วันจันทร์ที่ 29 กันยายน พ.ศ. 2551

Accuracy in Timekeeping - Atomic Clocks and Time Servers

The development of atomic clocks throughout the twentieth century has been fundamental to many of the technologies we employ everyday. Without atomic clocks many of the innovations of the twentieth century would simply not exist.

Satellite communication, global positioning, computer networks and even the Internet would not be able to function in the way we are used to if it wasn't for atomic clocks and their ultra-precision in timekeeping.

Atomic clocks are incredibly accurate chronometers not losing a second in millions of years. In comparison digital clocks may lose a second every week and the most intricately accurate mechanical clocks lose even more time.

The reason for an atomic clock's incredible precision is that it is based on an oscillation of a single atom. An oscillation is merely a vibration at a particular energy level in the case of most atomic clocks they are based on the resonance of the caesium atom which oscillates at exactly 9,192,631,770 times every second.

Many technologies now rely on atomic clocks for their unbridled accuracy. The global positing system is a prime example. GPS satellites all have onboard an atomic clock and it is this timing information that is used to work out positioning. Because GPS satellites communicate using radio waves and they travel at the speed of light (180,000 miles a second in a vacuum), tiny inaccuracies in the time could make positioning inaccurate by hundreds of miles.

Another application that requires the use of atomic clocks is in computer networks. When computers talk to each other across the globe it is imperative that they all use the same timing source. If they didn't, time sensitive transactions such as Internet shopping, online reservations, the stock exchange and even sending an email would be near to impossible. Emails would arrive before they were sent and the same item on an Internet shopping site could be sold to more than one person.

For this reason a global timescale called UTC (Coordinated Universal Time) based on the time told by atomic clocks has been developed. UTC is delivered to computer networks via times servers. Most time servers utilise NTP (network time protocol) to distribute and synchronize the networks.

NTP time servers can receive UTC time from a number of sources most commonly the onboard atomic clocks of the GPS system can be used as a UTC source by a time server connected to a GPS antenna.

Another method that is quite commonly used by NTP time servers is to utilise the long wave radio transmission broadcast by several countries' national physics laboratories. Whilst not available everywhere and quite susceptible to local topography the broadcasts do provide a secure method of receiving timing source.

If neither of these methods is available then a UTC timing source can be received from the Internet although accuracy and security are not guaranteed.

Richard N Williams is a technical author and specialist in atomic clocks, telecommunications, NTP and network time synchronisation helping to develop dedicated NTP clocks. Please visit us for more information about a network time server or other ntp server solutions.

Article Source: http://EzineArticles.com/?expert=Richard_N_Williams

Should You Convert Data From Your Existing EPM?

As the year Y2K approached, in 1998, Fiscal, our practice management company, informed us that they wouldn't be supporting their software for medical practices any longer. This predicament left us in a daunting and expensive situation of needing another EPM system. As a result, we decided to go with Medical Manager's system, a robust product among the offerings at the time. When we did make the the move over to EMR, Medical Manager was on the short list for obvious reasons.

We ultimately decided on NextGen as our choice of EMR. Following careful selection, we selected their integrated EPM/EMR solution even though this would mean we would have to abandon our EPM system by Medical Manager. This year we made the move over to NextGen's EPM before first using the EMR module. We had to decide if we were going to convert data from Medical Manager to the new system or not as a result.

If a medical practice decides to make the switch to a newer system with its own EPM module, there are some key issues to take into consideration before moving the data. This is particularly true of demographic and insurance information.

Over time, the info in an EPM database can degrade, due mostly to input errors. As an example, some of our staff were creating duplicate records for patients depending on what type of insurance they were using (personal or workman's comp.), believing this would save time. Unfortunately, in the end this information was quite difficult to reconcile.

With data field mapping, even when the information is accurate, it could be quite tedious to insure that the outdated info ends up in the correct place within the new database. Also, the majority of software vendors charge a flat rate for converting data from an older system to a newer one.

As we decided that NextGen would be the correct platform for us in the long term, we chose to manually input the data into the new system. The NextGen system had added new data fields in places where there were none in Medical Manager; these had to be filled in with the correct info. So, the time saved by converting the data would have been minimal as there was so much new info to be input, regardless. The time on this project was well-spent; we were able to rotate all of our staff members through the training room to learn the new EPM system - meanwhile others called patients to verify demographic and insurance info as they confirmed appointments into the new system.

