Friday, July 27, 2007

Advantages of Open Source Software

PHP-Nuke, PHP PostNuke, TikiWiki, Xoops, b2evo---you can find them everywhere in the web. These are all the open source software solution used in various areas of web applications. These are most of the time free applications released under special licensing terms. This allows the coding to be shared by all and edited to suit the unique needs of the user.

What is the secret behind this immense popularity of all these software? The use of open source software has some practical benefits. Let us discuss about them in details.

You get the core framework for free

For a start up company, budget is a major factor. You can save on your initial investment cost by adopting open source software which comes free of cost.

Modification benefits

With Open Source software, the code is openly available and that enables the users to fine tune the codes to suit their needs. It also contributes to the improvement of a software product by making it adaptable to changing conditions, fixing of bugs, security problems and so on.

Excellent support base free of cost

With open source software you are not tied to a single company or do not need to fall back upon it for fixing all your application related problems. This dependence proves to be very expensive. But with open source software, you get the support of the entire support community on which these applications grow and thrive.

Forking leading to a new product

The open source software keep open the possibility of forking when the existing code base does not work thus leading to the creation of a new software altogether.

The entire online community is indebted to the various open source software for what they have contributed to transform internet into a vast collaborative community that it is today. With an array of open source software, you may conclude that the days of commercial software are numbered. But it requires time for their installation, implementation and trouble shooting. If you lack the time then you have two options---go for the expensive commercial software or hire an efficient and renowned web host who will tackle these problems for you. The second option is definitely better.

How To Correct A Continually Rebooting Computer?

When you sit down at your computer desk and press the power switch on your desktop, the last thing you want to experience is a continually rebooting computer.

There are a variety of causes that contribute to this problem, from something as simple as a stuck power button to a much more serious problem as your power supply slowly failing. Other causes for this problem may be overheating PC components, or viruses affecting your system.

Now, if you’re like the rest of us, having a computer that reboots constantly is not our idea of a productive day. So how do you diagnose this problem and where do you start to to make corrections. Here are some common but often overlooked causes and solutions that will get your system running again.

First take a look at the power button and see if its stuck in the socket. If so, you may be able to simple tap the front of the case to release the button. In some cases, you may have to remove the system unit cover to get the button to return to the out position.

If you cannot stop the computer from rebooting by pressing the power button and releasing it, turn off the power switch in the back of the computer next to the power supply. If your power supply do not have a power switch, you will have to unplug the system from the wall outlet.

This must be done as soon as possible so that the constant rebooting will not damage components such as the hard drive. Constant rebooting also have the danger of power surges that can further damage larger components such as the motherboard.

Second you check your computer’s software by checking to be sure no virus or malware have not effected your hard drive. Virus and malware are small software that is downloaded along with other files that is designed to cause mischief.

To remove any viruses and malware, use a anti-virus program that will search your hard drive and remove these file quickly. These files can cause such damage as wiping your hard drive of all data or hijacking your web browser so you have no control over your online surfing.

If you find no malware on your computer, take a look at your BIOS to see if it has become unstable or has been changed. BIOS stands for Basic Input Output System and is a small program designed to check all components for proper operation when the computer is turned on.

If your BIOS has been changed or if you’re not sure if its been changed, try to reset the BIOS settings to the default settings after you access the BIOS as the computer reboots.Once inside the BIOS, you should have the option to load your default settings, save the change, and reboot the computer.

However, there are times when a continually rebooting computer will not allow you to access the BIOS. You can then reset the BIOS by removing the system unit cover and locating the jumper on a three pin header.

You must consult your computer or motherboard manual to properly perform this procedure and it should be done as a last resort. Before making any changes to your BIOS, you should backup your BIOS if your computer reboots at long intervals.

After checking your computer’s software for its rebooting problem, you must check to be sure hardware is not at fault. This problem may exist because one of your memory modules are unseated from its socket . Memory modules are long, narrow sticks that attach to the motherboard.

Remove any static electricity from yourself, remove the system unit cover and check these memory modules to be sure they are secure. Check the connections to the hard drive and the connections leading from the power supply.

Power supply connectors should be checked if you’ve done work inside your computer recently. Power Supplies are known to slowly fail and lead to rebooting problems. There is no way to check an ailing power supply and this should be considered the problem as a last resort.

Following these steps will help you correct any computer that continually reboots itself. If no virus or malware is found, carefully and thoroughly check all connections. And if the problem still exist, the most likely cause would be the Power Supply.

Which Tool to Use for Listening to Your Audio Books?

The beauty with audio books is that you have more than one option for listening to them.

For those of us who like to be given lots of options for doing certain things instead of being forced to adapt to just one choice, you definitely have lots of options for listening to your audio book.

If you are someone who likes listening while seated on your favorite couch or seated on your desk, listening to your audio book on your cassette tape player (if the audio book is in audiocassette format, of course) is the option for you.

But if you have a desktop or laptop computer, you might prefer listening to your audio book from here.

Most PCs have Digital Audio Players for playing audio books. If your PC doesn't have any (very unlikely), you can still download them completely free on the Internet. The 2 best digital audio players that you can download free from the Internet include:

RealOne Player: It can be downloaded from their website:-
http://www.Real.com

Windows Media Player: It can also be downloaded from their website:-
http://www.Microsoft.com

But if you would rather listen to your audio book while doing your household chores, dancing, exercising, jogging, commuting to and from work, etc, then you would need portable audio playback devices that you can carry around and listen to, preferably with earphones.

