiation with a frequency band of the electromagnetic spectrum than that of visible light, but greater than that of radio waves, or a wavelength between 700 nm and 1 mm (infrared band) .

 The term means "below red" because red is the color visible with the lowest frequency.

 It is often associated with the concepts of "heat" and "heat radiation" because every object with a temperature above absolute zero (basically any real object) spontaneously emits radiation in this band (for the Wien law increasing the temperature peak emission moves more and more towards the visible until the object becomes incandescent).

Thursday 12 March 2015

Li-Fi Technology

li fi


Li-Fi is the term used to label the wireless communications systems fast and inexpensive, the optical equivalent to Wi-Fi.1 The word Li-fi was indexed by Harald Haas in a lecture at TED on light communication visible.2

The technology was shown at the Consumer Electronics Show in 2012 using a pair of smartphones Casio to exchange data by varying the intensity of light from their screens, operating at peak separation ten metros.3

In October 2011, an association of industries and groups of companies formed the Li-Fi Consortium to promote wireless high-speed optical systems and overcome the limitations of the radio spectrum by exploiting a completely different part of the electromagnetic spectrum. The consortium expects him to reach speeds of more than 10 Gbps, theoretically enabling a high definition movie to be downloaded in 30 sec.

Li-Fi has the advantage of not causing interference with other systems and can be used in sensitive areas like the inside of an airplane. However, the light waves can not penetrate used paredes.5

Introduction To Usb

usb


The first models require a battery, but current use electricity from the USB port. These memories are resistant to scratches (external), dust, and some even water, factors affecting previous forms of portable storage, such as floppy disks, CDs and DVDs.

Its success and dissemination have led them several popular names related to its small size and the various forms of presentation, none has been able to stand out from all of them. The USB itself adjective or context can easily identify the computing device to which it relates; although being a little strict on the concept refers only USB port connection.

These reports have become the storage system and personnel data transport most used in this application displacing traditional diskettes and CD. You can easily find on the market memories 1, 2, 4, 8, 16, 32, 64, 128, 256, 512 GB, and up to 1 TB.2 memories with higher capacities may still be, for its price, outside the range of "domestic consumer." This means at least equivalent to 180 CDs or 700 MB diskette approximately 91 000 1440 KiB.

Wednesday 11 March 2015

Software Engineering

Software engineering


Software engineering is the application of a systematic, restricted, quantifiable approach to the expansion, operation and maintenance of software, 1 and studying these approaches, ie, the application of engineering to software.2 Integra mathematics, computer science and practices whose origins are in the ingenierĂ­a.3

The most recognized definitions, formulated by renowned authors are cited:

Software engineering is the study of the principles and methodologies for the development and maintenance of software systems (Zelkovitz, 1978).
Software engineering is the practical application of scientific knowledge to the design and construction of software and associated documentation required to develop, operate and maintain. Also known as software development software or production (Boehm, 1976).
Software engineering is the establishment of the principles and methods of engineering to obtain profitably software that is reliable and works on real machines (Bauer, 1972).
In 2004, the US Bureau of Labor Statistics (Bureau of Labor Statistics US) counted 760,840 software engineers computadora.4 The term "software engineer", however, is used generically in the business environment, and not all who work in the position of software engineer really have engineering degrees from recognized universities.

Some authors consider that "software development" is a more appropriate than "software engineering" to the process of creating software term. People like Pete McBreen (author of "Software Craftmanship") believes that the term implies IS levels of rigor and testing processes that are not appropriate for all kinds of software development.

Interchangeably the terms "software engineering" or "software engineering" are used; though less common also usually referenced as "software engineering" .5 June 7 In Latin America the most commonly used terms are the first two.

The creation of software is an inherently creative process and software engineering to systematize this process in order to limit the risk of failure to achieve the objective, through various techniques that have been proven right based on prior experience .

The SI can be considered as applied to software engineering, that is, systematic and tool presets means, applying them efficiently for optimal outcomes manner; objectives which always seeks engineering. Not only troubleshooting, but rather taking into account the different solutions, choose the most appropriate.

The Microprocessor

ntegrated floating point units


The microprocessor (or just processor) is the basic and most complex incorporated circuit of a computer system; by way of illustration, it is often called by analogy the "brain" of a computer.

Is responsible for implementing programs from the operating system to user applications; only executes programmed in low-level language instructions, doing simple things such as add, subtract, multiply, divide, binary logic and memory accesses arithmetic and logical operations.

This central processing unit consists essentially of records, a control unit, arithmetic logic unit (ALU) and a calculation unit FP (formerly known as "math coprocessor").

The microprocessor is usually connected by a specific socket on the motherboard of the computer; normally for proper and stable operation, it is incorporated a cooling system comprising a heat sink made of a material of high thermal conductivity such as copper or aluminum, and one or more fans that remove excess heat absorbed by the sink. Between the heat sink and microprocessor capsule usually thermal paste is placed to improve heat conductivity. There are other more effective methods, such as liquid cooling or using peltier cells for extreme cooling, although these techniques are used almost exclusively for special occasions, such as in the practices of overclocking applications.

Measuring the performance of a microprocessor is a complex task, since there are different types of "charges" that can be processed with different effectiveness by processors of the same range. A performance metric is the clock frequency for comparing processors cores of the same family, this being a very limited indicator given the wide variety of designs with which the processors of the same brand and marketed reference. A high performance computer system may be equipped with various microprocessors working in parallel, and a microprocessor may, in turn, consist of several physical or logical cores. A physical core refers to an internal portion of quasi-independent microprocessor executes all activities of a solitary CPU, core logic is the simulation of a physical core to more efficiently distribute processing. There is a tendency to integrate as many elements within the processor itself, increasing energy efficiency and miniaturization. Among the elements are integrated floating point units, RAM drivers, bus drivers and dedicated video processors.

