วันอาทิตย์ที่ 31 พฤษภาคม พ.ศ. 2552

The Best Gadgets on the Market For Your Home Entertainment

In our fast-paced culture, it seems nearly impossible to keep up with the constantly evolving cycle of electronics and gadgets on the market; practically every week new and improved versions of personal organizers, mobile phones, computers and laptops, high definition TVs, and digital cameras are released, making it difficult to know when you should make a purchase and what you should look for. Read on for some suggestions of must-have gadgets to outfit your home and increase your personal home entertainment system.

Apple is one of the forerunners on the electronics front, and has some of the slickest laptop computers, mp3 players, and all-in-one phones. The Apple iPhone 3G has increased call quality and user support, while maintaining the same streamlined design and handy touchscreen of previous versions. If you are a BlackBerry loyalist, upgrade to the Bold; with an increased display quality, extra tools and widgets, and high level multimedia features, the Bold is ideal for professionals on the go. Other cellular companies are upping the ante as well to keep up with the technology of the more advanced groups, driving the competition's prices down - check out Motorola's new phones, and T-Mobile's latest models for examples. Battery life is still a problem for most of these all-in-one phones that come equipped with mp3 players, digital cameras, and cyber calendars, among other features, so keep your eyes peeled for a better battery pack.

The iPod Touch is the ultimate in on-the-go music, and can be used at home with accompanying surround sound speakers or while on the move with high-quality headphones. If you prefer to listen to the radio while at home, pick up a Logitech Squeezebox Boom tabletop Wi-Fi radio to beam in all of your favorite channels and tunes.

Miniature laptops, called Netbooks, are a must for any traveling businessperson or those on the move. These tiny gadgets have all of the capabilities of a regular laptop, but can fit in your purse or shoulder bag and weigh just a few pounds. Check out the HP Mini 2140, a tiny premium model with a high definition screen.

Universal remote controls are a must for anyone trying to coordinate the controls of various different pieces of equipment, including TVs, DVD players, stereos, remote speakers, and cable boxes. Try the Logitech Harmony One to cut down on the confusion of multiple gadgets and to streamline your home entertainment system.

Digital camcorders are a great way to record your memories or keep track of your favorite live sports events. The Flip Video Mino is a bite-sized HD camcorder available at a mid-range price.

No entertainment system is complete without a high definition TV. The Panasonic TC wide flatscreen monitor gives an excellent picture, particularly when channeling HD programming, while the Sony XEL-1 OLED television is undergoing upgrades in size and picture sharpness to potentially release the best TV on the market.

Direct TV brings you only the best programming. You'll be impressed by all that Direct TV packages offer.

Article Source: http://EzineArticles.com/?expert=John_Granholm

วันเสาร์ที่ 30 พฤษภาคม พ.ศ. 2552

Keep Up With the Latest Gadgets - Mp4 Players

These days, music has gone mobile. Almost everywhere you look you will see at least one person with earphones or headphones over his/her ears, bopping their heads to some mysterious beat. And the electronic gadgets that hold this music are getting smaller and smaller. It started with the Walkman, and then came the MP3 player. Next in line was the iPods which integrated MP4 technology. Now, you can get a wide array of MP4 media players on the market.

MP4 players are a very exciting portion of technology. They enhance your entertainment life so much that you will be hooked to these gadgets within a matter of minutes. With the many options available on the types of digital MP4 players you can buy, making a choice can be difficult, since all of them come with at least one new function and modification.

There are even a number of MP4 watches available on the market today. You can actually cram about 3 movies into your watch, and play them as you relax anywhere. The capacities can be as big as 4GB, with added functions in the watch, such as an NES Emulator. To add to this amazing pool, you can even get a watch MP4 player that is made entirely of steel for a great look, as well as incorporating a huge 8GB of internal memory. It comes with a 1.8 inch screen, can record voices, you can choose languages, earphone jacks, JPEG capability, and many more exciting features. Who needs any other type of watch?

Did you know that it is possible to cram a whole 160GB of memory into your MP4 player? It has been done. It is a PMP, a Portable Media Player, with 160GB memory and it comes with an integrated DVR function. Also, you can just use your USB cable to drag and drop all you need into the player.

How about the world's thinnest MP4 player currently in the market? This MP4 video player is about 4.5mm thick. This is actually about as big as 4 credit cards stacked one on top of the other.

If you are a fan of digital MP4 players, then these latest developments are best for you.

MediaAtlantic is an online retailer of IT, AV & Technology products including Digital MP4 Players.

Article Source: http://EzineArticles.com/?expert=Robert_Deans

วันศุกร์ที่ 29 พฤษภาคม พ.ศ. 2552

Storage Appliances For Lean Times

Just about everyone in the IT business realizes that the most annoying aspect of the current recession is that while profits are down, data requirements are up. That makes it difficult to purchase and provision the storage that is desperately needed to meet not only business and competitive needs, but legal ones as well.

But it's also the reason why we're seeing a new generation of low-cost, mostly appliance-based storage options aimed not so much at smaller firms looking for ready-made storage, but larger organizations looking to bolster their current arrays with as little impact to the bottom line as possible.

PowerFile's new Hybrid Storage Appliance is a case in point. The device uses a proprietary "distributed performance architecture" to provide scalability into the petabytes for long-term fixed content applications. The company wants you to consider moving data from Tier 1 or 2 disks to an HSA, which not only costs less upfront, but eliminates the cost of regular data migrations. Each HSA consists of a dual quad-core system controller, a 12-48 TB cache array and a 25 TB library that holds up to 12 Blu-ray drives.

Networking firm Netgear is also getting into the game, coming out with the ReadyNAS 2100 rack-mounted storage appliance that offers simultaneous NAS and SAN functionality, as well as file-sharing and virtualization capability. It also provides for uninterrupted capacity expansion, plus managed ports for network redundancy. The system utilizes the company's X-Change storage modules, plus the ReadyNas Remote tool for access from branch offices.

Storage appliances are also drawing in firms with little or no hardware experience. For example, a company called i365, which specializes in software and SaaS offerings, has come out with a preconfigured backup and recovery appliance called the EVault Plug-n-Protect. The company uses standard hardware and storage, such as Dell servers with a Nexsan RAID, to run its EVault software plus System Restore and Real Time Protection packages. Sizes range from 6 to 36 TB at a cost the company says is about 40 percent less than purchasing the components separately.

