Sunday, May 31, 2009

Internet services and port numbers

The TCP/IP protocol suite is the lingua franca of the Internet because the Internet services “speak” TCP/IP. These services make the Internet tick by making possible the transfer of mail, news, and Web pages. Each Internet service has its own protocol that relies on TCP/IP for the actual transfer of the information. Each service also has one or more assigned port numbers
that it uses to do whatever it’s designed to do. Here are some well-known Internet services and their associated protocols:
  1. DHCP (Dynamic Host Configuration Protocol) is for dynamically configuring TCP/IP network parameters on a computer. DHCP is primarily used to assign dynamic IP addresses and other networking information such as name server, default gateway, domain names that are needed to configure TCP/IP networks. The DHCP server listens on port 67.
  2. FTP (File Transfer Protocol) is used to transfer files between computers on the Internet. FTP uses two ports — data is transferred on port 20; control information is exchanged on port 21.
  3. HTTP (HyperText Transfer Protocol) is for sending documents from one system to another. HTTP is the underlying protocol of the Web. By default, the Web server and client communicate on port 80.
  4. SMTP (Simple Mail Transfer Protocol) is for exchanging e-mail messages between systems. SMTP uses port 25 for information exchange.
  5. NNTP (Network News Transfer Protocol) is for distribution of news articles in a store-and-forward fashion across the Internet. NNTP uses port 119.
  6. SSH (Secure Shell) is a protocol for secure remote login and other secure network services over an insecure network. SSH uses port 22.
  7. TELNET enables a user on one system to log in to another system on the Internet (the user must provide a valid user ID and password to log in to the remote system).
  8. TELNET uses port 23 by default. However, the TELNET client can connect to any specified port.
  9. NFS (Network File System) is for sharing files among computers. NFS uses Sun’s Remote Procedure Call (RPC) facility, which exchanges information through port 111.
  10. NTP (Network Time Protocol) is used by client computers to synchronize the system time with that on a server (one with a more accurate clock). NTP uses port 123.
  11. SNMP (Simple Network Management Protocol) is for managing all types of network devices on the Internet. Like FTP, SNMP uses two ports: 161 and 162.
  12. TFTP (Trivial File Transfer Protocol) is for transferring files from one system to another (typically used by X terminals and diskless workstations to download boot files from another host on the network). TFTP data transfer takes place on port 69.

DVD Capacity Not actualy 4.7 GB..?

A word of caution about DVD capacity — when marketing people talk about
the 4.7GB capacity of a DVD, they mean 4,700,000,000 bytes. However, for
technology purists, that number translates to about 4,482MB or only 4.377GB
because 1,024 bytes are in each KB and 1,024 x 1,024 = 1,048,576 bytes in a
MB, and so on. The bottom line is that you can only fit about 4,482MB of data
onto a DVD.

Saturday, May 30, 2009

Post weekly (weekly)


Posted from Diigo. The rest of my favorite links are here.

How to Customize the Quick Access Toolbar in MindManager 8

I was inspired to put this video tutorial together after reading Michael Deutch's post last week on How to Access Your Most Frequently Used Features in MindManager 8. I know that I use the Quick Access Toolbar all the time and like to have some of my favorite features easily accessible. In the video tutorial I will take you step by step through the process so that you can see how it is done. It is a very handy feature and one I know you will use. Please let me know which features you have added to your Quick Access Toolbar in MindManager 8. Click here to view the video tutorial. Enjoy!

LTMS 600 Course at Harrisburg Univ

I'm very lucky (have I said that before?) to have the opportunity to teach the LTMS 600 course at Harrisburg University again this summer. Here is the description:

"LTMS 600: 3 semester-hour credits. This intensive course is designed for classroom educators to explore, and practice with, Web 2.0 learning technologies and how the integration of these technologies into teaching and learning impact their teaching and classroom dynamics. Tools to be explored and used, for example, include RSS feeds and aggregators, blogs, wikis, social bookmarking, mashups, podcasts and more. Students will begin to design a classroom activity incorporating one or more Web 2.0 tools for implementation in their classroom. Within a peer learning model, students will design, implement and evaluate a classroom activity that incorporates one or more Web 2.0 tools. The results of this applied project and experiment will be reported out and presented. Lessons created will become a part of a technology-based collection of classroom activities which participants can continue to access after the course."

This year we're going to change the schedule a bit. Last year we met for 5 days in a row, and then on two evenings (synchronously), and then a final Saturday. This year we're going to meet for three days in June, three days in July, and then a day later in the fall. This will allow us time to digest and practice and explore - something we didn't get a chance to do much of last time. I think this will work out much better.

If you are interested in taking this 3 credit Graduate level course, complete the application here: http://www.harrisburgu.net/educators-technology-clinics/register/index.php

I hope to see lots of you there this summer. We've got two sections blocked off, just in case.

Friday, May 29, 2009

Catch the Google Wave

I had some time today and watched the introduction of Google Wave at the Google IO Developer Conference that was on YouTube. It was an eye opening presentation of what is around the corner. If Web 2.0 has taught us anything- it is all about collaboration and with the introduction of Google Wave we are sure to be thrust into a new paradigm of collaborative computing. No more passing emails back and forth to engage in communication- but more of a real time dialog. The demonstration really makes you think how this is going to shift how we communicate and work with each other. Since Google will be providing this as Open Source we should see some real innovations in extension and gadgets that can be built on top of the application. One can only imagine what will be possible with Google Wave when your team has access to this type of innovative collaborative work space. Check out the presentation below and enjoy. I invite you to comment after you have previewed the video.

Thoughts on the Wave

This, of course, is THE HOTTEST topic of the.. year? Decade? Longer? And why? Because it changes everything about how we communicate. It's chat, email, backchannel, slideshows, collaboration and more, ALL IN ONE APPLICATION. Holy cow!! And, did you see the spell checker? Spellee ...Spellie.. er, Spelly? And linkee. It's just incredible.

What FUN this will be. Now, I know that most of you don't have an hour and a half to sit and watch a youtube video, but you might be able to let this run while you're working on something else. Then flip back to it to see it in action.

Oh, and this article (Thanks, Joanne R) is a great description of the Wave. Check it out, too.

The fact that it's Open Source (Are you paying attention, Apple?) is WONDERFUL! The fact that it brings together so many amazing tools into one INCREDIBLE application is... beyond words. It changes everything about how we communicate. Just now getting used to email? Don't get too comfortable, the Wave will pass this by instantly - where available. If you're the kind who MUST have Inbox (0) then this will freak you out, for sure. Start now to get over it. :-)

So how long before it will be allowed in our schools, do you think? ;-)

Another thing that I keep thinking of is the power demands of this technology. Bandwidth, too. This is surely going to up the ante in a HUGE way. Students, start NOW to be thinking about alternative energy sources.



Thursday, May 28, 2009

Sales IT Strategies for Turning Prospects into Long-Term Clients

Could you use some proven sales IT strategies that help you more easily and more rapidly turn your prospects into long-term clients on ongoing support agreements?

If you want to get more clients for your IT business, you need to be able to effectively and persuasively overcome prospect sales objections. In order to do this, you need to turn the tables on your prospective clients and ask questions that make them decide on their own that they need your help. Because after all, don't most ideas sound better when they are "your" ideas?!?

Now in order for your sales IT strategies to be successful, you need to convince your prospects that what you are trying to sell is both crucial and urgent. The following 3 tips can help prospective clients overcome their own objections and get on the road to being great new clients for the long-haul.

1. Suggest Potential Problems to Your Prospects. In order to get your sales IT strategy to work with potential clients, you need to set up in their minds that there are some potential problems with their current systems that they simply aren't aware of. You need to ask questions that will get them thinking. “When was most of our system infrastructure installed?” “How long ago was that and who did the work?” “Is that person or company still maintaining the systems?” After you ask these questions, your prospects will start to think, “Gee, it’s been a while since we had these installed, and I don’t even really remember who did it. No one’s been maintaining it for at least the past six months, if not more.” They will start to realize the need for more consistent, responsive, proactive professional support. And of course, if you have some client case studies and testimonial letters to support this all, don't be shy about flaunting your credibility enhancers.

