Sunday, November 9, 2008

hasil sepakbola liga italia 9 november 2008

Catania 2 - 1 Cagliari
Chievo 0 - 2 Juventus
Fiorentina 2 - 1 Atalanta
Genoa 4 - 0 Reggina
Inter Milan 1 - 0 Udinese
Lazio 3 - 0 Siena
Napoli 2 - 0 Sampdoria

Saturday, November 1, 2008

The Canada Method

Have you heard of the "Yahoo Back Door" ?
Several years ago we released a report
on how to get listed on Yahoo
using a little-known "back door" technique.

Worked like a dream.
We called it "The Canada Method".

This was the technique: Simply submit your
website to Canada.com (they shared the
same database with Yahoo) and presto
your website was also on Yahoo!
(bypassing the normal 6 week wait time)

This little trick worked for a whopping 2 years!

Yahoo closed that "back door" years ago.
But now, there is some very good news.
Would you like to....

==> Learn how to get top listings on Google
==> in about 1 day
==> for zero cost

Imagine for a moment the potential
traff^ic (and moolah!) when
you're on the first page of keyword
search results on the 2nd most
traff^icked website on the planet.

And that's why I think you'd agree
this information is worth
$hundreds of dollars, easy.

But it doesn't cost anything near that.
In fact you get it Fr^ee
with your membership to the
promotion tools website here:
www.z56.com/Google-Top-Listings-Free-Report
(plus you get access to 100+
webpages of online promotion tools,
training videos and cool stuff)

Thursday, June 12, 2008

Receivable is an important process

Receivable is an important process, which can show one big shares of estae of likuid company. Kieso and of Weygandt define understanding of receivable as following : Acre Receivables of claims money for others and customers against held, goods, services or. While understanding of receivable according to S.Hadibroto is : Receivable is claim to other party, is the claim in the form of money, service or goods, for the purpose of term accountancy utilized in smaller meaning that is is expected claim will be finished with money. Explanation of above definition known that receivable is widely interpreted as invoice to the everything good company rights in the form of money, service and goods of third party after company execute his obligation, while narrow;tightly receivable interpreted as invoice which can only be finished accepted [by] money him in the future.

In general receivable arise when a company sell service or goods by kredit and [is] entitled to of cash inflow [in] period to come, which the was process of started from decision making to give credit to customer, delivering of goods, addiction and finally accept payment, equally receivable earn also arise when company give money loan to other company and accept promissory note or money order, [doing/conducting] a[n other transaction or service which create a[n [relation/link] where one [party/ side] owe to other like loan to employees or leader. Receivable is one of [the] top-drawer element in working capital a[n company. Some of receivables can be packed into [by] working capital that is receivable shares which consist of fund which invested in sold product and some of other which including potential working capitals that is shares is advantage. Receivable are working capital element which always in a state of rotating continually

Many Nikon COOLPIX cameras have selectable picture modes

Many Nikon COOLPIX cameras have selectable picture modes, which Nikon has called "scene modes". All Coolpix cameras also have an "Auto" mode, which will select the camera settings automatically for the best picture under most circumstances; however, pictures may look better if the photographer manually selects the appropriate camera settings best suited to the conditions.

Nikon cameras with "Scene Modes" make this easy using a pre-programmed setting which are selectable via the camera's dial or menu (depending on the camera used). If pictures are going to be taken for any one of the scenarios below then choosing that "Scene Mode" will provide excellent results.

_________________________________________

Portrait

The main subject stands out clearly while background details are softened, this can give the image a sense of depth. By using a wide aperture (i.e. f/5.6) the camera will try to blur the background to make it less distracting and concentrating the viewer's attention to the main subject. The degree to which background is out of focus depends on the amount of light available.

Settings used:

Flash- auto any flash setting can be used, Shutter speeds- auto, Aperture -wide aperture, Focus-normal, some cameras allow manual focus point selection.

_________________________________________

Party / Indoor

This mode is designed for taking pictures at parties or generally in doors. While normal flash photography may result in the subject being correctly exposed the background will generally be under exposed (dark). Using the party mode the camera utilizes longer exposures (i.e. 1/30 second) to allow more ambient light from the room to be captured, improving the exposure of the background and giving an impression of the environment where the picture was taken. You can also use this setting to capture the effects of candlelight and other indoor background lighting. Note that the camera uses slower shutter speeds so some camera shake may occur. Steady the camera carefully to avoid movement.

Settings used:

Flash- on with red eye reduction, Shutter speeds - slower speed than normal are used, Aperture - auto, Focus - normal

_________________________________________

Beach/Snow

Vividly captures the brightness of such subjects as snowfields, beaches, or sunlight expanses of water. Photographing in these situations can be tricky as sand and snow can fool the camera into producing the wrong exposure. You may have seen holiday snaps of people skiing on what would appear to be pink/blue or grey snow, this is caused by the cameras exposure meter being tricked and giving the wrong exposure. Using the beach/snow scene mode the camera is able to compensate for these situations and produce the correct exposure.

Settings used:

Flash - auto, but any flash mode can be used, Shutter speeds- auto, Aperture -auto, Exposure compensation used (i.e. +1 exposure). Focus-normal

If your shooting a scene with predominant white (snow), you would dial in +2 EV since the meter will try to expose for 128 on the histogram. This would move the spike on the histogram from middle to roughly just before 255 - right of the histogram making the white look natural, but not blowing it. Of course, the amount of compensation required also depends on metering mode and the amount of bright white in your scene.

Monday, May 19, 2008

Ilmu ekonomi makro

Ilmu ekonomi makro mempelajari masalah-masalah ekonomi utama sebagai berikut :
• Sejauh mana berbagai sumber daya telah dimanfaatkan di dalam kegiatan ekonomi. Apabila seluruh sumber daya telah dimanfaatkan keadaan ini disebut full employment. Sebaliknya bila masih ada sumber daya yang belum dimanfaatkan berarti perekonomian dalam keadaan under employment atau terdapat pengangguran/belum berada pada posisi kesempatan kerja penuh.
• Sejauh mana perekonomian dalam keadaan stabil khususnya stabilitas di bidang moneter. Apabila nilai uang cenderung menurun dalam jangka panjang berarti terjadi inflasi. Sebaliknya terjadi deflasi.
• Sejauh mana perekonomian mengalami pertumbuhan dan pertumbuhan tersebut disertai dengan distribusi pendapatan yang membaik antara pertumbuhan ekonomi dan pemerataan dalam distribusi pendapatan terdapat trade off maksudnya bila yang satu membaik yang lainnya cenderung memburuk.
Kegiatan ekonomi di masing-masing negara dihitung melalui perhitungan Produk Domestik Bruto (PDB) (Gross Domestic Product), Produk Nasional Bruto (PNB) (Gross National Product), maupun Pendapatan Nasional (PN) (National Income).
PDB adalah nilai seluruh barang akhir dan jasa yang dihasilkan oleh siapapun di dalam wilayah teritorial suatu negara selama periode waktu satu tahun. PNB adalah nilai seluruh barang akhir dan jasa yang dihasilkan oleh seluruh warga negara suatu negara selama periode waktu satu tahun.
PDB - balas jasa faktor produksi secara netto yang mengalir ke luar negeri=PNB.
PNB - penyusutan = Produk Nasional Netto (PNN).
PNN - pajak tidak langsung = Pendapatan Nasional

