Sunday, December 14, 2008

Have a blog, so make money from it

Every people who alway visit internet know about blog. Yes, a blog. Blog is a personal website that we can make without know about web programming. Thats the truth, a common user can make a blog so easy, just click and click then finish and you have create a blog. Blog is like online diary, most of user write down on their blog about their daily activities.

But does everyone know how to make money from that hobby, blogging?. Maybe there is a lot of blog user doesnt know about it. advertise on blogs are one of many way to monetize your blog. There is many way around internet, but this is the most used by blogger in common. For example, there are PTC ( pay to click ), PTR ( pay to review ) and many more. is one of the most popular program in review program. You just need to submit your blog, wait for reviewing by the crew, and make money with post a review that you can get. In we receive the payment with paypal transfer. It give a more reliable transfering money and it so secure. Many blogger have receive their payment and give testimonials that say is the best pay per review program in internet. has a good website looking,eye candy looking. Once you got there, you will know what you have to do. Sign up for new account is the first way for you. If you have any question, there is a crew that can answer all your question about this program with IM. They will be so pleasure to help you.

If you want to know more, read this article carefully. I suggest you that have a blog, you have to follow my way. Run your hobby, create money. Do you like it, right? I've join this for a long time, and I have a good income from it. I can work at home, enjoy my life, and I have money from my hobby. 

Thursday, December 4, 2008

Technology And The Whistleblower

As the meeting comes to a close, your boss smirks with an self assured arrogance. He then says that you should seriously consider his offer, because he has it on good authority, that there may be a very localized downsizing in your department. Wouldn’t it be nice to smirk back and just say “no thanks”.

This scenario plays out more often then most people realize. With all of the recent business and government scandals there were a lot of people who knew that books were being cooked, laws being broken and the health of the public being put at risk, just to keep profits high and investors content. Many people felt that there was nothing they could do against powerful executives and corrupt bureaucrats. The credibility of a low level employee compared to that of a ‘successful’ corporate executive is a huge hurdle to overcome. Also, corporate lawyers are there to defend the company, even from internal hazards. So, once a person decides to speak up, they must be prepared to have their credibility brutally attacked and the onslaught of legal preceding from an all-star team of corporate lawyers.

Just the thought of legal proceedings can stop a person from making the ethical choice. It’s easy for people to be vilified by their employer, at which point the credibility of the person speaking out is destroyed. How is possible for a single person to fight a company or government with infinite resources? Many years ago, it was practically impossible. However, the “digital revolution” may have changed the balance of power. For a “whistleblower” to be effective they need proof of wrong doing and a method to communicate those issues to the public. The availability of compact electronic devices such as digital audio recorders and digital cameras allow an individual to document many of the issues and bring the power back to the whistleblower.

The first piece of technology that should be in every whistleblowers repertoire is a digital audio recorder. These devices are so small that they can be put in a shirt pocket without being noticed. Once you decide to “blow the whistle” you should start recording all of your conversations. Keep a log of the items discussed, so that you can refer to the appropriate recording when needed, otherwise you can spend hours going back over the content. The best part is that these devices are not expensive. A digital voice recorder costs about $100, or many times MP3 players have a microphone built into the device, so they can be used to record conversations.

Another device that is very handy is a voice modem with telephone recording software. This will allow you to, hook up your phone, and record any conversations that occur over the phone. If you get fired before you have all the evidence, sometimes telephone conversations, with the people in power, can help to document important facts, because people very rarely think they are being recorded and say things that they probably should not have.

Make sure you check your local laws regarding conversation recording. In most places it is legal to record with one-party consent. One-party consent means that if you are involved in the conversation, you do not need to notify the other parties that you are recording the conversation. In Canada, one-party consent is the law. In the United States it is a little more complicated, as some states have their own regulations. You can refer to this recording law chart ( to determine what laws affect you. If in doubt, speak with a lawyer.

The third device every whistleblower should have is a digital camera. Many times the violations are in manufacturing or packaging, which could be a public health concern. These can be very hard to document and prove, since the paper records may be manipulated. A picture says a thousand words though, and will help authorities uncover doctored documents. When taking pictures be very cautious as most companies prohibit camera’s on their premises. Many cell phones are now equipped with digital camera’s, so they are easier to conceal. Take as many pictures as you can and try to prove the date you took them. Some camera have a date stamp feature, even though this is easy to manipulate. The best option is to take a picture of the daily newspaper beside the offending subject. This is very hard for lawyers to argue against and disprove that the violations did occurred on that particular date.