2. Ask Questions about Maintenance. The next part of getting your clients to do the work with your sales IT strategy is asking questions about how often their systems are maintained. These questions will help you get a better idea of the current condition of their computers and technology assets, while also showing prospects that they are more disorganized than they believed and need your expertise. You have to rattle their cage a little, get them to second-guess their previous judgment and become a little bit borderline-obsesses about rectifying this severe oversight on their part. “What kind of maintenance is done and how often is it done?” “Do you have a log showing the maintenance activities and routine support requests?” “Do you have any support history, or do you have copies of some support invoices or something similar?” "What kind of encryption is being used?" "What's your automated data backup and restore plan?" "When was the last time your firewall was tested and updated?" "If your office was devastated tomorrow by a tornado, flash flood, or earthquake, could your business survive? Really? How?"

3. Get An Idea of How Many IT Professionals Your Prospects Have Used. To really get your prospects to buy what you’re selling and ease them along the sales IT process, you need to ask about the number of people that have been involved with their systems over the years. If they are like most typical business owners, they have had three or five different companies in the past several years. This means they probably have a very messy IT environment and a much bigger blob of blurred accountability and botched, highly-vulnerable infrastructure than they probably even realize.

In this short article, we talked about 3 sales IT strategies to help you turn the selling process around on your clients, so they can overcome their own sales objections. Learn more proven secrets about creating strong, profitable sales IT strategies that get you steady, high-paying clients now at the attached link.

Copyright (C) SalesITSecrets.com All Rights Reserved

Wednesday, May 27, 2009

The 17th Carnival of Computer Help and Advice

Welcome to the seventeenth monthly Carnival of Computer Help and Advice. Another collection of blog articles to help you avoid problems and get the most out of your PC.

He start this month with some relief for Vista users. Krissb explains how to get rid of the annoying dialog box that opens everytime you want to perform some sort of administrative task. See the Get rid of the UAC! article at SEEPEYU.

Jules of PCauthorities.com says, "If you are using Microsoft Outlook for your email, then there is a simple add-on from Microsoft that can help you make regular backups." To find out more go to Backup Outlook PST Files.

We often include articles about Firefox hacks in this carnival. This month's supply comes from kemei, who presents 8 ways to hack Firefox to load faster posted at infomaniac.

On ths subject of Internet apps, Ivan at PC Hacks has written an excellent article that answers the question, What Is A Proxy Server And How To Use It?

"For those of you, who have to work for long hours on the computer, your eyes are put to undue strain. Here are a few tips on how to relax them." So says Aparna of Beauty and Personal Grooming. Do yourself a favour and see that article: Eye care for computer users.

For those of you who have made the switch to linux or are considering making the move, Yonit Gruber-hazani lists 13 books and magazines for linux sysadmins at yonitg.com.

We round up this month with a post from regular carnival contributor, Andrew Edgington, who presents Adobe Photoshop Elements Tools - How to use the Smart Brush on his Master Adobe Elements blog.

If you have a blog with posts about computer issues and would like to host the next carnival then please leave a comment on this post or use the contact form over at our Blog Carnival page, where you can also submit your blog posts for inclusion in a future carnival.

If you would like to host a future carnival but don't wish to have the responsibility for selecting articles or writing the carnival post, don't worry I can do that for you.

More next month.

Tuesday, May 26, 2009

Use Proxy in IDM

Currently, Computer and Technology will discuss about internet download manager (IDM).
Download has become a very common activity conducted. Download the easy it is copying files that have to drive on the server computer that we use. Downloaded files can be images, music, movies, software and so on.

Download manager that is very commonly used Internet Download Manager. Even my friend make a portable version that can be moved to use the computer. If you are looking for Portable IDM, it can be downloaded in.

Sometimes when we download, the speed of the internet we use are slow. One way to speed download time are slow connection is to use a proxy. I will discuss how to use / install a proxy on the Internet Download Manager (IDM) and Portable IDM.

To change the proxy, can be done in the following ways:
Step 1:
Find proxy. Many free proxy providers. I just had to post the proxy indonesia free. In the sense that you can use it freely. You can select it in the Free Indonesia Proxy.

Step 2:
Go to the Downloads-> Options.




Step 3:
Go to the Proxy tab. Link and enter the IP address, Port. If the proxy requires authentication credentials, then enter your username and password. To list the proxy that I mentioned above, you do not need to enter your username and password. The protocol for what they want to use the proxy. Better fill you all.




Step 4:
Click OK. Done.

    Computer Repair Business Opportunity that Gets You More Great Clients

    Many that look for a computer repair business opportunity spend most of their time and energy thinking about the technology side and give relatively little thought to how they'll get paying customers and clients.

    While computer repair certainly is an IT-intensive business, ultimately it's quality and quantity of your marketing campaigns and relationship-building that will be a much better predictor of your success in pursuing a computer repair business opportunity.

    When it comes to building these long-term relationships, getting involved in local business-related organizations can be one of the most cost-effective ways to consistently generate very highly-qualified prospective clients.

    By getting involved in organizations such as your local Chamber of Commerce or Rotary Club or even an IT Professionals User Group, you can meet people with common interests in a very personalized setting. These contacts can be great future partners or clients of your company. As you meet people through organizations, you will start to develop personal relationships that will be the very foundation of your business. When you join organizations and attend regularly, you can show people that you are dependable, trustworthy and worthy of their consideration.

    The following three tips can help you make the most out of any computer repair business opportunity when you network through organizations.

    1. Think about Trust. People look for computer repair professionals in the same way they look for good dentists, internists, attorneys or accountants. Yes, some people will go to the phone book for these highly-professional services or look in coupon packs or billboards. But most will find their trusted business advisors through referrals and other very personalized methods. The reason for this is because when people are looking for services involved with their personal health, personal well being or their businesses, personal word-of-mouth referrals carry a lot of weight. When it comes to computer repair services, business owners want to make sure they find someone that can be trusted 100% with their most important technology and business assets.

    2. Become Well Known in Your Community. One of the best ways for you to seize every possible computer repair business opportunity is to reach important decision makers earlier on in the sales cycle, before they're even looking for a business like yours. To train key movers and shakers to know that your company is the only one to call, you need to raise your personal and business profile in your local community within your target market. There are a couple of ways you can do that, but you have to have a mature enough outlook to understand delayed gratification. Networking through organizations is one of these strategies and can make or break the success of any kind of computer repair firm. And networking is all about relationships. Even though you are in the technology business, you are really in the people business. So focus on your interpersonal skills and building trust.

    3. Get More Personal Recommendations. You need to think about personal recommendations as you network through organizations and tap into every possible computer repair business opportunity. In order to get personal recommendations, you have to know more people who are either in a position to hire you and/or recommend you to others who can hire you. Plain and simple. Join organizations and attend events on a regular basis. It's not rocket science and it's not something that will break your budget. $100-$250/mo can go a very long way. You don’t have to go to every single breakfast, networking luncheon or business after-hours function under the sun. But you do have to go to key functions and really meet and get to know a lot of people. If you really participate in organizations, over time you will get very good at identifying the kinds of people that are best at leading you to great client opportunities.

    In this article we talked about 3 ways to network through organizations, to grow your computer repair business. Learn more proven tips on pursuing the right kind of computer repair business opportunity and attracting great, steady, high-paying clients now at the attached link.

    Copyright (C) ComputerRepairBusinessOpp.com All Rights Reserved

    Saturday, May 23, 2009

    Post weekly (weekly)


    Posted from Diigo. The rest of my favorite links are here.