Even giants like Microsoft are starting to notice the appliance market. Along with the Windows 7 and Server 2008 releases, the company just issued the RTM version of Windows Storage Server 2008 to OEMs. The company says it expects to see fully configured hardware systems by the fall, souped up with the extra file and storage capabilities the software provides, not to mention single-instance storage deduplication and a new iSCSI software target that enables both block storage and file service on the same appliance.

Difficult times often bring out the biggest innovations, and 2009 is no exception. Fortunately, saving money never goes out of style, so even after the bad times are past, this and subsequent generations of storage appliances will provide solutions for those seeking quick storage without a lot of complexity.

Read Art's article, "Compression and Dedupe: Together at Last" - http://bit.ly/16lEWf

Article Source: http://EzineArticles.com/?expert=Arthur_Cole

The Technology Trends For 2009

Improved Televisions
Let us start with the television. It has been a steady feature in the homes of many people and yet it is one thing that has probably changed the most throughout the years. Last year, the flat panel televisions that were only four inches deep were the big thing. As the thinnest televisions on market, people flocked to the electronics store so that they could have the very best.

But this year, there are televisions that are making their panels only one inch, and in some cases even less, which means there is a new version of the flat televisions on the market. Many of the big name companies such as JVC, LG, Sharp, Sony, Mitsubishi, Samsung, and Hitachi are all jumping on the bandwagon and creating a television that will truly make history with how deep it is, or rather how deep it isn't.

But why do the televisions have to be so thin? The biggest reason is because the thin television gives the consumers much more flexibility with where they put it. The flat televisions help to improve a home, as it is truly a space saver. With how small the televisions are becoming, how does a person hide their DVD players, the cable box receivers, and the connections to their satellite receivers? The lowboy was something that was rather popular in the 1960s and 1970s but is finally making its comeback in 2009. Even though there are other products on the market, the lowboy is certainly the item that is the trendiest for this year. It is deep enough for the flat panel televisions and it is able to hide all of those connections so that the aesthetics of the wall display are not lost.

Blu-Ray Enters More Homes
When it comes to Blu-ray, many people feel as though it is something of the past. The thing is though, there have never been as many choices and options as there are in 2009. People are trying to get their movies and their normal everyday television viewing into the best picture possible. Even though this could not be done before, there are products out there that can now deliver high definition content to several televisions throughout the house. Instead of just having one television with the best viewing or having to purchase separate HD systems for all of the televisions, you can now get great viewing from all TV's with the help of a video distribution system that is HD-compliant.

The least expensive models on the market come from Sony with a price tag of anywhere between two thousand to two thousand five hundred dollars. These systems are the basics. But what about the homes that about more then two televisions? For that, Sony has developed a system as well. The HomeShare HD system can send HD video to up to four televisions. The cost is about one to two thousand per room.

Netbooks
When it comes to wanting the best of the best, 2009 has something great to offer those who love laptops. The Eee PC 1000HE is certainly the largest of the Eee series to date but there are more benefits to it which over shadows the size with no problem. The high-speed wireless capabilities are incredible and the battery life will last a person all day. This truly means that someone can work all day out in the sun or in the local coffee shop without having to worry about plugging in.

The ten-inch display makes seeing what is on the screen incredibly easy and the keys on the keyboard are ninety two percent of the size that would commonly be found on a laptop. This means that the spacing between each key is similar to what would be found on the common desktop keyboard. All in all, this is the netbook that is the best buy. While it may not be as pretty as another laptop or as compact, the features on it far exceed anything else out there for 2009.

And when you are shopping for the latest technology in netbooks, the thing that will be on your mind is what it can do for your personal and business life, not how pretty it looks.

Can It Get Better Then This?
With all of the various things that have already hit the shelves throughout the world in 2009, one would wonder if it could still possibly get any better then it already is. As far as designers and engineers are concerned, there is always room for improvement. There can always be something a little better, a little faster, and a little smaller. 2009 is truly a year that has brought many surprises and will probably bring even more before it is all said and done.

And what will next year bring? A half-inch thick television? Televisions that think more like computers? No one in the general public really knows for sure. What is known though is that we will most likely be continue to be amazed with what technology brings our way.

Thomas Haugen
http://www.tekblogger.net

Article Source: http://EzineArticles.com/?expert=Thomas_Haugen

วันพฤหัสบดีที่ 28 พฤษภาคม พ.ศ. 2552

Basic Things You Need to Know About Computers, Digital Devices and You

Modern computers and other digital equipment have become so ubiquitous in the developed and developing world that it is to be expected that every home or office may be having several of these electronic devices in one form or another. The meaning of the word 'computer' has changed over the years, the traditional meaning being some device capable of carrying out complex calculations on large numbers. Today, any device containing electronic circuitry on a silicon chip is a computer in its own right, carrying out its assigned tasks and delivering results either to you or to some other device. In most cases, several such electronic circuits on chips work together to carry out a single task.

The silicon chip is now found in every home and in every office, in the form of devices ranging from the iron, the fridge, mobile phone, GPS, telephone, both mobile and landline, PCs, Laptops, PDAs, digital cameras, netbooks , notebooks, printers, fax, copiers and scanners, TVs and many others. A few years down the line, computers only existed as very large machines called mainframes, in the large offices of large companies, and they were not inexpensive.

In company offices, the bosses had to write business letters by hand, then got them typed, tipexed, then re-typed by some careless secretary before it could be mailed. This could take a day or two. Today the boss does everything on a word processor and the job takes no more than twenty minutes. Then instead of posting, he can just email it and it will reach its destination instantly.

There are so many things which were going wrong before the modern personal computer came into existence. And the arrival of the PC opened floodgates for many other digital devices for the home and office that I have mentioned above. And these have greatly simplified life at both home and office by taking over some of the tasks from us and leaving us with more time to do other things. Think of the washing machine. But to get a clearer picture of what technology has in store for you, you need to take an active interest in the basics of the amazing world of computers and electronics. There are various ways of doing these, among them reading computer magazines and relevant articles on the internet

There are a lot more things these electronic devices can do in the home. For instance, they can monitor the contents of you fridge and make an order from your favourite supermarket when the contents run low. They can switch on the lights for you in the evening when you get home, set your bathtub, switch on the TV when you walk into the sitting room, prepare coffee for you.