Peter J. Polack, M.D., F.A.C.S., is founder of emedikon, a medical practice management consulting firm and president of Protodrone, a software development company specializing in medical practice applications. He is managing partner of Ocala Eye, a large multi-specialty ophthalmology practice. Find more useful articles and podcasts at http://www.medicalpracticetrends.com

Article Source: http://EzineArticles.com/?expert=Peter_Polack

What is CISSP Education and Information Security Training?

CISSP Education has to do with keeping information secure. When you want to maintain the integrity and private nature of information in the age of the internet, you need people who are trained to do just that. They have to be able to protect your information by creating a system that can defend itself against unauthorized entry from outside sources. This is the essence of CISSP Education.

Information security training is a growing field. The number of companies connected to the internet has increased exponentially in recent years, and those who would gain illicit access to personal information have grown with the changing times. CISSP Education is a means of educating individuals about how information security works, how to go about making information secure, and how to ensure that it stays that way.

The many aspects of network security include dealing with attacks and having the appropriate countermeasures in place. It also includes the follow up investigations on any attempts or infiltrations of a system. It is a way of policing the network. A security guard may be able to protect information that is stored in a warehouse but to protect your network, you need someone with CISSP Education. The demand for workers in this field has resulted in a matching increase in training programs. It makes you wonder how many ways there are to learn about this exciting and always changing career field.

Education as a whole has taken on a new face with the advances in technology too. The internet has opened up endless possibilities when it comes to making training available to anyone with a computer. The same is true for the field of CISSP Education.

Study materials are available online or through the mail in addition to more traditional class settings. Granted, it does take a certain level of knowledge and experience to develop true proficiency in such an important and detail oriented field, but there are many resources that are waiting to take an individual to the next stage of information security. These independent study programs allow for a level of flexibility and a convenience that would not have been an option years ago. The convenience of study combines with the rising demand to make an interesting career prospect for those with an interest and an aptitude for information security.

The real world applications of CISSP Education are limitless because the field is anything but stagnant. Programs are being refined, security measures are being updated constantly, and more information is shifting into the online arena where its safety must be protected. Shopping, bill paying, and banking are all accessible online with personal information being sent freely on a daily basis. Without the existence of information security, this would be a recipe for disaster.

Stop for a moment to consider the consequences of intercepted credit card numbers, social security numbers, and bank accounts that are openly accessible to anyone with enough knowledge of computer hacking. The results would be disastrous.

CISSP Education trains individuals in how to keep information safe. By learning about database security, the ways that hackers attack systems, and the appropriate countermeasures that can be put in place, individuals who study this field can work for companies that deal with such sensitive information.

In a world where your most personal information could be only a click away from the wrong hands, CISSP Education brings not only a feeling of security to your online interactions but the reality of actually being secure as well. With information security training like this, you can sleep soundly knowing that your company, your information, and your savings are safe.

Andy West is a writer for Logical Securities which offers CISSP education.

Article Source: http://EzineArticles.com/?expert=Andy_West

วันพุธที่ 17 กันยายน พ.ศ. 2551

Epson Printers - Nothing But the Finest Prints From an Industry Leader

Epson printers are well-known for the great output they produce. If you ask anyone, they'd be sure to tell you that Epson is an unquestionable leader in the printing industry. The name itself belongs to the ranks of brands that are held in high esteem not only by consumers but by industry experts. Judging by the quality of printers from Epson, it's clear why the brand has received such an appraisal as what it gets. A lot of people are stumped when buying printers because they are faced with so many available options that it's hard to choose what to buy. And of course, there are several factors to consider such as quality, reliability, performance, and cost. It's a good thing that all these factors are positively combined in printers from this brand. Thanks to Epson, you can easily find your ideal printer. Just look for the ones with the Epson label on it, which definitely says a lot. For years since their establishment back in 1975, the company has managed to build an unswerving reputation of being a top producer in the industry, starting with their EP-101, a revolutionary product that built their fame.