Tuesday, April 15, 2008

make money with crew BUX

  • What is Crewbux.com?
    Crewbux.com is a new innovative, international and FREE English based service that allows advertisers to reach thousands of potential customers by displaying their ads on our, "View Ads" page.
  • How does it work?
    You view websites in a few seconds via the "View Ads" page. Once the few seconds is up, you'll either get a green tick sign or a red 'X'. The green tick sign means you've earned money for the visit and the 'X' means you have not earned money for the visit. You'll get red X's when you have more than one website from the "View Ads" page open. When this happens, you get no credit.
  • Can other people in my household join?
    As long as they each have their own computer, PayPal account, AlertPay account and e-mail address. As far as cheating goes, our software detects users who create fictitious accounts and use the same computer so if someone else in your household wants to join and will legitimately use their account; you shouldn't be flagged for abuse.
  • Can I have more than one account?
    No. There is no need to maintain more than one account. If you've lost your login information, you can request to have it sent to your e-mail address. If you are caught with more then one account open (we have a very strict auditing process before payments are sent) your account(s) will be terminated, your ip address(es) will be banned and you will not receive any earnings.
  • My network, school or ISP all use the same or randomly used IP addresses, can I join?
    Yes, this is fine. The same general rule applies from the previous question.
  • How much money can I make?
    There is no limit in the amount of websites you visit or referrals that you obtain. Your earning possibilities are virtually endless.
  • How do I refer others?
    Use your unique referral code found within the user area "My Stats".
  • I can't see any ads!
    If you see no ad links on the "View Ads" page but you DO see stats on the right hand side then you need to disable all antivirus and antispyware/adware programs. If this doesn't work, try cleaning your cache, temp files, cookies, etc. If you're still having problems after all of that, try changing or updating your browser.
  • My stats aren't updating!
    This is either because your browser is saving the page in it's cache or you're not waiting for the dollar sign to appear after the timer is complete. Try cleaning your cache, temp files, cookies, etc. If you're still having problems after all of that, try changing or updating your browser.
  • I keep getting "Invalid verification code entered." when I try to register or login!
    First, make sure you are correctly typing in the verification code. If you are typing in the correct code and still having problems then it's something to do with your browser caching the previously used session image. Try cleaning your cache, temp files, cookies, etc. If you're still having problems after all of that, try changing or updating your browser.
  • How often are the statistics updated?
    Stats are updated immediately.
  • How do I get paid?
    If you have the minimum amount accumulated, you can click on your account balance within your stats area and it will submit your request. Currently, we only make payments via PayPal and AlertPay. We will soon be using other methods of payment.
  • When do I get paid?
    You can request for payment once you're account balance is the minimum amount accumulated. Your payment will be processed and issued via PayPal and AlertPay within 7 business days or less.
  • What is PayPal?
    PayPal is the payment processing solution that we use to pay members. Your PayPal address is the e-mail address you use to register with PayPal. You can get a free PayPal account at www.paypal.com.
  • What is AlertPay? Alertpay is the payment processing solution that we use to pay members. Your Alertpay address is the e-mail address you use to register with Alertpay. You can get a free Alertpay account at www.alertpay.com
  • Why did I get paid less then what I was owed?
    If you have a business account with PayPal, they charge a 2.9% transfer fee plus an additional $0.30 base fee when you receive funds.
  • How can I cancel my account?
    Inactive accounts are automatically cancelled after certain time.
  • Why I have to click twice to see the green tick?
    Check your antivirus, antispyware/adware programs, your browser settings for cookies and java script acceptance. If this doesn't work, try cleaning your cache or reboot your computer.

Wednesday, April 9, 2008

trik untuk menghindari kekacauan ketika login sebagai root

Keamanan Root

Account root memiliki akses penuh terhadap keseluruhan sistem. Ingat jangan menggunakan account root dengan sembarangan. Gunakan account root hanya untuk mengerjakan suatu pekerjaan khusus saja dan lakukan dalam jangka waktu yang tidak terlalu lama. Biasakan untuk menggunakan account pengguna biasa untuk menjalankan aplikasi sehari - hari. Bahkan kesalahan terkecil yang dilakukan pada saat login sebagai root dapat menyebabkan kekacauan yang fatal.

Beberapa trik untuk menghindari kekacauan ketika login sebagai root:

· Ketika mengetikkan beberapa perintah yang kompleks, cobalah untuk menjalankannya pertama kali dengan cara yang aman, khususnya perintah yang menggunakan globbing. Anda dapat juga menggunakan echo di depan perintah yang anda ketikkan, sehingga anda yakin bahwa anda benar - benar ingin menjalankannya.

· Menyediakan pengguna dalam sistem anda dengan alias standar (alias rm='rm -i' ke perintah rm untuk memberikan konfirmasi mengenai penghapusan berkas.

· Jadilah root hanya untuk melakukan pekerjaan tertentu saja. Jika anda ingin mencoba sesuatu, cobalah dengan login pengguna biasa sampai anda yakin apa yang akan anda lakukan dengan login root.

· Variabel path untuk root sangat penting. Cobalah batasi isi variabel path perintah untuk root dan jangan memasukkan "." (direktori saat ini) ke dalam variabel path. Jangan pernah memberikan izin akses tulis ke dalam direktory yang ada di variabel path, supaya pengguna lain tidak bisa memasukkan berkas binary lain yang bisa membuatnya menjadi root setelah anda mengeksekusi berkas binary tersebut.

· Jangan menggunakan perangkat lunak tools rlogin/ rsh/ rexec sebagai root. Karena perangkat lunak tersebut mudah diserang oleh penyusup. Jangan pula membuat sebuah berkas .rhost untuk root.

· Dalam berkas /etc/securetty terdapat daftar terminal di mana root dapat login. Berhati - hatilah apabila anda ingin memodifikasinya. Sedapat mungkin login-lah sebagai pengguna biasa, dan gunakan perintah su untuk mendapatkan akses lebih.

· Terakhir cobalah untuk bersikap tenang dan berpikir jernih ketika login sebagai root. Apa pun yang anda lakukan sebagai root akan sangat mempengaruhi banyak hal. Karena itu berpikirlah sebelum anda melakukan hal bodoh yang dapat merusak seluruh sistem.

New Weekly Tips Issue Just Released!

"Knowledge is key to success!"

In this week's Weekly Tips Issue:

- What is a 'Solo Entrepreneur'?

- Mind Movies? Does it work?

- Online Ad Agencies, a powerful ally for your business.

- How Testimonials work.

It's ALL in here:

=> http://imttrack.com/t/c/msmedia/issue_april_8/


Hope you enjoy,

Abe Cherian
CEO, Multiple Stream Media, LLC
Editor-In-Chief

Monday, April 7, 2008

Enhanced Tool Tips

The new Microsoft Office system user interface dramatically streamlines access to information about commands and tools. Enhanced ToolTips provide links to auxiliary information, such as training or help topics, directly from the command. You no longer have to discover the name of a command, open the Help window, and type in the command name—the link is now built into the user interface. This in-context information helps you learn unfamiliar functionality quickly. Because commands are organized according to the way you work, you can easily find and take advantage of the new and advanced capabilities in the 2007Microsoft Office System. With its streamlined look and dynamic Galleries, the new user interface helps you spend less time figuring out how the programs work so you can spend more time on content and analysis.

Sunday, April 6, 2008

Looking for a Windows XP Compatible Driver?


