The System i (formerly known as iSeries, AS/400, and Application System/400) is a type of computer produced by IBM. It was first produced in 1988. It was then renamed to the eServer iSeries in 2000 as part of IBM's e-Server branding initiative. Now with the global move of the server and storage brands to the System brand with the Systems Agenda, the family has been renamed to System i in 2006, with the POWER5-based members of the series being called the System i5.
Features
The AS/400 is an object-based system with an integrated DB2 database that was designed to implement E. F. Codd's relational database model, which is based on Codd's 12 rules, in the operating system and hardware. read more…
Find more about AS/400 visit www.halfvalue.com and www.halfvalue.co.uk
For more details on Books at www.lookbookstores.com
Monday, April 23, 2007
Tuesday, April 17, 2007
Computer Hacking
Hacker is a term applied often to computer software or computer hardware programmers, designers and administrators, and especially those who are perceived as experts or highly accomplished. A hacker is also someone who modifies electronics, for example, ham radio transceivers, printers or even home sprinkler systems for extra functionality or performance. The term usually bears strong connotations, but may be either favorable or denigrating depending on cultural context .
Computer programming, a hacker is a software designer and programmer who builds programs and systems that garner the respect of one's peers. A hacker can also be a programmer who hacks or reaches a goal by employing a series of modifications to exploit or extend existing code or resources. For some, "hacker" has a negative connotation and refers to a person who "hacks" or uses kludges to accomplish programming tasks that are ugly, inelegant, and inefficient. This pejorative form of the noun "hack" is even used among users of the positive sense of "hacker" In computer security, a hacker is a person who specializes in work with the security mechanisms for computer and network systems. While including those who endeavor to strengthen such mechanisms, it is more often used by the mass media and popular culture to refer to those who seek access despite them. read more........
For more details on Computer hacker visit www.halfvalue.com and www.halfvalue.co.uk
For more information on books visit www.Lookbookstores.com
Computer programming, a hacker is a software designer and programmer who builds programs and systems that garner the respect of one's peers. A hacker can also be a programmer who hacks or reaches a goal by employing a series of modifications to exploit or extend existing code or resources. For some, "hacker" has a negative connotation and refers to a person who "hacks" or uses kludges to accomplish programming tasks that are ugly, inelegant, and inefficient. This pejorative form of the noun "hack" is even used among users of the positive sense of "hacker" In computer security, a hacker is a person who specializes in work with the security mechanisms for computer and network systems. While including those who endeavor to strengthen such mechanisms, it is more often used by the mass media and popular culture to refer to those who seek access despite them. read more........
For more details on Computer hacker visit www.halfvalue.com and www.halfvalue.co.uk
For more information on books visit www.Lookbookstores.com
The Data disaster recovery
Tap Delete key, click empty Recycle Bin, stop breathing, hit panic button... Sounds familiar? And then, have you felt that supreme feeling of futility and vacuousness well up when you learn that your hard disk has packed up? Well, despair not. And heed not the hardware engineer when he tells you all is lost. Until you have tried out these freeware remedies. They may just save your skin/sanity/soul even after a trigger-happy finger has found the delete key... Or the dark forces of digitaria have dealt death blows to your hard disk's partition tables...
Before you say your prayers and attempt data recovery, here are some points you should keep in mind: If you have deleted a file/directory inadvertently and want to get it back, avoid using your system/concerned media till you have managed to retrieve your data. The more the activity on the disk/media, the greater the chances of your deleted data being overwritten. So do not copy any files to the disk containing your lost data. Avoid Web browsing; a browser's cache files could obliterate your deleted files. Avoid launching unnecessary programmes; agam, a programme's temp file writes to the disk. In fact, delete as many more files as you can to create more free space as there are chances of overwriting lost files with new one. So empty the Recycle Bin. Clear your browser's cache. Install a recovery programme, but not on the disk where your deleted data is located. read more……..
For more details on Data Disaster visit www.halfvalue.com and www.halfvalue.co.uk
For more information on books visit www.lookbookstores.com
Before you say your prayers and attempt data recovery, here are some points you should keep in mind: If you have deleted a file/directory inadvertently and want to get it back, avoid using your system/concerned media till you have managed to retrieve your data. The more the activity on the disk/media, the greater the chances of your deleted data being overwritten. So do not copy any files to the disk containing your lost data. Avoid Web browsing; a browser's cache files could obliterate your deleted files. Avoid launching unnecessary programmes; agam, a programme's temp file writes to the disk. In fact, delete as many more files as you can to create more free space as there are chances of overwriting lost files with new one. So empty the Recycle Bin. Clear your browser's cache. Install a recovery programme, but not on the disk where your deleted data is located. read more……..