With the ever expanding market of portable audio playback devices, it goes to show that more and more people are now using them, because of the wonderful benefits they provide.

The most common form of these portable audio playback devices are the normal audio CD players or CD-ROM devices. You can carry these around with you while you do your household chores, exercise, jog or commute to and from work.

The more advanced form of these portable audio playback devices for playing audio books, especially those for listening to downloadable audio books, include:

-- Audio-ready PDAs (Personal Digital Assistants). Some of these PDAs include Casio CASSIOPEIA and Compaq iPAQ. Both can be pretty expensive, costing as much as about $500 for the Compaq iPAQ and about $400 for the Casio CASSIOPEIA.

-- Compatible Portable Audio Players. Some of these include the Creative's NOMAD Jukebox 3 and the SONICblue's Rio 900. These are cheaper than PDAs. For example, you can get the SONICblue's Rio 900 for about $250 from sites such as Sonicblue.com

Finally, like I said at the start of this article, whatever tool you decide to use in listening to your audio books will depend largely on "how" you prefer listening to your audio books.

For example, for the "young and restless" teenagers they can't do without the PDAs. I bet you wouldn't too if you were their age, right? But for the "aged and rusty" who just prefer the ease of being seated on their favorite couch, nothing can be better than listening to their favorite audio books from their "good old" cassette tape player!

What is the Best Method to Back up Data?

This being the age of internet, chat rooms, blogging and innovative hackers, their expectation never gets fulfilled. The news always leaks out or is methodically publicised by a rival or a gleeful hacker. Thereafter, insult is added to their injury as irate customers and the eager press demand explanations about every unsavoury detail of the incident. But data loss is not a problem affecting only the big players only any more. All of us deal with some amount of data and almost all of it is important to us. Albums have been replaced by .jpeg files, our music is inside the hard drive of our pc or laptop, and our emails are stored in offline folders or software like Microsoft Outlook. Students keep their study material in their machines, and a doctoral thesis is usually a file on the hard disk instead of being a thick volume bound in leather covers. It is, therefore, strange that we keep losing data because we have not taken the precaution of backing it up elsewhere. Several start-up home businesses have not seen the light of the day anymore after an initial incident of data loss. All of this underlines the importance of backup, which really cannot be overstressed.

Some Methods of Obtaining Backups

The method, or rather, the medium chosen for backing up data will depend on the volume of data to be stored, as well as the nature of the data. Some common methods are being enlisted below:

CD and Floppy: The floppy has largely gone out of use by now, due to its many limitations, small capacity and security problems. The CD is a good choice for obtaining backups, and is one of the favourite choices in both domestic and corporate spheres. It is cheap, readily available, portable and compatible with several file formats. Storing a CD and sharing information from it are also quite simple.

DVD: The DVD is a good choice for storing audio visual information. It may not be as cheap as the CD, but offers better quality, often lasts longer, and has way more space. DVD RWs can be used in such a way that literally every bit is used to store information. A DVD also has the same facilities when it comes to sharing and easy transporting. However, the DVD RW, many market observers feel, may turn out to be an intermediate technology and be replaced by something superior but very similar in function, or may evolve in such a way that the problems would get solved. It must be noted here that the constant research in this regard, and inventions like the Blue Ray disk etc. point out that we can hope for a better technology soon.

USB Devices: These are the new favourites all over the world. The greatest proof of the popularity of this technology lies in two facts. Firstly, the storage space of pen drives / flash drives/ memory sticks is constantly increasing. Secondly, their prices are plummeting downwards rapidly. Almost all kinds of files can be stored on these; they are very easy to carry, do not require a separate software or booting up of the machine to start functioning, and it is very convenient to share the data stored on them. For storing smaller music libraries, an iPod may be an option too.

External Hard Drives: For larger data storage requirements, external hard drives are excellent solutions. Arrays or stacks of hard drives are available for corporate purposes and are provided by all good hard drive manufacturers. Seagate, Maxtor, ASB, LaCie all make external hard drives of varying capacities and prices.

Online and Offline Storage Spaces: These are ‘spaces’ provided by professional firms, and are extremely secure for sensitive data storage.

Tapes and Printouts: Traditional storage should not be left out of the list. There is some information that one simply needs to see on the good old piece of paper. Tape has been in use for a long time now, and will probably continue for some time.

Top 5 Ways To Make A Computer Run Faster

Today I am going to be talking about different ways you can make a computer run faster. There is actually a lot you can do yourself that will boost your PC's performance. So lets take a look at different ways we can remedy that slow computer of yours!

1. Free Up Disk Space

A great way to make a computer run faster is to free up some disk space. Windows comes with a disk cleanup tool that helps you free up space on your hard disk. The utility identifies files that you can safely delete without messing anything up, and then enables you to choose whether you want to delete some or all of the identified files.

How to use disk cleanup tool.

* Click Start, point to All Programs, point to Accessories, point to System Tools, and then click Disk Cleanup. If several drives are available, you might be prompted to specify which drive you want to clean.

* In the Disk Cleanup for dialog box, scroll through the content of the Files to delete list. (If you have multiple hard drives you will have to select which one to scan.)

* Clear the check boxes for files that you don't want to delete, and then click OK.

* When prompted to confirm that you want to delete the specified files, click OK.