History Of Computer

first computer


The first computer

As the first computer, the Z3 was elected at this conference. Regardless of this vote, the Z3 is since the late 90s, actually more often than the first computer called because they had some outstanding features of a modern computer, the other machines that time did not have. The Z3 was "only" the relay-based replica of the full-mechanical Z1. However, the Z1 was not practicable, but already shows the ingenious concept that developed Konrad Zuse for his machine.

Due to the different interpretation of what is a computer as opposed to an automatic calculating machine, there are now also considered that there would be several first computer:


1936

First mechanical computer by Konrad Zuse Z1

The 1st mechanical computer: Z1


In full mechanical design, without relay or tubes, Konrad Zuse developed from 1936 to 1938 the first program-controlled, freely programmable computer machines. It is programmed by punched tape (35mm film), already used the dual system (ax ^ 2 b) and dominated Gleitpunktrechnung. The number of input and output are in the decimal system. The calculator was due to mechanical defects not fully operational. Due to its pioneering logical concept is the Z1, together with the Z3, in the professional world often the first, although very simple, referred computer.

A replica of the Z1 is in the Museum of Technology in Berlin. It was manufactured in collaboration with Konrad Zuse and is mechanically much more stable than the original. more ...


1941

Relay calculator Z3 by Konrad Zuse

Relay calculator Z3
Photo: replica with minor variations, Deutsches Museum, Munich.

The Z3 is the elektromechnische replica of Z1, wherein the mechanical contacts of the Z1 were replaced by relay. As early as 1938, Zuse built, the Council of Schreyer following, an arithmetic unit in relay technology, Z2. In the Z3 then came 600 relay in the calculator and 1400 relay in the storage plant used. It was mainly used material: the windings of the relay was unheitlich, and they needed different voltages.

Read the program as in the Z1 via a perforated film strip. The Z3 was in May 1941, the first full-featured, programmable, program-controlled binary adding machine. It was destroyed in the war.

Characteristics of the Z3:

dual
Floating
Word length 22 bits (14 bits mantissa, exponent 7 bits, 1 bit sign of the mantissa)
64 words memory
Control over 8-channel paper tape
Addition parallel
Multiplication, division and square root in about 3 seconds
Single-step transfer
Typing on keyboard
Output via Lamp Field
It absence of conditional instructions, the non-variable program flow does not allow jumps. This is the key function, which is why the Z3 still is not a general purpose computer. With the binary logic is conceptually but other computers that have yet to follow, such as the Eniac, superior. more ...




1944 Relay Calculator MARK I of Aiken, Heinz Nixdorf Museum Paderborn. Photo: Clemens Weller
Relay calculator MARK I Aiken (exhibit at the Heinz Nixdorf Museum)

1946

ENIAC - the first "electronic brain"

First tube computer ENIAC Eckert and Mauchly of
1st generation based on tubes data processing systems. First tube computer ENIAC Eckert and Mauchly of. Von Neumann developed the concept of universal computer.


1956

2nd generation computers

On transistors based. The development of advanced programming languages ​​Fortran and Algol begins.


1965

3rd generation computers

Based on integrated circuits. There arise computer families that are compatible with each other. The core functions of the computer controlled by a micro program. The virtual storage principle is introduced. Undertow. Participants computing system.


1972

4th generation computers

Based on large-scale integrated circuits. Multiprocessor systems, high-speed storage concepts. Remote data access (dial-up). Database systems. Standardized operating systems.


1980

5th generation computers


Knowledge-based systems, expert systems, artificial intelligence development.

Binary Language

binary


A binary code is a code in which information by sequences of two different symbols are displayed (for example, 1/0 or true / false). [1] The basis of this system is the dual system. The term derives from the Latin prefix bi from which the meaning has two or twice.

Binary code form, due to their simplicity usually the basis for the processing of digital information and are therefore often mentioned in connection with the processing; "Computer work with this code" [3] Many of the binary species have arisen in the area of information technology and are used there. the term "binary code" is used in computer parlance as a synonym for machine code machine program or machine language.

Binary code can be technically very easy to map and process, eg by voltages. Voltage applied → 1 corresponds to or logically true, voltage is not equal to 0 or → logically false. The smallest unit of information from 0/1 or true / false is known in computer science as a bit. [5] By means of Boolean algebra logical connection or technical use more of these values using simple logic gates can be more complex, higher-quality information map. As a value-added information is displayed, is clearly defined by the respective code. For example applies in ASCII code, the bit sequence 1000001 as "A" 1100001 "a"; these characters are more understandable to humans as long as 0-1-sequences in the binary system.

The presentation and interpretation of information using binary code is not tied to a specific medium, but is everywhere applicable where the change between two states can be generated and measured again. So for example it would even be possible (though due to the low data transfer rate nonsensical) to transmit binary information with smoke signals (long smoking → logical 1, short smoking logic 0).

Monday 9 March 2015

Why Different Monitors Display The Same Images With Different Colors?



This happens in digital photography each color is represented by three numbers (which indicate the proportions of red, green and blue in the RGB system) which are the primary colors, mixing them we get all the others. Each monitor or printer has its own set of colors (or gamut color space which is decribed by the corresponding color profile) that can reproduce, and any color of a set is represented by three different numbers in each set.

In order to represent the colors of an image are created different color spaces, all subsets of the eye, then smaller, that are associated with cameras, digital scanners, or that are associated with the images "raw" from programs editing such as, for example, photoshop. Even monitors have their own color space that is the set of all the colors that the display can show and the color profile is a table that describes it.