For more details on Data Disaster visit www.halfvalue.com and www.halfvalue.co.uk
For more information on books visit www.lookbookstores.com
Monday, April 16, 2007
Microsoft Office 2007
The 2007 Microsoft Office System (also called Microsoft Office 2007) is the most recent version of Microsoft's productivity suite. Formerly known as Office 12 in the initial stages of its beta cycle, it was released to business customers on November 30, 2006 and was made available to retail customers on January 30, 2007 which was the same day of the formal launch to retail customers of Windows Vista. Office 2007 contains a number of new features, the most notable of which is the entirely new graphical user interface called the Ribbon, replacing the menus and toolbars that have been the cornerstone of Office since its inception.
The 2007 Office system provides many of the fundamental components required to support compliance regulations, such as auditing, records management, and data security. However, some degree of development and customization is necessary to tailor regulation-compliant solutions for particular organizations and environments. This paper provides examples of extending the platform to build custom compliance solutions for the financial services, healthcare, and accounting fields. The new software will be considerably different than the current MS Office product. The look and the menu/directory views will have a new look, more like Macromedia's Dreamweaver product. read more…
Find more about Microsoft Office 2007 visit www.halfvalue.com and www.halfvalue.co.uk
For more details on Books at www.lookbookstores.com
The 2007 Office system provides many of the fundamental components required to support compliance regulations, such as auditing, records management, and data security. However, some degree of development and customization is necessary to tailor regulation-compliant solutions for particular organizations and environments. This paper provides examples of extending the platform to build custom compliance solutions for the financial services, healthcare, and accounting fields. The new software will be considerably different than the current MS Office product. The look and the menu/directory views will have a new look, more like Macromedia's Dreamweaver product. read more…
Find more about Microsoft Office 2007 visit www.halfvalue.com and www.halfvalue.co.uk
For more details on Books at www.lookbookstores.com
Saturday, April 14, 2007
About mobile phones
A mobile or cellular telephone (commonly, "cell phone") is a long-range, portable electronic device used for mobile communication. In addition to the standard voice function of a telephone, current mobile phones can support many additional services such as SMS for text messaging, email, packet switching for access to the Internet, and MMS for sending and receiving photos and video. Most current mobile phones connect to a cellular network of base stations (cell sites), which is in turn interconnected to the public switched telephone network (PSTN) (the exception are satellite phones).
The Mobile phone is one of the most used pieces of equipment today. The concept of using hexagonal cells for mobile phone base stations was invented in 1947 by Bell Labs engineers at AT&T and was further developed by Bell Labs during the 1960s. Radiophones have a long and varied history that stretches back to the Second World War when the military started to use radio telephony links and civil services in the 1950s, with hand-held cellular radio devices being available since 1983. Due to their low establishment costs and rapid deployment, mobile phone networks have since spread rapidly throughout the world, outstripping the growth of fixed telephony. read more…..
For more details on Mobile Phones visit www.halfvalue.com and www.halfvalue.co.uk
For more information on Books visit www.Lookbookstores.com
The Mobile phone is one of the most used pieces of equipment today. The concept of using hexagonal cells for mobile phone base stations was invented in 1947 by Bell Labs engineers at AT&T and was further developed by Bell Labs during the 1960s. Radiophones have a long and varied history that stretches back to the Second World War when the military started to use radio telephony links and civil services in the 1950s, with hand-held cellular radio devices being available since 1983. Due to their low establishment costs and rapid deployment, mobile phone networks have since spread rapidly throughout the world, outstripping the growth of fixed telephony. read more…..
For more details on Mobile Phones visit www.halfvalue.com and www.halfvalue.co.uk
For more information on Books visit www.Lookbookstores.com
Friday, April 13, 2007
Guide to Buying a Webcam
A web cam in the simplest definition is a camera that is in some way connected to the World Wide Web, or Internet. As you may imagine given this broad a definition, webcams can take many different forms and flavors. Started in 1991, the first webcam was pointed at the Trojan room coffee pot in the computer science department of Cambridge University.
One of the most common types of webcams are personal cameras that are connected to a home PC, which with the help of some software allow the user to share a moving image of themselves with others. Depending on the user, and the software, this image may be publicly available to the Internet at large via a directory of some sort, or only available to the user's friends who know the proper address to connect to. These cameras are typically only on when the user's computer is turned on, and they are connected to the Internet. With the rise of DSL and Cable modems users are leaving their computers on more, which is good overall for webcam watchers, however, it has other complications including speed and security.