You should also take an interest in the various types of software that make these devices so versatile and amazingly brilliant, again there is so much literature written about this. But, above all, it will be important to actually have some of these devices and have first hand iexperience with the. You can do so now by visiting Home-Office-Electronix.

P Gumbo
Am a freelance software developer based in Melbourne

Article Source: http://EzineArticles.com/?expert=Pardon_R_K_Gumbo

วันพุธที่ 27 พฤษภาคม พ.ศ. 2552

A Safe Way to Repair Registry Files - Proven Not to Destroy Your PC

A 100% safe way to repair registry files.

When it comes to finding a safe way to repair registry files you need the right information and knowledge in order to make an informed decision on which approach you should take.

There are essentially 3 options available to you when faced with a registry problem:

1. Manually fix your registry

2. Employ the services of a computer technician or specialist

3. Use specially designed software for a safe way to repair registry

The first option should never be attempted by anyone who does not possess an advanced level of experience or knowledge of registries.

One wrong move when manually fixing your registry can lead to severe computer problems. In some cases, it can lead to your computer failing to boot up ever again.

The second option, whilst being a much safer and easier solution than the first option, is expensive. Computer technicians and service specialists charge a sizable hourly fee.

When you consider that most registry problems can be solved in less than 2 minutes using a relatively inexpensive software package, this option appears to present a much less attractive solution than perhaps first thought.

These specially designed software packages are called 'registry cleaners'. They perform a thorough scan of your Windows registry, weeding out and removing any invalid or redundant entries.

There is much skepticism surrounding the effectiveness and the safety of these registry cleaners, with some people claiming that they have removed vital registry entries from their PC's, thus rendering certain software and applications useless.

So we decided to perform a test.

This test consisted of taking the 10 most popular registry cleaners available and judging each according to the predetermined criteria of repair skills, eases of use, and customer service. We also checked the safety features of each software package.

Overall, Perfect Optimizer came out on top, scoring a hugely impressive 4.5 out of 5 in the overall test.

Perfect Optimizer performs a thorough scan of your Windows registry with extreme precision, ensuring that only unneeded and/or invalid entries are discovered and removed. This is something that other registry cleaners lack.

It truly is the safe way to repair registry files.

In order to provide added safety protection for your computer, Perfect Optimizer also lists all of the invalid registry entries that it finds, allowing you to double-check whether or not they are linked to essential pieces of software installed on your computer, in the unlikely event that it wrongly recognizes these as invalid entries.

It also backs up your registry before performing each scan, ensuring that if anything goes wrong throughout the process, the registry can easily be restored to its original state.

With free registry error scans taking just 2 minutes to complete, it can make the problems on your computer that were once perceived to be rather severe seem rather easy to rectify.

For a safe way to repair registry files, perform a no obligation, FREE registry scan today by clicking the link below:

http://www.registry2aid.com/Free-Registry-Scan.html

You really do have nothing to lose.

Don't put up with computer problems. Eliminate them. Give your registry a scan today at http://www.registry2aid.com

Article Source: http://EzineArticles.com/?expert=Riley_Edwards

วันอังคารที่ 26 พฤษภาคม พ.ศ. 2552

Powis Parker Fastback Frequently Asked Questions

If you have a Powis Parker Fastback binding machine or are considering buying one you may have questions. In fact, I talk to customers and potential customers ever week about different questions that they have concerning the Fastback product line. This article is not designed to answer questions about any particular machine but instead offers answers concerning the entire line of Fastback binding equipment. Here are some of the most frequently asked questions that we encounter...

Can I edit the book once it's bound?

Yes, all Fastback binding machines have an edit feature which allows you to remove or insert pages. This feature works well if you need to add or remove one or two pages from your bound book. However, if you need to completely disassemble the document you will want to consider using a large guillotine cutter that can trim the spine off the document.

Can I cut a Fastback strip to a different width?

No. You must use one of the three widths available. Narrow strips can handle up to 1/2" of paper, medium strips can handle up to 1" of paper and wide strips can handle up to 1-1/2" of paper. Attempting to cut one of these strips will destroy its binding capability.

Can I cut a strip to a different length?

Yes, as long as the strip is at least 6" in length you should still be able to use it in your Fastback binding machine. However, when using cut-down strips, be careful to always place the cut edge to the right as you face the machine, so that the adhesive from the cut edge does not spill onto the center of the heating platen. Over time, binding documents using cut-down strips may lead to adhesive build-up on the edge of the platen and may cause problems if you don't have your machine serviced and the excess glue removed.

Can I bind lengths other than 11"?

Yes. Fastback binding strips come in many lengths including 8 1/2", 9", 11", A4, 14", and 14 7/8". However, as mentioned in the previous answer, it is possible to cut these strips down to virtually any size larger than 6".

I would like the strip to wrap more to the back than the front of my document. Can I make it do that?

Yes. The wrap of the strip can be adjusted on your machine. Please see the users manual of your machine for more instructions on how to adjust the wrap on your model.

Can I use any kind of paper in my Fastback Binder?

Most papers common to copy centers work well in the Fastback binders. However, adhesion problems can occur if the paper fibers are not accessible to the binding strip. This can cause problems with high gloss sheets, photo papers and full bleed printed images. To bind documents with full bleed print or with on high gloss stocks you may want to consider using the Powis Parker Edge Splitter.

My machine says it has a strip jam. What should I do?

The Fastback 15xs, 11, 8x and 9 binders open easily to access the strip path. Open the machine and remove the jammed strip. Be careful: the heater is extremely hot!

Can I use tabs with the Fastback?

Yes. Tabs work very well in the Fastback. For best results (and the nicest books), use thin, grain-long tabs.

What should I use to clean my Fastback binder?

We recommend Icky Sticky Stuff Remover. This cleaning solution is safe, non-flammable and has been thoroughly tested on Fastback binding equipment.

If you are looking for Fastback Binding Machines or Fastback Binding Strips you should visit MyBinding.com. They are the largest online dealer for Powis Parker Fastback products in the United States. In fact, they carry the entire line of Powis Parker Fastback binding products.