    Using the Task Management Features in MindManager 8

    For small to medium businesses who are using MindManager 8 for project planning and keeping tabs on projects, one feature which you will want to explore is the Task Management features built into MindManager 8. As a consultant and small business owner I often am doing small projects that may not require a dedicated project management tool- but I still will need a way to keep on top of my projects and tasks. For this reason, one of new features which I am using more and more in MindManager 8 is the ability to use the Roll Up feature when using the Task Information pane. If you are like me and using MindManager 8 to help you plan and keep on task, then you will find the the new Roll Up feature to be indispensable. All of the task information features can be found in the Task Info pane within MindManager 8.

    To get started use MindManager 8 to brainstorm the tasks for the project. Once you have organized the tasks and sequenced them in the order that you will perform the task, select the Central topic and Open the Task Info Pane. In my example, I selected the central topic, Revise Assistive Technology DVD and from the Task Info Pane selected "Roll up task info to here." You also want to make sure that you have checked off Show past-due as: and Show as-risk as:- which I will explain later.

    Next go through your tasks and set the number of days each task will take in your mind map. For the first task, you can use the Calendar to set the Start date for the project. It is best to leave the end date blank and let MindManager 8 calculate the end dates based on your task dependencies. By default MindManager 8 will set each task to 1 day duration which is easily changed in the Task Info Pane. For the final step you will use the Relationship feature to link your tasks in the order that you would like to complete them. By default MindManager 8 will set the dependency to Finishto Start and you will see a little FS icon on the relationship line to denote this. If you would like to fine tune the dependency relationship this too can be done in the Task Info Pane. Once you have set the dependencies for your tasks you will see that under your Central topic the Start date and calculated finish date with the cumulative number of work days to complete the task under the topic.

    Once you start using your mind map to track your project's progress you will begin to see the real value of the Roll Up feature in MindManager 8. As you input the task completion percentages into your mind map, MindManager 8 will roll up the information to the central topic allowing you to get a quick overview of your overall progress and visually see which tasks are past due or at risk of not completing on time. MindManager 8 will display icons on those task which may be past due or at risk of not be completed which can give you a quick overview of where you need to concentrate your efforts. You can watch the video tutorial here to see how to use the Roll Up feature. I welcome your comment and how you are using this powerful feature in MindManager 8.

    Friday, May 22, 2009

    Starting Your Own Computer Business the Right Way

    Are you starting your own computer business? Do you want to make sure you launch it the right way, the first time around?

    Then make sure you're aware of your new company's sales cycle.

    If you are like a lot of other new computer business owners, maybe you don’t quite know how to sell your services or get long-term clients and predictable revenue. One of the first steps to building a successful computer business is knowing the sequence of the sales cycle and following it consistently every time you come into contact with a potential client.

    There are six steps in the sales cycle, and often new or naive computer professionals think these are just the ideal of what they ought to be doing in a perfect world.

    The reality is, the sales cycle is not just a hypothetical best case scenario. Following its steps is the only way for most to consistently sell the high-margin services you need to get steady, high-paying clients. Methods that are limited to selling products, canned solutions, and even managed services that are pretty much just commodities put lots of downward pressure on your profit margins and won’t help you build your business.

    To keep you away from profit-destroying methods as you are starting your own computer business, follow the 6 steps of the sales cycle below.

    1. Targeted Marketing Activities that Generate High-Quality Leads. As you are beginning the process of finding the best clients for your computer business, you need to plan and implement a whole bunch of targeted marketing activities that will find those most likely to benefit from your unique services and the solutions you provide.

    2. Careful Lead Qualification. As you are starting your own computer business and building your potential client roster, you need to qualify leads to make sure they fit your criteria for what makes a good client. For example, are they geographically desirable? big enough to need steady weekly or monthly sophisticated technology services? small enough to not have a big in-house IT department? and invested in, or planning to invest in, a platform supported by your particular computer business?

    3. Sales Calls as Mutual Interviews. Once you’ve qualified your prospects, you need to go on initial sales calls. You need to have a written-down, plotted-out agenda for these meetings, but also treat them as mutual interviews. They are checking you out as a potential service provider. But when you're prepared, calm, cool, and collected, you are also able to more proactively figure out whether or not they have the potential to become good clients for your company.

    4. Proving Ground Projects Build Credibility and Trust with New Customers. This step in the sales sequence is often overlooked, especially when you are just starting your own computer business. If you did everything right up to this point, your next step will be selling a small billable project – an emergency service visit or a technology assessment. This project will act as a proving ground of sorts, during which your company will prove its value to new customers. And conversely, your new customers are proving themselves to your business as being able to work well with you and your staff.

    5. Remediation Projects, Major Upgrades, Installations, and Rollouts. The fifth step in the sequence of the sales cycle only happens if the proving ground project works well. This step involves talking about fixing a larger problem... often a major upgrade of systems, a big installation, or some sort of rollout project. Naive computer business owners might try to sell this type of project right out of the gate, before the process of lead qualification or a smaller project have been completed. However getting impatient can be a big mistake if you want to build long-term relationships.

    6. Annual Service Agreements for On-Going Maintenance. As you present the major project or installation, talk about how on-going maintenance will be handled and present an annual service agreement program of some sort. You really need to have this service agreement program in place as you are starting your own computer business, so you can create the framework for creating long-term relationships. This final step of the sales cycle will take some time to reach as you let relationships evolve naturally. If you start talking about this major commitment in the first sales call with your potential client, before you have even built trust or proven yourself, you will in nearly all cases sabotage that relationship. Make sure you don't propose marriage on your first date. Take time to let new customer and client relationships evolve naturally.

    In this article we went over the 6-step sales cycle for new computer business owners. Learn more about starting your own computer business with the proven sales cycle that gets you great, steady, high-paying clients now at the attached link.

    Copyright (C) StartingYourOwnComputerBusiness.com All Rights Reserved

    Video Formats

    VCD -
    VCD is an mpeg1 based format, with a constant bitrate of 1150kbit at a resolution of 352x240 (NTCS). VCDs are generally used for lower quality transfers (CAM/TS/TC/Screener(VHS)/TVrip(analogue) in order to make smaller file sizes, and fit as much on a single disc as possible. Both VCDs and SVCDs are timed in minutes, rather than MB, so when looking at an mpeg, it may appear larger than the disc capacity, and in reality u can fit 74min on a CDR74.



    SVCD -
    SVCD is an mpeg2 based (same as DVD) which allows variable bit-rates of up to 2500kbits at a resolution of 480x480 (NTSC) which is then decompressed into a 4:3 aspect ratio when played back. Due to the variable bit-rate, the length you can fit on a single CDR is not fixed, but generally between 35-60 Mins are the most common. To get a better SVCD encode using variable bit-rates, it is important to use multiple "passes". this takes a lot longer, but the results are far clearer.



    XVCD/XSVCD -
    These are basically VCD/SVCD that don't obey the "rules". They are both capable of much higher resolutions and bit-rates, but it all depends on the player to whether the disc can be played. X(S)VCD are total non-standards, and are usually for home-ripping by people who don't intend to release them.



    KVCD
    KVCD is a modification to the standard MPEG-1 and MPEG-2 GOP structure and Quantization Matrix. It enables you to create over 120 minutes of near DVD quality video, depending on your material, on a single 80 minute CD-R/CD-RW. We have published these specifications as KVCDx3, our official resolution, which produce 528x480 (NTSC) and 528x576 (PAL) MPEG-1 variable bit rate video, from 64Kbps to 3,000Kbps. Using a resolution of 352x240 (NTSC) or 352x288 (PAL), it's possible to encode video up to ~360 minutes of near VCD quality on a single 80 minute CD-R. The mpeg files created will play back in most modern standalone DVD players. You must burn the KVCD MPEG files as non-standard VCD or non-standard SVCD (depends on your player) with Nero or VCDEasy.