Satellite Internet Access

internet


Pure satellite links (2-way satellite connection) are available practically independent of geographical features or other infrastructure all over the earth's surface and are therefore particularly suitable for remote areas and ships. Are a problem in satellite access the still significantly higher cost, high-latency, unless the return channel is realized via the satellite, the dependence of a further means of access.

In the example of a system with geostationary satellites typical delays of 500-700 ms, which disturbs sensitive real-time applications arise. The technique enables transfer rates of 1-2 Mbit / s and more. The capacity is limited in Germany to some 10000 simultaneous users, however, should be expanded

Saturday 7 March 2015

What is a domain?

domain


They would like to have your own domain, but do not know exactly how this all about? Or do you have one (congratulations!) And want to know what that has to do with emails and how to create a website? This blog is dedicated to exactly this topic.

So, all the world speaks of "www.irgendwas.de", e-mail addresses and Web sites.

Any e-mail address you get virtually anywhere through mass merchandisers for little to no money. This allows you to send and receive email, save to a limited extent. Disadvantage: These e-mail addresses, each - recognizable by the symbol of the supplier on the right side of the "@". This e-mail addresses do not act very professional in the business field. But for simple personal use them rich natural. (However, one often very little to no customization of e-mails.:-()

If you want to present his business online and fittingly "represent", then you should do it on their own website.

A website has ugs a "domain", more precisely, a URL (Uniform Resource Locator), under which one can reach them;. for example, we here just onsite.org (here in Germany reached the most .de, the country code for Germany. But there are many more, some with restricted access). This "domain" is practically the address on the Internet. Behind this lies a number line with the "address" of the server on which the content of the website is stored.

Constructed is the domain name or "domain" from right to left. On the far right is the TLD, that is, Top-level domain; either a "geographical" (.de, .at, .ch, etc.) or a "generic" suffix (.com, .net, .mobi, etc.). To the left is the second level domain (eg "meine-firma.de"). Has anyone else can register the domain that you want yourself, there is still the possibility of obtaining by minor variations similar free domain. (Try our domain and check domain Finder!)

Own domains or domains can be from different providers, so-called. Register "registrars".

In the next step you worried memory on a so-called. Webserver. A web server is a computer that is accessible from the Internet, in principle. Normally, the average consumer does not have a server are at home with you, but to book as much server space as you need with a provider (eg onsite;-)).

About this server space you can then send and receive e-mails. If you have your own domain, for example, "Www.irgendwas.com" or "fritzchenmueller.de", you can also create attractive e-mail addresses: The Domain fritzchenmueller.de could, for example, post@fritzchenmueller.de the address or buchhaltung@fritzchenmueller.de etc. set up. Let's be honest: Would you rather shop at an anonymous "firma12345@xyz.de" or a personal "info@meinefirma.de" ???

In addition to e-mail you can of course also run a website with its own domain. With an appropriate program (for some of our packages include free, see webseiten-gestaltung.eu) eg writes and / or one designed his text, image and / or sound (or, if you have no time or is not so computer savvy, can be programmed, eg by us;-)). Then everything is also stored on the web server. Now you can access it from all over the world, to the content stored there and look at (and possibly listen) what is offered everything there.

So, that was more than enough for a blog - soon it continues with special applications on your website, for example, own online store or even online auctions.

If you want to know more about domains in the meantime, HTML, etc. Webspace: Just browse through our website; next to our domain, web space and web design offer also includes extensive FAQ pages and small free tools.

Radio Communications

Radio


Radio communications is regulated by the International Telecommunication Union (ITU) has established a radio regulations in which we read the following definition:

Radio waves or radio waves "electromagnetic waves of frequencies arbitrarily lower than 300 GHz, propagated in space without artificial guide"; they are between 9 kHz and 300 GHz which corresponds to wavelengths of 33 km 1 mm1.
Frequency waves below 9 kHz are radio waves, but are not regulated.

Waves above 300 GHz are classified into the infrared waves as the technology associated with their use is currently optical and not electrical type, though this border is artificial because there is no difference in nature between radio waves , light and other electromagnetic waves waves (eg microwave, radar, etc.).

Many regulations concerning frequency sharing for different uses, some uses or exposure of workers to certain electromagnetic fields, via européenne2 regulations.

Thursday 5 March 2015

How To Defend Against Spam

spammer


A user of the e-mail has several ways to protect yourself from spam. First of all, however, is to realize that the email address should be considered as something extremely personal, just like the phone number or the credit card, and then it must be a bit 'of caution before you communicate it to others. The measures that personally you can take to reduce the amount of spam in your inbox are therefore:

do not give your e-mail lightly - the e-mail has become so common - both on the internet and in normal daily life - that appears in every form where you require your personal details, on business cards , on car bodies, on the "comment cardsĂ¢ €? the restaurant, etc. All this at first glance may seem harmless, but be aware that many companies register their e-mail addresses in their customer database in order to trace the habits of consumption. It may happen that with our consent, or even violating privacy laws, these lists are sold or shared with other companies or they fall into the hands of criminals.

