Saturday, July 17, 2010

Press Release by Steve Jobs on Iphone4 Antenna issue..

Watch this press release by Steve Jobs on the Apple Iphone 4 issues
http://media.smh.com.au/technology/tech-talk/jobs-on-iphone-antenna-problem-1698650.html

Which Video card should I buy?

In all fields of expertise there's theory, and there's practice. Sometimes, the difference is slight (say, philosophy), and sometimes the difference is visceral, as with, say, bull-fighting, bungee-jumping and boxing. Deciding which graphics card to buy can often feel like the latter - you read up on the technology, scour the reviews and yet all too often the huge number of cards on sale seem to actively work against your ability to make a decision you feel confident with. In this section of the feature we're going to show you how to make the best decision, and to prove it can be done, we're going to analyse one of the toughest sections of the graphics market: the $300 to $600 zone. Brutal price drops and fierce competition make it a place many fear to tread, but we'll show you exactly how to get what you want.

Know your PC
The first step is to survey your own PC. If you want to buy a new graphics card for gaming, then your only real option is a PCI Express card (PCI-E). Nvidia appears to have almost totally given up on the older AGP standard, and while ATI has made a not-completely-terrible AGP GPU in the shape of the Radeon HD 3850, it retails for a high price ($200) in relation to the performance it offers. If you still have an AGP motherboard, you'll be better off in the long run replacing it with one that supports PCI-E.

Graphics cards are power-hungry, too, so you need to know what your PC's PSU is like. You'll need one that not only delivers enough total wattage for the system, but also has a strong 12v rail, as this is where the graphics card draws all its power from. In addition, graphics cards, particularly high-end models, often need specific types of power plugs, usually a combination of one or two 6- and/or 8-pin PCI-E connectors. You can buy convertors that turn Molex plugs into PCI-E power connectors, but this increases the cost and complexity of your PC's wiring.

If you want to use your existing PSU, it's not that easy to find out if it will be able to cope with a new graphics card: in part this is because not all PSUs of the same wattage are equal, and it's also because both Nvidia and ATI are very poor at revealing the power requirements of their graphics cards. Also, your system's power requirements will be impacted by the CPU and motherboard you use, the number of hard disks you use, and whether your CPU is overclocked - as heavy overclocking can almost double the power draw of your processor.

Outer Vision Extreme's PSU calculator can come in handy to give you a rough idea of what PSU you'll need. The minimum PSU we recommend is a 550w model and this should be fine for a PC with a stock-clocked or slightly overclocked dual- or quad-core CPU, with a single graphics card and hard disk.

Once you've considered your motherboard and the PSU, the next item to look at is your CPU. A graphics card is fed with data by other components inside the PC, and if these components can't keep up, then performance of the graphics card will be compromised and you won't see its full potential. Of all the other components in the PC, it's the CPU that has the biggest impact upon the graphics card. In the second half of this section we've tested how various graphics cards perform with different CPUs, so you can see the variation. How much CPU performance a game needs varies from title to title, but if you've got a system with an older dual-core CPU or a single-core model, it's likely that you won't see full performance from a new graphics card. While an upgraded card will help, a faster CPU also wouldn't go amiss.

Finally, make sure you know how much room is available inside your PC. If you've got a small PC or Shuttle case, you may not be able to fit in a dual-slot graphics card, or you may need to shuffle around PCI add-in cards. Also, bear in mind that high-end graphics cards are typically around 9.5 to 10.5in long.

Buying a new computer... Wait! Check this out!!!

If you're buying a new computer I would strongly suggest that you be sure of what you really need and do some ground work if you dont wish to consult us. Please ensure you go to this link so that you know which processor is good for you:
This will ensure you have the right base product. I would suggest a minimum of 4GB DDR3 RAM if not 8GB. In terms of storage space ie. a hard disk drive, I would suggest at least 500GB if not 750GB or 1 Terrabyte. When you're looking at graphic cards take one with a minimum of 1GB onboard graphics. I would suggest a DVD Burner and if you're going to watch movies on it maybe stretch your budget to a Blue Ray player though its not really required. Displaywise you need a LED display of you're going for a notebook/laptop. Desktop buyers can look for LCD as LED's are still an expensive option. Listen to this carefully.. For Operating systems definitely Windows 7 Home Premium if its for home & Windows 7 Professional for Business and if you would like the best of both then go for Windows 7 Ultimate. I would suggest you invest in Microsoft Office 2010 which will be a productive tool for your home or business.
If you're in a dilemma pls call 1300 649 124 & we'll be happy to advise you.

Apple offers free cases, refunds to iPhone 4 owners- SMH

Apple will give free protective cases to buyers of its latest iPhone to alleviate the so-called "death grip" problem in which holding the phone with a bare hand can muffle the wireless signal.
Apple chief executive Steve Jobs announced the giveaway on Friday during a news conference at its headquarters, even as the company denied the iPhone 4 has an antenna problem that needs fixing.
The more than 3 million people who have bought the iPhone 4 and new buyers through September 30 will all be eligible.

Steve Jobs, CEO of Apple Computer Inc., speaks during a press conference regarding the Apple iPhone 4 reception problems at the Apple headquarters. Photo: Getty Images
People who purchased the $US29 ($A32.80) "Bumper" cases will be refunded.
Jobs began the event by saying, "We're not perfect," but was quick to point out no mobile phone is perfect. He played a video showing competing smartphones, including a BlackBerry from Research in Motion, losing signal strength when held in certain ways.
Phones usually have an antenna inside the body.
In designing the iPhone 4, Apple took a gamble on a new design, using parts of the phone's outer casing as the antenna. That saved space inside the tightly packed body, but means covering a spot on the lower left edge of the case blocks wireless signal.
Consumer Reports magazine said covering the spot with a case or even a piece of duct tape alleviates the problem. It refused to give the iPhone 4 its "recommended" stamp of approval for this reason, and it had called on Apple on Monday to compensate buyers.
On Friday, in the company's first remarks following the magazine's report, Jobs said Apple was "stunned and upset and embarrassed".
Jobs said the iPhone 4's antenna issue isn't widespread. He said just over five out of every thousand users have complained to Apple's warranty service, and less than 2 per cent have returned the device.
"We're not feeling right now that we have a giant problem we need to fix," Jobs said. "This has been blown so out of proportion that it's incredible. I know it's fun to have a story, but it's less fun when you're on the other end of it."
Analysts have criticised Apple's first responses to reports of reception problems as dismissive.
Jobs apologised to buyers who had less than perfect experiences.
"We're going to do whatever it takes to make them happy and if we can't make them happy we're going to give them a full refund and say we're really sorry we inconvenienced you, and we're going to do better next time."
The refund applies even for those who have long-term contracts with AT&T Inc., the iPhone's exclusive US wireless carrier.
Jobs, a cancer survivor, also addressed a question about his health on Friday.
"I'm doing fine. I was even better earlier in the week (when) I was having a vacation in Hawaii, but I decided this was important enough to come back for," he said. "I'm doing great."