If you can't find a driver for a hardware device under Windows XP, you can try to use a Windows 2000 compatible driver for the same hardware. Usually this tends to work, and in my experience so far, it always has. However, if you can find a driver specifically designed for use with Windows XP that is usually the best and safest option. You can also e-mail the hardware manufacturer and ask them about Windows XP compatibility and drivers.

Thursday, April 3, 2008

make money online


Getting Started Adobe Photoshop

About Photoshop:

Adobe Photoshop is hands down, the most popular program for creating and modifying images for the web. Even those who don't have Photoshop can download the tryout version from www.adobe.com and follow much of this tutorial.

Section 1 - Getting Started

When you open Photoshop, the Photoshop desktop appears. The following components should be visible: top menus, options bar, image window, palettes, the status bar, and toolbox.

Menus

Photoshop menus (File, Edit, Image, Layer, Select, Filter, View, Window, and Help) appear at the top of the desktop. Click on a menu name and its menu items will appear.

Options Bar

The options bar appears right below the menus. Options for the tool that is currently selected in the toolbox appear in the options bar. The following example shows options for the Type tool.

Image Window

The image window/s houses the photo or graphic files you plan on editing.

Palettes

You can display or hide palettes by going to the Window menu (please note the layers palette).

The Status Bar

The status bar at the bottom of the Photoshop desktop provides information about your file and current activity.

Toolbox

The toolbox contains the tools you use to work with images in Photoshop. To use a tool, click on its icon in the toolbox. For the most part we will be concentrating on the marquee tool, move tool, paint bucket and color selection palette.

VRC in Sports Social Science

1. Virtual reality applied to sports: do handball goalkeepers react realistically to simulated synthetic opponents? Bideau Benoît, Multon Franck, Kulpa Richard, Fradet Laetitia, Arnaldi Bruno, France

2. Using Dual Number Method For Motion Analysis of Left Arm in a Golf Swing. Koon Kiat Teu, Wangdo Kim, Franz Konstantin Fuss, Singapore

3. Understanding Cross Cultural Differences During Interaction Within Immersive Virtual Environments. Sam Bucolo, Australia

4. A repository of virtual places as community memory: an experience of use. Ekaterina Prasolova-Førland, Norway

5. Meetings, Gatherings, and Events in Smart Environments. Anton Nijholt, The Netherlands

Wednesday, April 2, 2008

Multiple URLs Require Multiple NavBars

Tech Tip
Multiple URLs Require Multiple NavBars Are you one of the hundreds of new members who either can't figure out how to add the WebRing NavBar to your site, or your site editing software doesn't allow you to add the NavBar, or you don't even have a web site?

Consider registering/activating your WebRing Blog.

As a member, you have a free blog waiting for you to activate it. Here's how:

  1. Sign in to your WebRing account and open your My Account page (if it doesn't open when you sign in).
  2. Click the "Register" button on the "Blog" tab.
  3. Fill out the form page that opens and submit it.
That's it! You will then have a blog at your disposal, and the best part is that the WebRing NavBar is already added.

Once you have registered your blog, you can post updates, provide tips and tutorials, showcase products, journal about your day-to-day lives, supply political commentary... the sky's the limit!

And, remember to join a WebRing Community after you start to blog.

Tips for Keeping Your Children Safe Online

By Sharon Housley

Parents are constantly struggling with ways to keep their children safe online. The Internet has a global reach and at this point no bounds, or limitations. Outside of installing filtering software children should be educated in order to protect themselves to this virtual monster. We've put together a collection of ten tips that should be observed while surfing online. At the very least these tips will prompt family discussions regarding safety.

1.) When on the internet personal information should be kept private. Just because someone asks doesn't mean you need to tell them. When someone asks for personal information, consider how they might use that information and whether it is necessary for them to have it.

2.) If you are conversing with someone online, don't assume that they are being honest with you. Just because they say they're 16 doesn't mean they are.

3.) Do not release your password to anyone, even if they say they are from your online provider.

4.) Overall it is best not to respond to unsolicited e-mail (SPAM), if there is something flagrant or inappropriate in the e-mail, consider reporting the sender to their Internet Service Provider (ISP).

5.) Do not give out or post identifying information, including address or telephone numbers.

6.) You may want to create a nickname for a screen name in chat rooms.

7.) Keep in mind when posting in chat rooms or newsgroups, that there may be lurkers (people who read but do not post). Your information can be read and seen by all.

8.) Keep an open dialogue with children surfing the Internet, remember if they come to you with a problem, your first reaction should not be to take away the Internet. Applaud child's confidence in confiding in you and work together to find a solution.

9.) Overall it is not a good idea to post or exchange pictures over the Internet

10.) Try to keep in mind the Internet is global and is *not* governed by any entity. This means that there are no limitations or checks on the information posted and accessible to Internet users.

Tuesday, April 1, 2008

Cool Remote

http://vyskocil.free.fr/coolcom/

You need a: Palm PDA, a Palm serial cable, and a Coolpix serial cable. You also need a NULL modem and possible a gender changer, since regular NULL modem cable having one end Male connector and other end Female. What you really need is a NULL modem with both ends Male type. I bought NULL modem and a gender changer from Radio Shack; each costs more than $6.

After reading some posts about modification of USB cable to get a serial cable, I realized that I could modify the serial cable too. Basically, you just need to cut the connector open and switch positions of two cables (RD and TD are official names of the cables, which are connected to pin 2 and 3).

Actually you need to replace the connector with a new DB9 connector, which can be found at Radio Shack for a little over $3.

Detail Steps:

1. Cut open the serial connector side of Coolpix serial cable carefully, write down positions (connect to which pin) of each wire (wires are colored).

2. Cut or use a welder to disconnect the wires from original connector.

3. Weld the wires back to a new serial connector of solder connector type, remember switch the wires connect to pin 2 and pin 3 you write down in step 1

4. Use some silicon rubber glue/sealant as electric insulation and bonding.

Notes: Depends on the new connector you get, you may need to put a rubber or plastic tube to the serial wire at the end going into the connector, just to fill empty space there. Use black heat shrink tube to make it more professional.

_________________________________________

The Palm OS software is free, supports bulb and interval, and is available here: http://vyskocil.free.fr/coolcom/. The PDA buttons can be used to half-press, fully press (take the picture) and zoom in/out.

You will need the generic serial cable, either the Nikon SC-EW3, or its equivalent, made by Harbortronics: http://www.harbortronics.com/DigiSnap/SErialCAbleInfo.htm.

You'll also need a modem adapter (or cable) to match your PDA to the side of the SC-EW3 cable that would normally plug into your PC: the cable adapter includes the crossover functionality. A good source for those is: http://www.syncablesolutions.com

The total cost of this setup, assuming you already have a PDA (an "old" Palm III will do just fine) should be about $50, cheaper than the MC-EU1 or even the DigiSnap.

Disclaimer: I have no relationship with any of the vendors/products mentioned above.

PS: Once you have the SC-EW3 cable, you can also use it to attach your 990/880 to your PC and remap out those hot pixels, with the Cpixmap program found here (version 0.12 or later): http://e2500.narod.ru/ccd_defect_e.htm

Lock Computer vs Welcome Login Screen

You must go into Control Panel and open the "User Accounts" applet to change this setting. Click "Change the way users log on or off". For maximum security, uncheck the "Use the Welcome screen" option. This re-enables the use of the "Lock Computer" option from the ALT CTRL DELETE menu, but prevents multiple users from being logged on locally at a single time. This also returns to the Windows 2000 style login screen. If you'd rather have the ability to *not* be able to use "Lock Computer" and would rather allow multiple users to logon to the computer at a single time locally, leave this setting checked and also check "Use Fast User Switching".