The last piece of equipment needed is a computer. When the authorities begin investigating your complaint, you will need to produce your evidence such as documents pointing to the issues. Most corporations are moving towards a paperless environment, which means that these documents will only be accessible by a computer. The other important part your computer plays, is to backup all of those images and audio recordings. Make sure your computer has a CD writer or DVD writer. Take these backups and put them somewhere secure, like a bank deposit box.

One area of concern is the removal of corporate documents from the office. This can violate many legal agreements you may have signed. If you are worried about this, there is a very simple solution. Backup all of the evidence files at work and stash them somewhere in the office. In the ceiling or in duct work is a great place. Basically, anywhere nobody ever looks. When it is time to produce these documents, simply tell the authorities that you have stashed them in a safe place at the office. The evidence is kept safe and you haven’t violated any agreements, a win-win situation.

In the future, companies may begin banning digital devices from the workplace for the exact reasons being discussed here. However, if were are persistent, it may go the other way and corporate behaviour may change, which is the ultimate goal of being a whistleblower. The days of “plausible deniability” and “disgruntled employees” are disappearing quickly.

Writer : Darcy O'Neil
Source :

Wednesday, December 3, 2008

OpenOffice 3.0 Final 3 is the leading open-source office software suite for word processing, spreadsheets, presentations, graphics, databases and more. It is available in many languages and works on all common computers. It stores all your data in an international open standard format and can also read and write files from other common office software packages. It can be downloaded and used completely free of charge for any purpose. 

Great Software requires great people. 3 is the result of over twenty years' continuous high quality software engineering. Designed from the start as a single piece of software, 3 has a consistency and a quality that is world class. Its open-source development model means there are no secrets. 
Roll your mouse over the screenshots for more details of the main components (requires javascript). 

Easy to choose, easy to install, easy to learn - 3 is the easy choice for an office software suite. 3 is suitable for complete beginners, but if you have used any other office software, that's ok too. 3 will make full use of what you already know - through familiar screens and menus - and also what you have - by reading existing files with no retyping. 

You may use 3 for any purpose without restriction: private, educational, public administration, commercial...

download link

What is VPS??

A Virtual Private Server (VPS) is a hosting environment that combines the benefits of both shared hosting and dedicated hosting. It does this by creating a virtual server that runs inside a hardware server via a specially designed partition.

Each Virtual Private Server partition runs its own operating system in a secure and private environment and cannot be accessed or interrupted by its neighbours. This system gives you the same level of root access as a dedicated server whilst sharing the cost of the hardware. With a VPS you are virtually running your own server but at a fraction of the cost.
The flexibility of a dedicated server

Users share system resources, such as the CPU and memory, but unlike shared hosting (a virtual host on a shared hardware server ) the file system is fully partitioned. This means that up-time is more consistent; while root access to the server provides the flexibility to add and change modules and to install your own software.
As cost effective as shared hosting

Partitioning a single hardware server into multiple servers is nothing new. In fact, mainframe computers have long been partitioned into multiples. In 1996, Japanese giant Verio started to migrate the technique into hosting as a highly cost-effective storage solution.
How much technical knowledge do I need?

All our VPS options include the Plesk control panel, which makes it easier to administer your websites and services.

However, because a VPS gives you root-level access, allowing you to install whatever software you like, you will need some technical knowledge and understanding of how servers work to run a VPS effectively.
Why call it VPS 2.0?

We've called our new VPS range VPS 2.0 because of our next generation improvements to both performance and hardware. Our servers are 9th generation Dell machines with embedded Intel® Virtualization (VT®) optimisation in the Intel® boards. They are designed by Dell specifically to ramp up VPS performance.

The inclusion of the very latest range of software and control panels for Windows and Linux is accompanied by price reductions across the range so we're increasing performance, features and value at exactly the same time.
Powerful partnerships working for you

We've partnered with SWsoft to offer you a choice between Ubuntu Linux and Microsoft Windows virtual private server systems, making us the first UK host to deliver Windows SQL Server 2005 VPS hosting using the latest Plesk 8 and Virtuozzo Power Panel technology.

All VPS 2.0 systems are hosted on Dell PowerEdge 2950 servers with quad-core Intel® Xeon® processors for maximum multi-tasking performance and 15,000 RPM SCSI RAID 10 drives for data speed and integrity.