    DivX / XviD -
    DivX is a format designed for multimedia platforms. It uses two codecs, one low motion, one high motion. most older films were encoded in low motion only, and they have problems with high motion too. A method known as SBC (Smart Bit-rate Control) was developed which switches codecs at the encoding stage, making a much better print. The format is Ana orphic and the bit-rate/resolution are interchangeable. Due to the higher processing power required, and the different codecs for playback, its unlikely we'll see a DVD player capable of play DivX for quite a while, if at all. There have been players in development which are supposedly capable, but nothing has ever arisen. The majority of PROPER DivX rips (not Re-Encs) are taken from DVDs, and generally up to 2hours in good quality is possible per disc. Various codecs exist, most popular being the original Divx3.11a and the new XviD codecs.



    CVD -
    CVD is a combination of VCD and SVCD formats, and is generally supported by a majority of DVD players. It supports MPEG2 bit-rates of SVCD, but uses a resolution of 352x480(ntsc) as the horizontal resolution is generally less important. Currently no groups release in CVD.



    DVD-R -
    Is the recordable DVD solution that seems to be the most popular (out of DVD-RAM, DVD-R and DVD+R). it holds 4.7gb of data per side, and double sided discs are available, so discs can hold nearly 10gb in some circumstances. SVCD mpeg2 images must be converted before they can be burnt to DVD-R and played successfully. DVD>DVDR copies are possible, but sometimes extras/languages have to be removed to stick within the available 4.7gb.



    MiniDVD -
    MiniDVD/cDVD is the same format as DVD but on a standard CDR/CDRW. Because of the high resolution/bit-rates, its only possible to fit about 18-21 mins of footage per disc, and the format is only compatible with a few players.

    Original Source Movie Tags

    CAM
    A cam is a theater rip usually done with a digital video camera. A mini tripod is sometimes used, but a lot of the time this wont be possible, so the camera make shake. Also seating placement isn't always idle, and it might be filmed from an angle. If cropped properly, this is hard to tell unless there's text on the screen, but a lot of times these are left with triangular borders on the top and bottom of the screen. Sound is taken from the onboard microphone of the camera, and especially in comedies, laughter can often be heard during the film. Due to these factors picture and sound quality are usually quite poor, but sometimes we're lucky, and the theater will be fairly empty and a fairly clear signal will be heard.


    TELESYNC (TS)
    A telesync is the same spec as a CAM except it uses an external audio source (most likely an audio jack in the chair for hard of hearing people). A direct audio source does not ensure a good quality audio source, as a lot of background noise can interfere. A lot of the times a telesync is filmed in an empty cinema or from the projection booth with a professional camera, giving a better picture quality. Quality ranges drastically, check the sample before downloading the full release. A high percentage of Telesyncs are CAMs that have been mislabeled.


    TELECINE (TC)
    A telecine machine copies the film digitally from the reels. Sound and picture should be very good, but due to the equipment involved and cost telecines are fairly uncommon. Generally the film will be in correct aspect ratio, although 4:3 telecines have existed. A great example is the JURASSIC PARK 3 TC done last year. TC should not be confused with TimeCode , which is a visible counter on screen throughout the film.


    SCREENER (SCR)
    A pre VHS tape, sent to rental stores, and various other places for promotional use. A screener is supplied on a VHS tape, and is usually in a 4:3 (full screen) a/r, although letterboxed screeners are sometimes found. The main draw back is a "ticker" (a message that scrolls past at the bottom of the screen, with the copyright and anti-copy telephone number). Also, if the tape contains any serial numbers, or any other markings that could lead to the source of the tape, these will have to be blocked, usually with a black mark over the section. This is sometimes only for a few seconds, but unfortunately on some copies this will last for the entire film, and some can be quite big. Depending on the equipment used, screener quality can range from excellent if done from a MASTER copy, to very poor if done on an old VHS recorder thru poor capture equipment on a copied tape. Most screeners are transferred to VCD, but a few attempts at SVCD have occurred, some looking better than others.


    DVD-SCREENER (DVDscr)
    Same premise as a screener, but transferred off a DVD. Usually letterbox , but without the extras that a DVD retail would contain. The ticker is not usually in the black bars, and will disrupt the viewing. If the ripper has any skill, a DVDscr should be very good. Usually transferred to SVCD or DivX/XviD.


    DVDRip
    A copy of the final released DVD. If possible this is released PRE retail (for example, Star Wars episode 2) again, should be excellent quality. DVDrips are released in SVCD and DivX/XviD.


    VHSRip
    Transferred off a retail VHS, mainly skating/sports videos and XXX releases.


    TVRip
    TV episode that is either from Network (capped using digital cable/satellite boxes are preferable) or PRE-AIR from satellite feeds sending the program around to networks a few days earlier (do not contain "dogs" but sometimes have flickers etc) Some programs such as WWF Raw Is War contain extra parts, and the "dark matches" and camera/commentary tests are included on the rips. PDTV is capped from a digital TV PCI card, generally giving the best results, and groups tend to release in SVCD for these. VCD/SVCD/DivX/XviD rips are all supported by the TV scene.


    WORKPRINT (WP)
    A workprint is a copy of the film that has not been finished. It can be missing scenes, music, and quality can range from excellent to very poor. Some WPs are very different from the final print (Men In Black is missing all the aliens, and has actors in their places) and others can contain extra scenes (Jay and Silent Bob) . WPs can be nice additions to the collection once a good quality final has been obtained.


    DivX Re-Enc -A DivX re-enc is a film that has been taken from its original VCD source, and re-encoded into a small DivX file. Most commonly found on file sharers, these are usually labeled something like Film.Name.Group(1of2) etc. Common groups are SMR and TND. These aren't really worth downloading, unless you're that unsure about a film u only want a 200mb copy of it. Generally avoid.


    Watermarks
    A lot of films come from Asian Silvers/PDVD (see below) and these are tagged by the people responsible. Usually with a letter/initials or a little logo, generally in one of the corners. Most famous are the "Z" "A" and "Globe" watermarks.


    Asian Silvers / PDVD
    These are films put out by eastern bootleggers, and these are usually bought by some groups to put out as their own. Silvers are very cheap and easily available in a lot of countries, and its easy to put out a release, which is why there are so many in the scene at the moment, mainly from smaller groups who don't last more than a few releases. PDVDs are the same thing pressed onto a DVD. They have removable subtitles, and the quality is usually better than the silvers. These are ripped like a normal DVD, but usually released as VCD.

    See Google results AND WolframAlpha results together!


    Once again, MANY thanks to John Branson for sharing this tip with us via a comment to a previous post.

    An experimental Firefox add-on now lets you see both your Google search results AND your WolframAlpha search results on the same page - side by side. Holy cow!! Presenters are going to LOVE it, for sure, but so will teachers AND students - if they can get the add-on installed.

    Check it out! Don't you just LOVE the Firefox browser?

    Thursday, May 21, 2009

    How Much Hosting Bandwidth Is Enough ?

    Previous Article : Web Site Traffic

    Hosting Bandwidth

    In the example above, we discussed traffic in terms of downloading an MP3 file. However, each time you visit a web site, you are creating traffic, because in order to view that web page on your computer, the web page is first downloaded to your computer (between the web site and you) which is then displayed using your browser software (Internet Explorer, Netscape, etc.) . The page itself is simply a file that creates traffic just like the MP3 file in the example above (however, a web page is usually much smaller than a music file).

    A web page may be very small or large depending upon the amount of text and the number and quality of images integrated within the web page. For example, the home page for CNN.com is about 200KB (200 Kilobytes = 200,000 bytes = 1,600,000 bits). This is typically large for a web page. In comparison, Yahoo's home page is about 70KB.


    How Much Bandwidth Is Enough?

