Tuesday, February 5, 2008
WAN Acceleration - 10 Reasons Why Businesses Need To Deploy This Technology
WAN optimization and application acceleration solutions are the hottest topics in IT these days. Many IT professionals are scrambling to get budget money approved to deploy these solutions in their environment as quickly as possible. You too can take advantage of this powerful, business enabling technology once you understand the driving reasons why this game changing other IT professionals have to get their hands on these solutions.
In this article, you and I will review some of the key reasons why most businesses need to deploy a WAN Optimization and WAN Application Acceleration Solution quickly.
Here is the list:
#1 - Server and Storage Consolidation
#2 - Disaster Recovery
#3 - Reduce WAN Bandwidth
#4 - Backup Consolidation and Data Replication
#5 - Data Protection and Regulatory Requirements
#6 - Increased Productivity Gains
#7 - Mobile Workers and Traveling Executives
#8 - Network Growth and Management
#9 - IT Efficiency
#10 - COST SAVINGS!
Now let's dive into each one in more detail:
#1 Server & Storage Consolidation - It's no secret that server sprawl and the "never delete anything" mindset is causing big headaches for IT professionals. Many companies either already have, or are in the process of consolidating servers and storage out of branch offices and into centralized data centers or host locations using virtual machines and storage area networks (SANs). This consolidation typically reduces cost and enables IT organizations to have better control over the company data. While server and storage consolidation produces many benefits, it can also produce some significant performance issues. Server consolidation typically results in chatty protocols such as CIFS (Common Internet File System), Exchange or NFS (Network File System), which were designed to run over the LAN, running over the WAN. For most of our customers we recommend that they deploy WAN accelerators before beginning to consolidate the server and storage environment so that end users do not have to deal with the performance impact associated with centralizing servers and data. At the end of the day you are able to get control of server sprawl, control the ever growing storage needs while simultaneously giving your end users LAN like application performance.
#2 Disaster Recovery - Have you deployed and tested a real DR strategy? Are you getting increased pressure from management to ensure resilient business continuity? With the growing importance of disaster recovery, businesses are relying heavily on WAN-based backup and data replication to secure important files and data. Backup and replication over the WAN ensures that data can be safely protected at a distance to the primary site, but also introduces new performance challenges that require companies to seek out methods that accelerate WAN backup applications. Disaster recovery and business continuity strategies can improve dramatically when businesses deploy a WAN Acceleration solution. This allows for the use of existing WAN bandwidth and allows IT to leverage an existing branch office as their DR site, rather than resorting to expensive 3rd party disaster recovery options. Now for the first time, even small organizations can leverage the combination of WAN acceleration, virtual servers, and IP SANs to be prepared for the worst scenario.
#3 Reduced WAN Bandwidth - "We'll just increase the bandwidth!" Ever made that statement? Now you have another option that actually works. Whether it's the inability to upgrade bandwidth at a few locations, or just the sheer amount of applications needed, there is a seemingly constant concern for managing bandwidth. By accelerating application performance, and reducing bandwidth utilization, WAN Accelerators enable the delivery of applications despite bandwidth limitations. The magnitude of the change is significant enough to change the end-user experience and also the nature in which they work. With WAN Accelerators deployed you can reduce your current WAN bandwidth by up to 95%. This allows for easy deployment of new applications such as voice and video over IP. This can really an eye opener when you see it in action!
#4 Backup Consolidation and Data Replication - Does the thought of restoring corrupted data keep you up at night? For faster and more reliable access to protected data, backup technology has moved beyond tape cartridges to spinning disk. Disk-to-disk and more scalable volume management systems allow for low-latency data to be backed up or restored in a fraction of the time required with tape. Data backup and recovery windows with WAN acceleration can go from 1 day to 2 hours. These innovations open the way for IT organizations to build security and scalability into their data protection architecture. Yet without the use of WAN acceleration to extend these benefits to distant remote branches, centralized backup cannot operate beyond the LAN without also creating congested pipes and soaring bandwidth costs.
#5 Data Protection and Regulatory Requirements - "SOX, SAS, PCI, and FISMA - Calgon take me away!" Regulatory compliance is forcing organizations to increase the security and maintainability of data center passwords. Customers report that by implementing the WAN Acceleration appliances, they are able to handle data protection in a completely different way. Instead of having to risk the loss and damage to tapes and with physical transportation to a backup facility, they can automate the process over the wide area. Not only does it save time, but it brings a new level of protection to sensitive company information. Keeping the auditors off your back!
#6 Increased Productivity - "My computer is slow, can you make this program work faster?" WAN Acceleration increases user productivity by speeding the performance of applications between distributed sites and between remote offices and enterprise data centers, allowing faster access to centrally located applications and facilitating collaboration within a distributed workforce. The appliances also have a number of features designed to optimize the work of IT. IDC (a research firm) found recently that improved user productivity accounted for the greatest benefits from deploying WAN Acceleration appliances. On average, users increased their productive time by 7.4%, saving 10.6 hours annually. These savings averaged $102,741 per 100 users per year.