Check that it is protected privacy - before signing a new e-mail address or personal information to fill out an electronic form, check that they are mentioned measures concerning the protection of information and personal data, in particular the sale of these data to third parts;
Pay attention to the active options when you subscribe to new services - sometimes it can happen that are marked for "defaultĂ¢ €? boxes contemplating sending mail from third parties or publication of certain address lists, etc ... In this case, remove the "sign of spuntaĂ¢ € ?;

Have multiple e-mail addresses - many domains (free, gmail, etc.) Offer free email accounts, for this reason it is recommended to create a new e-mail account to be used for purposes other than the official or in all situations where you are not sure that the other person does not make a proper use of our e-mail. There are also sites like www.tempinbox.com that provide email accounts "use and gettaĂ¢ € ?, free and without registration. This way you can avoid providing the e-mail main websites, services, demos, forums, or vendors that require a confirmation e-mail for registration;

Address munging (translation of the address) - is the publication, on a website or a discussion group, the address changed by the addition of other characters that make it unusable for a car but recognizable and usable for a person. Examples of address munging are andrea_NOSPAM@uniud.it, pieroTOGLIMISEVUOIRISPONDEREALLAMAIL@uniud.it etc. This technique, very popular in the nineties, showed many limitations and it is now preferable to publish an e-mail and secondary unmodified be abandoned if you receive too much spam;

Avoid opening e-mail spam - is best to avoid scams or receive additional spam. Not always, however, it is easy to see without opening it if a message is spam or not. In this case you should open it by following the advice given below.

Do not click on the link inside the e-mail spam - there are programs (called in the jargon "Bota €? Or" spiderĂ¢ €?) That automatically collect email addresses from websites, discussion groups, etc. These addresses are typically resold or shared, so if a user clicks on a link within this e-mail confirmation to the program that the e-mail address is valid and therefore become a potential victim of spam traffic. Sometimes the link within the email are also a way to perpetrate an attack of intrusive computer or telematic scams;
Do not respond to e-mail spam - answer means confirming to the spammer that the email address exists and is active;

Do not follow the removal instructions from the list or unsubscribe in the case of e-mail spam - in this case, as in the above, the only result is to confirm to the spammer that the email address exists and is active;
Avoid register their e-mail lists in spam that are on the internet - often behind these lists there are spammers that in this way we procure addresses of active e-mail;

Disable the automatic downloading of graphics in HTML email - many spammers send e-mail in HTML format with links to images or graphic parts that reside on a web server spammer. When the mail client displays the graphics contained in the message, the web server where the image resides is aware that e-mail has been opened and then the spammer know that that address exists and is active. Disabling the download of e-mail in HTML and viewing the emails in "only text on €? resolves this problem;

Increase PC speed with Windows tool

speedup pc


Even with Windows tool can increase your PC speed. You need to install any tuning software and still get quite a bit of performance out of your computer.
1. Remove Unnecessary programs from the Startup

 Startup Clean Startup Clean The biggest culprits for a slow PC are usually installed programs that have anchored in the startup. In a few steps you have these programs disables Windows functions.

Click "Start" and type in the search box "Run" field. Select the same search results.
In the "Open:" enter now "msconfig". This opens a window called "System Configuration".

Go to the tab "Startup". Clear the check mark for the programs that you do not need in the startup.

Programs such as "Spotify" or "gravel" You can just disable. Let However, the anti-virus program activated in any case.

2. Relieve the hard drive - uninstall programs

 Uninstall programs Uninstall programs even if you have removed the programs from the startup, nor slumber to other performance killer on your hard drive. These can be removed using the Windows Tool "Programs and Features".
Go back to "Start" and search for "uninstall programs" section. Select the same item.
A window appears, containing all installed programs are listed. Look for programs that you no longer use.

Select the entry with a left click. He turns blue and the "Uninstall" button appears. Select this to remove the program from the hard disk.

3. Change representation and increase system performance


 Performance options to adjust power options to adjust Aero Peek or window shades are beautiful, but also consume resources. This remedy can increase PC speed considerably.

Click "Start" and type in the search box "appearance and performance" field. Select the entry "appearance and performance of Windows Customize" from.

Now open the "Performance Options". Click on the "Visual Effects". Select "Adjust for best performance" either option, or turn itself off as many entries. The more you clear, the better it will affect your PC speed.
Now go to the "Advanced" tab. Under "Performance" select "Adjust for best performance" "Programs" from.

Also, the virtual memory plays an important role. Click on the "Change ...".

Size of approximately 3 GB is useful for most systems. Select the box next to "paging file size for all drives automatically manage" from.

Now choose "Custom Size" from. As the "Initial Size" enter approximately 2,000 MB and as "Maximum Size" approximately 3,800 MB.

Click the button "Set" and then click "OK".
Been tested on Windows 7 Tip: An additional SSD hard drive can increase your PC speed considerably.

Internet Server

server


At the base of the client-server, contains the pages and resources that make up the World Wide Web
Even if someone imagines a future where you can live without it, now the infrastructure and the very functioning of the Internet makes total reliance on web servers. Designed in the late '60s and early' 70s (more or less coinciding with the early development of ARPANET) but actually implemented only in the early 90s with Tim Berners-Lee and his project of the World Wide Web, the client-server model is the basis on which rests the web and allows you to access all the content of the Net: from images to video, from HTML pages to the application.

At the center of this architecture are precisely the web server, which plays at the same time, the function of the container (web pages, multimedia material, programs and more) and performer (instruction coming from clients or from other servers).
What is

The primary function of a server is to conserve, "process" and "deliver" web pages to clients who request it. The communication between the parties (the web server and the web client) occurs through HTTP (HyperText Transfer Protocol) and concerns, in most cases, HTML pages (containing text, images, style sheets and scripts). A user agent (usually a browser, but can also be a web crawler) begins a "conversation" with the server by sending a request for a specific resource, and the server responds with the requested content or an error message if the resource is absent, is no longer available or anyway not longer present. The resource is typically a file hosted on secondary storage server itself.