The Top Epson Printers and Printer Lines

As an expert in the printing world, it is a given that Epson has a wide assortment of printers. Epson prides itself on the fact that they pour great minds into every single printer they release into the market. The results are excellently designed printers with specifications that satisfy all the possible demands consumers might have. So now, consumers looking for printers will enjoy the great options that Epson's six major product lines offer. First, they have Inkjet printers optimized for great color printing. In this line, they have two printer series, both of which are highly popular especially among consumers very particular about color printing. The first series, the Epson Stylus series, is undoubtedly one of the most popular types of photo printers around. These inkjet printers can print sharp, intense color images using the specially-designed DURABrite ink from Epson that captures the actual subjects right on paper in perfect color. If you want a Stylus printer, you can choose from affordable models all the way up to high-speed and high-capacity models. But if you need photo printing one step higher, you should go for the Picturemate inkjet series, another great innovation from Epson, with leading specifications when it comes to professional color printing. Aside from their inkjet printers, Epson printers also come in Lasers, led by their trademark laser printer series, the Aculaser line. Aculaser printer models range from multi-function printers, monochrome printers, and color printers. In fact, the Aculaser CX11N is one of the top multi-function laser printers around. Their color laser printers also lead in speed and print quality. And to further meet your needs, they have All-in-One printers that can be shared in networks and can scan, print, make copies, and send fax.

What Epson Printers Boast Of

Epson printers boast of an indisputable level of output quality. While some brands focus on performance and durability, Epson prioritizes how your prints look when printed, which is, after all, what printers should be about. And while other brands scramble to come up with technologies to meet the soaring expectations of consumers, Epson answers consumers' requirements in a breeze. Their excellent print outputs are all thanks to Epson's special inks. But they also offer more than that. You can also find printers with great network connectivity features and special Epson software for photo printing and enhancements.

Reviews on Epson Printers

Printers from Epson are staples in ratings. But ratings are not the only things they ace. Printers from this great brand practically collect awards and recognitions. And thanks to the excellent work of printers made by Epson, the brand has several loyal customers worldwide that turns automatically to Epson for their printing needs.

For more information about Epson Printers and as well as the latest reviews on other printers, please see Printer Reviews for more info.

Article Source: http://EzineArticles.com/?expert=Beverly_Maniago

Rogue Spyware - Remove Smart Antivirus 2009 From Your PC

Smart Antivirus 2009 is a rogue Anti-spyware. It will pretend as if it has great capabilities to clean your system from malware and spyware. But it is not true. This article is written to let you know the true picture of Smart Antivirus 2009 and warn you against its true nature.

But first, do you know - what is a rogue anti-spyware?

Rogue Antispyware programs are the software, which pretends to be a genuine Anti-spyware, but actually those are a carrier of more spyware. When they come in contact with your system, they generally display fake alarms that it is infected with many spyware and you need to urgently clean it. Then they offer to clean it, if you buy the licensed version of them.
People fall in trap and they buy rogue anti-spyware, which is nothing but crap, and installs more spyware on your system, instead of cleaning it.

Smart Antivirus 2009 is also a similar type of malware. If you have got any trace of Smart Antivirus 2009, we recommend you to immediately get rid of it so as to protect you system from further harms.

How to remove Smart Antivirus 2009?

First of all you need to scan your system whether it is actually infected with Smart Antivirus 2009. If your system has got any trace of it, then you can either remove it manually by following step-by-step instructions available on Internet at many sites. Just search for them.

But it is a risky method. It should be tried by those people, who are comfortable with the Windows Processes and Registry Keys. If you are not sure about them, then it is better to use a good quality Anti-Spyware.

If you want to manually remove Smart Antivirus 2009, then there are basically four steps involved.

1. Stop all the Windows Processes associated with it. For this you have to open the Windows Task Manager and open the Processes Tab and find the Processes associated with it.

2. Delete the files associated with Smart Antivirus 2009. Before proceeding for this step, you should search for which files are associated with it.

3. Delete the DLL files associated with it.

4. Delete the registry keys. This is the most important step, which you need to execute with utmost care. Windows Registry is an important area of your system, and you should handle it extreme care. You should search for the exact Registry Keys associate with Smart Antivirus 2009 and then delete them.