#7 Mobile Workers and Traveling Executives - Businesses are becoming increasingly distributed. We've found that companies must support a large number of branch locations, vendor relationships, and employees that are simply no longer in the traditional headquarter location. As more and more users work outside of the traditional office, the need for them to connect to the critical corporate applications with "LAN like" performance is overwhelming. Mobile WAN Acceleration is allowing more and more employees to work in a productive manner outside of the standard office environment. A recent survey found that 23 percent of American workers regularly do their jobs from someplace besides the office, and that 62 percent of respondents who cannot work off-site would like to. The survey also found that workers prized the ability to telecommute more highly than stock options or on-site child care. This demand will only continue.
#8 Network Growth and Management - The IT staff of most businesses has not really grown over the past 5 years, yet that same staff is responsible for maintaining more and more network infrastructure as the business grows and the bottom line becomes more reliant on that network. With WAN Acceleration, the IT staff can simplify the setup and management of new and existing branch offices as well as set up regular reporting to easily keep track of the branch offices application usage and available WAN bandwidth when the need to roll out a new application presents itself. All of the WAN Accelerators can be centrally managed and updated by the single WAN Acceleration management appliance.
#9 IT Efficiency - In addition to seeking to reduce costs and drive new revenue, organizations use WAN Optimization and Application Acceleration Solutions to enable operational efficiency. Reducing calls to the IT help desk is a very concrete benefit to the IT organization in multiple ways. Also, IT can now quickly roll out new applications across the enterprise without the application performance concerns that have slowed the deployment of new apps in the past.
#10 COST SAVINGS! - The Return on Investment (ROI) can be impressive and immediate. Businesses save money immediately on the reduction in server maintenance (and of course replacement costs since they are no longer present). They avoid the costs of upgrading the WAN in an effort to increase performance, the cost of a WAN link to a branch can easily be thousands of dollars per month. Even the costs of backup and associated tapes and off-site media storage can be very significant. Lastly, it allows the business to avoid making new infrastructure purchases and reduces the need to hire new employees as the business grows because productivity of the business' existing staff has been enhanced tremendously.
I hope this has been an informative review of the key reasons why you need to deploy WAN optimization and application acceleration in your network environment.
Justin Lofton is the VP of Engineering for Tredent Data Systems, Inc.
Tredent Data Systems is the leader in wide area networking solutions. From carrier services (MPLS, Internet, Ethernet, etc), Cisco networking and Riverbed WAN acceleration technologies. http://www.tredent.com/
In this article, you and I will review some of the key reasons why most businesses need to deploy a WAN Optimization and WAN Application Acceleration Solution quickly.
Here is the list:
#1 - Server and Storage Consolidation
#2 - Disaster Recovery
#3 - Reduce WAN Bandwidth
#4 - Backup Consolidation and Data Replication
#5 - Data Protection and Regulatory Requirements
#6 - Increased Productivity Gains
#7 - Mobile Workers and Traveling Executives
#8 - Network Growth and Management
#9 - IT Efficiency
#10 - COST SAVINGS!
Now let's dive into each one in more detail:
#1 Server & Storage Consolidation - It's no secret that server sprawl and the "never delete anything" mindset is causing big headaches for IT professionals. Many companies either already have, or are in the process of consolidating servers and storage out of branch offices and into centralized data centers or host locations using virtual machines and storage area networks (SANs). This consolidation typically reduces cost and enables IT organizations to have better control over the company data. While server and storage consolidation produces many benefits, it can also produce some significant performance issues. Server consolidation typically results in chatty protocols such as CIFS (Common Internet File System), Exchange or NFS (Network File System), which were designed to run over the LAN, running over the WAN. For most of our customers we recommend that they deploy WAN accelerators before beginning to consolidate the server and storage environment so that end users do not have to deal with the performance impact associated with centralizing servers and data. At the end of the day you are able to get control of server sprawl, control the ever growing storage needs while simultaneously giving your end users LAN like application performance.
#2 Disaster Recovery - Have you deployed and tested a real DR strategy? Are you getting increased pressure from management to ensure resilient business continuity? With the growing importance of disaster recovery, businesses are relying heavily on WAN-based backup and data replication to secure important files and data. Backup and replication over the WAN ensures that data can be safely protected at a distance to the primary site, but also introduces new performance challenges that require companies to seek out methods that accelerate WAN backup applications. Disaster recovery and business continuity strategies can improve dramatically when businesses deploy a WAN Acceleration solution. This allows for the use of existing WAN bandwidth and allows IT to leverage an existing branch office as their DR site, rather than resorting to expensive 3rd party disaster recovery options. Now for the first time, even small organizations can leverage the combination of WAN acceleration, virtual servers, and IP SANs to be prepared for the worst scenario.
#3 Reduced WAN Bandwidth - "We'll just increase the bandwidth!" Ever made that statement? Now you have another option that actually works. Whether it's the inability to upgrade bandwidth at a few locations, or just the sheer amount of applications needed, there is a seemingly constant concern for managing bandwidth. By accelerating application performance, and reducing bandwidth utilization, WAN Accelerators enable the delivery of applications despite bandwidth limitations. The magnitude of the change is significant enough to change the end-user experience and also the nature in which they work. With WAN Accelerators deployed you can reduce your current WAN bandwidth by up to 95%. This allows for easy deployment of new applications such as voice and video over IP. This can really an eye opener when you see it in action!