Webcam software typically captures the images as JPEG or MPEG files and uploads them to the Web server. There are countless Webcam sites on the Internet that have cameras pointed at virtually everything. They provide videos of people going about their daily work as well as offering the online equivalent of the live "peep show.” read more…
Find more about Guide to Buying a Webcam visit www.halfvalue.com and www.halfvalue.co.uk
For more details on Books at www.lookbookstores.com
One of the most common types of webcams are personal cameras that are connected to a home PC, which with the help of some software allow the user to share a moving image of themselves with others. Depending on the user, and the software, this image may be publicly available to the Internet at large via a directory of some sort, or only available to the user's friends who know the proper address to connect to. These cameras are typically only on when the user's computer is turned on, and they are connected to the Internet. With the rise of DSL and Cable modems users are leaving their computers on more, which is good overall for webcam watchers, however, it has other complications including speed and security.
Webcam software typically captures the images as JPEG or MPEG files and uploads them to the Web server. There are countless Webcam sites on the Internet that have cameras pointed at virtually everything. They provide videos of people going about their daily work as well as offering the online equivalent of the live "peep show.” read more…
Find more about Guide to Buying a Webcam visit www.halfvalue.com and www.halfvalue.co.uk
For more details on Books at www.lookbookstores.com
Thursday, April 12, 2007
About Microsoft Corporation
Company Bio
Founded in 1975 by Bill Gates and Paul Allen, Microsoft's mission has been to create software for the personal computer that empowers and enriches people in the workplace, at school and at home. As the world's leading software provider, Microsoft strives to produce innovative products that meet customers' evolving needs.
Microsoft products include the MS-DOS and Windows operating systems for personal computers, server applications for client/server environments, business and consumer productivity applications, interactive media programs, and Internet platform and development tools. Microsoft also offers online services, sells personal computer books and input devices, and researches and develops advanced technology software products. Microsoft products, available in more than 30 languages and sold in more than 50 countries, are available for most PCs, including Intel microprocessor-based computers and Apple computers.
Annual Revenues
With annual revenues of more than $32 billion, Microsoft Corporation is more than the largest software company in the world: it is a cultural phenomenon. The company's core business is based on developing, manufacturing, and licensing software products, including operating systems, server applications, business and consumer applications, and software development tools, as well as Internet software, technologies, and services. Led by Bill Gates, the world's wealthiest individual and most famous businessman, Microsoft has succeeded in placing at least one of its products on virtually every personal computer in the world, setting industry standards and defining markets in the process. read more.......
For more details on Microsoft Corporation visit www.halfvalue.com and www.halfvalue.co.uk
For more information on books visit www.Lookbookstores.com
Founded in 1975 by Bill Gates and Paul Allen, Microsoft's mission has been to create software for the personal computer that empowers and enriches people in the workplace, at school and at home. As the world's leading software provider, Microsoft strives to produce innovative products that meet customers' evolving needs.
Microsoft products include the MS-DOS and Windows operating systems for personal computers, server applications for client/server environments, business and consumer productivity applications, interactive media programs, and Internet platform and development tools. Microsoft also offers online services, sells personal computer books and input devices, and researches and develops advanced technology software products. Microsoft products, available in more than 30 languages and sold in more than 50 countries, are available for most PCs, including Intel microprocessor-based computers and Apple computers.
Annual Revenues
With annual revenues of more than $32 billion, Microsoft Corporation is more than the largest software company in the world: it is a cultural phenomenon. The company's core business is based on developing, manufacturing, and licensing software products, including operating systems, server applications, business and consumer applications, and software development tools, as well as Internet software, technologies, and services. Led by Bill Gates, the world's wealthiest individual and most famous businessman, Microsoft has succeeded in placing at least one of its products on virtually every personal computer in the world, setting industry standards and defining markets in the process. read more.......
For more details on Microsoft Corporation visit www.halfvalue.com and www.halfvalue.co.uk
For more information on books visit www.Lookbookstores.com
Wednesday, April 11, 2007
Internet crime
Internet crime is crime committed on the Internet, using the Internet and by means of the Internet. Computer crime is a general term that embraces such crimes as phishing, credit card frauds, bank robbery, illegal downloading, industrial espionage, child pornography, kidnapping children via chat rooms, scams, cyberterrorism, creation and/or distribution of viruses, spam and so on. All such crimes are computer related and facilitated crimes.
With the evolution of the Internet, along came another revolution of crime where the perpetrators commit acts of crime and wrongdoing on the World Wide Web. Internet crime takes many faces and is committed in diverse fashions. The number of users and their diversity in their makeup has exposed the Internet to everyone. Some criminals in the Internet have grown up understanding this superhighway of information, unlike the older generation of users. This is why Internet crime has now become a growing problem in the United States and the whole world. Some crimes committed on the Internet have been exposed to the world and some remain a mystery up until they are perpetrated against someone or some company. read more.....