2. Use Defrag Tool

When you add a file or a new program to a new computer, the hard drive is relatively empty so new data is saved to the hard drive in one whole block. When you need to use that information, the computer can quickly access it because it is all in one place. Defragging your system is definitely a way to make a computer run faster.

How to use defrag tool.

* From the start menu point to "all programs"
* Point to "Accessories"
* Point to "System Tools"
* Click on "Disk Defragmenter"
* The disk defragmenter will display the hard drives on your computer. Just select and click Defragment.

3. Get rid of spyware

Definition

Spyware is software with malicious intent - by design; it does something bad to your computer. Usually, it gets installed without your knowledge. It sometimes takes advantage of the fact that most people click "I Agree" to software licenses without reading them.

The only way to get rid of spyware is to have some kind of scanner, sort of like an anti-virus. In order to make a computer run faster and keep it safer your going to need an anti-spyware program. This is tricky, a lot of the spyware programs out there are malicious and will actually add viruses and spyware to your computer by using the "spyware scanner and blocker". So please remember to be very careful when choosing your anti-spyware program.

4. Find and repair disk errors

Detect and Repair Disk Errors

In addition to running Disk Cleanup and Disk Defragmenter to optimize the performance of your computer, you can check the integrity of the files stored on your hard disk by running the Error Checking utility.

How to run the error checking utility.

* Click Start, and then click My Computer.
* In the My Computer window, right-click the hard disk you want to search for bad sectors, and then click Properties.
* In the Properties dialog box, click the Tools tab.
* Click the Check Now button.
* In the Check Disk dialog box, select the Scan for and attempt recovery of bad sectors check box, and then click Start.
* If bad sectors are found, choose to fix them.
Tip: Only select the Automatically fix file system errors check box if you think that your disk contains bad sectors.

5. Get an external hard drive

Adding an External Hard Drive to your computer will allow you to clear out a lot of the things you don't need to be storing on your normal hard drive.

A great example would be your music or pictures. All those songs and pictures are sitting on your computer making it go slower. You will see a decline in your computers performance as soon as you use over half of your hard drive space.

Moving all your songs or pictures to your external hard drive will free up a lot of space on your main hard drive. You can even move applications such as photoshop or games.

An external hard drive is also handy because it is portable. You can unplug it from your computer and take it to a friends house and plug it in there, sharing photos and pictures very easily.

This is truly a great way to make a computer run faster.

Monday, July 16, 2007

Factors To Think About When Choosing A Broadband Internet Service

Undoubtedly, broadband is the future of internet, but there are other ways of getting onto the internet. If speed isn't something that you need to have, you may want to look for a company that offers dial up service. It is much slower than the broadband but it can be much cheaper. It isn't good enough if you need to download large files or watch videos, but if you just need to write email or get information from the internet, it can work just fine. Broadband internet providers, especially some of the smaller ones will more often than not offer dial up as well. The idea is that you don't have to pay for a service that you don't need. As a person deciding on a service provider, consider what the service will be used for and then make a decision to use broadband or dial up services.

However, if you decide to change from dial-up to broadband internet either because of business needs or for faster surfing speed at home. By and large, broadband internet refers to permanent connection at 256 Kbps or any transmission that is higher than that.

There are two significant benefits that a broadband internet can offer you. You are automatically connected to the internet by once you turn on your computer. Broadband providers usually offer unlimited surfing package, which means you can surf as long as you want for one flat price.

Hundreds of service providers offer broadband internet promising clients of "super fast" access to the internet. This can be misleading because some service providers do not meet these promises. That's why it is imperative to consider a few things before getting a package for your broadband connection.

How Broadband Speed Affects Your Internet Experience

When you acquire a broadband service, one of the things you often need to think about is the speed of broadband service being offered to you. Although your broadband provider may attempt to make it appear as if it's vital to have the fastest speed, you need to think about your needs for what you want to do with your Internet connection. Understanding your personal needs in broadband speeds will prevent you from buying too much or too little. Certainly, what most savings-minded people are interested in knowing is when broadband speed enters the realm of being too much. Generally speaking, if you're simply browsing the Internet, then you will enjoy the speed of broadband, but don't need to purchase the fastest connection possible. Most text-based documents such as e-mail, news sites, and similar sites, simply don't need connections that are superbly fast.

If you begin doing other activities, such as downloading music and watching online videos, then you might want to get something slightly faster than the basic broadband speed. Remember, a little goes a long way. But generally speaking, the amount of data any single web page will transfer information to you at will be at a slower speed than your broadband connection, so there's potential for wasted bandwidth.

In some situations, you may realize that you don't have enough broadband speed to support your activity. However, these are the extreme cases. If you have many Internet users who like to use the Internet at the same time, such as having high school students who regularly enjoy playing video games over the Internet, you will absolutely desire a faster connection. If you make many peer-to-peer downloads, download a lot of videos and music, or browse numerous pages at one time, you also may need a faster connection.

Last but not least, another thing to think about when deciding on what bandwidth speed is your upload speed. This will have an effect on any data you send out to the Internet, including sending e-mail, transferring files to remote servers, and hosting web pages. Generally speaking, if you plan to run your own website, get broadband with fast speeds for uploads. Or, better yet, have a remote hosting company host your website at fast speeds without increasing the price for your home connection. On the whole, for both uploads and downloads, you should cautiously assess how heavily you intend to use the Internet and purchase accordingly, and you'll end up getting what's just right for you.