As we're a certified Intel Server Centre of Excellence using a Tier 1 Network with 50,000 Mbit Connectivity, you can also trust we set the access, speed and safety benchmarks you need.


Tuesday, November 25, 2008

Carlsberg launches Web-TV

Who didnt know football?
Almost every poeple in this world love this game. Oldman or youngman, man and women, has no different in this game. Maybe you loose your football club match? Don't worry about that, you can find it in is one from a lot of web tv that give you what you want.

Carlsberg web-tv has so much galery of various match around the world. Find and search what you want to see, especialy football moment.
Be sure not to miss the video clips about football funnies and rituals from the Football Magic.

Sunday, November 23, 2008

Routing Versus Bridging

When Connecting to the Wireless, xDSL or Cable Network


As wireless, cable and xDSL technologies emerge, a growing consideration is how to connect to the network. Although much can be said about different methods, it really boils down to two: bridging or routing. Now for those experienced in networking, they will know that this question has been around since routing and bridging technologies have been. However the new element here is that the discussions always centered on LAN’s and/or private WAN’s. When connecting to the Internet there are new considerations to keep in mind when making your decision. This technical document is geared for those who need assistance in the decision for choosing what equipment and how to connect to the cable or xDSL network.


Now before we can argue routing versus bridging (or vice versa for that matter) we need to be clear on what both devices are and how they behave. So let’s define each one:


A bridge is a device that connects two segments of the same network. The two networks being connected can be alike or dissimilar. Unlike routers, bridges are protocol-independent. They simply forward packets without analyzing and re-routing messages.


A router is a device that connects two distinct networks. Routers are similar to bridges, but provide additional functionality, such as the ability to filter messages and forward them to different places based on various criteria. The Internet uses routers extensively to forward packets from one host to another.

Based on these definitions we can see that key difference between a bridge and router is that a bridge does not look at protocols and a router does. A bridge does not look at traffic for the purpose of allowing or disallowing it, and it does not decide what to do with certain types of traffic; it simply moves data from one network to another. Whereas a router examines protocols and decides what to do with each packet based on defined criteria.

Router vs. Bridge in Cable & DSL Environments

When you order Internet access either via a cable or xDSL connection, they will offer you a bridge (although it may often be called a “modem,” it is a bridge). These are very low cost (usually around $200,) and will connect your machine to the ISP’s network. Now this is a cost-effective solution, however there are some very apparent reasons on why you should consider a router over a bridge. Let’s look at an example to illustrate this point

Security Risk: In this example, we have two different customers bridged to the Internet using the same ISP. You can see that both customers have IP addresses on the same IP network. This means that broadcast from Customer A’s network will propagate to Customer’s B network. For example if machines on both networks are utilizing file and print services through the Windows Network, it is perfectly plausible (and has happened) that machines from Customer A can show up in the Network Neighborhood of Machines on Customer B’s network. Now for security reasons alone this is a very undesirable situation.

Everyone is talking about firewalls, filtering, etc. Many people connecting to the Internet today do not realize how vulnerable they are to attacks from the Internet. When utilizing a dial up connection, the exposure is only for the time you are connected, however, along with the all the benefits of a permanent connection, there is a big drawback: your network is exposed to the Internet 24 hours a day, 7 days a week. When you are at home asleep, it could be quite possible someone out there is working away at your network in the hopes of destroying or stealing data. Although this is not a pleasant thought there are very simple means to prevent this happening.

The first thing is have a routed account. With a routed account you have a device examining all traffic before it enters your network. This means that traffic not destined for your network will not be routed to your LAN, broadcast storms, and other network related issues on other networks connecting to your ISP will not effect your network. Now the biggest gain from a routed account is security. A Router has the ability to filter Internet traffic. This means the router connecting you to the Internet can discriminate which traffic it will allow into your network, and which traffic it will not. A Router also has the ability to “hide” all of the IP addresses on your network and make them appear as if the were only one IP address out on the Internet. By doing this, you have just eliminated 90% of all security threats.

Other Benefits: Aside from security other benefits of using a Router over a bridge include:

· You will have a contiguous block of IP addresses, rather than sporadic address across a network.

· A Router can use DHCP to assign workstations addresses on the LAN, preventing specific configuration in each device.