Silki Garg has written many high rated articles on Online Security and Spyware Removal Tools She advices on how to clean your PCs to remove Smart Antivirus 2009 and other malware on her blog http://webtoolsandtips.com

Article Source: http://EzineArticles.com/?expert=Silki_Garg

Using an Off Line UPS Battery Backup and APC UPS Backup Battery Tester to Protect Data

Any business or any home office needs to have a UPS battery backup system running from day one in order to protect the business's data and make sure that service isn't interrupted. For businesses that deal in telecommunications or other industries where continual service is the core of what the business offers to customers having a high quality UPS battery backup is essential. Besides the backup system itself, every business should have at least one ups battery tester that can make sure that the system is running on full power and is ready to go at anytime you may need it. Businesses can choose from one of three different kinds of backup supplies. It doesn't matter what type of system a business chooses as long as it fits the application they need it for.

The ups battery tester should always be used regularly to make sure that the UPS system is functioning and is ready to go when needed. An offline UPS battery backup system stays dormant until the power goes out and then it instantly turns on and redirects its own battery power to the original source to protect data and keep your critical systems online. Businesses can save money by using an offline system since it doesn't do anything until the power actually goes off. However, since the unit will probably just sit until there is a power shortage, it is even more important to use an offline battery tester to actually test the batteries inside the UPS system itself. After all the batteries are the most important part of your system. Sitting around for a long time means that if something is wrong with the unit or if the battery is not holding a charge then no one will know that until the critical moment when the power is needed and by then it will be too late.

Using an offline UPS battery backup can be a more economical option for businesses than using an online or line-interactive UPS battery backup through their entire location, so it makes sense that most small businesses or start up businesses go for an offline UPS battery backup system at first. Remember it is very important to have your battery backup system tested regularly and this is something you can do in house or sub out to a testing company. Regular testing of the system should be done according to a schedule. A smart and simple way to keep track is to write on a calendar each date that the backup system should be tested and then when the battery tester has finished the testing process that person can make a big red "X" through the date so it's clear when the test was done.

Battery Tester Info: For more information on recommended ups battery health evaluation methods and what type of battery tester will work for your application, visit the Battery Research Center

Article Source: http://EzineArticles.com/?expert=Elliott_Turner

วันจันทร์ที่ 8 กันยายน พ.ศ. 2551

IPv6 (Cisco) Training - Using the "dns-server and Domain-name (IPv6)" Commands

Well, since this article is sort of lengthy I'm going to get right down to it; so without far ado let's begin.

The "dns-server" (IPv6) command, is a Cisco IOS "DHCP for IPv6 pool configuration" mode command that is used to specify the Domain Name System (DNS) IPv6 server(s) available on a network.

Below is the correct syntax and example of the "dns-server" (IPv6) command:

Syntax: router(config-dhcp)#dns-server ipv6-address
Example: router(config-dhcp)#dns-server 2001:0DC8:3000:3000::42

Notice, that the router's prompt is in "DHCP for IPv6 pool configuration" mode and the ipv6 address argument is the IPv6 address of the available DNS server.

Now, just in case if you were wondering; you can use (configure) the "dns-server" (IPv6) command multiple times on a router, if you have multiple DNS servers on your network. And, the new ipv6 addresses will not erase (overwrite) the existing (previous) ipv6 addresses.

Also, if you need to remove a specific DNS server from the DNS server list; all you need to do is type the word "no" in front of the command like you see below:

Syntax: router(config-dhcp)#no dns-server ipv6-address
Example: router(config-dhcp)#no dns-server 2001:0DC8:3000:3000::42

Ok, that pretty much sums up the "dns-server" (IPv6) command; so, let's move on to the "domain-name" (IPv6) command.

The "domain-name" (IPv6) command, is also a Cisco IOS "DHCP for IPv6 pool configuration" mode command; but it's used to configure a domain name for a DHCP for IPv6 client, which is also known as a Requesting Router or RR.

Below is the correct syntax and example of the "domain-name" (IPv6) command:

Syntax: router(config-dhcp)#domain-name domain
Example: router(config-dhcp)#domain-name ittechtips.com

Notice, that the router's prompt is once again in "DHCP for IPv6 pool configuration" mode and the domain argument is specifying the domain name to be used by the client. So, in the example above the router (client) is going to use the domain name ittechtips.com.

And, just like the "dns-server" (IPv6) command; the "domain-name" (IPv6) command can be used (configured) multiple times on a router. And, the new domain names will not erase (overwrite) the existing domain names.