#4 Backup Consolidation and Data Replication - Does the thought of restoring corrupted data keep you up at night? For faster and more reliable access to protected data, backup technology has moved beyond tape cartridges to spinning disk. Disk-to-disk and more scalable volume management systems allow for low-latency data to be backed up or restored in a fraction of the time required with tape. Data backup and recovery windows with WAN acceleration can go from 1 day to 2 hours. These innovations open the way for IT organizations to build security and scalability into their data protection architecture. Yet without the use of WAN acceleration to extend these benefits to distant remote branches, centralized backup cannot operate beyond the LAN without also creating congested pipes and soaring bandwidth costs.
#5 Data Protection and Regulatory Requirements - "SOX, SAS, PCI, and FISMA - Calgon take me away!" Regulatory compliance is forcing organizations to increase the security and maintainability of data center passwords. Customers report that by implementing the WAN Acceleration appliances, they are able to handle data protection in a completely different way. Instead of having to risk the loss and damage to tapes and with physical transportation to a backup facility, they can automate the process over the wide area. Not only does it save time, but it brings a new level of protection to sensitive company information. Keeping the auditors off your back!
#6 Increased Productivity - "My computer is slow, can you make this program work faster?" WAN Acceleration increases user productivity by speeding the performance of applications between distributed sites and between remote offices and enterprise data centers, allowing faster access to centrally located applications and facilitating collaboration within a distributed workforce. The appliances also have a number of features designed to optimize the work of IT. IDC (a research firm) found recently that improved user productivity accounted for the greatest benefits from deploying WAN Acceleration appliances. On average, users increased their productive time by 7.4%, saving 10.6 hours annually. These savings averaged $102,741 per 100 users per year.
#7 Mobile Workers and Traveling Executives - Businesses are becoming increasingly distributed. We've found that companies must support a large number of branch locations, vendor relationships, and employees that are simply no longer in the traditional headquarter location. As more and more users work outside of the traditional office, the need for them to connect to the critical corporate applications with "LAN like" performance is overwhelming. Mobile WAN Acceleration is allowing more and more employees to work in a productive manner outside of the standard office environment. A recent survey found that 23 percent of American workers regularly do their jobs from someplace besides the office, and that 62 percent of respondents who cannot work off-site would like to. The survey also found that workers prized the ability to telecommute more highly than stock options or on-site child care. This demand will only continue.
#8 Network Growth and Management - The IT staff of most businesses has not really grown over the past 5 years, yet that same staff is responsible for maintaining more and more network infrastructure as the business grows and the bottom line becomes more reliant on that network. With WAN Acceleration, the IT staff can simplify the setup and management of new and existing branch offices as well as set up regular reporting to easily keep track of the branch offices application usage and available WAN bandwidth when the need to roll out a new application presents itself. All of the WAN Accelerators can be centrally managed and updated by the single WAN Acceleration management appliance.
#9 IT Efficiency - In addition to seeking to reduce costs and drive new revenue, organizations use WAN Optimization and Application Acceleration Solutions to enable operational efficiency. Reducing calls to the IT help desk is a very concrete benefit to the IT organization in multiple ways. Also, IT can now quickly roll out new applications across the enterprise without the application performance concerns that have slowed the deployment of new apps in the past.
#10 COST SAVINGS! - The Return on Investment (ROI) can be impressive and immediate. Businesses save money immediately on the reduction in server maintenance (and of course replacement costs since they are no longer present). They avoid the costs of upgrading the WAN in an effort to increase performance, the cost of a WAN link to a branch can easily be thousands of dollars per month. Even the costs of backup and associated tapes and off-site media storage can be very significant. Lastly, it allows the business to avoid making new infrastructure purchases and reduces the need to hire new employees as the business grows because productivity of the business' existing staff has been enhanced tremendously.
I hope this has been an informative review of the key reasons why you need to deploy WAN optimization and application acceleration in your network environment.
Justin Lofton is the VP of Engineering for Tredent Data Systems, Inc.
Tredent Data Systems is the leader in wide area networking solutions. From carrier services (MPLS, Internet, Ethernet, etc), Cisco networking and Riverbed WAN acceleration technologies. http://www.tredent.com/
20 Laptop Security Tips
1. Install Mozilla Firefox - Mozilla Firefox will stop spyware dead in its tracks. Mozilla Firefox has many different plugins and advantages for other browsers and has a large community dedicated to keeping it secure.
2. Firewall. If you're your operating system is anything but Windows 98 then you have a built-in firewall. The problem is that most computers I fix the firewall is turned off. You wouldn't leave your front door open!! Firewalls close all the open doors or ports that enable remote users or applications to connect to your computer. No firewall means that all open ports can and will enable some application to connect to your computer remotely.
3. Encrypt your files - I don't care if you have a super secret password on your computer and all the latest patches if someone has physical access to your computer they can take your hard drive and pop it into another computer and access your files. If your files and folders are encrypted then they can't access them and steal your Identity. Pick a folder for you important documents-right click the folder then press advanced and then press encrypt folders and contents.
4. Updates - I don't care what operating system you use but make sure that you enable automatic updates. Updates should be install within twenty four hours of their release. Hackers will reverse engineer the published updates and use the exploits to create their own, so patch away.