Forget Emailing Pictures - Use Free Online Photo Hosting Websites

There is a very good alternative to emailing photos; they are called free online photo hosting websites. People love to share photos. However, photos take up a tremendous amount of space and can really slow down your email, not to mention take up a tremendous amount of space in someone's inbox.

On a free online photo hosting website you open an account and load your photos directly to that site. You can then invite family and friends to visit your site, check out your photos and even comment on them!

The following photo hosting websites are some of the more popular sites on the net.

FaceBook

FaceBook is a social network of people who have photo pages. You can find new friends through the search or you can link to your own friends and family while uploading an unlimited number of photos, share links and videos.

Anyone with a valid email address can join FaceBook. If you register with your school or work email, you can connect to co workers or classmates. When you have registered you can find a regional network to join and then you can connect to people in your area.

WebShots

One of the largest photo and video sharing sites, WebShots has more than 400 million photos to check out and is a great hosting site for your own photos.

They have free and premium memberships that offer lots of storage, ensuring that you will never fun out of space. You can share videos, photos and slideshow on both WebShots and on your personal website. You can even order prints of your photos and create custom photo gifts.

PhotoBucket

The self proclaimed most popular creative hub on the web, PhotoBucket links billions of personal photos, graphics, slideshows and videos to many of the most popular websites and social networking sites such as MySpace, Bebo, Friendster, Craigslist and Blogger.

However, the free online photo hosting website is not the only method that members can share their photos. They can also share their digital media via email, IM and even mobile devices.

Membership is free and it is a great place to share you latest shots of your new purple Mohawk or your adorable new baby.

Flickr

Flickr is a fun site where members can keep a blog of memories that they have captured on their cell phone camera, or maybe they just want to post their best photos so that they can show off their talents and perhaps earn the title web celebrity.

Of course, they can post their photos to share with family and friends. Flickr is a free online photo hosting website, but it also helps members get photos to the people who matter to them. Members can organize their photos, share and keep in touch with others.

The free membership on this site offers you a lot of options, particularly if you have a lot of photos to store and share.

Yahoo! Or AOL Photo Album

Yahoo! And AOL photo albums are free online photo hosting websites and are very effective for sharing your photos.

You can save, send and share your photos through these sites. There is no fee attached, the services are both free.

You can set your albums to private or you can make them public. Additionally, you can designate certain albums as private and others as public. If you want some simple photo sharing, storing and organizing, these are two great sites to use.

The Effects Of Fax Transmission On Bar Code Decoding

When documents containing bar code symbols are faxed, the quality of the bar code symbol will degrade. Documents scanned by fax machines in Standard Resolution are sampled with 204 horizontal dots per inch and 98 vertical dots per inch. Each sample point is then converted to either a white or black value (a process known as binarization). The binarization process converts straight lines of the bar code symbols into ragged lines changing the width of the bars and spaces. If a faxed document is itself resent out as a fax, further deterioration occurs. Each additional fax cycle continues to degrade the bar code. At some point, the symbol may no longer be able to be decoded by bar code decoding software.

The remainder of this article will discuss the issues that should be considered when selecting bar code symbologies and sizes to increase the likelihood of successful decodes after multiple fax cycles.

Linear (1D) Symbologies

Two popular 1D symbologies were examined: Code 128 and Code 39. Code 128 uses four bar and space widths to encode information, while Code 39 only uses two. Thirteen module sizes (smallest element) ranging from 12.5 mil to 32.5 mil of each symbol type, encoding ten numeric digits, were printed on a sheet. The sheet was sent through a fax at Standard Resolution for a total of ten cycles. This corresponds to a horizontal sample per module ranging from 2.6 to 6.6. The resulting 11 pages were then scanned on a flatbed scanner at 300 samples per inch and were presented to a bar code decode software toolkit. At 2.6 samples per module both bar code symbologies were only able to be successfully decoded for 3 faxes while the same codes with 6.6 samples per module were still readable after 10 faxes.

The larger samples per module (6 samples and greater) were able to successfully decode after 10 fax cycles. At 5.6 samples per module, the decode performance was no better than 4.6 pixels per module. This demonstrates that each fax cycle alters the bar code in a subtle way. Every fax cycle produces a unique version of the original bar code, and each alteration can make a symbol that did not read after a certain number of fax cycles read on the next one. However, if high read rates are desired after many fax cycles, then printing the bar code symbols at a minimum of 6 samples per module is recommended.

>From the testing conducted, Code 128 slightly outperformed Code 39 after multiple faxes. Given the higher data density of Code 128 and the built in checksum, Code 128 appears to be a better choice between the two symbologies. The images below show the size advantage of Code 128 over Code 39, with both symbols encoding 10 numeric digits with the same module size. If the data to be encoded is purely numeric, the numeric compaction mode of Code 128 can be used to further increase data density.

There is a trade off to consider: the larger the module size of a linear code, the more horizontal room will be required to encode the same amount of information, but the larger modules sizes can improve read rate. One additional factor to consider is the bar code height. For this test, all the codes were ½ inch in height. Given that all vertical information in 1D bar codes is by definition redundant, if space allows, increasing the height of a bar code will typically provide better read rates after multiple fax cycles.