Monday, July 5, 2010

Rumour: Telstra iPhone 4 Pricing Leaked?

Rumour: Telstra iPhone 4 Pricing Leaked?

Review Telstra's New T Hub..

Telstra's jumping deeper into the home entertainment space with the launch of its new T-Box, which bundles a high-definition set-top box/PVR with unmetered BigPond TV and movie on-demand content.

The Good
To get broadband-delivered content on your television screen, Telstra is packing quite a lot of punch into its new T-Box. It's an HD-ready digital TV set-top box that gives you access to free-to-air digital channels. With two tuners, its video recording functionality lets you record one channel while watching another, and you can store up to 100 hours of standard definition or 30 hours of high-definition content on its 320GB hard drive.
It has a seven-day electronic program guide and the menu structure looked very easy to use, scrolling through all the standard- and high-definition digital free-to-air television channels, as well as seven additional BigPond TV channels.
In addition to the BigPond TV channels, what makes T-Box more interesting than a stock-standard PVR is access to the BigPond library of on-demand movies. Telstra says that it currently has more than 1300 titles available to hire, and the number should grow to 2000+ by the end of the year. There's a pretty good mix of genres with distribution agreements in place with Disney, Warner Bros., Sony, Paramount, Village Roadshow, Icon, Umbrella and Hopscotch.
And, of course, no self-respecting IPTV offering this year would not include access to YouTube, so naturally it's included with a big caveat: all BigPond content comes unmetered (ie, you won't pay for what you download), but YouTube content is metered, which can chew up your data allowances rather quickly.

The Bad
You can connect the T-Box via either Ethernet or Wi-Fi, but obviously the T-Box's biggest drawback is that it's only an option for those on high-speed BigPond Cable Elite or BigPond ADSL2+ Elite plans, which start at AU$69.95 for 12GB and range up to AU$179.95 per month for a 200GB data allowance. BigPond movies will start at AU$3.99 per movie, but most recent titles will likely be AU$6.99. The T-Box itself can be paid for upfront (AU$299) or pro-rated in 24 payments in your plan.

Verdict
Telstra is aiming the T-Box at those who would rather pay for video-on-demand than be committed to any type of subscription TV contract. The BigPond TV Channels will have particular appeal to sports fans, with full replays of AFL and NRL matches on tap and the on-demand movie selection should rival your local video shop. It's early days for IPTV generally in Australia, and no doubt a much wider selection of programming and services are in development.
Whether you choose to jump on the IPTV and video-on-demand bandwagon via your TV vendor, game console or ISP, the key is watching what you want without getting smacked with exorbitant data charges. If you stick with the unmetered content available through BigPond and T-Box, this option might be a good way to get started.

Hitek Australia surges ahead!


It's with a a sense of great satisfaction that I'd like to share with you all the expansion of Hitek Australia. we have gone in for a national 1300 number which is 1300 649 124 and taken five additional telephone numbers for the company. Further another member has been added to the team. We are also working on Remote Solutions and will be setting up an exclusive Remote Solutions Team.

So what if I cannot do big things! I'll do small things in a big way!

Wish me luck as I embark on this journey...

Thursday, May 13, 2010

IT Jargon explained in English (TechSpeak to NormalSpeak)

Objectives
There are many tools, technologies and concepts emerging in IT on almost a daily basis. We do not have time to learn all these in detail. What we need is a brief and simple explanation of a given term for understanding it without spending too much time. There are dictionaries available for this purpose. However, these dictionaries are best used for isolated referencing. By referring to different terms randomly, you will get the complete picture.
Therefore, I am providing an easy to understand glossary of important terms. I have kept the language simple in order to ensure that while explaining one term, another difficult term is not required.
This article is useful for
Novices (Everyone is a novice in the topic you are new to!)
Anyone new to the term(s) mentioned here is obviously the target audience. However, that does not mean existing IT professionals are excluded. Everyone can not know everything. An expert in VB may still start with ASP For Dummies!
For explaining complex terms to Decision makers or End users
Even if you know what is the meaning of the term extremely well, there is a catch! You can typically explain it in Technical Language. NOT in ENGLISH! Most technical persons find it difficult to explain technical terms in simple language. As a part of your job you will invariably need to do this. Your end users, clients, less experienced colleagues will need to be explained complex things in simple terms. This glossary will come in handy for this purpose.
Incidentally, this coverage is by no means complete. However, it is a good starting point.
This glossary is NOT in alphabetical order
The items are not mentioned in alphabetical order. The coverage is more in some kind of logical order. Some apparently non-technical terms are also included in order to maintain the continuity.

Information Technology (IT)
This is a collective term. It includes various tools, technologies, products, machines and accessories that are used for various tasks related to computing and automation.
The basic purpose of using all these things is to improve something which was earlier being done in some tedious, cumbersome, costly or inefficient way so that your company objectives or personal goals can be achieved more easily.
There are literally thousands of technologies and tools under this global term. Some categories include hardware (actual computers and accessories), operating systems (Windows NT, Unix, Novell), Application Software (Microsoft Office, Lotus Notes), Utilities (Media Player), Browsers (Internet Explorer, Netscape Navigator), peripherals (printers, mouse), case tools (Erwin Logic Works), ActiveX Components (Sheridan Data Widgets, Leadtools Imaging Control), and so on.