5. Car Storage - OK, easy suggestion but if I'm a hacker all I need to do is follow the target home and wait for them to leave the laptop in the car. Dumb, but I felt like it needed to be said.
6. Laptop locks - Don't buy cheap laptop locks. Some of the cheap laptop locks on the market can be cut with small pliers. Good laptop lock cables will mesh together preventing it from being cut.
7. Policy - If you have own a business make a policy on how laptops are to be stored. You need to have a double lock policy. If a laptop is left unattended in a room it needs to be locked down with a laptop lock and the door to the room needs to be locked.
8. Harden Your Operating System - Locking down your operating system means stopping all unneeded services, installing updates and proper configuration of applications and server apps.
9. Passwords vs Pass Phrases - Make your passwords longer and more complicated.
10. Inventory - Assign inventory numbers and asset tags to laptops prior to giving them to employees. When a employee is fired or leaves the company get the laptop back, simple but often overlooked.
11. Wireless Security - Enable some sort of wireless security like WPA2, if you have no wireless encryption set up then all of your wireless clients can be tracked and subject to exploit. Kismet and other hacker tools will not only sniff wireless traffic they will also identify all the wireless clients for that wireless access points.
12. Walking Away - When you walk away from your laptop you need to press control-alt-delete and lock your computer. Dumb but it needs to be said.
13. AD-HOC Wireless networks - If your at a library or on campus or at a coffee shop and you scan for wireless networks and you see a computer to computer network don't' connect some one is trying to screw with you.
14. Rename your computer - Pretty easy to find you target if you computer's name is your name. Once a hacker knows your name the social engineering game begins.
15. Virtualization - Install Virtual PC and install a virtual machine. Use the Virtual computer to test all applications prior to use. Utilize the virtual pc for all risky websites.
16. Drinks -I think I have seen more lost data from someone spilling a drink on a laptop than anything else. So keep your drinks away from your laptop...yea simple.
17. Stolen Laptops - Register your laptops with one of the many different laptop recovery services. If you install their software and the thief accesses the Internet they can track it, deleted your data, and report the location to the police...in theory.
18. Ant-Virus - Update your virus definitions.
19. Install Linux - Ubuntu Linux is free, you can install it in about 15 minutes, and its more secure than anything Microsoft has to offer.
20. Install Linux - oops I put that twice but I think it deserves two listings, good luck
The Wireless Ninja can make your wireless network and work place more secure and productive. Visit http://www.wirelessninja.com and we will save you money, time and prevent your IT heachaches. Don't wait.
2. Firewall. If you're your operating system is anything but Windows 98 then you have a built-in firewall. The problem is that most computers I fix the firewall is turned off. You wouldn't leave your front door open!! Firewalls close all the open doors or ports that enable remote users or applications to connect to your computer. No firewall means that all open ports can and will enable some application to connect to your computer remotely.
3. Encrypt your files - I don't care if you have a super secret password on your computer and all the latest patches if someone has physical access to your computer they can take your hard drive and pop it into another computer and access your files. If your files and folders are encrypted then they can't access them and steal your Identity. Pick a folder for you important documents-right click the folder then press advanced and then press encrypt folders and contents.
4. Updates - I don't care what operating system you use but make sure that you enable automatic updates. Updates should be install within twenty four hours of their release. Hackers will reverse engineer the published updates and use the exploits to create their own, so patch away.
5. Car Storage - OK, easy suggestion but if I'm a hacker all I need to do is follow the target home and wait for them to leave the laptop in the car. Dumb, but I felt like it needed to be said.
6. Laptop locks - Don't buy cheap laptop locks. Some of the cheap laptop locks on the market can be cut with small pliers. Good laptop lock cables will mesh together preventing it from being cut.
7. Policy - If you have own a business make a policy on how laptops are to be stored. You need to have a double lock policy. If a laptop is left unattended in a room it needs to be locked down with a laptop lock and the door to the room needs to be locked.
8. Harden Your Operating System - Locking down your operating system means stopping all unneeded services, installing updates and proper configuration of applications and server apps.
9. Passwords vs Pass Phrases - Make your passwords longer and more complicated.
10. Inventory - Assign inventory numbers and asset tags to laptops prior to giving them to employees. When a employee is fired or leaves the company get the laptop back, simple but often overlooked.
11. Wireless Security - Enable some sort of wireless security like WPA2, if you have no wireless encryption set up then all of your wireless clients can be tracked and subject to exploit. Kismet and other hacker tools will not only sniff wireless traffic they will also identify all the wireless clients for that wireless access points.
12. Walking Away - When you walk away from your laptop you need to press control-alt-delete and lock your computer. Dumb but it needs to be said.
13. AD-HOC Wireless networks - If your at a library or on campus or at a coffee shop and you scan for wireless networks and you see a computer to computer network don't' connect some one is trying to screw with you.
14. Rename your computer - Pretty easy to find you target if you computer's name is your name. Once a hacker knows your name the social engineering game begins.
15. Virtualization - Install Virtual PC and install a virtual machine. Use the Virtual computer to test all applications prior to use. Utilize the virtual pc for all risky websites.
16. Drinks -I think I have seen more lost data from someone spilling a drink on a laptop than anything else. So keep your drinks away from your laptop...yea simple.