    It depends (don't you hate that answer). But in truth, it does. Since bandwidth is a significant determinant of hosting plan prices, you should take time to determine just how much is right for you. Almost all hosting plans have bandwidth requirements measured in months, so you need to estimate the amount of bandwidth that will be required by your site on a monthly basis

    If you do not intend to provide file download capability from your site, the formula for calculating bandwidth is fairly straightforward:

    Average Daily Visitors x Average Page Views x Average Page Size x 31 x Fudge Factor

    If you intend to allow people to download files from your site, your bandwidth calculation should be:

    [(Average Daily Visitors x Average Page Views x Average Page Size) +
    (Average Daily File Downloads x Average File Size)] x 31 x Fudge Factor

    Let us examine each item in the formula:

    Average Daily Visitors - The number of people you expect to visit your site, on average, each day. Depending upon how you market your site, this number could be from 1 to 1,000,000.

    Average Page Views - On average, the number of web pages you expect a person to view. If you have 50 web pages in your web site, an average person may only view 5 of those pages each time they visit.

    Average Page Size - The average size of your web pages, in Kilobytes (KB). If you have already designed your site, you can calculate this directly.

    Average Daily File Downloads - The number of downloads you expect to occur on your site. This is a function of the numbers of visitors and how many times a visitor downloads a file, on average, each day.

    Average File Size - Average file size of files that are downloadable from your site. Similar to your web pages, if you already know which files can be downloaded, you can calculate this directly.

    Fudge Factor - A number greater than 1. Using 1.5 would be safe, which assumes that your estimate is off by 50%. However, if you were very unsure, you could use 2 or 3 to ensure that your bandwidth requirements are more than met.

    Usually, hosting plans offer bandwidth in terms of Gigabytes (GB) per month. This is why our formula takes daily averages and multiplies them by 31.

    Web Site Traffic

    A very simple analogy to use to understand bandwidth and traffic is to think of highways and cars. Bandwidth is the number of lanes on the highway and traffic is the number of cars on the highway. If you are the only car on a highway, you can travel very quickly. If you are stuck in the middle of rush hour, you may travel very slowly since all of the lanes are being used up.

    Traffic is simply the number of bits that are transferred on network connections. It is easiest to understand traffic using examples. One Gigabyte is 2 to the 30th power (1,073,741,824) bytes. One gigabyte is equal to 1,024 megabytes. To put this in perspective, it takes one byte to store one character. Imagine 100 file cabinets in a building, each of these cabinets holds 1000 folders. Each folder has 100 papers. Each paper contains 100 characters - A GB is all the characters in the building. An MP3 song is about 4MB, the same song in wav format is about 40MB, a full length movie can be 800MB to 1000MB (1000MB = 1GB).

    If you were to transfer this MP3 song from a web site to your computer, you would create 4MB of traffic between the web site you are downloading from and your computer. Depending upon the network connection between the web site and the internet, the transfer may occur very quickly, or it could take time if other people are also downloading files at the same time. If, for example, the web site you download from has a 10MB connection to the internet, and you are the only person accessing that web site to download your MP3, your 4MB file will be the only traffic on that web site. However, if three people are all downloading that same MP at the same time, 12MB (3 x 4MB) of traffic has been created. Because in this example, the host only has 10MB of bandwidth, someone will have to wait. The network equipment at the hosting company will cycle through each person downloading the file and transfer a small portion at a time so each person's file transfer can take place, but the transfer for everyone downloading the file will be slower. If 100 people all came to the site and downloaded the MP3 at the same time, the transfers would be extremely slow. If the host wanted to decrease the time it took to download files simultaneously, it could increase the bandwidth of their internet connection (at a cost due to upgrading equipment).


    Next : How Much Hosting Bandwidth Is Enough ?

    BandWidth Explained

    Most hosting companies offer a variety of bandwidth options in their plans. So exactly what is bandwidth as it relates to web hosting? Put simply, bandwidth is the amount of traffic that is allowed to occur between your web site and the rest of the internet. The amount of bandwidth a hosting company can provide is determined by their network connections, both internal to their data center and external to the public internet.

    Network Connectivity

    The internet, in the most simplest of terms, is a group of millions of computers connected by networks. These connections within the internet can be large or small depending upon the cabling and equipment that is used at a particular internet location. It is the size of each network connection that determines how much bandwidth is available. For example, if you use a DSL connection to connect to the internet, you have 1.54 Mega bits (Mb) of bandwidth. Bandwidth therefore is measured in bits (a single 0 or 1). Bits are grouped in bytes which form words, text, and other information that is transferred between your computer and the internet.

    If you have a DSL connection to the internet, you have dedicated bandwidth between your computer and your internet provider. But your internet provider may have thousands of DSL connections to their location. All of these connection aggregate at your internet provider who then has their own dedicated connection to the internet (or multiple connections) which is much larger than your single connection. They must have enough bandwidth to serve your computing needs as well as all of their other customers. So while you have a 1.54Mb connection to your internet provider, your internet provider may have a 255Mb connection to the internet so it can accommodate your needs and up to 166 other users (255/1.54).

    IP Address Syntax in Web Page

    To Get And Show The Ip Via Javascript

    To show the ip via JavaScript


    var ip= '<!--#echo var="REMOTE_ADDR"-->';
    document.write("Your IP Address is :"+ip+" ");
    ________________________________________________________________________________
    __________________
    To show IP via ASP


    request.ServerVariables("REMOTE_ADDR")
    ________________________________________________________________________________
    __________________
    TO SHOW IP VIA PHP

    <?
    $remote_address = getenv("REMOTE_ADDR");
    echo "Your IP address is $remote_address.";
    $browser_type = getenv("HTTP_USER_AGENT");
    echo "You are using $browser_type.";
    ?>

    IP Address Syntax in Web Page

    To Get And Show The Ip Via Javascript

    To show the ip via JavaScript


    var ip= '<!--#echo var="REMOTE_ADDR"-->';
    document.write("Your IP Address is :"+ip+" ");
    ________________________________________________________________________________
    __________________
    To show IP via ASP


    request.ServerVariables("REMOTE_ADDR")
    ________________________________________________________________________________
    __________________
    TO SHOW IP VIA PHP

    <?
    $remote_address = getenv("REMOTE_ADDR");
    echo "Your IP address is $remote_address.";
    $browser_type = getenv("HTTP_USER_AGENT");
    echo "You are using $browser_type.";
    ?>

    Microsoft Windows Shorcut

    Getting used to using your keyboard exclusively and leaving your mouse behind will make you much more efficient at performing any task on any Windows system. I use the following keyboard shortcuts every day:

    Windows key + R = Run menu

    This is usually followed by:
    cmd = Command Prompt
    iexplore + "web address" = Internet Explorer
    compmgmt.msc = Computer Management
    dhcpmgmt.msc = DHCP Management
    dnsmgmt.msc = DNS Management
    services.msc = Services
    eventvwr = Event Viewer
    dsa.msc = Active Directory Users and Computers
    dssite.msc = Active Directory Sites and Services
    Windows key + E = Explorer

    ALT + Tab = Switch between windows

    ALT, Space, X = Maximize window

    CTRL + Shift + Esc = Task Manager

    Windows key + Break = System properties

    Windows key + F = Search

    Windows key + D = Hide/Display all windows

    CTRL + C = copy

    CTRL + X = cut

    CTRL + V = paste

    Also don't forget about the "Right-click" key next to the right Windows key on your keyboard. Using the arrows and that key can get just about anything done once you've opened up any program.