Article Source: http://EzineArticles.com/?expert=Jeff_McRitchie

วันจันทร์ที่ 25 พฤษภาคม พ.ศ. 2552

Saving a Ton on Traffic - Best Deals Aren't Downtown

Downtown is the trendy place to be. No matter what city you live in or near, the downtown area is where everything is concentrated. You have businesses, clubs, restaurants, activities, stadiums, events- everything you could possibly want is downtown. Because downtown is so central and so concentrated, it's where everyone wants to be- including data centers and collocation facilities.

The High Price of Downtown

But downtown comes with its own host of problems. The main disadvantage of downtown is the high cost of real estate. Everyone wants to be there. And because of this, companies have to pay a premium to locate downtown. If rents rise, people are either forced to pay higher rent or leave the location that they perceive to be prime.

Unfortunately, this doesn't help the consumer, especially when it comes to data centers and colocation. Because these facilities are so specialized and require so much energy, power and infrastructure to run, they're not likely to move locations if rents are raised too much. In fact, it would be a disadvantage for downtown data centers to do so because of the costs associated with moving an entire data center and the inconvenience it would cause for the customers.

So, when rent goes up, colocation facilities are forced to pay. In order to make up the costs, prices are raised or services are cut in order to maintain the same margin.

The Best Deals Aren't Downtown

If you're looking for the best deal on colocation, downtown is not the place to look. The farther away you get from the city, the less expensive real estate is. There are many reasons for this, but the point is that data centers don't have to pay the high premiums for real estate. Without these excess costs for rent, facilities are able to pass these savings onto customers. Not only can they offer cheaper prices per rack, but they can also include more bandwidth and more services. By locating away from downtown, you'll get at least the same quality of service and in many cases you'll get better service without having to pay the high prices that you do downtown.

A sample price comparison of a facility located just outside the city center and a facility located right in the heart of downtown is as follows:

Downtown facility-

½ Rack- $650 (Does NOT include traffic)

Full rack- $1200 (Does NOT include traffic)

It is not possible to rent space in any smaller amounts. It's pretty much all or nothing, which doesn't accommodate the needs of smaller businesses or allow for gradual expansion. Other services include a power generator (which belongs to the building and therefore they don't have complete control over its usage) and 100mps ports.

Facility near, but not in, downtown-

1/8 Rack- $175 (includes 50 GB traffic)

¼ Rack- $350 (includes 200 GB traffic)

½ Rack- $500 (includes 350 GB traffic)

Full rack- $900 (includes 800 GB traffic)

Other features include a power generator which is owned by the company allowing more control, owning their own facilities, 100 mbps ports and free internal traffic with an internet account.

Savings Passed on to You

As you can see, facilities that are not located downtown can afford to pass on the savings to customers. Not only is it less expensive to rent a rack, but it also comes with more features, such as included traffic and free internal traffic. Not only that, but hosting away from downtown will save you on other costs you may not even have thought of such as not having to pay for parking. All-in-all, regardless of where you're located, it's always much cheaper to host your servers outside of downtown than it is to host them right in the heart of downtown.

Saleh Tousi is the CEO of SmarttNet, a Vancouver IT company offering comprehensive business Internet services including Canada Collocation since 1995.

Article Source: http://EzineArticles.com/?expert=Saleh_Tousi

วันอาทิตย์ที่ 24 พฤษภาคม พ.ศ. 2552

Password - Impossible

My bank forced me to change the login password again; they claim it's an automated procedure that happens every 90 days, but I know that it actually waits for me to remember the password and then immediately forces me to change it.

When I went in to change it, I was reminded of the draconian rules: it has to be at least 6 characters, with at least 2 numbers and at least 2 uppercase and 2 lowercase. These guys went to the 'security by obstruction' school, no doubt.

I decided to fight back. As I finally got around to remembering this awkward strange password I had to pick 90 days ago, I decided I'm staying with it. So I changed it to something else, which I had to write on a piece of paper for fear of forgetting within 30 seconds (if you saw memento, that movie is about me. And I try to always order beers in bottles since seeing it), and I then went to the 'change password' section to change it back to my awkward-but-conditioned-to-memory password.

Naturally, the bank was trying to set me straight. "You can't change back to any of your last 5 passwords" it told me with a grinning smile, giving me the solution right there. As you can undoubtedly guess, I returned the favor by changing the password 5 times to different things and then changed it back to my old one. I win. Next round in 3 months.

People will always outsmart security systems that try to force them into making the 'right' decision. What I've done today (and I'm quite proud of it, thank you) is being done every day by people who use their CD-ROMs as coffee trays and have never used any program that didn't automatically run when double clicking an icon.

But here's what is really bothering me: What exactly is the attack scenario here? I would like to see the statistics that show how many attackers actually manage to capture a username and password and only fail because they try to use it after 90 days. While these huge numbers are crunched, please put on the Y-axis how many attackers found the password on a post-it stuck to the monitor because the password is so complicated to remember.

Or maybe so many attackers have used brute force to crack the password, (which would take hundreds of millions of attempts for a single account) so there is a clear need for a long and complicated password. (BTW, if this attack is possible, someone should tell me how to do it. I've been locked out a few times for failing to type the password correctly within a few guesses. I need a few guesses because I didn't remember the current password, which, as you remember, changes every 90 days).

Being the cynic that I am, and having read enough security policy documents, I can guess why the password policy is the way it is: it's easy to explain and justify, and it makes sense to the senior execs when shown in a PowerPoint slide show. I once heard from a high-profile organization that due to a successful break-in to their network they decided to tighten up security: all passwords now had to be 9 characters instead of 8. I'm guessing someone was promoted for this genius action, and there's still enough room to increase it further when the next break-in comes (now that's thinking ahead).

How is a complex password policy bad? Let me count the ways; it makes your user you enemy instead of your ally, it distracts the security people from the real threat, it gives a false sense of security, users will more likely write it on a post-it note, it encourages your users to find flaws in your security system and use them. What else? I had more, but somebody just came in the door and I forgot.

Aviram Jenik is the CEO of Beyond Security, which has developed tools that uncover security problems in servers and web sites, discover vulnerabilities in corporate networks, check computer systems for the possibility of hostile external attack and audit vendor products for security risks.

Aviram Jenik
Beyond Security
http://www.beyondsecurity.com
1616 Anderson Road
McLean, VA 22102
1-800-801-2821
brianp (at) beyondsecurity.com

Article Source: http://EzineArticles.com/?expert=Aviram_Jenik

วันเสาร์ที่ 23 พฤษภาคม พ.ศ. 2552

Employee Data Provides IT With Opportunity to Cut Costs, Add Value

If you're looking for a way to prove your value to the business, go have a chat with your HR director about the problems with employee data.