17. Stolen Laptops - Register your laptops with one of the many different laptop recovery services. If you install their software and the thief accesses the Internet they can track it, deleted your data, and report the location to the police...in theory.
18. Ant-Virus - Update your virus definitions.
19. Install Linux - Ubuntu Linux is free, you can install it in about 15 minutes, and its more secure than anything Microsoft has to offer.
20. Install Linux - oops I put that twice but I think it deserves two listings, good luck
The Wireless Ninja can make your wireless network and work place more secure and productive. Visit http://www.wirelessninja.com and we will save you money, time and prevent your IT heachaches. Don't wait.
Computer File Name Extensions Which You Should Not Forget If You Are A Computer User
File extension awareness can prevent you from downloading potentially dangerous files. It will also let you know which application is needed to open them. Read this article and it will help you in your day to day work.
File extensions are like surnames (In a real life scenario). The name can be chosen by you during the time of saving the file. The extension is given to it by the application. The list below mentions some of the most frequently used file name extensions . In reality there are at least a thousand file extensions existing as of today.
SAMPLE : filename.extension
1. Text files - .txt 2. Documents / Word file - .doc 3. Microsoft Excel - .xls 4. Microsoft Access - .mdb5. Microsoft Power Point - .ppt
Compatibility pack which is available from Microsoft site can be used for opening/editing office 2007 files with older versions.
6. Images - .jpeg, .gif, .png7. Audio - .wav, .cda, .mp3 ( and other versions ), .wma etc8. Video - .mpeg, avi(audio video interleave), .dat(VCD video file), DivX (DivX encoded movie), .rm(real media)9. Installers/ Executable - .exe10. Corel Draw - .cdr11. True type fonts ( Windows ) - .ttf12. Webpage - .htm, .html, .xhtml13. Programmed webpage - .php, .aspx, .cfm14. Microsoft ebook reader - .lit15. Rich Text File - .rtf16. Photoshop - .psd17. Flash - .flv, .fla18. Compressed - .zip, .rar19. Icons ( Windows ) - .ico20. Outlook Express email - .dbx
Office 2007 has new file extensions. The 2007 Microsoft Office system introduces a new file format that is based on XML. It is called Open XML Formats.
Word
XML file type Extension Document .docx Macro-enabled document .docm Template .dotx Macro-enabled template .dotm
Word supports a DOCX format (macro-free document) and a DOCM format (document that allows macros). Administrators can control the use of these formats by Group Policy.
Excel
XML file type Extension Workbook .xlsx Macro-enabled workbook .xlsm Template .xltx Macro-enabled template .xltm Non-XML binary workbook .xlsb Macro-enabled add-in .xlam
PowerPoint
XML file type Extension Presentation .pptx Macro-enabled presentation .pptm Template .potx Macro-enabled template .potm Macro-enabled add-in .ppam Show .ppsx Macro-enabled show .ppsm Slide .sldx Macro-enabled slide .sldm Office theme .thmx
File extensions are like surnames (In a real life scenario). The name can be chosen by you during the time of saving the file. The extension is given to it by the application. The list below mentions some of the most frequently used file name extensions . In reality there are at least a thousand file extensions existing as of today.
SAMPLE : filename.extension
1. Text files - .txt 2. Documents / Word file - .doc 3. Microsoft Excel - .xls 4. Microsoft Access - .mdb5. Microsoft Power Point - .ppt
Compatibility pack which is available from Microsoft site can be used for opening/editing office 2007 files with older versions.
6. Images - .jpeg, .gif, .png7. Audio - .wav, .cda, .mp3 ( and other versions ), .wma etc8. Video - .mpeg, avi(audio video interleave), .dat(VCD video file), DivX (DivX encoded movie), .rm(real media)9. Installers/ Executable - .exe10. Corel Draw - .cdr11. True type fonts ( Windows ) - .ttf12. Webpage - .htm, .html, .xhtml13. Programmed webpage - .php, .aspx, .cfm14. Microsoft ebook reader - .lit15. Rich Text File - .rtf16. Photoshop - .psd17. Flash - .flv, .fla18. Compressed - .zip, .rar19. Icons ( Windows ) - .ico20. Outlook Express email - .dbx
Office 2007 has new file extensions. The 2007 Microsoft Office system introduces a new file format that is based on XML. It is called Open XML Formats.
Word
XML file type Extension Document .docx Macro-enabled document .docm Template .dotx Macro-enabled template .dotm
Word supports a DOCX format (macro-free document) and a DOCM format (document that allows macros). Administrators can control the use of these formats by Group Policy.
Excel
XML file type Extension Workbook .xlsx Macro-enabled workbook .xlsm Template .xltx Macro-enabled template .xltm Non-XML binary workbook .xlsb Macro-enabled add-in .xlam
PowerPoint
XML file type Extension Presentation .pptx Macro-enabled presentation .pptm Template .potx Macro-enabled template .potm Macro-enabled add-in .ppam Show .ppsx Macro-enabled show .ppsm Slide .sldx Macro-enabled slide .sldm Office theme .thmx
The Safety Of A Good Anti Spyware
I have used antivirus products since the DOS and Windows days when antivirus protection was still an "option". Today you not only need AV protection for your PC but you also should have good antispyware and a software firewall. In the old days Norton AV used to be a premium AV program that worked well at a reasonable price. These things are no longer true today and the software security industry has become a multi-billion dollar monster that mostly cares about their own profits before customer interests.Here are some possible solutions.