End User
The person(s) who finally use and benefit from a particular IT product. For example, developers use Visual Basic. Thus developers are the end users of Visual Basic. If a developer creates a Payroll system using Visual Basic, the employees from the Payroll department are the end users. The important issue is that typically end users are NOT aware of the complexity of the technology they are using. Therefore, it is important for developers to ensure that the end users can use the applications without learning complex concepts or jargon. A product, which is technically brilliant, is practically useless if the end user does not comprehend how to use it. If end users did not exist, IT professionals would be extinct!
IT professional (ITP)
A person who is a middleman between end user needs and Information Technology. IT professionals come in many flavors. System analysts, IT auditors, Trainers, Developers, Administrators, etc. However, the basic functionality remains the same. ITPs are expected to understand the pros and cons of various technologies as well as the user needs. Finally they are expected to select and utilize the right kind of technology for the user needs. This sounds simple. However, typically both user needs and technology keeps changing at an alarming pace. Thus keeping the balance between utilizing the correct tool for the appropriate need is a very challenging task. How well you can handle this challenge , on a long term basis, determines your success in IT.
Competitive Advantage
As mentioned above users have needs. These needs typically arise out of competition. Better service, integrated and automated business processes, better speed, faster processing, immediate availability of data and similar end user ambitions are basically because of the core desire to face the competition better. Thus the basic purpose of the existence of IT professionals is to ensure that the desired competitive advantage is available to end users using the right type of tool.
Operating System
This is a piece of software which provides basic infrastructure for developing and using various automation tasks. Operating system manages baseline functions like user interaction, input from mouse/keyboard, graphics, memory management, security, etc.
Application
This is a program created using some development language. Application automates or simplifies some user need(s). For example, Windows Calculator is a simple application. Erwin Logic Works is a specialized application which helps the end users ( database designers, in this case) to optimize database structure. Various types of IT persons manage different aspects application lifespan.
Functional Specifications
This is a document, which specifies the content and behavior of the application being developed. This document forms the base upon which the developers create the application. This document typically contains the user requirements, user interface details, business processes and validations and the application architecture.
Executable File
The final form of an application is a file, which can be run from the Operating System. Executable files are typically shown as icons on the desktop or in the Start menu of Windows.

Dynamic Link Library
These are programs that are not directly executable. Executable programs use the DLLs, whenever required. If multiple executable applications require some common functionality, DLLs are used. DLLs use less memory and are easier to upgrade if the functionality changes.
Suppose we have three independent applications. These use a function to check time. This function is actually the same but each of the applications contains a separate copy of it.

Instead of using this approach, we can use DLL concept by allowing all these application to share the Check Time part of the application.

As you can see the size of individual applications has reduced. In addition, changes to the Check Time function need to be done only once. We will cover DLLs in more detail in later articles.
Database
Any application requires some information. This is called data. For example, clock will need to know what the starting current time is. A large collection of such information is called database. Database management system is an application, which allows you to store and manipulate data in simple or complex ways.
Relational Database Management System
This is a sophisticated version of database management system, which offers many high-end features. It ensures that the information is always accurate, secure and available speedily. There are many RDBMS today like Oracle, SQL Server, Sybase, Informix, Ingress and so on. These applications typically handle very large amount of data. Therefore, these are installed on high performance computers or servers.
Database Driver
When data from the server needs to be viewed at a terminal, we require a method of communication from the client terminal and the database server. This purpose is served by an application called database driver. This driver moves data between client and server.
Open Database Connectivity
When your application uses data from a particular RDBMS, it becomes tied to it. If the RDBMS changes you will need to rewrite your application. This is a major constraint. In order to overcome this problem, the concept of ODBC was propagated. Using ODBC you can write one application which can work with many RDBMS packages without having to rewrite code. ODBC drivers are like database drivers and are typically supplied by the database vendor. Using ODBC you can manipulate, merge and analyze data from different sources.
DAO and RDO
Data Access Objects and Remote Data access Objects are two ways of handling data. DAO is typically used to handle local data (on the same machine). RDO is used to handle data from the server. DAO and RDO provide simple commands for information management.
OLE DB
This is a more enhanced and feature rich version of ODBC. OLE DB allows developers of database to access information from complex types of data applications.
Active Data Objects
This is a newer type of technology for accessing data. It is similar to RDO but has lesser complexity of programming. It works with a special type of database driver called OLD DB
Visual Interface
This is the visible part of the application. Menus, forms, report, buttons, etc are called the interface. The end user interacts with the interface to perform various tasks.
Business Logic
Rules /policies /methodologies of how data is to be manipulated is called the business logic. For example, in a clock application, you can not display a number more than 59 minutes. Similarly in a banking application you can not withdraw more money than your current balance.
Monolithic (Single Tier) Application
This method of making applications puts the business logic, data and visual interface in a single executable. This runs on a computer like a self-contained entity. The problem with this approach is that if the data, logic or interface changes you have to keep making the application again. If this application is being used by lots of users, you have to physically replace the older application with the newer one.
Two Tier (Client Server) Application
Here the data is stored on the server and the client application contains business logic along with visual interface. Large Data handling is performed very speedily because server is a more powerful computer. Some business logic is also stored along with data whenever feasible. For example business logic which says that age can be between 0 to 100 is better stored on the server than duplicating this validation on hundreds of client applications.
Three Tier Application
This type of application stores data on the server, business logic either on server or client and visual interface on the client. The main difference is the executable application does not contain the business logic. The logic is a separate application. Typically it is a special type of DLL (see above). This arrangement makes it easier to change the application. It also improves the speed of operations. Business logic can now be run on powerful servers rather than modest clients. Similar Business logic can be shared by many applications, using this approach.