    Keyboard Shortcuts

    [Alt] and [Esc] Switch between running applications

    [Alt] and letter Select menu item by underlined letter

    [Ctrl] and [Esc] Open Program Menu

    [Ctrl] and [F4] Close active document or group windows (does not work with some applications)

    [Alt] and [F4] Quit active application or close current window

    [Alt] and [-] Open Control menu for active document

    Ctrl] Lft., Rt. arrow Move cursor forward or back one word

    Ctrl] Up, Down arrow Move cursor forward or back one paragraph

    [F1] Open Help for active application

    Windows+M Minimize all open windows

    Shift+Windows+M Undo minimize all open windows

    Windows+F1 Open Windows Help

    Windows+Tab Cycle through the Taskbar buttons

    Windows+Break Open the System Properties dialog box



    acessability shortcuts

    Right SHIFT for eight seconds........ Switch FilterKeys on and off.

    Left ALT +left SHIFT +PRINT SCREEN....... Switch High Contrast on and off.

    Left ALT +left SHIFT +NUM LOCK....... Switch MouseKeys on and off.

    SHIFT....... five times Switch StickyKeys on and off.

    NUM LOCK...... for five seconds Switch ToggleKeys on and off.

    explorer shortcuts

    END....... Display the bottom of the active window.

    HOME....... Display the top of the active window.

    NUM LOCK+ASTERISK....... on numeric keypad (*) Display all subfolders under the selected folder.

    NUM LOCK+PLUS SIGN....... on numeric keypad (+) Display the contents of the selected folder.

    NUM LOCK+MINUS SIGN....... on numeric keypad (-) Collapse the selected folder.

    LEFT ARROW...... Collapse current selection if it's expanded, or select parent folder.

    RIGHT ARROW....... Display current selection if it's collapsed, or select first subfolder.




    Type the following commands in your Run Box (Windows Key + R) or Start Run

    devmgmt.msc = Device Manager
    msinfo32 = System Information
    cleanmgr = Disk Cleanup
    ntbackup = Backup or Restore Wizard (Windows Backup Utility)
    mmc = Microsoft Management Console
    excel = Microsoft Excel (If Installed)
    msaccess = Microsoft Access (If Installed)
    powerpnt = Microsoft PowerPoint (If Installed)
    winword = Microsoft Word (If Installed)
    frontpg = Microsoft FrontPage (If Installed)
    notepad = Notepad
    wordpad = WordPad
    calc = Calculator
    msmsgs = Windows Messenger
    mspaint = Microsoft Paint
    wmplayer = Windows Media Player
    rstrui = System Restore
    netscp6 = Netscape 6.x
    netscp = Netscape 7.x
    netscape = Netscape 4.x
    waol = America Online
    control = Opens the Control Panel
    control printers = Opens the Printers Dialog

    Making Web Page Fonts Consistent and Uniform

    Is it disturbing to you when every other Web page you visit has a different font size?. One web page's font is too small, and another web page's fonts are too big.
    Well here's a way to fix that and set each web page's fonts to just the size you want.

    In Internet Explorer, select: Tools-Internet Options, choose the General tab, click the Accessibility button, and check Ignore font sizes specified on Web pages (the wording varies depending on your IE version).

    In Netscape 6 and 7, choose Edit-Preferences, select Fonts (double-click Appearance if you don't see 'Fonts' listed), and then either check Use my default fonts or uncheck Allow documents to use other fonts, depending on your version (the wording of these choices also varies).

    Now all Web page fonts should be of uniform size on all pages.

    Ping-o-Matic, service to ping your blog

    Ping-o-Matic is a third party service provide by wordpress.com. Ping-O-Matic is a service to update different search engines that your blog has updated.

    Voice and Data Cabling: 3 Tips for Outsourced IT Consultants

    If you are an IT consultant designing total small business solutions, choosing the right kind of voice and data cabling for your network application, installing it properly and verifying compliance with the necessary standards is the key to ensuring your clients get the most out of their technology investment.

    If you take a casual attitude towards the design or installation, you could cost your clients unnecessary money and waste time with unnecessary long-term troubleshooting issues and devastating downtime.

    When it comes to laying the proper foundation for a reliable network, voice and data cabling is as important as pouring a solid foundation for a building construction project.

    But how can you ensure you give your small business clients the best voice and data cabling options that fit in with your overall solution ... especially if you are coordinating services with an outside vendor and acting as their outsourced IT manager or virtual CIO?

    Consider the following 3 tips that can help you be a great “go-between” for your clients and ensure your technology solutions work well for them, even if you are working with outside vendors for voice and data cabling services.

    1. Map Out All the Parts of the Project and How They Fit Together. First, you need to know how to get from Point A to Point B. But you also need to know all the intricacies of the steps along the way, even if they are not being carried out by you personally. You have to know exactly what Point A and Point B are. Then you have to figure out how the overall project can be broken down into phases and who will be doing what, including which outside vendors you will be using and what you will be able to do in-house. To be a real virtual CIO, create a technology roadmap for your clients and be in total control of how it is executed. And be sure to communicate regularly with any outside vendors you use throughout the course of any project so you are all on the same page.

    2. Allow Ample Time for Voice and Data Cabling Projects. Smooth IT projects do not happen magically. Major systems upgrades are generally carried out over the course of several weeks and sometimes even several months. And when you are coordinating voice and data cabling with outside vendors, you have to do a lot of advanced planning and pay close attention to a lot of interrelated details. You also have to understand that while you might have a specific timeline in mind for completing a project, you can’t always expect that other vendors will have the same exact idea, or that your timeline will even be reasonable for them. As an effective virtual CIO, you need to be realistic about timelines and work with all members of your team to develop a definite plan before the start of the project.

    3. Prepare for Potential Problems with Conservative Time and Money Budgets. Seasoned virtual CIO's and project managers learn to spot potential problems before they evolve into major catastrophes that can drastically increase budget and time spent. When you are working with other companies that provide voice and data cabling, you need to make sure any outside companies you use are doing their jobs in the agreed-upon amount of time and for the agreed-upon cost. If you are watchful of every component of a big project, even those pieces you are not doing yourself, you can handle most unexpected problems efficiently and expediently.

    In this article, we discussed how you can work more effectively with outside vendors to oversee major network infrastructure projects, such as voice and data cabling. Learn more about how to provide great voice and data cabling options to better serve your steady, high-paying clients now at the attached link.

    Copyright (C) VoiceAndDataCablingBusiness.com All Rights Reserved

    Wednesday, May 20, 2009

    How Discussion Forums Change Our Classrooms

    On May 6 I had the opportunity to attend Capital Day at the PA state Capitol Building in Harrisburg. Students and teachers from around the state came to show off the kinds of projects that they've been doing in class. I LOVE these days. I LOVE to stop by to ask a student to tell me about his/her project and to hear the excitement and enthusiasm in their voices when they show off what they've done.

    This year was no exception, as I went from station to station hearing these kids talk with that pride and confidence. I would ask a question about their topic to see if I could throw them off, but I never did. One project was all about landfills, and I asked a number of questions about how they keep them from polluting the ground water, and how they tap off the methane, and what they do with it, and what the outlook was for the future if the current trends continue. They knew the answers to every one of the questions and it was clear that the young man who was talking to me was enjoying the fact that he was so well informed. I loved it!

    And then I stopped by to talk with some students from Radnor High School who were showing their ning site that they use in their Social Studies/English class. First of all, I thought the combination of the two classes was interesting, and the kids seemed to really take to it. In this assignment, they identified key ideas and themes for each chapter of A Fine Balance by Rohinton Minstry, and, with their blogging buddies, had conversations about the content of the posts. Yes, they could have done this by having a conversation in class, but we all know that that approach doesn't get all the students involved. Nor does it often give a student enough time to complete a thought without an interuption. Nor do the students often comment about a statement directly, as they will often simply follow up one statement with another which has its own point but which doesnt show a reflection on the first.

    But, take a look at this conversation that was taken from their discussions. Ask your self if your students get a chance to talk like this in class. Finally, ask someone how you, too, can get your students into something like this. And, if nings are blocked in your school, send them this post so that they can see why you're after this kind of tool for your students.