Employee data integration is a major challenge for companies today, Forrester Research analyst Paul Hamerman said in a recent Industry Standard article. So, these types of data integration projects are a great way for IT to add value to the business, he said.

Employee data problems can create major business headaches, as the article's mini-case study of Aker Philadelphia Shipyard shows. Aker had three legacy HR systems - none integrated, and all containing contradictory data. The company actually spent thousands in fees each pay period because of incorrect payroll checks - not to mention the problems caused by lost injury reports.

In 2004, the company decided to clean up its employee data and consolidate on a new solution. So far, the company has saved almost $660,000 through reduced fees, payroll errors and escrow payments, according to article. The consolidation project also decreased payroll errors by 90 percent.

How's that for creating a nice ROI and IT/business alignment?

The article doesn't specifically mention data migrations, but I think it's a safe bet, given that they're moving from three legacy systems to a new solution. In fact, according to Bloor Research, most data migrations are actually associated with some sort of change to the application environment - even in cases where your goal is to switch databases.

Data migrations can be pretty scary projects, because there's a lot that can go wrong. Bloor Research says there are three main areas of risk with data migrations:

1. Data profiling, or understanding your existing data
2. Maintaining data relationships during the migration
3. Assuring a smooth handover process at the project's end.

In "Business-centric Data Migration," a whitepaper available for free download, Bloor contends part of the problem is that IT departments over-rely on the "big bang" approach to migrations. Bloor suggests IT can improve success with data migrations by taking a more incremental approach. Among other things, that requires:

* Planning for the migration from the get-go instead of at the end of the project
* Migrating data based on business entities, rather than data tables, to reduce breaking relationships
* Running the two systems in parallel until you've ensured every thing is functioning as it should
* Using an external model within the migration model to tell the applications where to look for the data, rather than putting flags in the original databases

If you're considering a data migration project, you might also want to review "How to Migrate Your Data in Seven Steps," which was recently published in SAS.com Magazine. It's written by David Barkaway, the company's data integration solution manager for the SAS Global Technology Practice, and includes more information about the data profiling step.

Read Loraine's interview with Ash Parikh with Informatica, entitled, "Is Data the Missing Last Mile for SOA Success?" - http://bit.ly/iuemX

Article Source: http://EzineArticles.com/?expert=Loraine_Lawson

วันศุกร์ที่ 22 พฤษภาคม พ.ศ. 2552

Test It (for Security Holes) Before You Buy It

Seems like black box testing tools (fuzzers) area gaining more ground, but not in the way I expected.

I expected software/networking vendors to be buying commercial fuzzers to check their products for security holes (or using open source fuzzing tools as part of the development cycle). Surprisingly, most companies I know that have implemented fuzzers are not the ones writing code, but those who rely on other people's products - telcos, cell phone providers, financial institutions, and equipment suppliers.

Apparently, some of these companies check 3rd party products for security holes before they install them in their network.

While this 'certification' attitude is expected from financial institutions, it's pleasantly surprising to see it from equipment suppliers, for example. One large telco went as far as informing several networking equipment vendors that any new version of their networking products will undergo extensive security tests before it is purchased. Since the tests are done with a commercial fuzzing product, the networking vendor has a chance to buy a similar product and do its testing already in the development lab - saving the shame of having the customer find its security holes for him.

Perhaps I shouldn't be too surprised - there were many instances of organizations running nessus on their networking equipment and sending the vendor a 'report card' with all the known vulnerabilities present in the product. But doing a quick nessus run is way different from implementing security testing as part of the acceptance process. At least one company picked up on this upcoming trend - BreakingPoint's business model is around companies benchmarking security products before deciding which ones to buy. Will this trend tie up with testing products for security holes before deciding which ones to buy?

Another pleasant surprise is that Microsoft, who has been behind in terms of security for many years (to a point where many people, myself included, were convinced that they "just don't get it"), has implemented a fuzzing infrastructure that is more advanced than anything else I've seen. A couple of networking vendors are not too far behind, but the rest of the software development world seems to be in the security testing dark ages.

This is obviously a good step for the security world - if large customers begin to pressure product vendors to develop more secure products (rather than spend marketing dollars on branding themselves as secure), product security will have a clearer ROI and the result will be more secure products.

A cynical friend of mine told me that this is yet another proof that product vendors will not take steps to increase their product's security unless pushed to do so by external forces. I tend to think that whatever the reasons, a net result of less security holes is good for everyone.

Aviram Jenik is the CEO of Beyond Security, which has developed tools that uncover security problems in servers and web sites, discover vulnerabilities in corporate networks, check computer systems for the possibility of hostile external attack and audit vendor products for security risks.

Aviram Jenik
Beyond Security
http://www.beyondsecurity.com
1616 Anderson Road
McLean, VA 22102
1-800-801-2821
brianp (at) beyondsecurity.com

Article Source: http://EzineArticles.com/?expert=Aviram_Jenik

วันพฤหัสบดีที่ 21 พฤษภาคม พ.ศ. 2552

The Sun Will Come Out Tomorrow

I remember when I was first introduced to Data Encryption Standard (DES). It was in some computer magazine whose name I can't recall and it went something like "the DES algorithm is so powerful, that even if you could run several DES brute force attempts per second, the sun will die and our galaxy will be destroyed before you can try all the DES combinations. It made sense - 2^56 is a very big number, more than the measly 5-10 billion years our sun has to live. Back then there was also speculation on how the NSA could break it.

It was a well-documented fact that the NSA made some subtle changes to the DES algorithm and the popular assumption was that they put in a 'back door' so that their supercomputer can break it. There had to be an NSA backdoor, since there were mathematical proofs on the impossibility of breaking DES in a reasonable time (like, within the age of the universe) or reasonable amount of money (let's say, within the entire worth of the world's economy). Who can argue with a mathematical proof that contains a lot of exponents and relies on bullet proof analogies?

Almost a decade later I learned cryptology from Eli Biham, the inventor of differential cryptology. He spent a full lecture on the DES design and algorithm and we were all quite convinced that its 16 rounds and mysterious S-box design was unbreakable. Biham finished the lecture by saying "...and next week, I'll tell you how DES is broken" and indeed the following week he taught us differential cryptanalysis. The method was impractical and mostly theoretical, so it didn't really "break" DES, but it showed the first weakness and I started losing faith in the whole "the world will end before..." jive.