Monday, March 31, 2008

EFV

A camera works with something that is called Exposure Value (EV). That exposure value determines the correct combination of shutter speed and aperture, at a certain sensitivity (ISO), for a good exposure. This value is a constant, meaning that whatever combination of the two, always make up for the same number. So small aperture needs long shutter speed; large aperture needs shorter shutter speed. Of course there is a limit to your apertures. If it gets too dark, it needs the largest aperture, but to make the EV it needs shutter speeds that you cannot hand hold (like 1 sec.).

P-mode determines the combination itself, and sets its possibilities according to the available light (intensity of the light from the scene). The S-mode, you control the shutter speed, and the cam will try to match it with the correct aperture (giving the correct EV, remember?). The A-mode will try to match it with the correct shutter speed (again, giving the correct EV). Manual, you have to determine the combination itself, with the help of the exposure meter of the cam.

In this case you should have either used a flashgun with high guide number or moved closer to your subject. If you have to keep a fair amount of distance, working with flash becomes eminent. But don't expect the average flashgun to perform beyond approximately 75 feet.

Practice the aperture priority.

Use about f/5 - f/6. Use ISO 200.

Practice to change white balance often from fine to cloudy, to fluorescent to incandescent.

Use AF area mode: Manual option and use the Spot Metering.

Practice changing Matrix, Center Weighted, and Spot Metering.

The Center Weighted is often better than the Matrix.

Get started right away and be ready to see your

How important does google value web site that is linking to you
This tip is one that most everyone does not even know about. Authority Web Sites are seen as most import by the search engines. Web pages that
contain a gov at the end of their domain name are considered to be an authority web site.

There are a few other sites such as microsoft.com and adobe.com that have reached this status as well. You will find that most authority sites contain
a ton of content and information.
If you are able to obtain a link from this type of site, it will have a huge impact on how your web page is considered. Any site containing a page rank of

7 and up would be assumed an authority site.
This brings us to a question? Is this time consuming process worth it?
The answer is simple. Yes. You will be much impress by taking the time needed to find targeted backlinks from web pages with great off-page
optimization.

If you are looking for and automated solution to save all your time and provide even more useful help, there are a few products out there that will do
the trick.
These products range from $167 - over $300.
All these programs will find all of the above information in minutes and offer other strategies to promote your web site.
From here you would use the other tools in the programs to quicken the time it takes to implement a link building process.
Ready. Aim. Fire!
You have not got the most valuable information that most outsiders do not even know about or use. Get started right away and be ready to see your
web site listed higher in the search engines right away.

Sunday, March 30, 2008

Highly Competitive Terms & Phrases

For some terms and phrases, even the best websites with the most diligent promotional efforts will have a very difficult time penetrating the top 10-20 results. In these instances, it can be tempting to rely on efforts outside of the search engines' guidelines. However strong this temptation may be, be advised that search engines do not tolerate spam or manipulation via automated links, nor do they allow such results to flourish for long. Although these methods, commonly referred to as "black hat SEO", may have some effectiveness in the short term, they have little chance of long-term success in the SERPs and may become permanently banned from search results.

For highly competitive results (from "mortgage" to "car insurance" to "university degree"), targeting the above described "long tail" (the more niche related search terms for which a smaller degree of heavy competition exists) can be the best method. Search engines are also careful to consider the age of a site and its links, and give heavy weight to those sites with long-held, highly trusted links. Thus, while rankings may be sparse at first, over time, an enterprising site owner can achieve some measure of notice, even in the most competitive of searches.

The 3D alpha shapes software consists of four programs

SOFTWARE

The 3D alpha shapes software consists of four programs:

+ Delcx --- 3D (weighted) Delaunay complex,
+ Mkalf --- 3D alpha shape file and data structure,
+ Alvis --- 3D alpha shape visualizer, and
+ Volbl --- Measuring union of balls and voids.

The first two programs, Delcx and Mkalf, pre-process the data, and Alvis
visualizes the results interactively. The fourth program, Volbl, measures
the union of spherical balls dual to the alpha shape; it is aimed at
computational biology applications modeling molecules. Execute any of
these programs without arguments to get a list of available command-line
arguments. The programs are now described in more detail.

_______________________________________________________________________________
SHORT TOUR

Let us assume that you have a hardcopy of this document on your desk, next to
your Silicon Graphics workstation. Now go to the demo directory of the alpha
shape distribution; for example:

% cd /usr/local/alpha/demo

This directory should at least consist of the following files:

% ls -F
alvis@
delcx@
mkalf@
molecule
torus
volbl@

The torus data consists of points generated in a regular fashion on the
surface of a torus; it will serve as demo data.

In case your demo directory already contains the files torus.dt, torus.alf,
and torus.info, you can jump ahead and start Alvis by typing:

% alvis torus

Otherwise, you should follow the instructions step by step.

THREE-DIMENSIONAL ALPHA SHAPES

This is a brief and informal tutorial for the alpha shapes software. For the
time being, this document together with the README files serve as substitutes
for a user's manual, which may be available sometime in the future.

This text gives a brief description of three-dimensional alpha shapes,
followed by a short tour through the programs, especially, the graphics user
interface of Alvis. The list of relevant references can be found in the file
REFERENCES.

_______________________________________________________________________________
THREE-DIMENSIONAL ALPHA SHAPES

The concept of alpha shapes formalizes the intuitive notion of ``shape'' for
spatial point set data, which occurs frequently in the computational sciences.
An alpha shape is a concrete geometric object that is uniquely defined. It
thus stands in sharp contrast to many common concepts in computer graphics,
such as isosurfaces, which are approximate by definition and the exact form
depends on the algorithm used to construct them.

Alpha shapes are generalizations of the convex hull. Given a finite point
set S and a real parameter alpha, the alpha shape of S is a polytope which
is neither necessarily convex nor necessarily connected. The set of all real
numbers alpha leads to a family of shapes capturing the intuitive notion of
``crude'' versus ``fine'' shape of a point set. For sufficiently large alpha,
the alpha shape is identical to the convex hull of S. As alpha decreases,
the shape shrinks and gradually develops cavities. These cavities may join
to form tunnels and voids. For sufficiently small alpha, the alpha shape
is empty.

In the original (unweighted) definition, a piece of the polytope disappears
when alpha becomes small enough so that a ball with radius alpha, or several
such balls, can occupy its space without enclosing any of the points of S.
Think of R^3 filled with styrofoam and the points of S made of solid rock.
Now imagine an eraser in the form of a ball with radius alpha. It is
omnipresent in the sense that it carves out styrofoam at all positions where
it does not contain any of the sprinkled rocks, that is, points of S. The
resulting object is called the alpha hull. For good reasons we straighten
the surface by substituting straight edges for circular arcs and triangles
for spherical caps. The thus obtained object is the alpha shape of S. It
is a polytope in a fairly general sense: it can be concave and even
disconnected, it can contain two-dimensional patches of triangles and
one-dimensional strings of edges, and its components can be as small as
single points. The parameter alpha controls the maximum ``curvature'' of
any cavity of the polytope.