Multi-tier application
This is a more sophisticated version of three-tier application. Here the business layer is split into multiple layers. This provides higher performance and better manageability if designed properly.
COM Component
In three-tier application, business logic was available as a shared resource. One way of implementing this shared resource is using a component. Each component behaves in a predictable, predetermined way. Its behavior can be manipulated using some characteristics and commands. For example if there was a component called stopwatch, it would have characteristics like Elapsed Time, Lap Time, etc. Similarly it would understand commands like Reset Stopwatch, Start, Stop. The characteristics are called Properties and the commands are called Methods.
Dynamic Data Exchange
When two applications want to exchange pure text information, this method of communication is used. This allows one application to talk to another application without these needing to know details about each other. For example if a word processor needed to pickup the name and address from a spreadsheet, DDE could be used. Apart from data, you can give some commands to the other application using DDE. Currently DDE is not used often because more usable and flexible methods of inter-application communication are now available.
Document
This is a conceptual representation of similar type of information. A spreadsheet, a letter written in a wordprocessor, a picture drawn in some image editor, a page on Internet are all examples of documents.
Compound Document
This is a special type of document, which allows another type of document to be mixed with it. For example within a letter you can add a picture.
Object Linking and Embedding
This is a technology by which part of one type of document can be attached or inserted into another type of document. The base document does not need to know how to handle the inserted document. For example a wordprocessor does not know how to draw and edit pictures. But when you embed a picture in a wordprocessor, the picture is displayed along with the text. Moreover, OLE allows you to edit the picture while it is inside another document. In short, OLE allows you to create compound documents. Although this jargon is very heavy and difficult, most of us use compound documents quite frequently.
ActiveX Technology
This is another way of providing reusable applications. Suppose you are an expert in drawing various types of graphs. You want to make money using this skill. You will typically create a separate application where users can enter data and draw various graphs. Now there are thousands of types of users who may want to draw different graphs. Doctors, architects, engineers, planners, scientists all want to draw graphs using for their own special needs.
To satisfy all of them you will have to understand a little about the needs of each profession and create a special application optimized for each one of them. This is not very easy to achieve because your skill lies in graph drawing and not in metallurgy or geography. Thus you will waste your time trying to capture all the market potential while spending lesser and lesser time on perfecting your graph drawing skills.
Instead there is a better approach. All that you do is create a component called Graph Component. This has all the features you can provide for drawing all types of graphs. Any developer to create a custom graph package for any type of end user can use this component. Now there are two immediate advantages. The developers do not need to reinvent the wheel because they are directly using your expertise in graph drawing. They won’t mind paying a small sum for this. On the other hand, you can fully concentrate on your core skill and not attempt to learn other unrelated disciplines. You can create upgraded versions of your component and add more features. This is reuse of technology. Components made in this way are called ActiveX components.
OLE Automation
This is a methodology by which one application can control other application using programming. For example, you have a large document containing 50 headings. You want to make a slide show in with each slide containing only the heading. Normally you would have to cut paste 50 times.
Data Warehouse
It is a large store of information derived from data within your organization. The data warehouse allows you to analyze information based upon various parameters, geographical locations, time periods, etc. The information can be easily rearranged to perform detailed analysis.
Data Mining
Mining is the process of using a warehouse database to derive business-related conclusions, trends, forecasts, etc using various tools including statistical methods.
Dumb Terminal
Typical UNIX terminals which were popular few years back. It is called dumb because the terminal does not perform any processing or calculations. It simply displays information on the screen. It also understands the keys pressed by you and sends the keys to the server, which interprets the keys and converts it into actions.
EDI
Electronic Data Interchange is a worldwide standard method of communicating business information between two companies. The information could be a purchase order, invoice, bill, etc. The information is exchanged in a predetermined format so that each company understands what the other company has sent. EDI can then talk to your order processing or accounts system internally and perform further actions like dispatch of material and billing.
Internet
Internet is a large network of computers across the world, which is accessible to any subscriber. The Internet was initially used for publishing information and content. Nowadays, the technology is also being used for actual business transactions, email, subscription-based services and numerous more functionality.
The most important advantage of internet is that is allows you to connect to any place from any other place at a very low cost. In addition, the Internet provides a simple but effective method of interacting with the target audience in a very quick and efficient manner.
Internet is becoming more and more popular as the preferred method of developing standard line of business type of applications.
The internet consists of one or more web servers connected together and many browsers.
Web server
Web server is software, which allows you to publish content, information, multimedia, etc on the Internet. Clients (users of the web site) connect to the web server using special protocols. The web server manages the client connections, security, application loading and display of information. Web servers, which participate in business applications, can also be configured to access data in external databases.
IP Address
A web server is identified by its web address like www.webserver.com. Internally, it is actually a four-part number like 202.33.1.19, which identifies any internet server in the world. This number is called the IP address.
Worldwide, an international body called InterNic allocates these IP addresses. This ensures that no two servers have the same IP address.
Intranet
It is a web server, which is used only within your organization. It is not listed on the Internet. This Intranet is typically used for automating internal tasks like disseminating information, sending and receiving group messages, publishing documents on the web, line of business applications, workflow and so on. External persons like the customers, vendors, etc can not access the Intranet.
Extranet
Extranet is a proper web server. However, apart from your employees and business associates (vendors, marketing staff, customers), nobody has access rights in Extranet. However, extranet is accessible from anywhere the same way as any other internet server. Therefore, you can cover all your key contacts using Extranet without having to spend for a large wide area network.
Extranets are used for applications like external vendor procurement, vendor queries, customer queries, etc.
E-commerce
All of us use some software for tasks like financial accounting, invoicing, order processing, dispatch, etc. All this software is typically loaded on machines within your office premises. The customers, vendors or other related parties may require information from this software. For example, the customer may want to know the dispatch details of a consignment or the progress of the manufactured item. Similarly Vendors may want to know your inventory levels and the projected consumption so that they can keep their material ready.
To answer such queries, traditionally, you had to talk to the customers on phone and then use the in-house software. This is cumbersome and inconvenient. If there are thousands of customers, it is difficult to have dedicated staff for just answering queries.
E-commerce is a method of making software, which enables your business functionality to be available to a target audience outside your organization. This means, potential customers can directly use any browser and look at products on sale using internet connection. They can even place orders, track order dispatch status and provide feedback.
This can occur without any person manning this service in your office. In addition, this service would be available 24 hours a day.
Thus E-commerce is a new method of software development which bridges the gap between the supplier and the consumer.
Business to Business Application
A software application, which automates the process of one organization performing business transactions with another organization. Manufacturer and supplier, vendor and dealers, agents and primary supplier, manufacturer and transporter are different types business to business relationships.
Even today there is lot of communication between these entities. For example, when a manufacturer wants to procure some raw material, a fax or document has to be sent as purchase order. The vendor will then enter the details of the purchase order into his own internal order processing system. After this is done, the status of the order execution, dispatch will be faxed back to the manufacturer. At each stage there is manual intervention required and at each stage there is delay and bottlenecks.
Using latest tools and technologies like COM and web programming, it is possible to automate these tasks. The manufacturer can directly place an order electronically to the vendor. The order will be automatically transferred into the order processing system of the vendor. The manufacturer will automatically get relevant progress information. At any point of time, if the manufacturer wants to know the status of the pending order, he can simply go to the vendor web site and using an Ecommerce application perform various queries.
Order amendment, cancellation, etc. can be implemented using the same methodology.
This method of developing and integrating applications provides a very simple but efficient mechanism of improving the response times, productivity, minimizing inventory and increasing competitiveness.
Site Server
A specialized web server which allows you to create business – to- business applications which integrate well with in-house systems. It also provides you facilities for creating a membership-based authentication for accessing information on your web site.
Site Server provides sophisticated methods of providing online purchase store functionality for consumer goods and services.
HTML
HyperText Markup Language. This language is used to publish and display information on the web. The web browser understands this language and acts accordingly.
This language specifies the display formats like the placement, colors, fonts, size, special effects, buttons, captions, images, etc.
For example
Sample Text
This HTML code specifies that the text “Sample Text” should be displayed in Bold font. Thus the browser will display as follows.
Sample Text
This language is used for creating web pages containing any kind of information, pictures, diagrams, audio, video and animation.
Hyperlink
Web pages contain links to other related information. When you click on a link, your browser displays the page referred to by the link.
The links look like this
More information about this subject.
Hyperlinks make the web very powerful medium for publishing complex amount of information with cross-linkages.
Knowledge management
A system which allows an organization to document the subject knowledge, experiences, troubleshooting and preventive information and any other reference material which is useful. On many occasions, such information is either not captured or is available only to a few selected persons. Thus the organizational knowledge is very poorly utilized. Knowledge management system is a structured method of capturing, tagging, storing, searching and retrieving organizational experience and skill sets.
Using KM ensures that mistakes done once will not be repeated, skill acquired by one person will not be re-learnt by another person.
KM is a concept. It can be implemented by various means. Simplest would be a shared directory containing well-created documents with proper keywords. You can use a structured public folder in the Messaging system for the same purpose. Higher end systems can also use Site Server, Office 2000 and the workgroup editing features to create dynamic web based knowledgebase.
Knowledge Worker
Employees whose job profiles requires them to analyze and manipulate information to manage business in a more effective manner. Personal productivity tools are very important for this group of people. In addition, data from multitude of sources must be made available to these persons in an easy-to-use manner. The complexity of handling data should be hidden from them. Searching for the right piece of information is important. Therefore, end user level powerful search tools must be used in case of Knowledge workers.
OLAP
Online Analytical Processing. A database, which is capable of handling complex ad-hoc queries, typically used by Knowledge Workers. It also provides complex calculations, multidimensional viewing of data and faster indexing techniques.
EIS
Executive Information System is a set of tools designed to organize information into categories and reports for senior executives. Nowadays, it is known as Enterprise Information System.
Internet Portal
A web site which is the starting point of the web surfer. This typically provides extensive search, lot of consumer services, latest news, customizable layout and many more features, which simplify your web browsing experience. MSN, Yahoo, AOL are some examples. There are general-purpose portals or special portals. People of specific interests or professions use special portals. For example there are portals for music, medicine, sports, technology, etc.
ERP
Enterprise Resource Planning is a software used in an organizations to coordinate sales and order information with the manufacturing process in order to perform accurate scheduling, inventory management and utilize full capacity.
ERP requires integration across all functions relating to the manufacturing process. ERP is typically available as an off-the-shelf product. Thus it minimizes the time required for installing a fully functional application. However, ERP is typically costlier than developing a custom solution locally.
XML
This is an updated version of HTML. HTML is primarily used for describing how things are to be displayed on a web page. XML describes the information contained in the page rather than its appearance.
For example if you view the following on a web page,