    Congratulations to their teacher, Abby Daniels, and their CFF coach, Andrea Frezel, for their work to get this set up for their students.
    ----
    Posted by David: Chapter 13 of A Fine Balance is concerned with serious themes of disappearance and avoidance. While man has certain duties in life, sometimes it is easier to run away from those responsibilities than it is to confront them. Dina tells both Maneck and Om early on in the chapter that: "Ingratitude is not uncommon in the world. One day, you too will forget me -- all of you. When you go your own way and settle down, you will not know me....In two months you'll sit for your final exam, pack your things, then disappear" (455). That's exactly what Om wants to do when the subject of marriage comes up. He wants to run away. Increasingly, Om becomes emboldened when his Uncle Ishvar talks about his obligation to arrange Om's wedding. He realizes, however, that the topic will not go away. Om is devastated to think he'll have to marry soon. He wants nothing more than to disappear.

    This theme continues when Dina makes the worms in Om's stomach disappear. Om's body is cleansed not just physically, but spiritually. He is maturing into an adult. He is looking more and more like Maneck, and if anything is disappearing, it's Om's connection to the untouchable world of his deceased parents. As for Rajaram, he also wants to disappear, as he is on the run after murdering Beggarmaster's husband-and-wife team. Literally, Rajaram's mind has disappeared as well. He is so obsessed with hair collection that he literally clips the plaits off of living beings. Perhaps this is what happens as well to the untouchables in this time of the Emergency. Their possessions were stripped bare, and their huts and shacks were knocked down. Everything they owned disappeared, much like the hair of Rajaram's victims. He says, "I want to reject the material world, become a sanyasi, spend my life meditating in a cave" (468). Yes, Rajaram wants to disappear into the Himalaya mountains, but his escape is motivated not by a Hindu spiritalism as much as it is to run from the authorities, who would execute him on the spot for his terrible crimes. Om is beginning to face the reality of his social and cultural demands, while Rajaram is supposedly running away to become an ascetic in the "hope of redeeming" himself (475). The tailors know better. They realize that Rajaram will be back some day, with more tales and adventures. He's disappearing for the time being, and the reader doesn't believe for an instant that his life of "abnegation" will last long (475). That, too, will disappear, when the time comes.

    3 Comments

    Comment by Andrew on March 27, 2009 at 10:32am
    I very much disagree with your statement that Om wants to disappear. On the contrary, with the relationship between Dina, Om, and Ishvar becoming less business-like and more family-like, it would be harder than ever for Om to have to leave his life with Dina behind. Om and Ishvar are no longer just tailors to Dina, they are family. They eat dinner together, they live together, and they talk like a family would, joking together, laughing together, worrying together, and crying together. I believe the true turning point of the relationship of Dina and Om, a point that occurred before this chapter, was when Dina offered Om a red-rosed cup, instead of his usual pink-rosed cup that she segregated from the rest, which expressed the fact that she no longer saw him as just her worker, as just a tailor that she needed to make a living, but as a true part of her family, a friend. Though it may have been true that Om wanted to return to his village in earlier chapters, that he wanted to leave the horrible city as soon as he could, such is no longer the case. Dina, Om, Ishvar, and Maneck are now a family, and leaving Dina’s house, which is now their home, would be just as difficult as it was to leave their village. This can be seen in the difficulty that Om and Ishvar experienced in leaving Dina’s house to return to their village to get Om married. This would truly be a happy ending in a world where a Hindu woman like Dina would more than likely never cease to treat Om and Ishvar with condescendence. In the world, caste is a huge part of the Hindu religion, an aspect of the religion very much engraved in Hinduism, and a Hindu woman learning about her workers’ pasts (which is what turned around Dina’s attitude toward Om and Ishvar) would most likely only increase her haughtiness over the “low-castes”. Though such a situation would be unlikely, I believe that it is possible, and that this story describes how such a happening would play out as well.
    Comment by David on March 31, 2009 at 5:17pm
    My blog comment on the word disappear reflects Om's reaction to marriage. This topic is brought up time and again in A Fine Balance, and each time his response is the same. Om says that he's not ready, or he tries to avoid the subject. Wishing that the topic of marriage would disappear is different than saying Om wants to leave the comfort and security of living with Uncle Ishvar on the verandah's of Dina's flat.
    Comment by Troy on April 1, 2009 at 10:19am
    I agree with the blog because it shows how there is a lot of disappearance. This is also seen in how the tensions of the household are disappearing more, as seen in Dina calling Ishvar "Ishvarbai." This blog post connects to the way that Om and Ishvavr disappear from their village early in the book. This shows how Om and Ishvar are making their life better again as they were before by disappearing. This time Om's poor habits are disappearing with his sickness disapearing.This connects to the real world because it shows the way that the third world nations have parasites and worms but the people their don't worry or immediately get rid of them.

    Tuesday, May 19, 2009

    Putting new buttons on toolbars in MS Office (before the 2007 version)

    A while ago I published an article that suggested that rather than printing directly from web browsers, such as Internet Explorer, it is better to copy the information that you want into a word processor and print it from there. In that article I mentioned the use of the 'Paste Special' in Word, which enables you to remove formatting from the information that you paste. In this article I will explain how to put a button for 'Paste Special' onto the toolbar in Microsoft Word 2003 and other earlier versions. This technique can also be used to add any of the other available buttons onto any toolbar.

    Open up Word and right-click on one of the toolbars, which are at the top of the screen below the menu and look something like this:


    From the menu, select 'Customize...', which will open a dialog box. Click on the 'Commands' tab.


    Select 'Edit' from the left-hand menu, because the 'Paste Special' tool is listed in the 'Edit' menu. Scroll down through the list on the right-hand until you see 'Paste Special' then left-click on it and hold the mouse button down. The mouse pointer should change to an arrow pointing at a rectangle with a square to the bottom right, which will have an X in it initially.

    Move the pointer up to the toolbars and release the mouse button when it is in a suitable position: next to the normal paste button for example. You will notice that the mouse pointer changed appearance again when you hovered over the toolbar, with the X being replaced with a + to let you know that the new button can be placed there.

    Your toolbar should now look something like this:

    If you wish to remove a button from the toolbar, follow the instructions above for opening the 'Customize' dialog, but rather than drag from the dialog box to the toolbar, click on the button you wish to remove from the toolbar and drag it into the dialog box.

    This process also works in the other Microsoft Office applications such as Excel and PowerPoint. With Office 2007, Microsoft have replaced the old tried-and-tested menu and toolbar arrangement with something called 'ribbons' (as pictured below) and there is no way to customise these in the same way as detailed above.

    This is an edited version of a post that first appeared on Bloody Computer! on 19th November 2007.

    Monday, May 18, 2009

    Using Variables in Adobe Captivate 4

    One of the really exciting new features in Adobe Captivate 4 is variables. Using variables allows the developer to personalize the experience when the user is interacting with your video. Adobe Captivate 4 allows you to use both User Variables as well as built in System Variables in your projects. While working with ConceptDraw for MindMap Projects, I created a short video which shows you just how easy it is to go from the ConceptDraw Mindmap to ConceptDraw Project. Using User Variables I captured the user's full name in a User Variable called v_Name which then gets stored, and is then used throughout the simulation video to personalize the experience. You will see once you enter your name that the guiding captions now include your name at the beginning of each prompt. This is a really nice touch to your simulation videos and one I know I will be using more and more. In a future video I will show you just how easy it is to create the User variable and then use it within your video. Click here to view the simulation video.

    In addition to personalizing the video simulation, I also demonstrate how I can use a widget which is a new feature found in Adobe Captivate 4. Using the Certificate widget, in conjunction with the Quizzing feature found in Adobe Captivate 4, I was able to create two questions which were then followed up with a certificate which included the users name, the name of the course, their score, and grade on the quiz. The Certificate widget uses variables that a passed along to the certificate from within Adobe Captivate 4 which make this a rather easy task to accomplish. So when you run the simulation, enter your full name and then watch as it is populated throughout the session. When you get to the end of the quiz notice how the certificate includes all the information which can then be printed out for the user. Adobe Captivate 4 has numerous widgets and system variables that can be used in your projects. I hope this gives you some idea of the power of these two features and I welcome your feedback.