Many web servers also use the so-called server-side scripting (server-side scripting) using Active Server Pages (ASP), PHP and other scripting languages that allow you to "change" the behavior and operation of the server on-the-fly (literally "on the fly") without altering the basic structure of the server itself. In this way the server can provide both static web pages is to create dynamic web pages "fishing" content and composing them into a single framework HTML.

Before you can get to the HTML page or any other content on the web, the client is "forced" to a lengthy process of requests and responses made by the use of different communication protocols. The requests go through a web browser and are "sorted" the web thanks to the URL (Uniform Resource Locator), the web addresses that uniquely identify each resource present in the server. A URL is broken down into three parts: the protocol used in the communication between the two known (usually HTTP, but may also be the HTTPS or FTP), the server name or the domain that hosts the resource ("www.fastweb.it" for example) and the name of the given "target" (for example, the URL https://it.wikipedia.org/wiki/Informatica identifies the web page on the definition of "Information" within the domain wikipedia, via HTTPS).

All resources on the web are identified by a unique numerical address (IP address) composed in different ways depending on the protocol (IPv4 or IPv6) and corresponding to the alphanumeric URL. So that the web browser can find the corresponding server, you must have a name server (basic element of the Domain Name System or DNS) "translates" the URL into an IP address and individuals consequently the resource "target" (for example, it.wikipedia.org the URL matches the IPv4 91,198,174,192 and is equivalent to it).
Identified the IP address and the server containing the desired resource, comes in the HTTP protocol: the browser sends a GET request (from the verb get, translated as "get", "receive") to the web server responds by sending the code HTML page or resource sought. The browser reads the HTML tags included in the received code in response, format the page as well as indications transposed and displays it on the screen.

How Do I Manage My Digital Reputation

google


When you start to create and upload content online, think for a moment about what you're about to share and impact on others. The content you post and loads represent yourself online. This is what is called "digital reputation". Do not forget the invisible audience, that is, who might be able to view your content and ricondividerli without your knowledge. Rule of thumb: do not post content that you do not want can be seen by friends and relatives.

Be sure to review the settings on the privacy and security of the platforms of social networks like Google+. Google offers several tools for managing your settings.

What Are Web Applications And How They Work

app


If you play online, use a photo editor online or web-based services such as well-known Google Maps, Twitter, Amazon, YouTube or Facebook, you're an active resident of the fantastic world of the web app.
Web applications, also calls only "app", are programs available on the browser and on mobile devices. You connect to Internet services that allow you to perform simple tasks, such as adding Web sites to your bookmarks and check emails.

Will also allow you to perform more complex operations such as share photos, visit cities or listen to music. The standard navigation system that you have in your car is a good example of app. In this app you can receive real-time information based on your location. You can pan and zoom the map, get driving directions, find alternate routes and search for specific destinations.

The web app, in addition to being accessible, are actually safer. Are executed in the browser and you never have to download them to your computer. This way you protect yourself from viruses, malware and spyware. Now you have access to many more transactions and information and access is much safer than in the past.

For more information on web applications, read the booklet 20 Things I Learned (20 things I learned).

Wednesday 4 March 2015

3G

3g


3G is a technology standard for mobile phones and laptops, as well as GSM or EDGE standards. It is an evolution of the latter, since it provides a higher data rate. 3G and 3G + technology allows you to enjoy high broadband on your mobile phone or your laptop. You will be able to access video telephony, on TV, or simply enjoy a comfortable and efficient internet access.

What a difference between 3G and 3G +?

3G + is a software evolution of 3G. As such, it offers ten times the performance. The flow for the download and transfer of data is substantially increased.

What rate to which technology?

"Upload speed and download

First to understand the concept of flow, it is necessary to differentiate between the flow of upload (or debit amount) and the download (or downstream). The first is the fact his computer to send information to another computer. The second refers to the act of downloading information from another computer to your own computer, just like when you download documents from the Internet.
The main difference between these two types of sending the information is that the upload has a still lower than the download speed. Thus, the offers will be presented in 3G / 3G + always will be with the speed of download.

"The flow rates of different technologies

- EDGE (2.75G) has a flow rate of about 250kbps.
- 3G technology allows in practice a 384kbps rate.

- 3G + (HSDPA standard), meanwhile, allows speeds up to 3,6Mbps, equivalent flow of current ADSL broadband offer.

Types Of Computer

types of computer


1 - PC 

The personal computer or PC defines a computer designed for general use and for one or more people. Being a MAC computer a PC, most people associate this term with systems running the Windows operating system. The PCs were known at first as microcomputers because they were a full-fledged computer, but on a smaller scale compared to the huge systems in use at that time.

2 - From Desktop 

A PC that is not designed to have portability. What is expected of desktop computers is that they will be localized and implemented in a permanent location. Many of these computers offer more power, storage and versatility for less cost, which portable versions.


3 - Laptop 

Laptop computers are computers that can be moved from one place to another and where everything needed to operate without having to continually by connecting peripherals are integrated. Everything is included, including mouse, keyboard, memory, hard drive, etc. It also has a battery that gives autonomy to run certain hours without being connected to an external power resource.

4 - PDA 

These devices are small embedded computers that normally use flash memory instead of a hard drive to store information. The PDA usually have no keyboard, and instead have sensitive touch screens to perform common tasks. They are usually very lightweight with a reasonable battery life. There are some older versions that are between a PDA and a laptop.

5 - Workstation 

A desktop computer that has a more powerful processor, additional memory and sufficient resources to carry out special tasks and of great weight and wear.

6 - Server 

A computer which have been optimize to provide services to other computers over a local network or the Internet. Usually have high power processors, lots of memory and several large hard drives.