For more details on Internet Crime visit www.halfvalue.com and www.halfvalue.co.uk
For more information on books visit www.Lookbookstores.com
With the evolution of the Internet, along came another revolution of crime where the perpetrators commit acts of crime and wrongdoing on the World Wide Web. Internet crime takes many faces and is committed in diverse fashions. The number of users and their diversity in their makeup has exposed the Internet to everyone. Some criminals in the Internet have grown up understanding this superhighway of information, unlike the older generation of users. This is why Internet crime has now become a growing problem in the United States and the whole world. Some crimes committed on the Internet have been exposed to the world and some remain a mystery up until they are perpetrated against someone or some company. read more.....
For more details on Internet Crime visit www.halfvalue.com and www.halfvalue.co.uk
For more information on books visit www.Lookbookstores.com
Friday, April 06, 2007
What is Atomic Clock?
An atomic clock is a type of clock that uses an atomic resonance frequency standard to feed its counter. Early atomic clocks were masers with attached equipment. Today's best atomic frequency standards (or clocks) are based on absorption spectroscopy of cold atoms in atomic fountains. National standards agencies maintain an accuracy of 10-9 seconds per day, and a precision equal to the frequency of the radio transmitter pumping the maser. The clocks maintain a continuous and stable time scale, International Atomic Time (TAI). For civil time, another time scale is disseminated, Coordinated Universal Time (UTC). UTC is derived from TAI, but synchronized with the passing of day and night based on astronomical observations.
The first atomic clock was built in 1949 at the U.S. National Bureau of Standards (NBS). The first accurate atomic clock, a cesium standard based on the transition of the cesium-133 atom, was built by Louis Essen in 1955 at the National Physical Laboratory in the UK. This led to the internationally agreed definition of the second being based on atomic time.
The best atomic clocks on Earth today are stable to about one part in 10^15," notes Kuzmich. That means an observer would have to watch the clock for 10^15 seconds or 30 million years to see it gain or lose a single second. read more.....
Find more about Atomic clock visit www.halfvalue.com and www.halfvalue.co.uk
For more details on Books at www.lookbookstores.com
The first atomic clock was built in 1949 at the U.S. National Bureau of Standards (NBS). The first accurate atomic clock, a cesium standard based on the transition of the cesium-133 atom, was built by Louis Essen in 1955 at the National Physical Laboratory in the UK. This led to the internationally agreed definition of the second being based on atomic time.
The best atomic clocks on Earth today are stable to about one part in 10^15," notes Kuzmich. That means an observer would have to watch the clock for 10^15 seconds or 30 million years to see it gain or lose a single second. read more.....
Find more about Atomic clock visit www.halfvalue.com and www.halfvalue.co.uk
For more details on Books at www.lookbookstores.com
The Digital devil’s dictionary
The Digital devil's Dictionary application, developed by Apple for its Macintosh computers, was introduced with Mac OS X v10.4 "Tiger".
Apple also included a Dashboard Widget for accessing the Dictionary application. In applications which support "Services", there is an option in the application menu,which brings up the Dictionary application and displays the definition of a selected word.
Malware
Software that runs computer processes that either unexpected or unauthorised but are always harmful. The term "malware"generally covers viruses, worms and Trojan horses.
Backdoor
Term for an app or service that permits remote access to an infected computer. It opens a backdoor to circumvent other security mechanisms.
Phishing
A method of stealing personal data via an authentic-looking e-mail which appears to come from a real company or institution -- to trick the recipient into sending vital banking or login information etc. read more...
Find more about Digital devil’s dictionary visit www.halfvalue.com and www.halfvalue.co.uk
For more details on Books at www.lookbookstores.com
Apple also included a Dashboard Widget for accessing the Dictionary application. In applications which support "Services", there is an option in the application menu,which brings up the Dictionary application and displays the definition of a selected word.
Malware
Software that runs computer processes that either unexpected or unauthorised but are always harmful. The term "malware"generally covers viruses, worms and Trojan horses.
Backdoor
Term for an app or service that permits remote access to an infected computer. It opens a backdoor to circumvent other security mechanisms.
Phishing
A method of stealing personal data via an authentic-looking e-mail which appears to come from a real company or institution -- to trick the recipient into sending vital banking or login information etc. read more...
Find more about Digital devil’s dictionary visit www.halfvalue.com and www.halfvalue.co.uk
For more details on Books at www.lookbookstores.com
Subscribe to:
Comments (Atom)