Age : 30


Age is just a text and 30 is a number which can be edited by the user. You know that the number 30 pertain to age because it is visually next to it. However if there was just the number shown

30
In this case you had no way of knowing what this number represents.
XML allows you to internally specify that this 30 is the age. You can then use this information for formatting, searching, and sending understandable information between to companies and so on.
Thus XML describes data on the Web. XML is the most important method of exchanging information over the web from any source to destination. This will simplify transactions between different companies and entities.
Y2K Problem
Inability of some software and hardware to understand that year “00” means 2000 and not 1900. This simple omission can make many systems misbehave, calculate wrong results or completely stop operating. Each company needs to ensure that the computers, software, network equipment and other electronic gadgets in use by them are Y2K compliant. Some packaged software products provide free patches for making them Y2K compliant. Software written in-house must be tested and modified to ensure that the above-mentioned problem does not hamper the business processes.
Euro Symbol
Recently the European union introduced a uniform currency called Euro in the Europe. Earlier each country had its own currency. This change requires drastic changes to be made to any kind of software, which deals with European currency so that it understands the new currency. Some keyboards do not even support the Euro symbol. Many banking and financial systems need to be thoroughly checked and modified to accommodate this change.
GroupWare
A type of software or system, which allows multiple members of a project, team or group to work together, even though they are physically working at different locations. GroupWare makes it simple to manage your time, fix appointments, collect information from many team members, and perform online or offline meetings, share documents and other content and share knowledge.
Workflow
A method of developing software where business processes are converted into automated work modules. The software works in a serial manner, similar to manual business processes. However, completion of one step automatically leads to the initiation of the next step. The person(s) responsible for taking action on a specific process are notified using Email so that the response time can be minimized. Workflow systems typically require integration between messaging, database and web systems.
Messaging System
This type of software provides you with Email functionality within as well as outside the organization.
Email
A method of communicating information between each-other using a messaging system. Messages can contain text, graphics and files. More advanced method of communications contain formatted text, embedded objects and source code.
Mailbox
A place in the messaging system where the mail received and sent by you is stored. Mailbox can contain multiple folders created by you. Mailbox stores your mail till you file it in folders or delete it. Mailboxes can be stored on the main server or your local computer. If you are not in a position to connect to the mail server because you are away from office, you can create an offline mailbox. Now you can make any type of changes to your mailbox copy on local computer. When you connect to the main server later, changes made by you are reflected onto the main mailbox. This is called synchronization.
Public Folder
Is a folder, which is accessible to all members having access rights. Public folder is similar to the private mailbox based folders. However, it has one additional feature called replication. If you have many offices containing Exchange in multiple cities. You will want circulars and other bulletins created in HO to be sent automatically to branch offices. This can be done by creating a public folder called “circulars: and make this folder replicate itself automatically to all other sites.
Discussion Group
A feature where many persons from a group can conduct discussion on a given topic in an offline manner. Which means, it is possible for one person to create a topic for discussion and others can post their replies in the folder. More persons can even reply to the replies. This can continue as long as necessary. A new member joining the team can quickly understand what discussion has taken place till now by just browsing through the folder.
This discussion can occur even across multiple sites.

AN IT Mantra- The DEFRAG Principle..

It is alright to be technically equipped with knowledge but the application of that knowledge combined with people skills ie. The human side of enterprise plays a crucial role in the evaluation of an IT professional.
Over the last 15 years working within the IT industry and managing teams in England, India & Australia I have devised a principle which I believe if implemented by IT Consultants, will help a long way in increasing their productivity and keeping self motivated in this stressful & demanding occupation as an IT professional.
I call it the DEFRAG principle and will unearth each alphabet and briefly explain its definition and importance.
D = Discipline: I strongly believe that an IT Professional must have the discipline to deliver outcome and not short cut the processes.
E = Environment: This refers to the operating environment and it is absolutely imperative that both physically and culturally the environment be conducive to high performance.
F = Focus: One of the essential objectives is to be able to focus on the important factors not the ‘white noise’ – emotions, complaints, blame etc.
R = Resources: Without essential resources there is no way that one can achieve success. Do you or your team have the ‘right’ resources to achieve the outcome?
A = Attitude: A positive attitude is an important aspect of an IT Professional. One must complete each task to a degree of excellence – near enough is NOT good enough – always remember attitude will surpass aptitude every day.
G = Goal: Stay clear about the end goal – don’t get lost and bogged down in the minutiae of the moment
I firmly believe that formulating such principles in your workplace and trying to abide by them often gives you a set of directions and provides you with an effective path to success.
So the next time you’re at a client site or fixing a PC, designing a network or setting up a server or wireless network, remember before you defrag the computer don’t forget to defrag your mind!