7 - Mainframe 

In the early years of computing, such computers were big computers that could fill an entire room or even an entire floor. Going decreasing in size and in turn increasing in power, the term mainframe has fallen into disuse, using more 'enterprise server' or corporate server. Still, some companies still use this expression.

8 - Supercomputer 

 These types of computers are often worth a lot of money coming to assert custodial amounts of money. While some of these devices consist of a single computer system, many consist of a system of several high performance computers working in parallel as a single device

Computer Culture

computer


While digital music players existed for some years and the online music market is beginning to emerge, Apple offers as of 2001, not a player but a complete solution including an MP3 player, a management and software download music (iTunes) and an online music store (iTunes Store). Rather than chasing the pirate music on the net.

 Apple believes that people are willing to pay $ 1.29 (and 0.99 dollar) for that simplifies life. Not to shoot themselves in the foot, the company agrees for the first time to open the PC world. Compatible with Windows, the iTunes software to purchase and manage content from any computer connected to the net.

Success is the rendezvous.

 Today, seven years after its creation, the iTunes Store has become the leading retailer of music in the world (90% market share in online music) in front of stores Wal-Mart (main American hypermarket chain) . Over 10 billion songs have been downloaded a total of 11 million references.

 Apple has succeeded in passing from mere computer manufacturer to the distributor of cultural content (music, videos, movies). A stroke of genius that allows it to retain 30% of the money spent on iTunes itself without producing any content. This ecosystem of a new genre will find many variations thanks to the iPhone that allows you to sell applications (3 billion downloads in eighteen months), and now the iPad, which is positioned in the areas of digital books and the press.

Touchpad

Touchpad


The touch pad replaces the mouse when the use thereof is not possible, for example on a portable computer.

The touchpad works as a relative pointing device. There is no relationship between the finger position and the cursor position on the screen. However, some manufacturers make available API allows programmers to know the absolute position of the finger and the pressure exerted.

The buttons on top or below the touch pad are used as mouse buttons.

Some touchpads offer reserved areas can be used for different functions, for example to scroll the scroll bars (like the wheel of a mouse).

Synaptics touchpads (used with the correct driver) and keep the party against the right edge of the pavement reserved for vertical scrolling and the portion above the bottom edge reserved for horizontal scrolling (even if no symbol in that did shown on your touchpad).

Some touchpads can emulate mouse click by tapping the surface.

It is also possible to perform 3 clicks mouse buttons by pressing the surface (eg with Linux and the Synaptics driver):

Left click → type with one finger;
middle-click → type with two fingers;

right click → tap with three fingers.

5 Priorities Of Generations Y and Z With Respect To Employment

computer genration


Looking to attract and mobilize young workers? Here are five elements that build to meet their expectations and ambitions with regard to the job market.

This compilation is drawn from a survey by staffing firm Randstad Canada to 1200 workers of Generation Y (born between 1981 and 1994) and the Z generation (born between 1995 and 2010).

Social responsibility: not less than 82% of workers surveyed believe it is important that their employer contributes positively to their community. The most effective way to do this is to create new jobs locally, according to 31% of respondents.

Diversity: inclusion and harmony are values to new generations. Young workers are seeking an employer promoting diversity - both professional and cultural, but it is gender that is of the most importance, as 88% of Y and 87% of Z.

Communication: high in the era of Web and social media, young workers want an environment where premium dialogue where they can express themselves and be heard. Communication skills are also sought from the main quality of a leader, who they expect including regular feedback.

Flexibility: The work-life balance is a growing concern, young workers seeking an employer offering both flexibility in scheduling work habits (teleworking, technological tools, etc.). No less than 20% of respondents want further that their superior offers them the opportunity to work independently.

The implication: Y and Z generations of workers want to take part in major projects and contribute to the results. So employers have an incentive to be responsive to their ideas and give them the chance to use their creativity. Young workers are also looking for opportunities to learn and improve, whether through training, mentoring and special projects.

Tuesday 3 March 2015

Powerful Industrial PC For Demanding Applications

pc


Its new 19-inch industrial rack PC, the Simatic IPC547D has the Siemens Industry Automation Division (2nd Generation) equipped with powerful Intel Core i processors up to Core i7 quad-core processor with integrated graphics capabilities.

The Rack PC is available with 64-bit Windows 7 operating system, to 32 gigabytes large DDR3 Arbeits¬speicher and Intel HD Graphics with Dynamic Frequency onboard. With its high computing, system and graphic performance, the PC is especially suitable for fast processing of large amounts of data in industrial image processing, process visualization, data acquisition and processing. Redundant power supplies, RAID hard drives and solid state drives provide high system availability and data security.

Virtual Memory Management

virtual memory


This article or section does not adequately equipped with supporting documents (eg, individual records). The question information is possibly soon removed. Please help Wikipedia by you investigate the information and insert good documents. Information is possibly on the talk page or in the page history. Please remove this last warning markings.

For this important information technology concept still missing documents, background information, details, etc.

Schematic diagram of the application of virtual memory management:
left: virtual memory space per process memory is linear and unfragmented
right: real memory sources, typically RAM or hard drive, several, small memory fragments can be used; in red memory usage of other processes, invisible in the virtual memory space

The virtual memory management (engl. Virtual memory management, VMM) is a special memory management in a computer. The translation of the English term represents a hypallage - not the administrative process, but the memory is to be managed virtually. The virtual memory refers to the fact independent of the existing memory address space that is provided to a process by the operating system.

The concept originated in the 1950s and is now found in almost all modern operating systems use.

How To Protect Your Wireless Data Against Thieves



The new wireless router is unpacked, jerk, jerking connected device and after a few steps are notebook, game console, smartphone, and tablet in the network. But beware: With all the joy over your wireless surfing pleasure forget many safety.