A question that was repeatedly asked in the past is whether it is possible
to construct a shape that represents different levels of detail or different
``curvature'' in different parts of space. This is indeed possible by
assigning a weight to each point. Intuitively, a large weight favors and
a small weight discourages connections to neighboring points. We refer to
the resulting concept as the weighted alpha shape. If all weights are zero
it is the same as the original, unweighted alpha shape. This software is
general enough to handle weights, and this document makes no distinction
between weighted and unweighted alpha shapes, unless such a distinction is
important. Refer to Edelsbrunner and Mucke [3] for the formal definition
of unweighted alpha shapes and to [7, 11] for the extension including weights.

tuning to LSB or USB even tho the signal is AM

DXers are well aware of this technique, but I'd like to
point it out for the record: if you have severe selective fading,
causing distortion when trying to listen to a program, such as is the
case here with WOR on WWCR 5070, UT Sun 0230, you can eliminate this
problem by tuning to LSB or USB even tho the signal is AM. Selective
fading occurs due to the fact that the lower and upper sidebands of
the AM signal are at slightly different frequencies and thus fade
independently, intermittently cancelling each other out when both are
being heard in the AM mode. On a receiver such as the ATS-909, you
can eliminate one of the sidebands and thus the mutual interference.
With a strong signal it will be necessary to back off the RF gain
while you are at it; and with tuning steps such as on the 909 of 40
Hz, it could be that you can't get an exact zero-beat on the carrier.
It doesn't matter whether you pick LSB or USB (assuming the signal is
truly DSB AM) unless you also have some interference on the other side
to eliminate. Furthermore, listening to AM in an SSB mode can "even
out" a heavily fading signal and depending on the receiver, may well
invoke tighter selectivity and greater sensitivity (gh)

Thursday, March 27, 2008

IT pro newsletter 18 March 2008 ( 2 )

More news
http://newsletter.itpro.co.uk/c/1bb9TPtbsPAPZ4wB

****************************************************
There\'s no better time for your business to go mobile.
This financial year end is just the beginning of great savings - save £100 on the HP Compaq 6715b Business Notebook PC and £10 on the HP Travel Battery.
http://newsletter.itpro.co.uk/c/1bba6L1ZzUoGkYx0
****************************************************
REVIEWS

Overland Storage REO 4500c

Verdict: The REO 4500c is a superb choice for D2D data backup and recovery operations. It\'s offered at a very competitive price and the data compression card increases capacity immensely, but Overland could do much better in the performance stakes.

http://newsletter.itpro.co.uk/c/1bbajGANGZcwGSxp

EXCLUSIVE: Dell EqualLogic PS5000XV

Verdict: Dell’s newly acquired EqualLogic family of appliances offers a quality range of IP SAN features and the PS5000XV has expansion and high performance at the top of the agenda.

http://newsletter.itpro.co.uk/c/1bbawC9BO40n2MxO


****************************************************
Mobile Computer, the essential guide to technology on the move, is now online at www.mobilecomputermag.co.uk.
Updated daily with news, reviews and practical advice on making the most of your mobile life, Mobile Computer is indispensable for anyone looking to buy or use the latest mobile technology.
Read reviews of HTC’s new Shift UMPC (http://newsletter.itpro.co.uk/c/1bbaJxIpV8OdoGyd) and the O2 Xda Orbit 2 smartphone (http://newsletter.itpro.co.uk/c/1bbaWthe2dC3KAyC), and find out how to protect private data on your laptop with TrueCrypt.
****************************************************

BLOGS

Read all of the IT PRO blogs at http://newsletter.itpro.co.uk/c/1bbb9oQ29ipU6uz1

Featured Editorial Bloggers
-----------------
Davey Winder

The digital universe has been measured
http://newsletter.itpro.co.uk/c/1bbbmkoQgndKsozq

Simon Bisson & Mary Branscombe

If it ain\'t got an API...
http://newsletter.itpro.co.uk/c/1bbbzfXEns1AOizP

Featured Reader Bloggers
-----------------
Dave Adamson
Discrimination? Positively!

http://newsletter.itpro.co.uk/c/1bbbMbwsuwPracAe

Mark Tennent
Chips with everything

http://newsletter.itpro.co.uk/c/1bbcc2E4IGr7S0B2


Featured Industry Bloggers
-----------------
UK Internet Governance Forum and Best Practice Challenge
Nominet

http://newsletter.itpro.co.uk/c/1bbcoYcSPLeYdUBr

****************************************************
Matrox DualHead2Go connects to your notebook or desktop computer so you can enjoy the feeling of more screen space.
With two displays, keep email on one screen, while you surf the web on the other, or compare two documents side-by-side. See more, do more and be more productive with Matrox DualHead2Go.
http://newsletter.itpro.co.uk/c/1bbcBTLGWQ2OzOBQ
****************************************************

FEATURES

OOXML: Standards for accepting standards
After the Ballot Resolution Meeting (BRM) of the International Standards Organisation (ISO) failed to resolve the differences around Microsoft\'s proposed OOXML standard, what happens next?

http://newsletter.itpro.co.uk/c/1bbcOPkv3UQEVICf

OOXML and the future of open standards
Delegates from the national standards bodies who contribute to the International Standards Organisation (ISO) met last week in Geneva to decide the immediate future of Microsoft\'s OOXML data format, ahead of a vote on 29 March.

http://newsletter.itpro.co.uk/c/1bbd1KTjaZEvhCCE


Ubuntu: Bridging the technology gap
In our second interview with Mark Shuttleworth, the man behind the Ubuntu Linux distribution, we discuss issues of interoperability and the learning curve associated with switching to Linux.

http://newsletter.itpro.co.uk/c/1bbdeGs7i4slDwD3

*******************************************************
New Crystal Reports® 2008 delivers advanced functionality to help reduce report proliferation, build increasingly powerful reports, and save time with high-productivity designer features.
Users can find more information in the same report with features such as sorting, reformatting and parameter filtering. Flash and Flex applications can be easily embedded in reports to enable what-if scenario modeling and operational reporting. Smaller designer install files and runtime engine ensure fast deployment to more customer settings than before. Learn more.
http://newsletter.itpro.co.uk/c/1bbdrC0Vp9gbZqDs

IT pro newsletter 18 March 2008

The last few days have seen growing discussion about the future of broadband in the UK, and in particular, whether so-called \'unlimited\' broadband services are going to continue.

The majority of business broadband services are genuine all-you-can-eat deals for a single fixed fee, but with so many business and consumer users making full use of the pipes coming into their homes and places of work, uploading and downloading everything from YouTube videos to spreadsheets with the last quarter\'s P&L on it, ISPs are beginning to buckle under the strain.

Since the collapse of the dot com era, wholesale bandwidth has been both plentiful and cheap, thanks in part to the huge investment in global fibre that stayed dark when telcos needed to lease it out at full value. After the bubble burst, this fibre was sold and leased out at a huge discount, fuelling the boom in broadband.

That fibre has long since been used, and new fibre is being laid all over the globe, at a much higher price and one that many ISPs are struggling to afford amid razor-thin margins.

For users, this has already seen more aggressive use of traffic shaping, and longer term it could see the reduction of unlimited services in favour of caps with an actual named limit.