It was only a few years after, that DES collapsed. It wasn't with smart differential cryptology, though. It wasn't even by finding the 'secret NSA backdoor' everybody was looking for in the 80s. In fact, many were shocked to discover the NSA change to the S-boxes actually made DES more resistant to differential cryptanalysis attacks. They didn't want the algorithm to be weakened by other means, possibly because they could brute-force it way back then.

DES was broken because something unexpected happened. The processing power of a super computer from the 70s is weaker than the average PC sold at Walmart. In fact, a $500 PC running a standard operating system can try hundreds of thousands of DES combinations per second, while allowing its operator to play Solitaire. It's not difficult to get hold of thousands or even tens of thousands of PCs (think a medium-size corporation after 5pm or a university during summer vacation) and you've got about a billion DES brute-force attempts per second. The sun will come up tomorrow, and the DES encrypted message will be broken by that time.

If I was to go back in time and tell a computer science professor that in 30 years an average person will have access to a processing power that is a billion times that of a super computer, I would be committed on the spot (or worse - sent to the social sciences department). Yes, I admit that it's hard to anticipate something like that - keeping with the flawed analogies that would be like me telling you that in 30 years we'll all be living in mansions like Bill Gates while paying 1/10 of the rent we pay today.

On the other hand, just because we can't grasp something doesn't make it impossible. I made that mistake myself, when 8 years ago I argued passionately that Windows vulnerabilities are impossible to exploit. I gave a very detailed reasoning. I thought I knew a lot about security. Two years later, David Litchfield gave a step-by-step explanation on how to exploit buffer overflows on Windows. Reading back what I wrote then, makes me want to get into the time machine again, visit the young me and hit myself with the clue stick (and tell the astonished me that whatever stupid thing I write will be saved forever and can be pulled by a search engine in less than a second. After that, I should probably give myself the lottery winning numbers and a travel brochure).

I figured people stopped making outrageous claims about what's 'impossible' in computer security, and then I stumbled upon this. My favorite quote (attributed to Jon Callas, the CTO of PGP corporation):

[...] consider a cluster of [grain sized] computers, so many that if you covered the earth with them, they would cover the whole planet to the height of 1 meter. The cluster of computers would crack a 128-bit key on average in 1,000 years.

Really Jon? Sure, it can be backed up by the 'exponential growth' problem and by looking at the results of various distributed cracking projects. But will an encrypted message sent by a Coca Cola executive containing the secret formula and encrypted by a 128-bit PGP key survive brute force attacks 5 years from now? 10 years? 20? 30? Would you wager $23B a year on that? I wouldn't.

Don't get me wrong, brute force should not be the primary concern of someone securing their system from attack. It's much easier to find an un-patched network vulnerability, or run a social-engineering attack to get what's needed. But 2005 was an amazing year for cryptanalysis, with weaknesses found in major hashing algorithms and Chinese crypto experts leap-frogging what we thought was possible in some fields.

My advice? Whenever someone describes 'impossible' in terms of planets, atoms or large exponents ask them to give it to you in writing. 10 years later go back to them with a "what were you thinking?". With some luck, they'll be rich and famous and you could shame them in public. I'm saving mine for Jon Callas. Modern cryptographic systems are essentially unbreakable? Yeah, and 640k should be enough for anybody.

Aviram Jenik is the CEO of Beyond Security, which has developed tools that uncover security problems in servers and web sites, discover vulnerabilities in corporate networks, check computer systems for the possibility of hostile external attack and audit vendor products for security risks.

Aviram Jenik
Beyond Security
http://www.beyondsecurity.com
1616 Anderson Road
McLean, VA 22102
1-800-801-2821
brianp (at) beyondsecurity.com

Article Source: http://EzineArticles.com/?expert=Aviram_Jenik

วันพุธที่ 20 พฤษภาคม พ.ศ. 2552

Improving Your Computer's Performance

First things first-Housekeeping

PC's occasionally need both hardware and software cleaning. This includes removing unused programs, clearing accumulated data, and physically cleaning the interior (inside the tower) and exterior (outside the tower) components.

Removing unused programs is a fairly straightforward process all that really needs to be done is to navigate to the control panel and select add or remove programs. Select programs that you do not wish to keep and then select remove. You will be guided through the process by the uninstall wizard.

Clearing data is a bit more complex especially if you have a lot of data that needs to be removed. I would suggest starting by going through each and every folder on your system to determine what needs to go. Each time you select a document that is destined for deletion right click the document and select delete. This will remove that item to the recycle bin. Once you have completed task of removing old documents and files go to the recycle bin on your desktop and empty it, Also empty temporary files and internet data.

Physically cleaning your system is also an important practice. To begin obtain a dry or slightly damp cloth and a can of compressed air if possible. Start with the exterior components like the monitor, keyboard, mouse, and the outside of the tower use the cloth to wipe down these items.

Moving on to the interior of your computer start by opening the outer casing this process differs for each machine so you may have to struggle with it for a bit to figure out the proper opening method. Once inside take your can of compressed air and blow out any debris and dust that has accumulated inside the casing.

Next-UPDATING

-Keep your antivirus anti spyware up to date. The easiest way to accomplish this is by setting up regular updating.

-Keep your operating system up to date, this to can be accomplished through automatic updating.

Another important practice- RUNNING DISK DEFRAGMENT AND ERROR CHECKING UTILITY

The disk defragment utility available in windows helps to organize data more effectively thus freeing up disk space. This program can be found by going to start, all programs, accessories, system tools and then disk defragment.

Another important tool Window's has available is the Error checking utility that can detect and repair many disk errors. To run this utility go to start, my computer and right click your hard disk and select properties. Select the tools tab in the properties window and then select check now. In the box that opens next make sure to check the scan for and attempt recovery for bad sectors option.

Finally- ADD RAM

When all else has failed to speed up system performance it may be time to add more RAM to your system. RAM or Random Access Memory are modules found inside your computer case that are used to temporarily hold data while your computer is on. If you do not have enough RAM installed in your system (which is very common) system performance will be slow and freezing may occur. To alleviate such symptoms you can add more of this memory to your system. For a complete guide on how to do add RAM refer to the link below.