Lastly, if you need to remove a domain name from a DHCPv6 client (RR); you must type the word "no" in front of the "domain-name" (IPv6) command like you see below:

Syntax: router(config-dhcp)#no domain-name domain
Example: router(config-dhcp)#no domain-name ittechtips.com

I hope this article was very informative and helped you quickly understand the usage of the "dns-server and domain-name" (IPv6) Commands. If you need to learn more; I suggest you visit my website, were you'll find the latest information regarding Cisco IPv6 Design and Implementation Techniques.

To your success,

Charles Ross, CCNP #CSCO10444244 is the owner of Ittechtips.com; where you'll find free comprehensive information and videos about IPv6 technology and how it works with Cisco Systems technology.

Sign-Up for "18 Free Videos" that will teach you IPv6 Address Representation In Under 10 Minutes! And, also learn more about the new "Cisco IPv6 Video Accelerated Training Course" at his website. http://www.ciscoipv6ittechtips.com

Article Source: http://EzineArticles.com/?expert=Charles_E_Ross

Various Options Available to Open Files With .Docx Extension - Latest Microsoft Word Application

Recently, I received text content for a website project from a client. Unfortunately, the file was in .docx format. This is a new format for the latest Microsoft word application. I could not open this file as I use the older version.

After searching the internet and other sources, I found the following options available to open the new word files in older applications. Here is the list.

1. Download Microsoft Compatibility Pack from Microsoft website

2. Use online facility. Websites like docx2doc.com and zamzar.com are some popular sites that provide the facility to convert files from .docx to .doc.

Zamzar offers to convert your file in 4 easy steps.

Step 1 - Upload the .docx file.
Step 2 - Choose from the various conversion options.
Step 3 - Add your email address.
Step 4 - Submit the request.

Docs2doc.com adopts a two step process.

Step 1 - Upload the .docx file.
Step 2 - Add your email address.

It takes upto 24 hrs to get your converted file back, which I think is such a waste of time.

3. Desktop Widgets - There are many Desktop Widgets available online which can be used to convert the new word documents.

4. The fourth method is the quickest. Here are the steps.

Step 1 - Change the extension of the file from .docx to .zip.
Step 2 - Extract the content using unzipping program.
Step 3 - Locate the file document.xml in the extracted folder and open it in Notepad,Internet Explorer latest version ( 7.0 ) or use XML VIEWER from Mind fusion.

I have not personally tried Mind Fusion, so use it at your own risk. I have tried the notepad method. It requires editing of unwanted tags and characters to extract your content.

5. Use OpenOffice - It has an XML Translator.

For more articles / tips and tutorials log on to http://gateway2internet.com/blog

Article Source: http://EzineArticles.com/?expert=Lalit_Navani

How Does Bitmap Images Differ From Vector Graphics?

Bitmap images and vector graphics are both used for computer graphics. Bitmap images, also called raster images are created from a grid of colors called pixels. Each pixels are assigned a specific color value and location within the grid. When working with bitmap images, groups of pixels are edited instead of shapes or objects. Bitmap graphics display subtle gradations of shades, color, and display continuous tones best for photographs, paintings, and art works created from painting programs. The drawback of bitmap images is that the number of pixels are fixed within the grid. Therefore, when the image is scaled up onscreen or zoomed in, the image looks jagged and looses detail. The same result is found when the image is printed at a lower resolution than the original.

Vector graphics are created from lines and curves defined by mathematical objects or geometric characteristics called vectors. The graphic can be moved freely and edited without losing detail or clarity, because they are resolution independent. Whether they are resized, printed to a PostScript printer, saved in a PDF file, or imported into a vector based graphic application, the graphic always maintains its shape. For artworks such as Illustrator types and logos, vector graphics are the best choice for rendering sizes and output media.

Both bitmap images and vector graphics can be created in Photoshop. Any shape tools, pen tool or the freeform pen tool can create vector shapes and paths. Vector arts can be copied and pasted between the creative suite applications. To create bitmap shapes, the pencil tool and the brush tool can be used. To compare the bitmap and vector art, use Photoshop to zoom in or scale the image up and see the difference. Vector and bitmap graphics serve different purposes for projects.

Anna W. is an Adobe Certified Expert in Photoshop CS3. She received her bachelor of arts in studio art from the Wheaton College, a master degree in art education from the Rhode Island School of Design. Her teaching experience include: CDIA, New Horizons, Newton Community Education, and free Photoshop CS3 lessons online. For more information, please visit: http://designersbookmark.com

Article Source: http://EzineArticles.com/?expert=Anna_W