Chris Green
Editor
IT PRO

****************************************************
Find the people trying to find you.
Google AdWords connects you with potential customers at precisely the right moment – when they are searching on terms related to your business. Ads can be targeted to your local area, and here’s the best part - you only pay when people click on your ad.
Start advertising today with your free £30 voucher.
http://newsletter.itpro.co.uk/c/1bb6m2VrwvVtYIpK
****************************************************
NEWS

Latest News
http://newsletter.itpro.co.uk/c/1bb6yYufDAJkkCq9

Security
------
Net founder condemns web tracking
http://newsletter.itpro.co.uk/c/1bb6LU33KFxaGwqy

McNealy calls for more industry-wide security standards
http://newsletter.itpro.co.uk/c/1bb6YPBRRKl12qqX

Wireless, Mobile and Telecoms
------
Telecoms comes to aid of flood victims
http://newsletter.itpro.co.uk/c/1bb7bLaFYP8Rokrm

Google takes a pop at iPhone
http://newsletter.itpro.co.uk/c/1bb7BCiicYKy68sa

Networking
------
The \'digital universe\' shows explosive growth
http://newsletter.itpro.co.uk/c/1bb7OxR6k3yos2sz

Client
------
Nationwide switches to SAP
http://newsletter.itpro.co.uk/c/1bb81tpUr8meNWsY

Intel upbeat despite US and EU antitrust hearings
http://newsletter.itpro.co.uk/c/1bb8eoYIyda59Qtn

Internet
------
Leading businesses fail on email service
http://newsletter.itpro.co.uk/c/1bb8rkxwFhXVvKtM

Record labels embrace ecommerce
http://newsletter.itpro.co.uk/c/1bb8Eg6kMmLLREub

Server
------
HP target data centre pains
http://newsletter.itpro.co.uk/c/1bb8RbF8TrzCdyuA

Microsoft acquires another virtualisation vendor
http://newsletter.itpro.co.uk/c/1bb947dX0wnszsuZ

Information Management
------
Credit crunch dents IT recruitment rates
http://newsletter.itpro.co.uk/c/1bb9h2ML7BbiVmvo

Agent Provocateur uncovers benefits with new IT system
http://newsletter.itpro.co.uk/c/1bb9tYlzeFZ9hgvN

Wednesday, March 26, 2008

Passing Parameters

When calling a secondary batch file or subroutine, you will often want the routine to manipulate some data, the data (usually a variable) should be passed as a parameter.

If you CALL an executable or resource kit utility make sure it\'s available on the machine where the batch will be running, also check you have the latest versions of any resource kit utilities.

Jumping to a label

A label is defined by a single colon followed by a name

As this is effectively a subroutine I always prefix the name with s_
e.g.
:s_error_trap

When you jump to a subroutine with CALL, all statements after the label are executed until either the end of the script is reached, or a GOTO :eof command.

GOTO :eof will return back to just after the position where you used CALL.

Don\'t forget you can also pass command line arguments to the :label and refer to these just like the parameters passed to a separate batch file.

For example

@ECHO OFF
SETLOCAL
CALL :s_staff SMITH 100
GOTO s_last_bit

:s_staff
ECHO Name is %1
ECHO Rate is %2
GOTO :eof

:s_last_bit
ECHO The end of the script

Pay-Per-Click

Pay-Per-Click – Online advertising technique that only charges when
the ad is clicked

Sponsored Listing – Search engine result where placement is
typically determined in order of the highest pay-per-click

Organic Listing – Natural search engine listing determined when a
search engine finds your site through a crawler or search engine
submission

IP Cloaking – A technique of disguising an IP address

Spider or Bot – a computer program that systematically performs a
function on a web site, such as, repeatedly clicking on a sponsored
link for a specified search term or URL

powerful Windows program for snapping (capturing) images

MWSnap is a small yet powerful Windows program for snapping (capturing) images from selected parts of the screen. Current version is capable of capturing the whole desktop, a highlighted window, an active menu, a control, or a fixed or free rectangular part of the screen. MWSnap handles 5 of the most popular graphics formats and contains several graphical tools: a zoom, a ruler, a color picker and a window spy. It can be also used as a fast picture viewer or converter. 95 / 98 / ME / NT4 / 2000 / XP / 2003

TWEAK UI , POWER CALCULATOR

TWEAK UI

• Just so you know, UI stands for user interface, which is basically what you see when you use Windows
• Anyway, Tweak UI enables you to access part of Windows that Microsoft doesn’t make all that accessible
• For example, you can turn off those wildly annoying bubbles that pop up from the System Tray (bottom right of your screen on the taskbar)
• It also gives you a new tip about Windows XP and some of its hidden capabilities every time you open the program. It’s a fun way to learn about your operating system and customize your computer

POWER CALCULATOR

• For any of you who are math majors, or just enjoy calculating stuff, this power calculator could be very helpful
• You can make graphs, do conversions, and evaluate functions. Calc students, take notice.

IMAGE RESIZER

• With this powertoy, you get an extra option when you right-click on any picture on your computer; resize!
• You get preset options of sizes that you can chose from, our you can specify your own size
• You can also save the picture, or save it as a new picture that you also have the original size saved

WALLPAPER CHANGER

• This powertoy is definitely the most fun
• It is not listed with the rest of the powertoys, so the best way to find is to go to www.microsoft.com and just search for it. It should be the first result.
• This powertoy will help you manage those wallpapers we talked about earlier.
• You can set it to change your wallpaper every 30 minutes, or however often you’d like it to change, set so that on certain dates, it will display a specific wallpaper, and other kinds of options
• In order for the wallpapers to show up in this toy, they must be put into the folder I told you about earlier (the Wallpaper folder)
• This really helps keep your desktop exciting…and it confuses people, too, which is pretty funny

Monday, March 24, 2008

Nikon COOLPIX picture modes ( 2 )

Museum
Museums are full of interesting object to photograph; however the use of indoor flash photography is usually prohibited. This mode is useful in other settings in which you do not want to use the flash. The camera turns on automatically the Best Shot Selector, which captures several images and only records the correctly exposed and sharpest image from the several images taken. Photography may be prohibited altogether in some settings. Be sure to obtain permission first.

Settings used:
Flash- off, Shutter speeds- fast to avoid camera shake, Aperture -auto, BSS-on

_________________________________________

Multiple Exposures
Two successive exposures are combined to form a single image, to create special effects in camera. Take the first exposure normally. The shot will appear in the monitor superimposed on the view through the lens. Use this as a guide to compose a multiple exposure, and then press the shutter- release button to record the picture. Ideal for creating virtual twin photographs as below.

Settings used:
Flash- off (can be turn on) Shutter speeds- auto, Aperture-auto, Focus -normal

_________________________________________

Copy
Because most cameras base their exposures on metering from an 18% grey card, photographing a white object like a sheet of paper can produce disappointing results. Using the Copy scene mode provides clear pictures of text or drawings on a white board, business card, or printed matter using exposure compensation to provide the correct exposure. Colored text and drawings may not show up well in the final picture.

Settings used:
Flash- off, shutter speeds- auto, Aperture -auto, Exposure compensation-on, Focus -macro

_________________________________________

Back Light Auto
Use when your subject is lit from behind and their features are in shadow, or when your subject is in the shade but the background is brightly lit. This mode is also very handy for photographing people wearing hats as the flash will fire automatically to \"fill in\" (illuminate) shadows so you are able to see the subjects face more clearly.

Settings used:
Flash- on, shutter speeds- auto, Aperture -fast aperture, Focus-normal,

_________________________________________

Sports
This mode is useful for photographing fast moving objects with cameras, which do not feature manual exposure modes, or inexperienced users. The camera will use a fast shutter speed to freeze the action to produce dynamic sport shots.