An unprotected wireless radio network provides neighbor or data thieves easy access to your Internet connection - and potentially sensitive information that you send over the network or stored on your hard drive.

This can have fatal consequences: Catching attacker passwords or bank data from, they can clear empty your account or use your online shopping account of a scam. Even the secret Mitsurfer that connects his laptop in the apartment above you with the Wi-Fi network can give you a lot of trouble.

Space pirates from


Spread the neighbor, for example, illegal movies and music on the Internet, it does so through your IP address. The police can trace the address from your internet provider. Although you do not have anything to do with the fact, you stand as the alleged pirates. The tips above in the gallery to help make your wireless network secure.

Spam Secure e-mail addresses with the "Email Address Encoder"

email


A simple yet effective method is to reward e-mail addresses by their decimal character entities. This one replaces each character an e-mail address by its numerical notation according to ISO 10646 (congruent with the Unicode standard) in decimal form.

From

<a href="mailto:example@example.com"> example@example.com this code
becomes the source of the page

Such encoded e-mail addresses and mailto links are still represented by web browsers without problems correctly in writing and are usable, but they should at least be safe from automated address collectors. The software side effort required to "decrypt" is here apparently simply too high.

Absolute security does not exist

Although this method is of course not a hundred percent safe solution, she should protect at least largely against unsolicited e-mails, and at the halfway reasonable cost. The problem is also "packed at the root," saying: You are trying to prevent the concerned e-mail address is in the first place bespammt.

Of course you want the Umwandelung not "have to do it by hand" in numerical notation. A convenient web interface for converting offers about the Email Address Encoder.

Image Sensor

sensor


OTE Group, based in the Netherlands, specialized in manufacturing and exporting vial lubricating, moisturizing and cleansing for contact lenses. Along with three production lines, the company offers more than 100 brands to bring their brand to customers. OTE desired product to the customer must be in perfect condition.

Going along with that, OTE must meet the strict requirements of the pharmaceutical and healthcare industries. Previously, the quality control is done by hand, but when faced with the requirement to improve the quality of products meet ISO standards, the company has to find solutions to the image sensor to ensure the presence of product code and the label on the bottle. Using the image sensor to ensure quality control and help improve the efficiency and speed performance.
Image sensor is a simple solution and moderate price, for checking the presence of products and components in the packaging process. Specifically, an image sensor can replace multiple sensors or perform the function of optical sensors can not be done.

Three image sensors are installed on the packaging line's OTE. Here, the image sensor checks the presence of the code in the bottom of the bottle and the label.

In the first application, without code, line stops.

OTE has more than 250 customers each label for many customers. They should ensure that the correct label is affixed to the bottle. With this application, an image sensor used for round bottles, and two image sensors are used with specially shaped bottle.

Image Sensor Solutions helped secure OTE and code printed on the label, no longer have to rely on the random test and meet the stringent requirements of customers in the pharmaceutical industry. 

Sunday 1 March 2015

Digital Single Lens Reflex (DSLR) Camera

dslr


DSLR cameras, also called DSLR (Digital-SLR, SLR English with Single lens reflex) are a type of photographic camera single-lens reflex type (SLR), which support storage of the captured image is an electronic sensor rather than 35 mm film used in chemical photography. Among its most important features is the use of control systems for automating most of the mechanisms of both sealing devices,

Synchronization with flashes (both internal and external), and generally most camera functions, although still behave in most respects (approach shot, stabilization) as electromechanical devices like their predecessors. In most cases remain the same features (and compatibility, depending on the manufacturer) for the traditional SLR system, popularized worldwide since 1959 Nikon F.

The first difference is that the lenses are interchangeable, compatible with the objectives of SLR film (depending on manufacturer). Because these objectives were designed for 35mm film, the sensor is larger than in compact cameras. While it may be the same size of a movie (36x24 mm) (full-frame sensor, usually only in very high-end models), usually tend to be somewhat smaller (see: APS-C size sensor), in which If a 'multiplying the focal length "normally 1.5 (Nikon, Pentax, Minolta, Sony), 1.3 and 1.6 (Canon) or 2x (Four Thirds) occurs.

In compact cameras small size sensors are used, leading also shorter focal lengths and therefore a very high depth of field (almost everything in the picture into focus). The depth of field is therefore the main difference between a photograph taken with a digital compact camera or an SLR. With an SLR great control is achieved by the free choice of the ratio of the focal length and aperture, as a defocused focuses on the subject photographed.

Another advantage of an image sensor larger is the highest image quality and increased sensitivity, being able to take pictures with high ISO values with very acceptable noise level.

DDR3 Ram

DDR3 Ram


The processor has to take the data and instructions for it to function. However, the rates at which it works, the memory of which takes the data and instructions must be flash. Or, what is the same, ultracara. For this reason, we have created different hierarchical levels of memory.

The fastest and closest to the processor cache, with levels 1, 2 and 3. The L1 is up flash and expensive, and therefore does not exceed a few tens of kilobytes. Sandy Bridge is 64 Kbytes divided into 32 Kbytes for data and 32 for instructions. The level two cache, L2, and becomes more than 100 Kbytes, with up to 256 or 512 Kbytes. The Level 3 or L3 unfolds with several "megas" up to 16 Mbytes. These three levels are integrated in the processor, while the next, RAM, is out, as memory modules.

And finally, the slower cheaper memory but also corresponds to the hard drives, optical drives and Flash memory. These systems are just a support for loading data into RAM. And is that a hard drive can not run anything directly; just loaded into RAM.

The processor first searches its records, then the L1 cache, then the L2, L3 and finally, in RAM. Anything having to go for a data memory means slow down the operation, the more the higher is the data in the memory hierarchy.