Matrix (2D) Symbologies

Matrix symbologies provide dramatically better information density because information is encoded in both horizontal and vertical directions. Given their size advantage over their linear counterparts, 2D symbols can be printed with much larger module sizes and still be comparable to linear symbols encoding the same information. For the 2D test, we printed various sizes of Data Matrix and Micro QR Codes. The Data Matrix was a 12 x 12 module square symbol. The Micro QR is a more space efficient version of a QR code that employs only one finder pattern and is limited to a number of smaller sizes. The symbols were encoded at a comparable level of error correction. The module sizes varied from 39 mil to 79 mil. Like the 1D test, we subjected the image to 10 fax cycles and then scanned the images. The images were scanned at 150 samples per inch given the large feature sizes of the test bar codes. The scanned images were then processed by the same bar code decoding toolkit.

At 8.7 samples per module the 2D bar codes were able to be read after 5 fax cycles and once 15 samples per module were reached the codes were readable up to 10 cylces.

The results were not as consistent as the 1D symbols. This is due to the fact that the distortion of the symbol during the increasing number of fax cycles affects data in both the data dimensions. However, we can draw the conclusion that symbols with larger size modules will decode more reliably after multiple fax cycles.

Summary

If documents containing bar code symbols are to be faxed multiple times, the bar code symbols must be printed with larger module sizes to be successfully decoded.

For linear symbologies, if a large number of fax cycles (greater than 5) is required, the number of samples per module should be at least 6. Code 128 performed well in our tests and has a higher data density than Code 39. Linears are a good choice for encoding small amounts of data.

For larger data requirements, 2D symbologies such as Data Matrix, provide good decode performance after faxing if larger module sizes are used. They provide the added benefit of reducing the amount of real estate required in the application document due to their superior data density.

Microsoft Dynamics GP Customization Design

Microsoft Great Plains customization specking out might be challenging enough, especially if you try to think about GP modification from the perspective of .Net “surface” mods, not getting to the Dexterity depth – its tables structure, records workflow (how transactions are distributed in SQL Dex tables clusters: master, work, open, historical). As GP consultant you naturally understand that if you spec out customization, you need to decide on programming tools, and this in turn determines the customization architecture. Currently GP modification, reporting and integration tools are .Net, Dexterity, SQL scripting, eConnect, Integration Manager, Modifier with VBA, Extender, ReportWriter, SRS, Crystal Reports; in the case of Business Portal customization is more challenging, it is in .Net and UML and you do not have the option of direct modification access to SQL server. Let’s come through the techniques and options:

1. Business Logic mapping. This part is the most important. You need to decide how your customization extension will integrate with existing business logic. It might be independent custom logic with following integration to GP tables – in this case you should be familiar with GP master and transactions records distribution in GP. The easiest and most reliable approach is to imitate intended integration records via Great Plains user workstation data entry

2. .Net. Consider web ecommerce data publishing from Great Plains SQL tables. However, make your homework and research GP tables structure. Open GP workstation and go to tools->resource description->tables. We only intend here to orient you for the next step, not really give you complete solution, so you is the one to explore the further options

3. eConnect. In addition to above option, eConnect will give you some comfort level manipulating master and work transaction records in GP. In eConnect you can not post Great Plains transactions, due to Microsoft Great Plains Dexterity architecture – posting is left to GP users

4. Modifier/VBA. This tandem was very popular in 1990th and earlier 2000th, however now it is legacy as it is not .Net compliant. VBA is also Integration Manager modification tool. VBA scripting is very powerful – you can include Dexterity sanscript scriplets into Modified forms logic, which is very cool, but unfortunately not easily upgradeable to new GP version. VBA usesOLE Server functionality

5. Microsoft Dexterity. Former name is Great Plains Dexterity. This tool requires professional Dex developer, otherwise you will get into years long learning curve with all the known development errors and traps. The beginning of Dex learning are Dynamics.dic, Dex.ini, Dynamics.set, DEX_ROW_ID

6. Integration Manager. Besides obvious and intuitive integration you can extend it with VBA scripting and data translation. At this time IM is in process of being redesigned in eConnect (on the business objects level – SQL stored procedures), this should resolve known IM performance issue. Consider direct eConnect programming if you plan to integrate over ten thousand records per day

7. Reporting Tools. You should be aware that both SRS (SQL Server Reporting Services) and Crystal Reports will more likely require SQL Stored Procedures or SQL Views to be based on. If you decide to follow the “wizard” approach – the chances are high that you will end up with long term debugging and then move back to SQL stored procedure or view

8. ReportWriter. is Dexterity module with all the pluses and minuses of this legacy technology. Report Writer reports version update is known as challenging, especially if you are not happy to redesign several reports from scratch. Known trick is as this – open new (non modified) and old (modified) version of your report and compare calculated fields.

Monday, July 9, 2007

What Is COM And How It's Related To Registry Cleaner

What exactly does COM mean? What does it stand for and what does it do? COM in this article means Component Object Model and it is a Microsoft software architecture that can be called up to perform certain functions during the course of running a program or application as it is called in the Windows environment.

COM is an acronym for Component Object Model. This is a software architecture developed by Microsoft Corporation and is used to define a certain structure used to build program routines, known as 'objects' that can be called up for execution in a windows based environment. COM was first built into Windows 95 and Windows NT.4.0. many parts of Windows operating system and some applications developed by Microsoft's developers have built in COM objects. Com Objects are stored in the registry of a system and are one of the things that need to be cleaned with registry cleaner.

So What Exactly Does COM Do?