Settings used:
Flash -off, Shutter speed- fast, Aperture-auto.

_________________________________________

Dusk/Dawn
This mode will provide the correct exposure to capture the weak natural light just before sunrise or after sunset. The camera will use long exposures to capture these scenes. Noise reduction will be turned on to reduce any digital noise, which may affect the image due to the long exposures.

Settings used:
Flash-off, Shutter speed- slow, Aperture-auto, Focus- set to infinity

Nikon COOLPIX picture modes ( 1 )

Many Nikon COOLPIX cameras have selectable picture modes, which Nikon has called \"scene modes\". All Coolpix cameras also have an \"Auto\" mode, which will select the camera settings automatically for the best picture under most circumstances; however, pictures may look better if the photographer manually selects the appropriate camera settings best suited to the conditions.

Nikon cameras with \"Scene Modes\" make this easy using a pre-programmed setting which are selectable via the camera\'s dial or menu (depending on the camera used). If pictures are going to be taken for any one of the scenarios below then choosing that \"Scene Mode\" will provide excellent results.

_________________________________________

Portrait
The main subject stands out clearly while background details are softened, this can give the image a sense of depth. By using a wide aperture (i.e. f/5.6) the camera will try to blur the background to make it less distracting and concentrating the viewer\'s attention to the main subject. The degree to which background is out of focus depends on the amount of light available.

Settings used:
Flash- auto any flash setting can be used, Shutter speeds- auto, Aperture -wide aperture, Focus-normal, some cameras allow manual focus point selection.

_________________________________________

Party / Indoor
This mode is designed for taking pictures at parties or generally in doors. While normal flash photography may result in the subject being correctly exposed the background will generally be under exposed (dark). Using the party mode the camera utilizes longer exposures (i.e. 1/30 second) to allow more ambient light from the room to be captured, improving the exposure of the background and giving an impression of the environment where the picture was taken. You can also use this setting to capture the effects of candlelight and other indoor background lighting. Note that the camera uses slower shutter speeds so some camera shake may occur. Steady the camera carefully to avoid movement.

Settings used:
Flash- on with red eye reduction, Shutter speeds - slower speed than normal are used, Aperture - auto, Focus - normal

_________________________________________

Beach/Snow
Vividly captures the brightness of such subjects as snowfields, beaches, or sunlight expanses of water. Photographing in these situations can be tricky as sand and snow can fool the camera into producing the wrong exposure. You may have seen holiday snaps of people skiing on what would appear to be pink/blue or grey snow, this is caused by the cameras exposure meter being tricked and giving the wrong exposure. Using the beach/snow scene mode the camera is able to compensate for these situations and produce the correct exposure.

Settings used:
Flash - auto, but any flash mode can be used, Shutter speeds- auto, Aperture -auto, Exposure compensation used (i.e. +1 exposure). Focus-normal

If your shooting a scene with predominant white (snow), you would dial in +2 EV since the meter will try to expose for 128 on the histogram. This would move the spike on the histogram from middle to roughly just before 255 - right of the histogram making the white look natural, but not blowing it. Of course, the amount of compensation required also depends on metering mode and the amount of bright white in your scene.

_________________________________________

Landscape
Use for landscape shots to enhance outlines, colors, and contrast in such subjects as landscapes and forests. This mode is also useful for photographing views from windows of planes, trains, cars or tall buildings, where glass and reflections could fool the AF. The camera will lock the focus to infinity and select an aperture to produce the maximum depth of field (i.e. f/16).

Settings used:
Flash- off, shutter speeds- Auto, Aperture -smallest aperture, Focus- set to infinity

_________________________________________

Sunset
Sunsets are difficult subjects to photograph. Trying to preserves the deep hues seen in sunsets and sunrises requires careful exposure. Using the Sunset scene mode, Nikon has incorporated the optimum degree of exposure compensation to capture the color you saw when you took the image.

Settings used:
Flash- off, Shutter speeds- use slower speed than normal, Aperture -auto, exposure compensation-on Focus -normal

_________________________________________

Night Portrait
Use to provide a natural balance between the main subject and the background when shooting portraits against a backdrop of night scenery. The camera will combine flash and long exposures to provide the correct exposure, using flash for the portrait subject and long exposure for the background. Note that camera shake may occur, so it is recommended to use a tripod or brace your self or rest the camera on solid object.

Settings used:
Flash- on (slow sync mode if available, Shutter speeds- use slower speed than normal, Aperture -auto, Focus normal.

_________________________________________

Night Landscape
This mode is similar to the landscape mode but uses a slow shutter speed is used to produce stunning night landscapes. Noise reduction turns on automatically to reduce digital noise, which may occur during long exposures giving clear images. Note that camera shake may occur, so it is recommended to use a tripod brace your self or rest the camera on solid object.

Settings used:
Flash- off, Shutter speeds- use slower speed than normal, Aperture -auto, Focus- set to infinity

_________________________________________

Close Up
Use to capture the colors in close-up shots of flowers, insects, and other small objects, with the background artistically blurred. Note Minimum focus distance varies between cameras and zoom position.

Settings used:
Flash- on, Shutter speeds- fast, Aperture -wide apertures, Focus-macro, some cameras allow manual focus point selection.

_________________________________________

Fireworks Show
Slow shutter speeds are used to capture the expanding burst of light from a firework. Using a degree of exposure compensation is used to prevent the camera incorrectly exposing the scene. Note that camera shake may occur, so it is recommended to use a tripod brace your self or rest the camera on solid object.

Settings used:
Flash- off, Shutter speeds- use slower speed than normal, Aperture -auto, Focus- set to infinity

Disk CleanUp Delete files that you no longer need

The Disk Cleanup program can free up space.

How to do Disk CleanUp?
1. Click on "Start" -> "All Programs" -> "Accessories" -> "System Tools" -> "Disk Cleanup".
2. Select the items you want to cleanup. Then click ok.

Tip:
• Backup important data, preferably to an external source like external harddisk, CDs, thumb drives, etc. This ensures you do not lose data should your computer unfortunately crash one day.
• Backup your data regularly. For important data that change frequently, you will need to back it up more regularly.
• Disk cleanup should be done on a monthly basis.

Manage Shared Information and Content

Document Workspace – If you want to make a document available for collaboration purposes, create a document workspace to store the document in a central online location. You can create a document workspace by choosing the shared attachment option when sending an e-mail attachment with Outlook 2007. Document workspaces are made possible through integration with Windows SharePoint Services, a feature of the Windows Server® 2003 operating system. You can use Office SharePoint Server 2007 to further extend these capabilities; for more information, visit http://office.microsoft.com/en-us/sharepointserver.
Connect to Outlook Tasks – Task lists created on an Office SharePoint Server 2007 site can be connected to Outlook 2007 so that they can be viewed and managed alongside your other tasks. Like OneNote tasks, SharePoint tasks are visible in your To-Do Bar. In the SharePoint task list, click the Actions button, then click Connect to Outlook.
Offline Document Libraries – You can keep synchronized copies of SharePoint document libraries and lists within your Outlook folders, making it easy to organize and browse documents in these folders, just as you would any e-mail. You can work on these documents within their respective applications in Office Outlook 2007 at any time, even when you are offline. When you are back online, you can easily synchronize your changes with the server version. From a shared document library, click Actions on the Shared Documents toolbar, then click Connect to Outlook.
Start a Workflow – To start a workflow, click the drop-down list for your document within your document workspace or document library, and then click Workflows. Select the desired workflow, and then click Start.
Participate in a Workflow – Integration with familiar client applications such as Office Outlook 2007 simplifies the workflow experience for users. For example, you can be notified of the workflow in progress via e-mail. At the top of your email Click Edit This Task to open the Approval dialog box. From here, you can open the workflow document and then approve or reject it, adding your comments if necessary.
Track a Workflow – You can track the workflow progress and view the completion information in the shared document library or document workspace. Click Workflows from the document drop-down menu within your document workspace or document library.