Today, memory is DDR3 par excellence. After a long transition, also prompted by integrating memory controllers on processors, DDR2 is alone for old computers, while DDR3 has been expanding both laptops and desktops and netbooks. The fall in prices has been remarkable too, with bargains of up to 10 euros per Gbyte or less.

For extreme memory speeds can reach up to 60 euros per Gbyte, for memories DDR3-2.300. They are positioned as solutions at the end of overclocking performance professionals. Typically will work in speeds between DDR3-1.333 and DDR3-2.000. What is clear is that today having 8 Gbytes of RAM is not a luxury, not even on laptops, where 4 Gbytes on a 1,333 SODIMM module cost around 30 euros.

But these differences in prices are not justified by performance tests, at least for the vast majority of users. In fact, you may find prices of less than 7 euros per gigabyte. Curiously, for SSD price per Gbyte is around 2 euros.

How To Boost The Speed Of Wi-fi

wifi


Many users often lose almost a third of the speed of internet connection paid when using Wireless. Below we discuss some "tips" that we consider relevant to increase internet speed by improving your wifi network.

Step 1: Reduce interference to increase internet speed

The first step in solving the problems of WiFi performance is to understand what causes it. In most cases is signal interference from other neighboring wireless networks and devices. Our wireless devices help to create a wall of electronic noise with the WiFi network must deal. It would be like trying to have a conversation with someone who was in another room and that both had noise.

Outdated equipment of your neighbors can influence the performance decrease your WiFi network. The points of access routers WiFi and former operating in the 2.4 GHz band limited thus slowing the connection.

Their electronic devices may also be working on influencing the efficiency of your network. Cordless phones and microwave ovens used increasingly congested 2.4 GHz band.

Step 2: When you upgrade to a Dual-Band (2.4 and 5 GHz) device get speed up internet

What do we do when we find much traffic on the freeway? Normally, we try to find an alternative route, preferably where there are fewer cars. The same idea applies to WiFi networks. The band's most recent 5 GHz has been described as an almost empty freeway, and has become the standard for modern high-end electronic devices such as game consoles, TVs and digital media players such as Apple TV and Roku. The Dual-Band Wireless routers today offer the best of both worlds: surfing the web on older devices 2.4GHz and increase internet speed to play and view streaming HD videos through the 5 GHz band, all without being affected the performance of the network.

When you go to buy a Dual Band router, be sure to find one that allows connection to 2.4 GHz and 5GHz. Some older models must be established only in bandwidth. We suggest routers as NBG5615, NBG5715, NBG6503 or NBG6716 Zyxel or Access Points as the NWA1123-NI or NWA5123-NI also Zyxel, these are Dual Band devices that meet international standards WiFi 802.11 a / b / g / no 802.11 b / g / n 2.4 GHz and 802.11 a / n / ac 5 GHz in the case of APs.

.

Step 3: Importance of Location

Traditionally it has been said that location is everything when it comes to business. It's the same when it comes to the integrity of the WiFi signal. The placement of access points and router in areas of poor accessibility leads to poor quality signals, shaded areas and loss of connectivity.

The wireless router must be located as close as possible to the central part inside your home. If you are trying to provide a signal to several plants, it is important to think in three dimensions. Consider placing the router on the second floor for a more complete coverage on the top floor and bottom.

The walls, windows, large objects or other barriers, weaken the WiFi signal. Find an open as a desktop or a central wall space. Do not hide your router in a narrow or behind a large electronic device such as a TV or a computer cabinet.

Step 4: Do not run security risks increase internet speed

To avoid any unwanted access to your network is very important to take the necessary protective measures and do not skip the security protocols, updating and maintaining security settings.


The new routers have security protocols WPA and WPA2, which have replaced the WEP protocols (less secure today). Some cheaper models of these new protocols can slow connection speed, but it is not advisable to disable security for greater speed. Instead, consider buying a router with hardware optimized for the latest security protocols. This will keep the overall network performance while protecting your data from hackers.

Dynamic Host Configuration Protocol (DHCP)

DHCP_Serve


DHCP (Dynamic Host Configuration Protocol) simplifies the assignment of IP addresses on a network. What is needed is to at least one DHCP server. Distributes IP addresses to the different clients.

On the server side, an address space is defined. IP addresses from this pool are allocated to the clients when they ask the DHCP server for it. For this to happen, the network configuration of the client must be set accordingly. This is now standard on operating systems such as Linux and Windows is the case, so that an administrator does not have to worry about the settings of the client.

A DHCP server automatically, manually or dynamically assigns IP addresses. Automatically addresses can be assigned only once. It receives a client that is identified by the MAC address of its network interface, at first logon the network a free IP address. Which is bound to the MAC address, and the client gets it in the future at each login. In contrast, dynamically distributed IP addresses are cashed by the server after a certain time.

The latter method should always be used in the larger network, otherwise the IP addresses could be almost there. Caution: This can happen even in smaller networks, if one uses often times virtual environments such as VMware Workstation, Parallels Desktop or Citrix XenServer. These generate multiple virtual network interfaces depending on configuration. The most cumbersome method, but certainly is used, is the manual assignment of IP addresses. Here you can assign a specific address one or more clients an administrator - such as a router or a network printer.

The request from the client by means of broadcast. Thus, to test how many DHCP servers exist on the network. The contacted server is sent in response a suggested configuration. If the client accepts this, it sends a DHCP request (DHCP request). The server in turn sends the IP address and the required parameters. At the end of the session, the client sends a release back to the server and reports so that the IP address is no longer needed (DHCP Release).