If you still want to use a Symantec AV product then look into purchasing the latest "corporate version" of Norton Antivirus. I have read that the corporate version is still and excellent program without all the bloatware and bugs of the retail versions. You could also simply use Antispyware 2008 which can still be purchased inexpensively online. But if you have had it with Norton for now and want to jump ship before it completely sinks then I recommend you try Antispyware 2008. There are some other antivirus choices that are also supposed to be good. Don't forget to install a good antispyware program and use a good software firewall or at the very least make sure that the standard Windows XP SP2 firewall is enabled.
Before you install any antivirus alternatives remember to completely, totally, and properly uninstall any and all versions of your other antispyware program from your computer. You can find some helpful info rmation regarding the proper un-installation of these products on their web site. The sad truth is that there are so many hidden and discrete files that the retail versions of Norton AV installs on your computer that some people have reported it to be harder to completely uninstall Norton AV than it is to get rid of a bad computer virus.
If you still want to use a Symantec AV product then look into purchasing the latest "corporate version" of Norton Antivirus. I have read that the corporate version is still and excellent program without all the bloatware and bugs of the retail versions. You could also simply use Antispyware 2008 which can still be purchased inexpensively online. But if you have had it with Norton for now and want to jump ship before it completely sinks then I recommend you try Antispyware 2008. There are some other antivirus choices that are also supposed to be good. Don't forget to install a good antispyware program and use a good software firewall or at the very least make sure that the standard Windows XP SP2 firewall is enabled.
Before you install any antivirus alternatives remember to completely, totally, and properly uninstall any and all versions of your other antispyware program from your computer. You can find some helpful info rmation regarding the proper un-installation of these products on their web site. The sad truth is that there are so many hidden and discrete files that the retail versions of Norton AV installs on your computer that some people have reported it to be harder to completely uninstall Norton AV than it is to get rid of a bad computer virus.
Sunday, February 3, 2008
LOC- LINE OF CONNECTION
HSDPA, A2DP,EDGE, 3G..... the mobile world seems to be speaking in a language from another planet. If you too have been jarred by mobile jargons, hop abroad as well try to make sense of it all.
BLUETOOTH
A technology that allows you to send information from one device to another or connect with BLUETOOTH accessories without wires. Unlike infrared, in BLUETOOTH the two devices need not be in the line of sight and can actually be within 100 meters to each other. The data that can be sent include musics, contact files, SMS etc. However the kind of data to be sent or recieved depends on the mobile handset. It is advisable to turn off BLUETOOTH when it is not required as it depletes the battery level at an alarming rate.
A2DP
Advanced audio distribution profile is a feature that allows high quality stereo audio to be transferred from a cellphone to a pair of stereo handsets. Your cellphone should have this profile if you wish to use BLUETOOTH-enabled audio accessories such as speakers and headphones.
BANDS
The frequencies on which mobile network provides (such as Airtel, Hutch, Idea and the likes) are allowed to operate are called BANDS. A phone is classified as DUAL-BAND, TRI-BAND or QUAD-BAND depending on the number of frequencies it can access. A simple rule of thumb- the more BANDS your phone supports, the more countries it will work in.
GPRS
General packet radio service.Quite simply, a way in which you can access the internet on your phone or even access iton a PC, using the cellphone as a modem. It can potentially allow a data transfer rate of up to 115 kbps, allowing the users to surf internet on their cellphones or computers. To enable GPRS on your phones, you need to contact your service operator provided your handset is compatible for the service. GPRS packages are generally offered either in terms of data transferred or in unlimited (surf as much as you like for a fixed payment per month) form.
EDGE
Enhanced data rate for GSM evolution , in simple terms , a faster way of accessing the internet on your mobile phone. It can theoritically deliver data at 384 kbps, which is almost three times the speed of conventional GPRS. This allows delivery of mutimedia and other applicatins requiring greater bandwidth to mobile phones.However, EDGE is not available in all areas.
MEGAPIXEL
Megapixel refers to the size of an image ,usually in reference to a photo from a digital camera or camera phone.Megapixel means one million pixels . The resolution of camera phones is often measured in megapixels. For example, a two megapixel camera can produce image with two million pixels. Since pixels are usually square and form a grid, a one-megapixel camera will produce an image roughly 1200 pixels wide by 900 pixels high. By comparision,a VGA image (640x480 pixels) would be only 0.3 megapixels.
VGA
Video graphics array; It is a standard size/resolution for digital cameras, images(files), and displays of your mobile phone,VGA size is 640 pixels wide by 480 pixels tall or vice-versa in potraitorientation. VGA is smaller than one megapixel.
USB
Universal serial bus ;A type of plug-in connection that is used to connect devices, including some phones , to desktop or laptop computers. In a phone, USB is useful for quickly transferring files to and from phones. It also allows the mobiles user to synchronise address book , music files, calender information and the likes with a computer application.