Com is that part of a program that provides an interface between objects. A counterpart DCOM or Distributed COM allows the objects to run remotely. COM is implemented in different ways. Objects can be large small or medium and are written in different programming languages to perform any kind of processing of a file or code. Programs call on objects whenever the program needs the services of the object and the Common Object Model acts as the interface between the program and the object. COM will link common objects to different programs that need them. That is why even though the program may be uninstalled the common object will not be removed. This fills up the registry and slows down a PC. A computer registry cleaner will remove all unwanted entries from a registry and speed up the system.

COM and ActiveX

ActiveX controls can call up COM objects called 'controls'. These 'controls' just blend into the program and become part of the program when called up by COM. OLE also uses COM services in the windows environment. Standard applications, such as word processors and spreadsheets, can be written to expose their internal functions as COM objects, allowing them to be "automated" instead of manually selected from a menu. Microsoft's OLE compound documents are based on COM, which lets one document be embedded within or linked to another (see OLE). ActiveX Documents are extensions to OLE that allow a Web browser, for example, to view not only Web pages, but any kind of document.

Microsoft Corporation is increasingly making its standard programming interfaces conform to the COM object model so that there is continuity between all interfaces in the Windows working environment. In the beginning Microsoft Corporation decided to use the term ‘OLE’ to refer to its COM-based architecture, then later decided to drop that designation in favor of ActiveX. Now since both OLE and ActiveX are based on COM, the term COM is also used. As a result, any combination of the words COM, OLE and ActiveX followed by the words control, object and component may mean the same thing, or they may not, depending on the context they are referred to.

So in the end we are given to understand that Common Object Model is ActiveX and vice versa in relation to the environment they are working in. All this automatic activity only feeds the registry with information it may not have to retain. But there is no way to rid the registry of this data except with the help of a windows registry cleaner. A PC registry cleaner will remover from the registry all unwanted information thus making the system more efficient.

What Is CLASS ID?

ActiveX controls are reusable software components that are used to add special functions to web sites or desktop applications. Browsers use the 'CLASSID' of the ActiveX Control on a web page to determine if the control already exists on the system. If they do not they are automatically downloaded from the website.

Before you go ahead and download a registry cleaner understand why it is necessary. As a web page loads on your system, you may be prompted to install several ActiveX components before the page can be fully downloaded. This is so that the browser can interpret the ActiveX components and display them properly on the system. This only would only occur if the controls used in the web page were not already on the system. If you decline permission for the installation, the page will not function properly. However, once these ActiveX controls are on your system, you won't have to download them again, even when you come across them on other web sites. These download clutter up the registry over time and need to be removed with the help of some registry shareware cleaner.

Other ID Tags


So how can the web page determine that the required ActiveX controls are not installed on the system or not? The browser does this by referring to the 'CLASSID' in the 'OBJECT' tag of the web page. To cut a long explanation short, an ActiveX control is added to a web page using the and container tags. The 'CLASSID' is unique to each ActiveX component

Spyware Can Cause You And Your System Irreparable Damage

Spyware is dangerous to your system and your personal identity. There is always the fear of identity theft as well as financial loss if your system is vulnerable to Spyware. Removing it is imperative.

Spyware can be described in simple terms as software that performs certain functions covertly on your computer such as collecting personal information, changing the configuration of the computer, and advertising. Spyware is often associated with advertising software or software that generates pop-up ads on the screen when the computer is connected to the Internet. Now this does not mean that all Spyware is malicious and causes damage to you by collecting personal information from your system. However, all Spyware do make changes to the system and cause the registry to grow substantially and ultimately cause the system to slow down to a crawl. The Spyware must be removed with the best Spyware removal utilities such as free Microsoft Spyware Removal Tool.

Is Cleaning The Registry Really Important?

Yes. Anti-Spyware searches and detects any Spyware operating in the background of the system. It is designed to detect any program that is operating and yet is not associated with the running programs on the system. Anti-Spyware can then remove such Spyware and secure the computer. Many free Adware Spyware removal tools also clean the registry to some extent. However, Spyware can create entries in the registry in hundreds or even thousands of places. These entries will stay hidden until the Spyware discovers that the exe file is missing. Then the registry entries start to operate and download the necessary files, secretly, from the Internet and the Spyware begins to operate again. Some free Spyware and Adware removal programs can go into the registry and pull out all the entries associated with programs that have been removed from the system.

Are These Spyware and Adware Removal Software Easy And Inexpensive?

Spyware virus removal software is very easy to operate. In fact, they just take a few seconds to download with a fast Internet connection. Installation takes just a few seconds and you are ready to go. Spyware virus removal software such as free Spyware and Adware removal is very effective and has all the safety features of a good Spyware removal utility. Along with this a good PC spyware cleaner can create a back up of the existing registry, which can be restored in case something goes wrong with the cleaning process.

Use Spyware Removal Tools Often

Spyware removal software should be run of the system at intervals of two to three weeks manually to clean and maintain the system. Many free Spyware programs do a great job and keep the system running perfectly. When you discover that the system has slowed down to an unusual pace run the anti-Spyware and you will be sure to come up with a few hundred if not thousands of infected files that need to be healed by the software.

What Is an ActiveX Control And How Is It Related With The Registry?

ActiveX is a technology that was developed by Microsoft to enhance the display of images, video and animation in their browsers. ActiveX components are a set of rules that guide the browser to display hi-resolution images and streaming video properly.