For more information on the topics discussed above please visit http://tjhelms.blogspot.com/

Article Source: http://EzineArticles.com/?expert=Tj_Helms

วันอังคารที่ 19 พฤษภาคม พ.ศ. 2552

Part II - What Are the Pros & Cons of T1, DS3, OC3, and Ethernet Bandwidth Solutions For Voice-Data

This is part 2 of a 3 part series that will hopefully help guide you to making better decisions on bandwidth solutions (T1, DS3, OC3, And Ethernet) for your voice and/or computer data network. Read closely and soak up every tidbit from all three parts.

With regards to T1, DS3, OC3, and ethernet circuits...

Some carry more bandwidth and are more expensive....and others carry less bandwidth and are less expensive. That may sound simplistic but it gets to the core of the real differences. It's a starting point .... but where you go from there is the more important.

However, focusing on that "simplistic" explanation is probably the wrong view to take. Primarily because service level agreements will define your experience and cost as much as the carrier technology. In other words .... there's much more than bandwidth to consider in the equation for deciding what's best for your network. Whether it be for voice ... or computer data ... or both.

For example .... some agreements allow for very high latency and this would make conferencing and voip insufferable, no matter the bandwidth. Others allow the service to degrade under certain circumstances. Others provide for uptime guarantees or the lack of them. Symmetric or asymmetric service may be to your liking or not depending on what you do.

All these and more service level terms apply to all the types that are mentioned. Ultimately you want or need a certain bandwidth either in bursts or continuous and you will make your contract accordingly. It really doesn't matter whether they use OC3 bandwidth or Applesauce to meet the agreement.

As with all things, decide what you want, what you need, and then go shopping.

If you'd like some help with your shopping expedition .... take advantage of the free assistance available from FreedomFire Communications.

Michael is the owner of FreedomFire Communications....including DS3-Bandwidth.com. Michael also authors Broadband Nation where you're always welcome to drop in and catch up on the latest BroadBand news, tips, insights, and ramblings for the masses.

Article Source: http://EzineArticles.com/?expert=Michael_Lemm

วันจันทร์ที่ 18 พฤษภาคม พ.ศ. 2552

Part I - What Are the Pros and Cons of T1, DS3, OC3, and Ethernet Bandwidth Solutions For Voice-Data

This is part 1 of a 3 part series that will hopefully help guide you to making better decisions on bandwidth solutions (T1, DS3, OC3, And Ethernet) for your voice and/or computer data network. Read closely and soak up every tidbit from all three parts.

This is one of those questions that just begs to be answered with "It Depends..."

These are really physical layer technologies and the benefits of each will depend on how they are used and what data link layer technologies they transport (ATM, Frame Relay, MPLS). Then there is always the question of availability.

T1 Bandwidth, for example, can be used as an access circuit into a multi-node network like Frame Relay or MPLS or as a point-to-point circuit. In a large multi-site MPLS network, a T1 may be an appropriate choice smaller locations with a small number of users. However, A point-to-point circuit may be appropriate to connect a small satellite office to a regional office that is connected the larger network.

Knowing the size of the business only provides part of the information required. What kind of traffic do they have? Are they running voice and video on the network? Do they have an IT staff capable of managing routers? What facilities are available in each location (copper/fiber)? Do they have replicating servers in different locations?

I think this question puts the cart before the horse. In my opinion, you need to understand your network traffic, establish bandwidth requirements, and allow the carriers to make recommendations on the transport technology based on what's available in the locations required.

It's kind of like asking what's better, a pick-up truck, a tractor-trailer or a freight train?

Each of them can carry cargo over long distances, but each one will have advantages and disadvantages based on payload, availability and cost.

Michael is the owner of FreedomFire Communications - including DS3-Bandwidth.com. Michael also authors Broadband Nation where you're always welcome to drop in and catch up on the latest BroadBand news, tips, insights, and ramblings for the masses.

Article Source: http://EzineArticles.com/?expert=Michael_Lemm

วันอาทิตย์ที่ 17 พฤษภาคม พ.ศ. 2552

Backup Data Storage - Your Ultimate Guide

Backup data storage simply means saving or storing your documents, files, and other important data in another medium. This medium may be accessed in case one's files are lost or deleted. This is a way to protect your files in case of any accident that may happen to your computer or file, and also to have a copy of the file for future reference.

There are many backup data storage devices that are available in the market today. One may also purchase these storage devices over the internet. Also, some storage means are found in the internet because there are many website that offers storage spaces for individuals and companies. If you are confused on what kind of backup data storage will you choose, here are the most common storage devices that one may consider in selecting the best medium to protect your data.

1. Online data backup service. This kind of backup data storage allows one to store his files over the internet. Many websites offer this kind of service and one may choose which among the websites he will choose. The most common features of an online data backup service includes files storage up to 2 GB but may be unlimited depending on the service selected, file encryption, protection and storage of the files through a confidential username and password, and many more. The files may be accessed with any computer as long as there is a good internet connection

2. External hard drives. This storage device is detachable from the computer. It is like the hard disk of your CPU but is found outside the computer and is attached normally to the USB. One can choose the capacity of the external hard drive ranging from 8 GB to 160 GB. Also, using an external hard drive does not need an internet connection. One just has to plug it and one can already access the files stored therein.

3. Optical drives. Examples of this kind of storage device are the CD or DVD disks. Before CD or DVD, people use the floppy disks. Floppy disks are obsolete nowadays because of its limited storage capacity. CD or DVD disk storage is very convenient to use because one just has to save his files and the files are already saved or copied therein. No need for an internet connection or a USB hub. However, writing the files in the CD or DVD disks require a CD or DVD writer in order to save the files. Also, the disks are sensitive and may easily be destroyed if it is not taken care of.

4. Flash disks or thumb drives. This is the mini version of external hard drives. The difference is flash disks or thumb drives have lower storage capacity as compared to external hard drives. Since the size is small, the capacity usually ranges from 512 MB to 8 GB. The good thing about this data storage device is that it is compact and may be placed even in one's wallet. However, since it is small, one may easily lose it.