Guide to Wireless Security

Setting up a wireless network is incredibly easy. There’s no cable to pull, no holes to drill; just plug in your wireless access point (AP), let your wireless connection manager auto-associate, and you’re online. Unfortunately, so is every other person who happens to be within broadcast range of your AP, and that’s where your trouble starts.
Every business has information that must be kept private. Trade secrets, source code, or even the company’s accounting books can find their way into nefarious hands all too easily. If you have customer data stored on your network, it’s even more imperative to lock down access. A few credit card numbers escaping into the wild can permanently damage your customers’ trust; just the possibility of credit card number theft can trigger regulatory disclosure procedures in some states. And wireless network access doesn’t stop at your business’s walls; if your network is open, anyone can squat in your parking lot and hop online.

The Threat
Know your enemy! There are three basic types of bad guys you need to guard your network against: thrill seekers and war drivers, bandwidth thieves, and knowledgeable attackers.
Thrill seekers and casual war drivers are the folks who drive around with a laptop, looking for wireless networks to hop on to. They often don’t do any damage; they’re motivated by the thrill of trespassing electronically. The simplest of security measures is usually enough to deter them, particularly if there are other open networks around.
Bandwidth thieves know exactly what they want. Maybe they’re sending bucketsful of spam, maybe they’re downloading pirated movies or porn. Whatever they’re doing, there’s a reason they want to do it on your network instead of their own—they don’t have to worry about being traced, they don’t have to bear liability for their actions, and they don’t have to pay for the bandwidth they use. Because they profit from intrusion, they’re more willing to crack their way into your network, but just like the thrill seekers, they’re looking for the easiest option available.
Serious, knowledgeable attackers are rare, but scary. Either they want the data on your network or they’re looking to cause you harm. They won’t be deterred by casual security measures because they aren’t looking for easy targets. They want valuable information that only you have, they expect it to be at least lightly guarded, and they’re prepared to work hard to gain access or even to break your network completely.
It’s easy for bad guys to become even more evil in a hurry, and network security is only as strong as its weakest link. In a recent case that got a lot of publicity, three war drivers discovered that a national retail chain store in the Midwest was using wireless pricing scanners. There was no human client access, just automated data transfer from the point of sale system. However, the transactions weren’t encrypted, and the AP used the default administration password, so the attackers were able to access the store’s general network. They installed a small program on one of the corporate servers that would capture credit card numbers to a text file, which they could easily retrieve from the parking lot. The three thieves were eventually caught and sentenced for fraud, but you don’t want your business to gain this kind of publicity.

Three Sample Scenarios
Coffee Shop with Hotspot Access
1 You’re setting up a network as a service to your customers, to get them to come more often, stay longer, and drink more coffee. Your users can be anyone who stops in with a laptop, so ease of use is most important. Because you’re operating a public network that you want people to connect to, there’s really not a whole lot you can or need to do. Trying to configure any form of authentication or encryption will drive away customers. You certainly don’t want the hassle of maintaining a user database and requiring people to log in. Recommended solution: get an AP that supports client isolation to help protect clients from each other. And keep this network completely separate from your internal store network, if you have one.

Small Accounting Firm
2 You’re setting up a network so that your three employees can easily share work and files. Your users are those three employees, plus you, so a little client configuration isn’t an issue. In addition to wardrivers and bandwidth thieves, you need to protect your customers’ financial data. Recommended solution: make sure all your wireless equipment is new and supports the latest features and protocols, then configure WPA-Personal. Choose something other than a dictionary word for your preshared authentication key.
Our rubric is to choose a passphrase—a complex sentence (with upper and lower case letters, numbers, and special characters) that is easy remember but difficult for others to guess. For example, "To be, or not to be? That is the question." Also, make sure your AP has an option to turn off client isolation, or the collaborative side of your network will be lost.

Law Firm with Guest Access
3 Your back office has wireless so that all the lawyers, paralegals, and assistants can easily share files and work on cases together. You are also offering guest access so that visiting clients or attorneys can easily access their own files. Security here is unbelievably vital; if your clients' legal records get out, you won’t just lose business, you can be disbarred or suffer criminal legal consequences. Recommended solution: build two wireless infrastructures. Use high-quality APs that support WPA2-Enterprise and dual Service Set Identifiers (SSIDs), one for your back office and one for guest access.
Configure the employee side to use WPA2-Enterprise for authentication and encryption. You'll need a RADIUS server (just run Internet Authentication Services on your domain controllers for simplicity) and updated client software (Windows XP SP2, at least). If you use EAP-TLS for authentication, you’ll need digital certificates too.
Configure the guest side as an open public network. Again, your guests won't be able to easily integrate with protocols like WPA-Personal or WPA-Enterprise, so save them (and yourself) the trouble. Make sure that you permit outbound Virtual Private Networking (VPN) through the guest side, so that they can connect back to their own corporate networks to retrieve data.