It should suffice to say that ActiveX is a technology that was developed to bring the power of Object Linking and Embedding or OLE as it is popularly known, to empower web browsers and particularly Internet Explorer, to display such objects. When web pages with embedded ActiveX components are downloaded, the corresponding controls are also downloaded and automatically launched by the operating system of the computer. This can, over some time, clutter up the registry with unwanted data and controls, thus slowing down the system drastically. This will mean having to clean up the registry with a registry cleaner periodically. ActiveX controls are actually used by windows to display very rich interfacing activity such as animation, video images, virtual reality that used 3D technology, high resolution images and the like.

ActiveX Prompts For Registry Cleaners

When downloaded into your computer, an ActiveX control is actually packaged as an .OCX file. There are cases when more .OCX files are downloaded and needed for a web page. The .OCX files like ActiveX controls need to be registered on your system before they can be used. Registering means that a program capable of doing this, queries the ActiveX control and saves specific information about it into Windows Registry, so that the operating system can find it and therefore be able to use the ActiveX control. However, one must keep in mind the importance or cleaning up the registry periodically. The Internet has the best registry cleaners available free. So, make use of them to keep your system running smoothly.

Pro's and Con's Of ActiveX Controls

It is important to understand that with all the 'pros' of ActiveX technology also come a few 'cons' as well. ActiveX is a very powerful tool and is sometimes used by individuals, with a flair for the technology, to create ActiveX controls with malicious intentions. These 'corrupt' ActiveX controls can wreck havoc on your system and leave you helpless for no fault of yours. After all, you know that ActiveX is supposed to help your system run some programs, right. So why not download an ActiveX control when you are prompted to do so? It is for this reason that Microsoft has developed the ActiveX security system.

In Windows XP operating system, this security system is embedded in the Internet Explorer. The registry of the system automatically blocks the download and installation of any ActiveX component in the Registry of the computer. Apart from this is an ActiveX component has to be installed the computer will prompt the user to check for the signature of the component. If the ActiveX component is registered with Microsoft the ActiveX is verified as authorized and is allowed to be installed in the registry of the computer. If the ActiveX component is not verified the systems offers the user a choice of not installing the ActiveX control.

Some Advise For Internet Explorer Users

If you are using Internet Explorer you should ensure that you are using a security level set to Medium or above in Internet Explorer. You can do this by going to tools in IE and select 'internet options' then click on 'security' and slide the level to medium or higher. Now, after reading about the entire automatic downloads of controls and stuff, it makes sense to download a free window registry cleaner and use it periodically to clean the registry of your system. There are enhanced registry XP cleaners to clean the complex registry of Windows XP as well.

Tuesday, July 3, 2007

How To Copyright And Patent Your Software?

If you're wondering how to copyright software, the good news is you've probably already done it. At least you have if you have ever written software. Most people get confused over exactly what having a copyright for their software means. Only those things that can be seen (when it comes to software) can be copyrighted. If you want to protect the abstract, look into patents. Otherwise if it is original, fixed, and tangible you can copyright it. Essentially you already know how to copyright software if you've put it into a finished form. Once you've written the source code, the copyright belongs to you.

Copyrighting software doesn't offer the protection that many people hope it will. The idea of software and anything about the finished product that wasn't available in a tangible (visible) form isn't protected by copyright. In fact, the only thing undeniably protected by software copyright is the source code. The question you should ask yourself is not how to copyright software, but how to patent your software.

What Is A Software Patent?

A “software patent” has no universal understanding. In general, owning a patent allows a company certain rights (or exclusivity) for a prescribed amount of time. Individuals or corporations seeking a patent must apply for a patent in each country in which they wish to have one. Unlike copyrights, patents are not automatically granted to applicants and can take a while to be approved.

The growth of Internet business and e-commerce has led to many patent applications for software, particularly software designed for specific business applications. While the cases are granted and successfully tried and defended in some countries, other countries offer no enforcement or legal recourse for those who do not honor the software patent, even if the patents were granted in those countries. The fine line between nations about what is and isn't patentable is another challenge to establish and honor patents.

Patents differ greatly from copyrights, which are issued automatically and recognized and enforced internationally. Copyrights protect the source code of software from being copied and registration is generally not required to protect your work.

Lately there is a new term, “Copyleft,” which is an obvious play on words and represents the rights to not only redistribute the copyrighted works, but also to modify and freely distribute those modifications. This term is very much in the spirit of many open source types of software and music. The catch for copyleft protection is that the newly created work be distributed in the same manner and spirit in which it was received. In other words if you were freely given the software, then you must freely provide the improvements and modifications you made to that software.

One unfortunate circumstance surrounding patents is the unequal and obvious disparity between the haves and the have not's. Patent enforcement for software, unlike literature and music, is largely subjective. In literature and music, it is obvious that the copyright has been abused or that the work has been copied; this isn't as simple with software.

How to Obtain a Patent

To obtain a patent for your software, you must apply for a patent in each country that offers patents for software and in which you wish to have the protection a patent can offer. There is no universal legal definition of what a software patent is. Each country that offers patents also has a different definition for what is protected by that patent, as well as for why a patent will be granted. Also consider the fact your software may be given a patent in one country where you applied and none of the others.

Of course, if this is not enough fun for you, you can try to deal with the red tape involved in dealing with multiple governments to resolve any issues or disputes that may have arisen from your software patents.