Are you trying to find a way to backup your data? We have the best and most reliable option, try it out for FREE at http://www.databackupcentral.com

Article Source: http://EzineArticles.com/?expert=C_Garcia

The Many Uses of Robotics Technology

Robotic vehicles can do the jobs that are too dangerous, boring, or disgusting for people. Unmanned vehicles can plunge to the deepest parts of the ocean, the farthest corners of the galaxy, into the wells of a volcano, and inside combat areas which would be too perilous for vehicles driven by human beings. This technology won't replace drivers; it will help the current workforce with robots that will drive anywhere in the world under any conditions.

The US Army isn't a stranger to robotic vehicles. Military insiders say that a lot of their success is from small reconnaissance or tactical planes that are unmanned. The planes can fly for miles and miles from remote locations, while reporting video and photos back to the military stations. They will follow targets and hit them with extreme accuracy. One great benefit is that no US soldiers are put in danger, and the terrorists won't see or hear it coming. American soldiers use robotics technology to command drones in the Middle East.

A lot of effort is also being put into the development of robotic vehicles for a wide range of civilian applications. Synthetic Aperture Sonar is helping robots capture brand new images of deep sea beds. Farmers can use these to monitor their crops, and forest rangers can keep track of trees and wildlife in remote places in their parks. There are vehicles that can ride the surface of the water to monitor coastlines, and there are underwater devices used to recover old shipwrecks and unaccounted for lobster traps that threaten endangered marine animals.

The newest robotic vehicles will probably surprise you. Seven hundred ton Caterpillar trucks are currently being prepared by scientists that will allow trucks to transport 240 ton loads from mining productions. Automated trucks are supposed to be available in five to ten years, and they will save a lot of time and money. This new robotic innovation will be really popular due to a shortage of drivers.

Being a chip industry consultant for many years, Milan Leeham has had the pleasure of being involved in numerous ASIC design and manufacturing projects. He strongly recommends a fabless semiconductor company to anyone needing ASIC manufacturing services or custom IC design optimization.

Article Source: http://EzineArticles.com/?expert=Milan_Leeham

Slow Computer Help

The problem is there are so many little computer problems that can make your computer lose performance slightly that you don't necessarily notice it until there is more than one thing affecting it.

Full hard drive

If your hard drive is too full then there isn't enough room for temporary files, or virtual memory. The size of hard drives today makes this less likely, but its still may happen.

Computer memory/ram

Not enough ram can make your computer go very slow. There might not be one single better thing to speed up your computer than upgrading your ram. This will give you the most noticeable difference in speed. Check my post for more information.

SpyWare and AdWare

These are not only annoying but can seriously affect your computers performance. Luckily there are plenty of free and top of the line programs out there to help you deal with this. If you constantly get pop ups, or go to websites that you did not intend to, you probably have spyware, and even if this doesn't happen it may be there. Check out www.Ad-aware.Com for a good anti-spyware program.

Computer maintenance

There are a few things that should be done regularly to keep your fast computer from becoming your slow computer. Disk defragmenting, clearing temporary files and other needless files through disk clean up need to be done often and can be scheduled to run at certain times. You should remove any unused programs.

Clean up your Registry

After a while through no fault of your own and because of malicious programs, your registry becomes a mess. Fortunately again there is software for this as well.

For more slow computer help go to http://www.slowcomputerhelp.net

Article Source: http://EzineArticles.com/?expert=Sean_Moriarty

วันเสาร์ที่ 2 พฤษภาคม พ.ศ. 2552

Bonded ADSL Can Replace Expensive Diginet Leased Lines - At A Fraction of the Cost

With the pressure to cut costs and survive the current economic downturn, companies are looking at ways to trim excess costs without cutting away any vital resources that they need to operate an effective and efficient business . In some respects, the current downturn, for those companies that survive, will be beneficial as it forces us to become more productive and efficient with our scarce resources, meaning that our long-term competitiveness will be enhanced.

One area that can often lead to significant cost savings without the lose of any capabilities or capacity is IT spend, especially when one scrutinizes your monthly operational line item expenses. The fact is that technology moves at a rapid pace and yesterdays "state-of-the-art" solution is today's inefficient resource hog. When times are good we tend not to look at an recurring expense again once it has been approved, it simply becomes part of the monthly budget. Now is the time to look at those expenses and ask, "is there a cheaper more efficient solution to replace our current setup?" One such area that should be looked at is your corporate Internet connection costs. Although this article is written based on the current state of broadband access in South Africa, my home country, the general principles, if not the specific themselves are of universal application.

Replace your old, expensive diginet line with a bonded ADSL solution
When Asymmetric Digital Subscriber Lines (ADSL) first came out,it was billed as a consumer service. Many small and medium enterprises (SME) were quick to identify ADSL as a cheap way to get connected to the Internet without relying on slow dial up or an expensive diginet leased line. The problem was, however, that ADSL could only get you so far. ADSL's shortcomings are:

* Limited bandwidth speeds,
* Extremely poor upload speeds, when compared to its download speeds,
* Limited account sizes,
* No guarantee on service availability


In South Africa our current top of the line ADSL connection can provide a maximum of 4Mbps. If you want higher throughput you need to consider, expensive 3g or HSDPA wireless solutions. The costs of these wireless alternatives are prohibitive. However, over the last two years, bonded ADSL has emerged as an alternative to expensive diginet leased lines. Bonded ADSL works by taking up to 6 ADSL lines and bonding their bandwidth together to get a throughput that is up to 6 times more than any one line.

Thus a company can get a download speed of up to 24Mbps up and as much as 2 -3 Mbps upload speed at a fraction of the cost of a diginet leased line. In fact you can get two or more of these solutions for the price of 1 diginet leased line.

This is just one area in IT where one can cut costs but researching newer solutions that have become available over the last few years and replacing your current older technology.

Mark Clarke has over 10 years experience consulting with companies and individuals on the best broadband option for their needs and budgets. Whether its ADSL,diginet,3g or iBurst. He currently works, part time, at the broadband connectivity solutions company, Cyber Connect assisting their customers in developing the most cost-effective and appropriate solution for their remote branches, road-warrior sales staff, and corporate Internet connectivity needs. He also consults on implementing firewalls and network management solutions, to help in the proper management of corporate networks. He occasionally works for http://www.OnSiteTechSupport.co.za where he advises corporate on how to cut their IT costs, and manage their infrastructure cost-effectively. For more information please visit bonded ADSL

Article Source: http://EzineArticles.com/?expert=Mark_Clarke