· A router has the ability to use NAT (Network Address Translation), thus only requiring you to obtain 1 IP address from your ISP. Cost saving as well as security enhancement

For the above reasons it seems quite clear that a routed account has distinct advantages over a bridged connection. For wireless bridge connections an Ethernet broadband router can be placed between the bridge and the LAN, thus providing all the benefits of routing to cable, ADSL and other environments.


Wednesday, May 28, 2008

What is the purpose of Wi-Fi ad-hoc mode? Why would I use it?

The 802.11 standard defines two modes of operation: Infrastructure mode, where all stations communicate through an access point, and ad-hoc mode, where stations communicate directly without the help of an intermediary. Ad-hoc mode can be useful for temporary peer-to-peer applications, such as when two laptop users want to exchange files over Wi-Fi.

Most businesses discourage use of ad-hoc mode because they prefer to enforce corporate security policy at the access point and gateway or switch connected to the access point. Users that communicate directly over ad-hoc mode essentially bypass those security measures. Ad-hoc mode can even be used as an attack method. For example, a Windows XP PC that previously associated to an access point with a given name (SSID) can be tricked into automatically re-associating in Ad-hoc mode to an attacker's laptop that advertises that SSID. You avoid this attack by configuring XP (or any other wireless client software) to associate to preferred SSIDs in infrastructure mode only.

On the other hand, several vendors are now using ad-hoc mode as the foundation for building wireless mesh networks. Mesh networks have many applications, including outdoor metropolitan networks and mobile ad-hoc networks (MANETs). To learn more about Ad-hoc mode and its use in mesh networks, visit this NIST resource page. A standard for mesh networks is now under development, designated IEEE 802.11s.

In short, ad-hoc mode has many constructive uses, but unless you have a specific reason for enabling, your safest best today is to disable ad-hoc mode to prevent unwanted or risky associations.


What is Hub

In general, a hub is the central part of a wheel where the spokes come together. The term is familiar to frequent fliers who travel through airport "hubs" to make connecting flights from one point to another. In data communications, a hub is a place of convergence where data arrives from one or more directions and is forwarded out in one or more other directions. A hub usually includes a switch of some kind. (And a product that is called a "switch" could usually be considered a hub as well.) The distinction seems to be that the hub is the place where data comes together and the switch is what determines how and where data is forwarded from the place where data comes together. Regarded in its switching aspects, a hub can also include a router.

1) In describing network topologies, a hub topology consists of a backbone (main circuit) to which a number of outgoing lines can be attached ("dropped"), each providing one or more connection port for device to attach to. For Internet users not connected to a local area network, this is the general topology used by your access provider. Other common network topologies are the bus network and the ring network. (Either of these could possibly feed into a hub network, using a bridge.)

2) As a network product, a hub may include a group of modem cards for dial-in users, a gateway card for connections to a local area network (for example, an Ethernet or a Token Ring), and a connection to a line (the main line in this example).

What is bridge in network world

In telecommunication networks, a bridge is a product that connects a local area network (LAN) to another local area network that uses the same protocol (for example, Ethernet or Token Ring). You can envision a bridge as being a device that decides whether a message from you to someone else is going to the local area network in your building or to someone on the local area network in the building across the street. A bridge examines each message on a LAN, "passing" those known to be within the same LAN, and forwarding those known to be on the other interconnected LAN (or LANs).

In bridging networks, computer or node addresses have no specific relationship to location. For this reason, messages are sent out to every address on the network and accepted only by the intended destination node. Bridges learn which addresses are on which network and develop a learning table so that subsequent messages can be forwarded to the right network.

Bridging networks are generally always interconnected local area networks since broadcasting every message to all possible destinations would flood a larger network with unnecessary traffic. For this reason, router networks such as the Internet use a scheme that assigns addresses to nodes so that a message or packet can be forwarded only in one general direction rather than forwarded in all directions.

A bridge works at the data-link (physical network) level of a network, copying a data frame from one network to the next network along the communications path.

A bridge is sometimes combined with a router in a product called a brouter.


Tuesday, May 27, 2008

Switch is .....

In a telecommunications network, a switch is a device that channels incoming data from any of multiple input ports to the specific output port that will take the data toward its intended destination. In the traditional circuit-switched telephone network, one or more switches are used to set up a dedicated though temporary connection or circuit for an exchange between two or more parties. On an Ethernet local area network (LAN), a switch determines from the physical device (Media Access Control or MAC) address in each incoming message frame which output port to forward it to and out of. In a wide area packet-switched network such as the Internet, a switch determines from the IP address in each packet which output port to use for the next part of its trip to the intended destination.