The Basics
Wireless network security isn’t a one-size-fits-all proposition. Before you can even think of implementing a security design, you have to consider several questions.
Who are your users? Are they your employees or your customers? How much configuration will users be willing to go through? Will they always be the same people, or will you have different people using the network every day?
Why are you installing a wireless network? Do you want to share files between employees? Do you want a gateway to the Internet? Do you want to be able to offer wireless access to your customers to get them through the door? Are you looking to replace an aging Token Ring cable plant in your facility?
What are you trying to protect? You don’t need to have security that the Pentagon would envy. What you need is enough security that breaking into your network is more trouble than the data inside is worth. Credit card numbers, source code, medical or legal records—those are all worth a lot. The employee handbook or the shift schedule? You might think these have little value, but to someone engaged in social engineering these resources contain highly useful information about the practices of your organization and the habits of your employees. Even your bandwidth is valuable. But remember that clever intruders can find their way to unexpected places, so make sure you aren’t putting more at risk than you think you are.
Before we get into the ins and outs of authentication servers and encryption protocols, there are some very basic, very easy steps to take that can substantially reduce your risk of intrusion.
Change your passwords It’s been said before, but it’s worth repeating: change your AP’s default administrator password, particularly if it’s "admin," "password," or null. Do it for every AP, every time. These passwords are widely known, and if you give someone administrator access to your AP, you might as well just leave printouts of your company data in a cardboard box on the curb.
Change IP addresses Different brands of APs use different WLAN IPs and different DHCP ranges. These are also user-configurable, and you can change them from the default to something that’s less likely used. Again, it gives less information about your AP to someone who’s up to no good. It doesn’t gain you very much security, but it’s easy to do and has no negative impact on your users, so it’s worth considering. Note, however, that your choice of addresses must work with the addressing scheme you’ve used in the rest of your network. If you aren’t responsible for maintaining IP addresses, work with the people in your organization who are. You can’t just randomly choose any IP address and expect it to work.
Use client isolation Some APs include a feature that prevents wireless clients from communicating with each other. Typically, in a corporate environment or in a workgroup, you’ve already instituted other mechanisms to either allow or prevent client-to-client communications, so this feature wouldn’t be important to you. But if you’re building a wireless hotspot or other public wireless network, look for APs that support client isolation and be sure to enable it. This helps keep poorly configured computers from attacking other computers on the network.

How Not to Secure a Wireless Network
There is a lot of bogus wireless security advice circulating the Internet. It gets repeated often in articles and seminars because, well, "it sounds good." Let’s dispel a couple common wireless security myths right now.
Hide your SSID The Service Set Identifier (SSID) in your AP is nothing more than a name. It was never intended to be a password, yet people have turned it into one by disabling its broadcast, thinking this makes their network more secure. This couldn’t be less true. Every time a client associates to an AP it includes the SSID in the association message—in clear text, visible to anyone with a wireless sniffer. So go ahead and let the SSID broadcast. Windows® XP zero configuration requires it, the 802.11 specification mandates it, and the kind of good wireless security we recommend here makes it such that it doesn’t matter that the SSID is visible.
Filter MAC addresses Media Access Control (MAC) address filtering sounds great in theory. Every network device in the world has a unique MAC address, so by restricting which MAC addresses can associate with your wireless network, you’re eliminating the possibility of intruders, right? No. The problem is that the MAC address is sent with the header of every packet, outside any encryption that’s being used, and packet analyzers are widely available, as are MAC spoofing applications. It’s also a hassle from the administrative end, since every new device that connects to the network has to be entered into the AP by the systems administrator. Save yourself the hassle and just avoid this so-called feature.

Access Control
After you’ve taken care of the basics, you can start looking at how you’re going to control access to your network. Start at the physical layer. Don’t make the AP physically available. It’s all too easy to reset the AP to its default settings. Once you know the make and model of the AP, the defaults are simple to figure out—often they’re printed on the bottom of the AP itself.
Some APs offer basic username/password authentication within the AP itself. Setting it up is simple; just enter your username/password pairs in the AP, or upload them from a text file on another machine. Access control is per-user, not per-device. These APs are easy to use, but are often substantially more expensive than standard equipment and may not support more than about 15 or 20 different users. They also lack integration with any directory system you’re using (such as Active Directory®), so requiring users to remember yet another ID and password won’t go over too well.
For more robust per-user access control than you can get within an AP, look to an external server authentication solution like Remote Authentication Dial-In User Service (RADIUS). By itself RADIUS won’t do anything to help you. But because advanced wireless security protocols like Wi-Fi Protected Access (WPA) (see the section on encryption that follows) can use RADIUS for user authentication, you can start to build an environment that integrates more smoothly with the rest of your network. RADIUS servers don’t necessarily have to be costly to set up. Internet Authentication Service (IAS), included in Windows 2003, is ideal for companies using Microsoft software.Server
As fast as access control solutions appear, ne’er-do-wells attempt to find ways to get around them. One of the most successful and frightening has been labeled the evil twin problem. In this scenario, someone sits out in your parking lot with a laptop running a Web server and an AP with a high-powered antenna on it. The thief configures the AP with your SSID, and configures the Web server to proxy and log transmitted information. The evil twin probably has a stronger signal because of the high-gain antenna, so users will associate with the false SSID instead of the true one. And any clear-text Web traffic, say logging into something that isn’t protected with secure sockets layer (SSL) will be visible to the attacker.
Now is this really a problem? It depends on what security measures you have in place. If you rely on plain old Wired Equivalent Privacy (WEP) then this is a problem. But if you’re using more sophisticated protocols, like dynamic WEP or WPA, then the problem goes away. These protocols incorporate a principle called mutual authentication. Not only does the client authenticate to the network, but the network authenticates to the client—either with a digital certificate from the RADIUS server or by the AP’s knowledge of an authentication key. Because the attacker can’t get access to the certificate or the key, your clients will refuse to connect to the evil twin. The attacker has created a denial of service problem, but can’t intercept your traffic.