If you are applying for international patents (which can secure a profitable future for you and your business), you need to find a good patent lawyer and have him walk you through the entire process. Patents are complicated. When you're not exactly sure of what you're doing, whom you need to talk to, and what the next step is, you stand to waste a lot of time while taking a bigger risk. It is much easier to deal with how to copyright software on your own than it is to work out the complicated world of software patents.

If this is your first time designing your own software, you have every right to be nervous. Remember: lawyers went to school much longer than you to know what to do in this situation, so you should not be expected to know how to copyright or patent software when you've never done it before.

Using Hard Disk cleanup Wizard

The Disk Cleanup tool searches your entire hard disk for files that are safe and possible to delete and helps free up needed space. You can choose to delete some or all of the files.

* Remove temporary Internet files.
* Remove downloaded program files.
* Empty the Recycle Bin.
* Remove Windows temporary files.
* Remove optional Windows components that you are not using.
* Remove installed programs that you no longer use.


You can start Disk Cleanup, by doing any of the following:

* Click Start, My Computer
* Right-click appropriate hard disk drive, then click Properties
* Select the General tab,
* Click the Disk Cleanup button
(Disk Cleanup will take a few minutes to examine your disk )
* When the Disk Cleanup dialog box appears, select the Files from the list that correspond to what you want to delete.
* Click OK
* Click Yes to "Are you sure you want to perform theses actions?" box
* Click OK

To Remove Files Stored on Your Hard Disk
To remove files stored on your hard disk that you no longer use, follow these steps:

* Click Start, and then click My Computer.
* Right-click the disk in which you want to free up space, and then click Properties.
* Click the General tab, and then click Disk Cleanup.
* Click the Disk Cleanup tab (if it is not already selected), click to select the check boxes next to the files that you want to remove, and then click OK.
* Click Yes to the proceed with this action, and then click OK.

To Remove Windows Components

* Click Start, My Computer
* Right-click Local Disk, then click Properties
* On the General tab, click the Disk Cleanup button
* Select the More Options tab
* Under Windows components, click Clean up
(the Windows Components Wizard starts)
* In the Components list, click to clear the check box next to the component(s) that you want to remove.
(A shaded check box next to a component indicates that only some of its subcomponents are installed )
* If you want to remove a subcomponent, click Details
* Click the check box next to the subcomponent(s) that you want to remove
* Click OK.
* Click Next.
* Click Finish
* Click Yes
* Click Yes to "You must restart your before the new settings will take effect" message
* Click OK

To Remove Installed Programs

* Click Start, then click My Computer.
* Right-click Local Disk, then click Properties.
* On the General tab, click the Disk Cleanup button.
* Select the More Options tab
* Under Installed Programs, click Clean up
(the Add or Remove Programs dialog box is displayed)
* In the Currently installed programs list, click the program that you want to remove, and then click Remove (or Change/Remove)
* Follow specific steps issued for each program if they appear
* Repeat above steps for each program you want to remove

To Remove Restore Points

* Click Start, My Computer
* Right-click Local Disk, then click Properties
* On the General tab, click the Disk Cleanup button
* Select the More Options tab
* Under System Restore, click Clean up
* Click Yes to "Are you sure you want to delete all but the most recent restore point?" message
* Click OK

If you are using Netscape Navigator, Mozilla Firefox, or Opera, this program does not clean temporary Internet files for those applications.

Disk Cleanup does not clear your browsing history. It certainly isn't necessary to clear these, but if you share your computer, there is a privacy issue when others can see where you go on the Internet

Content Sites - What Are They?

So just what the heck is a content site?

Glad you asked. A content site is a site that contains content. This literal definition of a content site, however, doesn’t convey the sheer effectiveness of utilizing a content site for affiliate programs. There are several distinct advantages of using a full content site as opposed to a single-page sales format.

Using a sales page or a mini site is one way to sell a product, but even then the sales page is usually accessed from a content site. These larger sites, which can be 20, 30, 40 pages or more, have the advantage of many pages of keyword optimized content that just can’t be reached by a single page. With pages and pages of keyword articles, the content site has the potential for a much higher rank in the search engine line.

In addition to the SEO action, a content site is much more likely to be referenced again and again. People interested in the content will bookmark it and come back to read more about it. Multiple views can only increase the chance of sales, as well as word of mouth about the content that is provided. There probably aren’t that many people that bookmark a sales page, but when a content site has lots of practical information that a reader can use, it has a better chance of being read. Using a content site is like having a catalog, and the sales page is the order form.

Having pages of content also allows you to go more into depth about the items you are selling. A sales page is an obvious sales pitch. Readers come in, mill around, and they’re told why the product is a good thing to buy. A content site is seen more as information about the items- and look! They just happen to sell them here.

And, unlike a smaller site, a content site has room for plenty of products. If one of the products is failing, it can always be squashed and replaced with something that can perform better. Content sites usually are concerned with a specific topic, and within that topic there is room for any number of different products to be promoted. This creates a better chance of revenue instead of relying on only one item for the entire bulk of sales. In addition to changing around the products if they become ineffective, there is also room to change the keywords for the same reason.

A content site is also easier to promote than separate pages that each have to be promoted. An informational site can be branded to create a name for the site and its products. Creating a brand is something that can’t be done with just one product that is probably being sold elsewhere on countless other pages. A brand is the collection of pages, which will be unique to your site. A brand is a powerful thing in cyberspace, and can be wielded for good or evil. Or, just to make the highest number of conversions possible.