In the Open Systems Interconnection (OSI) communications model, a switch performs the layer 2 or Data-Link layer function. That is, it simply looks at each packet or data unit and determines from a physical address (the "MAC address") which device a data unit is intended for and switches it out toward that device. However, in wide area networks such as the Internet, the destination address requires a look-up in a routing table by a device known as a router. Some newer switches also perform routing functions (layer 3 or the Network layer functions in OSI) and are sometimes called IP switches.

On larger networks, the trip from one switch point to another in the network is called a hop. The time a switch takes to figure out where to forward a data unit is called its latency. The price paid for having the flexibility that switches provide in a network is this latency. Switches are found at the backbone and gateway levels of a network where one network connects with another and at the subnetwork level where data is being forwarded close to its destination or origin. The former are often known as core switches and the latter as desktop switches.

In the simplest networks, a switch is not required for messages that are sent and received within the network. For example, a local area network may be organized in a Token Ring or bus arrangement in which each possible destination inspects each message and reads any message with its address.

Circuit-Switching version Packet-Switching

A network's paths can be used exclusively for a certain duration by two or more parties and then switched for use to another set of parties. This type of "switching" is known as circuit-switching and is really a dedicated and continuously connected path for its duration. Today, an ordinary voice phone call generally uses circuit-switching.

Most data today is sent, using digital signals, over networks that use packet-switching. Using packet-switching, all network users can share the same paths at the same time and the particular route a data unit travels can be varied as conditions change. In packet-switching, a message is divided into packets, which are units of a certain number of bytes. The network addresses of the sender and of the destination are added to the packet. Each network point looks at the packet to see where to send it next. Packets in the same message may travel different routes and may not arrive in the same order that they were sent. At the destination, the packets in a message are collected and reassembled into the original message.


Router is ......

In packet-switched networks such as the Internet, a router is a device or, in some cases, software in a computer, that determines the next network point to which a packet should be forwarded toward its destination. The router is connected to at least two networks and decides which way to send each information packet based on its current understanding of the state of the networks it is connected to. A router is located at any gateway (where one network meets another), including each point-of-presence on the Internet. A router is often included as part of a network switch.

A router may create or maintain a table of the available routes and their conditions and use this information along with distance and cost algorithms to determine the best route for a given packet. Typically, a packet may travel through a number of network points with routers before arriving at its destination. Routing is a function associated with the Network layer (layer 3) in the standard model of network programming, the Open Systems Interconnection (OSI) model. A layer-3 switch is a switch that can perform routing functions.

An edge router is a router that interfaces with an asynchronous transfer mode (ATM) network. A brouter is a network bridge combined with a router.

For home and business computer users who have high-speed Internet connections such as cable, satellite, or DSL, a router can act as a hardware firewall. This is true even if the home or business has only one computer. Many engineers believe that the use of a router provides better protection against hacking than a software firewall, because no computer Internet Protocol address are directly exposed to the Internet. This makes port scans (a technique for exploring weaknesses) essentially impossible. In addition, a router does not consume computer resources as a software firewall does. Commercially manufactured routers are easy to install, reasonably priced, and available for hard-wired or wireless networks.

Thursday, April 10, 2008

RAM Overview

by : Christophe Catesson

There are two big categories of random access memories:

* Dynamic memories (DRAM, Dynamic Random Access Module), not very costly. They are in most cases used for the central memory of the computer

* Static memories (SRAM, Static Random Access Module), quick and expensive. SRAM is notably used for cache memories of the processor

Functioning of the random access memory

The random access memory is constituted of hundred of thousand small condensers storing charges. When it is loaded, the logical state of the condenser is equal to 1, otherwise it belongs to 0, what means that every condenser represents one bit of memory.

Given that condensers off-load, it is always necessary to recharge them in a space of regular time called cycle of refreshment. Memory DRAM requires cycles of refreshment for instance (Ns) is about 15 nanoseconds.

Every condenser is coupled with a transistor allowing to "recover « or to change the state of the condenser. These transistors are lined up in form of matrix, that is they achieve a hut memory (so called memory) by a line and a column.