BLUETOOTH
A technology that allows you to send information from one device to another or connect with BLUETOOTH accessories without wires. Unlike infrared, in BLUETOOTH the two devices need not be in the line of sight and can actually be within 100 meters to each other. The data that can be sent include musics, contact files, SMS etc. However the kind of data to be sent or recieved depends on the mobile handset. It is advisable to turn off BLUETOOTH when it is not required as it depletes the battery level at an alarming rate.
A2DP
Advanced audio distribution profile is a feature that allows high quality stereo audio to be transferred from a cellphone to a pair of stereo handsets. Your cellphone should have this profile if you wish to use BLUETOOTH-enabled audio accessories such as speakers and headphones.
BANDS
The frequencies on which mobile network provides (such as Airtel, Hutch, Idea and the likes) are allowed to operate are called BANDS. A phone is classified as DUAL-BAND, TRI-BAND or QUAD-BAND depending on the number of frequencies it can access. A simple rule of thumb- the more BANDS your phone supports, the more countries it will work in.
GPRS
General packet radio service.Quite simply, a way in which you can access the internet on your phone or even access iton a PC, using the cellphone as a modem. It can potentially allow a data transfer rate of up to 115 kbps, allowing the users to surf internet on their cellphones or computers. To enable GPRS on your phones, you need to contact your service operator provided your handset is compatible for the service. GPRS packages are generally offered either in terms of data transferred or in unlimited (surf as much as you like for a fixed payment per month) form.
EDGE
Enhanced data rate for GSM evolution , in simple terms , a faster way of accessing the internet on your mobile phone. It can theoritically deliver data at 384 kbps, which is almost three times the speed of conventional GPRS. This allows delivery of mutimedia and other applicatins requiring greater bandwidth to mobile phones.However, EDGE is not available in all areas.
MEGAPIXEL
Megapixel refers to the size of an image ,usually in reference to a photo from a digital camera or camera phone.Megapixel means one million pixels . The resolution of camera phones is often measured in megapixels. For example, a two megapixel camera can produce image with two million pixels. Since pixels are usually square and form a grid, a one-megapixel camera will produce an image roughly 1200 pixels wide by 900 pixels high. By comparision,a VGA image (640x480 pixels) would be only 0.3 megapixels.
VGA
Video graphics array; It is a standard size/resolution for digital cameras, images(files), and displays of your mobile phone,VGA size is 640 pixels wide by 480 pixels tall or vice-versa in potraitorientation. VGA is smaller than one megapixel.
USB
Universal serial bus ;A type of plug-in connection that is used to connect devices, including some phones , to desktop or laptop computers. In a phone, USB is useful for quickly transferring files to and from phones. It also allows the mobiles user to synchronise address book , music files, calender information and the likes with a computer application.
WORLDSPACE SATELLITE RADIO
There were times when RADIO was the most popular medium to cater to the entertainment and information needs of common man in both rural and urban india. But with the advent of television, followed by cable, the golden era of RADIO almost came to the end. The period post 2k will be remembered as the reincarnation of RADIO, with big FM players adding glamour to the 'aam aadmi' medium.
This entertainment medium has been further enriched with the WORLDSPACE SATELLITE RADIO entering the fray to entertain the people in all new avtar. It was NOAH SAMARA who thought of WORLDSPACE RADIO with the objective of reaching out to the world.It started in 1990.The advantages that set the WORLDSPACE system apart from traditional RADIO are- the reciever is euipped with a data port that transforms it into a wireless modem able to download data to personal computers. Its digital signal means no fading, noise or interference. Currently, there are over 40 channels satisfying the need of the listeners. A few of them that may suit your interests are-
MAESTRO: This channel features the best of western classical music and rare concerts played by the top world's top orchestras.
BBC ASIA: News , information and cultural programming from one of the best-known international broadcasters in the world.
AMORE: The channel is dedicated to love songs specially international ones.
NDTV 24x7: This news and current affairs channel provides the coverage of the latest in the domestic and international news and entertainment.
PUNCHLINE: This unique channel takes you into the world of comedy. The channel features comedians like BOB HOPE, BOB NEWWHART,ABBOTT, CASTELLO and many more.
PLAY: It is india's first 24-hours-sports-radio channel ,with exclusive coverage from BBC,TWI and radio Mid-day. It also updates you on dressing room scoopsnd vignettes about different sports stars.
THE ART OF LIVING: This channel brings you lessons on meditation,disourses and daily serving of SHLOKAS and BHAJANS .
Currently 14 million users are enjoying the services of WORLDSPACE SATELLITE RADIO. To join the list, you are needed to make a payment of Rs 2599, which gets you the complete set of WORLDSPACE SATELLITE RADIO, with a RADIO player, speakers, an earphone and a patch antenna. Now to enjoy the services, you need to subscribe for the programme as well . After paying the subscription fee of Rs 1000 for one year,welcome to the world of WORLDSPACE SATELLITE RADIO. For more information log on to www.worldspace.in
This entertainment medium has been further enriched with the WORLDSPACE SATELLITE RADIO entering the fray to entertain the people in all new avtar. It was NOAH SAMARA who thought of WORLDSPACE RADIO with the objective of reaching out to the world.It started in 1990.The advantages that set the WORLDSPACE system apart from traditional RADIO are- the reciever is euipped with a data port that transforms it into a wireless modem able to download data to personal computers. Its digital signal means no fading, noise or interference. Currently, there are over 40 channels satisfying the need of the listeners. A few of them that may suit your interests are-
MAESTRO: This channel features the best of western classical music and rare concerts played by the top world's top orchestras.