Sunday, March 23, 2008

ip tools v.196

1.96
added : vbs script editor
modified : use tscriptcontrol to launch vbs scripts
todo : check wmi(msndis) vs GetIfEntry
added : wmi browser
added : possibility to run vbs scripts on object(s) in ad browser
added : bookmark with dynamic columns/cells
modified : ping : check icmpesendecho<>0 (instead of =1)
added : citrix console
added : CoInitializeSecurity before run to be able to use citrix com remotely
added : clientip,appname,logontime,idletime in terminal services

Friday, March 21, 2008

SURFSTREAM 1.0 : another proxy server alternative

RELEASE NOTES FOR SURFSTREAM 1.0

1. Installation Notes

You need to have Microsoft Internet Explorer v5.0 or higher installed
on your computer for SurfSream to operate correctly. Internet Explorer
is freely available from http://www.microsoft.com.

2. System Requirements

· Intel Pentium 500Mhz or greater/ AMD Athlon 500Mz or greater processor
· Windows 98SE, Windows Me, Windows 2000 or Windows XP
· Minimum of 64MB RAM (128MB or higher required for Windows XP)
· Minimum of 50MB hard disk space
· Graphics card set to 16 bit or higher resolution
· Microsoft Internet Explorer version 5.0 or greater
· Internet connection (dial-up modem, ISDN, cable, ADSL, microwave, optical, etc.)

NB: Windows 2000 and Windows XP users must have Administrator privileges to
install and use SurfStream

3. More Information

Press the F1 key on any window in SurfStream to get detailed help. Also
read the help file for tips about using SurfStream with your web browser.

4. Technical Support

Please let us know if your experience any problems when using SurfStream.
Go to our web site at http://www.conceiva.com and click on the Support
button.

5. Viewing this file.

This ReadMe.txt file is located in the application folder of SurfStream.

Thank you for using SurfStream. From the team at Conceiva.

Copyright (c) 2004 Conceiva Pty. Ltd. All rights reserved.
All other trademarks are the property of their respective holders.

Cacheout Extension for Slow Web Pages

It happens to everybody. You want to see the Web page that is making all the
news, and once you finally get the link to go there it times out on you. You can't
see the content and you will have no idea what folks will be talking about around
the water cooler tomorrow. What is a geek to do?

The Firefox extension this time around is called Cacheout. What does it do?

Too frequently on sites such as Slashdot.org and digg.com, articles that are posted
are flooded with thousands of people trying to simultaneously access the same Web
site. Unless the article is being hosted on a provider that has the infrastructure to
support massive hits, the server essentially stops responding to any more web
requests.

The service they use to bring the Web sites back up is the Coral Content
Distribution Network. Coral is very reliable for distributing the server loads around
so that you can view a Web site that is in very high demand. Right now they are
only using Coral for the back end, but if you know of any other content distribution
networks out there, let them know.

Although the content for the Web page hasn't gone too in depth with the extension
just yet, I have high hopes for this extension in the future. Go check it out, and
never be left out of the conversation at work again.

Thursday, March 20, 2008

Mobile Computer – Your New Laptop Magazine

Looking to make decisions on buying and using the latest mobile technology?

Look no further than Mobile Computer, the essential magazine for laptops with Intel Centrino mobile technology. Providing insightful reviews, exciting product news, expert opinion and honest, unbiased advice.

The only magazine to be associated with Intel is on sale now at all good newsagents for just £2.20.
http://www.mobilecomputermag.co.uk/

Seagate FreeAgent Pro and FreeAgent Go

Verdict: FreeAgent Go is faster and more capable then a flash drive, though rather less portable. FreeAgent Pro gives you the speed of SATA on a budget, in style. For both, price and performance are good but it's the software that shines.
http://www.itpro.co.uk/reviews/112158/seagate-freeagent-pro-and-freeagent-go.html

Apple Xserve

Verdict: The Xserve is far from cheap, in fact it rates among the most expensive 1U rack servers on the market when compared with its Windows-based x86 counterparts. However, few servers on the market at any price can offer the same combination of build quality, performance, backward hardware compatibility and ease of deployment.
http://www.itpro.co.uk/reviews/115924/apple-xserve.html

Monday, March 17, 2008

Internet Protocol (IP/IPv4, IPng/IPv6) and IP-Related Protocols (IP NAT, IPSec, Mobile IP)

The idea of singling out any one protocol as being more important than the others in a network is kind of pointless, if you think about it. The protocols and technologies work as a team to accomplish the goal of communication across the network. Like any team, no single member can get the job done alone, no matter how good they are. Still, if we were to try to pick a “most valuable player” in the world of networking, a good case could be made that we have it here in this section: the TCP/IP Internet Protocol (IP).

Even though it gets “second billing” in the name of the TCP/IP protocol suite, IP is in fact the “workhorse” of TCP/IP. It implements key network-layer functions including addressing, datagram handling and routing, and is the foundation upon which other TCP/IP protocols are built. Even the ones lower in the TCP/IP architecture such as ARP and PPP are easier to understand when you know how IP works. In addition to the main functions implemented by the IP protocol itself, there are also several protocols that have been developed over the years that I call “IP-Related” because they are based on IP but add new functionality or capabilities for special purposes.

In this section I provide considerable coverage of the TCP/IP Internet Protocol and to several protocols that are closely related to IP. I begin with a section that takes a general look at IP concepts and provides an overview of how IP works. I then have a large section that looks at IP version 4, the current version of the protocol that is in use on TCP/IP networks everywhere. Following this I look at the “next generation” of IP, IP version 6. I then provide sections covering three IP-related protocols: the IP Network Address Translation protocol (IP NAT), the IP Security protocol set (IPSec), and the adaptation of IP for mobile devices (Mobile IP).

tips to help you secure and protect your portable device

Steps to take before you leave the office
  • Password-protect your portable device - Make sure that you have to enter a strong password to log in to your device. If possible use a “power-on” password. This prevents someone from booting up your laptop with a different Operating System on a CD, floppy disk, or flash drive.
  • Have your laptop configured to boot from the hard drive first - By forcing your laptop to boot from the hard drive first, it prevents someone from rebooting your laptop from another drive e.g. floppy drive, CD, flash drive.
  • Install and maintain firewall and anti-virus software – Protect portable devices from unauthorized access and malicious code the same way you protect your computer when at work. Install antivirus and firewall software and keep them updated.
  • Be sure all critical information is backed up – Portable devices should not be the only place important information is stored.
  • Remove information that is not needed – Don’t carry around sensitive and personal information on your laptop or other portable device that is not necessary to you or your work.
  • Store your portable devices securely - When not in use, store portable devices out of sight and, whenever possible, in a locked drawer or file cabinet.
  • Record identifying information and mark your equipment - Record the make, model and serial number of the equipment in a separate location so that if your portable device is stolen the information will be available to the authorities. Label your portable device with an asset tag or other identifying label.