So, for a memory of type DRAM, the time of access is of 60 nanoseconds (35ns of delay of cycle and 25 ns of time of latency). On a computer, the time of cycle corresponds contrary to the frequency of the clock, for instance for a computer pulsated in 200 MHz, the time of cycle is 5 ns (1 / (200*106)).

As a result a computer having a frequency well brought up and using memories the time of access of which is much longer than the time of cycle of the processor must perform cycles of wait to access to the memory. In the case of a computer pulsated in 200 MHz using memories of types DRAM (which the time of access is of 60ns), there are 11 cycles of wait as a cycle of transfer. The performances of the computer are of as much diminished as there are cycles

Formats of Random Access Memory (RAM)

There are numerous types of random access memories. These all come in the form of barrettes of memory attachable on the motherboard.

* SIMM (Single Inline Memory Module): it is about printed circuits among which one of the faces has fleas of memory. There are two types of barrettes SIMM, according to the number of connector cables (30 or 72)

* DIMM (Dual Inline Memory Modulates) are from memories 64 bits, what explains why it is not necessary to match them. Barrettes DIMM have fleas of memory on both sides of printed circuit and have also 84 connector cables on each side, what endows them with a total of 168 brooches. They have bigger dimensions than barrettes SIMM (130x25mm).

* RIMM (Rambus Inline Memory Module, conscripts also RD-RAM or DRD-RAM) are from memories 64 bits developed by the society Rambus. They have 184 brooches. These barrettes have two notches of location (d├ętrompeurs), avoiding very risk of confusion with the previous modules. Considering their well brought up speed of transfer, barrettes RIMM have a thermal film made responsible for ameliorating the clearing up of warmth. As in the case of DIMM, there are modules of smaller size, called SO RIMM (Small Outline RIMM), intended for laptop computers. Barrettes SO RIMM include only 160 brooches.

* DRAM (Dynamic RAM, dynamic RAM) is the type of memo most spread at the beginning of the millennium. It is about a memory from which transistors are lined up in a matrix according to lines and of columns. A transistor, coupled with a condenser gives the information of a bit. 1 byte consisting of 8 bits, a barrette of memory 256 Mb DRAM will contain 256 therefore * 2^10 * 2^10 = 256 * on 1024 * on 1024 = 268 435 456 bytes = 268 435 456 * 8 = 2 147 483 648 bits = 2 147 483 648 transistors. A 256 Mb barrette has so in reality a capacity of 268 435 456 bytes, that is 268 Mb! These are memories from which the time of access is 60 ns. On the other hand, accesses memory are made in general on data lined up consecutively in memory. So the mode of access in gust (burst mode) allows to achieve the three successive data in the first one without time of additional latency.

* DRAM FPM to speed up accesses to DRAM, there is a technology, called pagination consisting in achieving data located on the same column by changing the address of the line only, what allows to avoid the repetition of the number of column between the reading of each of the lines. They speak then about DRAM FPM (Fast Page Mode). FPM allows to acquire time of access in the order of 70 - 80 nanoseconds for a frequency of functioning that can go from 25 to 33 Mhz.

* DRAM EDO (Extended Data Out, Goes out of data ameliorated sometimes also called "hyper-page") appears in 1995. The technology used with this type of memory consists in addressing the following column during the reading of the data of a column. It creates an overlapping of accesses allowing to save time on every cycle. The time of access to memory EDO is therefore about 50 - 60 nanoseconds for a frequency of functioning going 33 - 66 Mhz. So, RAM EDO, when it is used in mode gust allows to acquire cycles of form 5-2-2-2, that is a benefit of 4 cycles on the access to 4 data. As much as memory EDO did not accept the upper frequencies in 66 Mhz, it disappeared in aid of SDRAM.

* SDRAM (Synchronous DRAM, translate synchronous RAM), appeared in 1997, allows a reading of data synchronized with the bus of the card-mother, contrary to memories EDO and FPM (qualified as asynchronous) having their own clock. SDRAM allows therefore to free itself from time of wait owed to synchronization with the card-mother. This one allows to acquire a cycle in mode gust of form 5-1-1-1, that is to say benefit of 3 cycles in comparison with RAM EDO. In that way SDRAM is able of working with a cadenza going until 150 Mhz, allowing him to acquire from time of access about 10 ns.