BBC ASIA: News , information and cultural programming from one of the best-known international broadcasters in the world.
AMORE: The channel is dedicated to love songs specially international ones.
NDTV 24x7: This news and current affairs channel provides the coverage of the latest in the domestic and international news and entertainment.
PUNCHLINE: This unique channel takes you into the world of comedy. The channel features comedians like BOB HOPE, BOB NEWWHART,ABBOTT, CASTELLO and many more.
PLAY: It is india's first 24-hours-sports-radio channel ,with exclusive coverage from BBC,TWI and radio Mid-day. It also updates you on dressing room scoopsnd vignettes about different sports stars.
THE ART OF LIVING: This channel brings you lessons on meditation,disourses and daily serving of SHLOKAS and BHAJANS .
Currently 14 million users are enjoying the services of WORLDSPACE SATELLITE RADIO. To join the list, you are needed to make a payment of Rs 2599, which gets you the complete set of WORLDSPACE SATELLITE RADIO, with a RADIO player, speakers, an earphone and a patch antenna. Now to enjoy the services, you need to subscribe for the programme as well . After paying the subscription fee of Rs 1000 for one year,welcome to the world of WORLDSPACE SATELLITE RADIO. For more information log on to www.worldspace.in
CAMERA PHONES
Mobile imaging, relatively a new concept ; will take the industry into a new era where CAMERA PHONES ill become mainstream imaging devices and an extention of our mobile lifestyles.
Cellular phones , once meant just for talking , now almost universally come with built-in digital cameras. That means user can snapphotos and send them instantlyto loved ones almost as easily as placing a call.
Mobile imaging is relatively a new concept,with Nokia launching the industry's first mobile phone with integrated camera(for GSM markets) in june 2002.According to a Mobile imaging report, by 2005 the number of CAMERA PHONES sold outnumbered the sales of still digital cameras. With the significant surge in demand over the last two years, mobile phones are expected to add more cameras to the mix than digital and analogue cameras combined- approximately 50 percent more. The rise of mobile imaging has been unprecedented and this trend has tansitioned from being a gadget fad confined to JAPAN in 2001 to emerging as the most popular mode for picture taking around the world in five years.
It is interesting to note that in JAPAN , where CAMERA PHONE penetration is by the far the highest, sales of single-use cameras are on the decline. So what does this mean? The dominance of CAMERA PHONES will impact the imaging market in a variety of ways that will benefit the industry.Mobile imaging is a revolutionising mode where MMS is set to eclipse SMS traffic sometimes in 2007.The concept of mobile phones has drastically evolved over a period of time. Gone are the days , when it is used to be a single fuctionality device just to serve your communication needs. With the advent of CAMERA PHONES, mobile phones have given a new dimension to human expression .As they say "An image is worth a thousand words".
When text messaging was first introduced in a Nokia phone in 1994, mobile phone users discovered a new way to communicate quickly and efficiently-without speaking. Take a lok around and you will find people busy fiddling with their mobile phones to confirm appointments , discuss strategy, greet loved ones and share jokes. It has indeed become an integral part of everybody's life. Building on this plateform, came Multimedia imaging in 2002 that took text messaging to the second level. This allowed a rapidly increasing number of mobile users to experience how life can be enriched by means of visual communications.
Cellular phones , once meant just for talking , now almost universally come with built-in digital cameras. That means user can snapphotos and send them instantlyto loved ones almost as easily as placing a call.
Mobile imaging is relatively a new concept,with Nokia launching the industry's first mobile phone with integrated camera(for GSM markets) in june 2002.According to a Mobile imaging report, by 2005 the number of CAMERA PHONES sold outnumbered the sales of still digital cameras. With the significant surge in demand over the last two years, mobile phones are expected to add more cameras to the mix than digital and analogue cameras combined- approximately 50 percent more. The rise of mobile imaging has been unprecedented and this trend has tansitioned from being a gadget fad confined to JAPAN in 2001 to emerging as the most popular mode for picture taking around the world in five years.
It is interesting to note that in JAPAN , where CAMERA PHONE penetration is by the far the highest, sales of single-use cameras are on the decline. So what does this mean? The dominance of CAMERA PHONES will impact the imaging market in a variety of ways that will benefit the industry.Mobile imaging is a revolutionising mode where MMS is set to eclipse SMS traffic sometimes in 2007.The concept of mobile phones has drastically evolved over a period of time. Gone are the days , when it is used to be a single fuctionality device just to serve your communication needs. With the advent of CAMERA PHONES, mobile phones have given a new dimension to human expression .As they say "An image is worth a thousand words".
When text messaging was first introduced in a Nokia phone in 1994, mobile phone users discovered a new way to communicate quickly and efficiently-without speaking. Take a lok around and you will find people busy fiddling with their mobile phones to confirm appointments , discuss strategy, greet loved ones and share jokes. It has indeed become an integral part of everybody's life. Building on this plateform, came Multimedia imaging in 2002 that took text messaging to the second level. This allowed a rapidly increasing number of mobile users to experience how life can be enriched by means of visual communications.
Subscribe to:
Posts (Atom)