    Programmer Refreshing

    Oh.. I'm Forgot to type "*" and that make my program not work...

    As a programmer all the thing that we just need for programming are relax and fresh mind condition. So with the good mind condition, we can do programming well.

    Can you do programming intensively in 3 hours..?
    Like doing a study 3 hours is long enough to make our mind tired. So Sometimes it's best to walk away, and come back to it later fresh. Then you'll notice those things.

    All people need refreshing, not only programmers. Refreshing activity is important to refresh energy/stamina and mind.

    IT Marketing Plan Tips for Fine-Tuning Your Elevator Speech

    If you want to attract great, steady, high-paying clients to your IT consulting business, you need to develop a very solid IT marketing plan. Many in IT consulting naively believe that marketing is only something that merits attention when business slows down. The problem however is that because of the length of your sales cycle, most can't afford to back-burner their IT marketing plan.

    An important marketing element many IT professionals neglect to fully develop is the elevator speech. The elevator speech is a short little description of your business, and is necessary to reach prospective clients in networking situations. You need to really practice it and make it a reflex as you are meeting prospective clients and partners that will be essential to the growth of your business.

    An elevator speech, named for the amount of time you have to deliver your message between getting on and getting off the elevator, must be very concise -- 30 seconds tops, though 10 seconds is more ideal. Remember, if you're still blabbering away when the person you're sharing the elevator ride with exits, you're talking way too much.

    If you have a well thought-out compelling business plan and unique problem-solution-benefit value proposition, writing your elevator speech is a piece of cake.

    The following 3 IT marketing plan tips can help you fine-tune your elevator speech.

    1. A Fine-Tuned Elevator Speech Helps You Compete with Other IT Professionals. If you go to an organizational meeting, like a Chamber of Commerce breakfast or Rotary Club luncheon, you will probably not be the only IT professional giving a 30-second commercial as you mingle around and meet others. If there are two or three other computer service companies there at the same event, you need to make sure your elevator speech resonates with those you meet that might be great candidates for your services. A huge part of success in IT marketing is showing how you are different from your competitors, and how only your unique solution can fully solve the problems of your target business prospects. An effective problem-solution-benefit elevator speech can often get your foot in the door, which is key to your success in your IT marketing plan.

    2. Focus on Benefits and Problems Solved … Not Features. The key thing with an elevator speech is that you need to focus on the benefits you provide for a particular business as well as the problems you can solve. For example, “Hi, my name is Bob Johnson from Johnson Computer Solutions. We help small businesses make better use of their computer systems to grow their revenue, lower their costs and raise their overall productivity and bottom-line profits.” Your elevator speech needs to focus on what you can do specifically for small businesses in actual business language. It cannot just talk about how great you are, your laundry list of certifications or the technology services you provide.

    3. Make Sure Your Elevator Speech is Sincere. Any IT marketing activities you do need to be 100% sincere. Therefore, as you are delivering your elevator speech, you have to come across as someone that can help business owners and has a genuine interest in hearing more about them and their most important issues. The general rule of thumb with networking is to try to let the person that you’re talking to do most of the talking. Make sure to use active listening and find the opportunity for you to help the business owner. Networking as part of an IT marketing plan is learning about prospects … not about hearing yourself talk.

    In this article we discussed 3 quick tips to help you fine-tune your elevator speech to use effectively in networking situations. Learn more about how to develop an effective, results-oriented IT marketing plan tips that will get you great, steady, high-paying clients now at the attached link.

    Copyright (C) ProvenITMarketingPlan.com All Rights Reserved

    Indonesian President Candidate's

    Indonesian have 3 candidate for President election in july, 9 2009.
    They are 3 packet of President and Vice President
    • Susilo Bambang Yudhoyono and Boediono
    • Jusuf Kalla and Wiranto
    • Megawati Soekarnoputri and Prabowo Subianto
    The three candidate have similarity, one person in each candidate have military background (Susilo Bambang Yudhoyono, Wiranto and Prabowo Subianto). There a big hope that the military background keep the security and stability.

    As a Indonesian People I hope the election must be well done, without a war and conflict. Indonesian situation in recent (May 2009) was very heavy for mid level economic people like me and the other's. I hope there's no war and conflict that can worse the situation.

    Just hope The Best Candidate can handle this situation. Keep Peace Indonesia..!!!

    Sintaks Deteksi Batas dengan Delphi

    Deteksi batas adalah suatu teknik pengolahan citra yang bertujuan untuk mendapatkan obyek citra tepat pada batas obyek tersebut. Teknik ini bekerja pada citra biner dengan menjelajahi citra, misalnya dari bagian atas. Jika baris pertama paling atas semua piksel berwarna putih, maka ukuran tinggi citra dipotong pada bagian baris tersebut. Pemotongan tinggi citra berakhir bila ada ditemukan piksel berwarna hitam. Pemotongan juga dilakukan dari sisi bawah, kiri dan kanan. Gambar 2.8 berikut ini ilustrasinya (abaikan garis hitam yang membatasi lebar dan tinggi citra) :
    (a)



    (b)
    Gambar Ilustrasi deteksi batas (a) citra awal, (b) citra hasil deteksi batas.

    Berikut adalah Sintaks Deteksi Batas dengan Delphi



    procedure Tform1.DeteksiBatas(Image:TBitmap);
    var
    x,y:Integer;
    Arr:array of Boolean;
    Temp,Max,TempStart,Start,TempFinish, Tempo:Integer;
    begin
    SetLength(Arr,Image.Height);
    for y:=0 to Image.Height-1 do
    begin
    Arr[y]:=False;
    for x:=0 to Image.Width-1 do
    if Image.Canvas.Pixels[x,y]<>$ffffff then
    begin
    Arr[y]:=True;
    end;
    end;

    Max:=0;
    Temp:=0;
    Tempo:=0;

    for y:=0 to Length(Arr)-1 do
    begin
    if Arr[y] then
    begin
    if Tempo=0 then
    begin
    TempStart:=y;
    end else
    if Temp>Max then
    begin
    Max:=Temp;
    Start:=TempStart;
    TempFinish:=y;
    end else if Temp=Max then
    begin
    Max:=Temp;
    Start:=TempStart;
    TempFinish:=y;
    end;
    inc(Tempo);
    end;
    inc(Temp);
    end;
    Temp:=TempFinish-TempStart;
    Image.Canvas.Draw(0,-start,Image);
    Image.Height:=Temp+1;

    SetLength(Arr,Image.Width);
    for x:=0 to Length(Arr)-1 do
    begin
    Arr[x]:=False;
    for y:=0 to Image.Height-1 do if Image.Canvas.Pixels[x,y]<>$FFFFFF then
    begin
    Arr[x]:=True;
    end;
    end;
    Max:=0;
    Temp:=0;
    Tempo:=0;

    for x:=0 to Length(Arr)-1 do
    begin
    if Arr[x] then
    begin
    if Tempo=0 then
    begin
    TempStart:=x;
    end else
    if Temp>Max then
    begin
    Max:=Temp;
    Start:=TempStart;
    TempFinish:=x;
    end else if Temp=Max then
    begin
    Max:=Temp;
    Start:=TempStart;
    TempFinish:=x;
    end;
    inc(Tempo);
    end;
    inc(Temp);
    end;
    Temp:=TempFinish-TempStart;
    Image.Canvas.Draw(-Start,0,Image);
    Image.Width:=Temp+1;
    end;


     
    Design by Free WordPress Themes | Bloggerized by Lasantha - Premium Blogger Themes | Sweet Tomatoes Printable Coupons