* DR-SDRAM (Direct Rambus DRAM or else RDRAM) is a type of memory allowing to transfer data on a bus of 16 wide bits to a cadenza of 800Mhz, what confers on him a band passer-by of 1,6 Go / s. As SDRAM, this type of memory is synchronized with the clock of the bus to ameliorate exchanges of data.

* DDR-SDRAM (Double Dated Miss SDRAM) is a memory based on technology SDRAM, allowing to double the rate of transfer of SDRAM with equal frequency. Reading or writing of data in memory am accomplished on the basis of a clock. Standard memory DRAM uses a method conscript SDR (Single Data Fails) consisting in reading or writing data in every forehead going up. DDR allows to double the frequency of reading / writings, with a clock pulsated in the same frequency, by sending data in every forehead going up, as well as in every downward forehead. Memory DDR has in general a commercial appellation of type PCXXXX where "XXXX " represent the debit side in Mb / s.

* DDR2 (or DDR-II) allows to attain twice as well brought up debit sides as DDR with equal external frequency. They speak about QDR (Quadruple Dated Fail or quad-pumped) to indicate the method of reading and used writing. Memory DDR2 uses in effect two channels separated for reading and for writing, so it is able of sending or of accepting twice more data than DDR.


Wednesday, April 2, 2008

Microsoft Server 2008 Certification: Routing's Not Just For Cisco Exams Anymore!

by: Chris Bryant

Knowing routing theory and routing protocols has always been a big part of earning your CCNA and CCNP certifications. According to Microsoft's exam blueprints for the Server 2008 certification exams, that knowledge will also serve you well on your Microsoft exams.

The topic outline for the Configuring Windows Server 2008 Network Infrastructure exam (70-642) specifically mentions routing and routing protocols as exam topics. Specifically mentioned are RIP, OSPF, and static routing - three topics every CCNA and CCNP candidate will be well prepared to handle!

IPSec isn't part of the CCNA exam, but you'll see it on at least one CCNP exam, and it's also listed as a 70-642 exam topic. IPv6 and IPv4 addressing are both covered on the 70-642 as well.

Microsoft's website lists the following major skills you should expect to see on this exam:

Configuring IP addresses and Services (routing with RIP and OSPF, static routing, persistent routing, addressing, DHCP and DHCP options including relay agents, IPSec policies, Authentication Header and Encapsulating Security Payload, subnetting, supernetting)

Configuring Name Resolution (DNS configuration, zones, records, replication, and integration with Active Directory, and client computer name resolution techniques)

Configuring Network Access (includes NAT, VPNs, RADIUS, 802.1x authentication, MS-CHAP, firewalls, and remote authentication)

Configuring File And Print Services (self-explanatory)

Monitoring And Managing A Network Infrastructure (includes SNMP and Windows Server Update Services)

Your CCNA and CCNP preparation will not quite be enough to get you past this exam, but as you can see, it'll give you a great head start!


Monday, March 24, 2008

What's WiMAX?

WiMAX is a short name for Worldwide Interoperability of Microwave Access. WiMAX is described in IEEE 802.16 Wireless Metropolitan Area Network (MAN) standard. It is expected that WiMAX compliant systems will provide fixed wireless alternative to conventional DSL and Cable Internet.

Typically, a WiMAX system consists of two parts:

  • A WiMAX Base Station: Base station consists of indoor electronics and a WiMAX tower. Typically, a base station can cover up to 10 km radius (Theoretically, a base station can cover up to 50 kilo meter radius or 30 miles, however practical considerations limit it to about 10 km or 6 miles). Any wireless node within the coverage area would be able to access the Internet.
  • A WiMAX receiver - The receiver and antenna could be a stand-alone box or a PCMCIA card that sits in your laptop or computer. Access to WiMAX base station is similar to accessing a Wireless Access Point in a WiFi network, but the coverage is more.

Several base stations can be connected with one another by use of high-speed backhaul microwave links. This would allow for roaming by a WiMAX subscriber from one base station to another base station area, similar to roaming enabled by Cellular phone companies.

Important Wireless MAN IEEE 802.16 (WiMAX) Specifications

Range - 30-mile (50-km) radius from base station
Speed - Up to 70 megabits per second
Non-Line-of-sight (NLoS) between user and base station
Frequency bands - 2 to 11 GHz and 10 to 66 GHz (licensed and unlicensed bands)
Defines both the MAC and PHY layers and allows multiple PHY-layer specifications.