Encryption
Now we can get to the nitty-gritty of security—protecting your data transmission with encryption. There are a lot of different encryption algorithms available, each with their advantages and disadvantages, and they’re not all interchangeable. The more you know, the more easily you can pick the right solution to suit your needs.
Static WEP is the first that comes to mind when people think of wireless encryption. It’s an old standard, supported by just about every wireless network device out there, so there are no worries about compatibility. It has two big disadvantages, though. The first is that it requires every user and every device to enter a long hexadecimal string to make connections. (Some devices support ASCII passkeys, but not all.) The second is that it’s become trivially easy to crack. With modern attack tools it takes only about 500,000 captured frames to perform statistical analysis against the data and recover the key. Given a fully utilized AP processing 1,500-byte frames (the typical size), you can capture 500,000 frames from an 802.11b network in just over eight minutes, and from an 802.11a or 802.11g network in less than three minutes.
Despite its pervasiveness in nearly all wireless equipment, static WEP has reached the end of its productive life. Don’t use it. Instead, choose from one of the alternatives described here. If compatibility is most important, use dynamic WEP. If you can’t support using a RADIUS server, use Wi-Fi Protected Access (Pre-Shared Key) (WPA-PSK). This means you might need to upgrade your wireless hardware and client operating systems.
Dynamic WEP with 802.1X+EAP is a combination of protocols that addresses some of the flaws in static WEP. Dynamic WEP uses a combination of the 802.1X and EAP protocols (along with a RADIUS server) to authenticate the user and optionally the computer, create a unique WEP encryption key for each associated computer, and rotate all keys at a time interval you specify. How often? Because WEP is still the foundation for encryption, you need to consider the 500,000-frame problem described before. So your time interval would be eight minutes or two minutes (or less), depending on your hardware.
One exceptionally cool thing about dynamic WEP with 802.1X+EAP is that, in Windows XP SP1 and later, it integrates with the domain logon process. Domain-joined computers are often configured with Active Directory group policies that are applied when the computer logs on, before the user does. It’s important that your wireless infrastructure permit the same behavior. In the supplicant built into Windows XP, 802.1X+EAP handles the domain logon process and allows group policy to apply. Keep this in mind when evaluating wireless security alternatives.
You have a choice of authentication methods with 802.1X+EAP. EAP-TLS and protected EAP (PEAP) are the most popular. EAP-TLS requires digital certificates on all clients and on all RADIUS servers. These certificates are used for computer and user authentication. PEAP allows the use of computer and user domain accounts (IDs and passwords) for authentication, though in this case the RADIUS server still presents a digital certificate to the client.
Dynamic WEP is better than static WEP because it eliminates most of the conditions that make static WEP so unsafe. Although 802.1X+EAP can do some cool things, know that dynamic WEP never became a true standard, and should be avoided if possible because it doesn’t eliminate all flaws. 802.1X+EAP combined with WPA (discussed next) is really where you should be heading.
WPA is the next generation of wireless encryption technologies. It’s both more secure and easier to configure than WEP, but most network cards made before mid-2003 won’t support it unless the manufacturer has produced a firmware update. WPA replaces WEP with an improved encryption algorithm called Temporal Key Integrity Protocol (TKIP). TKIP supplies each client with a unique key and uses much longer keys that are rotated at a configurable interval. WPA also includes an encrypted message integrity check field in the packet to prevent denial-of-service and spoofing attacks, something that neither static nor dynamic WEP can do. WPA operates both with and without a RADIUS server.
WPA-Personal uses a preshared authentication key that is configured on each device. Unlike WEP, this can be any alphanumeric string and is used only to negotiate the initial session with the AP. Because both the client and the AP already possess this key, WPA provides mutual authentication, and the key is never transmitted over the air.
WPA-Enterprise uses 802.1X+EAP for authentication, but again replaces WEP with the more advanced TKIP encryption. No preshared key is used here, but you will need a RADIUS server. And you get all the other benefits 802.1X+EAP provides, including integration with the Windows login process and support for EAP-TLS and PEAP authentication methods.
WPA2 is the latest thing on the scene. Instead of WEP, it uses Advanced Encryption Standard (AES), the government standard for security. If it’s good enough for the Pentagon, it’s probably good enough for you! Like WPA, the newer WPA2 can be used in either Personal or Enterprise modes, and has so far proven difficult to attack.
Wireless security is just as critical for your business as having a lock on the front door, and finding the balance between security, accessibility, and cost of ownership can be tricky. Consider your needs carefully, and don’t put it off. Every day that you run your network open is another day you’re at risk. Well-designed and implemented security involves minimal hassle and a whole lot of peace of mind, and that’s good for you and your customers.

________________________________________
Rajiv Chaudhri is the CEO of Hitek Australia in Sydney, Australia. You can reach him at rajiv@hitekaustralia.com.au
________________________________________

Eight Reasons You Need a Server

Based on these analysts' feedback and others', here are eight reasons to buy a server for your small business, rather than doing without or relying on peer-to-peer networking.
1. You can create order from chaos. By centralizing data on a server, you can better manage business-critical information. Sharing files and other data across PCs becomes much easier, as does migrating data from one PC to another. And as DiDio points out, older PCs can get new life if their files and data are off-loaded onto a server. "A lot of people are buying servers and opting not to dump their old PCs and laptops," she says.
2. You can protect your data by making backups easier. Two features of Windows Small Business Server 2003, for example, enable users to better protect their data assets by simplifying backups and the restoration of critical data. The features are the Backup Configuration Wizard and Volume Shadow Copy.
3. You can collaborate better as a business. Not only is data sharing easier with a server-based network, but Windows Small Business Server 2003 comes with Windows SharePoint Services, which is software that enables your employees and other team members to collaborate via the Web. With SharePoint, you get a company intranet portal with a user-friendly interface to organize and share information. It comes pre-populated with help documents and resources. A server also is a must if you want to run line-of-business applications, such as accounting solutions from Microsoft Business Solutions, on multiple PCs.
4. You can accommodate a mobile work force. Servers enable authorized out-of-office workers to have remote access to your network, enabling data sharing among those who travel, telecommute or work in off-site locations. Through Remote Web Workplace, users of Windows Small Business Server 2003 can get access to server data via the Internet. Out-of-office workers also can connect to the company intranet via SharePoint.
5. You can share high-speed broadband access. "A real catalyst to server sales among small businesses is in providing high-speed Internet access across a network," says IDC's Boggs. "If I'm running a business now that has three or more dial-up accounts, it's time to get a server and go broadband." The return on investment will come quickly in the form of higher productivity, he says.
6. You can set up new computers, add users and deploy new applications more quickly and easily. Expect to grow? By managing your data from a central location, you can better coordinate the addition of new PCs, software licenses and software applications. You can also better manage firewalls and monitor threats to your data, and more easily deploy virus protection and intrusion detection.
7. You can get more processing power. A server can supercharge your network, storing large chunks of data, freeing up memory and enabling individual PCs to perform better. Small business today need that additional processing power to run Web services, manage Web sites, do e-mail newsletters, and use more sophisticated tools and applications, DiDio says. (Boggs says he foresees more and more households buying servers to accommodate students using their PCs as educational labs and teenagers who buy online games and other sophisticated applications.)
8. You can look more professional — and connect better with your customers. Server software such as Windows Small Business Server 2003 enables you to consolidate your e-mail accounts (AOL, Yahoo!, Hotmail, etc.) into a single, company-hosted e-mail account, enhancing your image to customers and partners. "You could have several aliases from one root e-mail address," Harry Brelsford (from SMB Nation) says. "A server can make a lot of businesses look bigger than they are." Adds DiDio, "It not only gives you more bang for your buck; it makes you look more professional to those you want to do business with."
How you know it's time to buy a server?
• You have two or more dial-up accounts in your business.
• You need to centralize and organize your data (you can't always find what you need when you need it).
• You need to share hardware such as printers and fax machines for two or more PCs (peer-to-peer networks mean lots of cords and wires to trip over).
• You need to simplify backups to keep your data more secure.
• You have employees who travel, frequently telecommute, or work off-site, and want to connect to a network.
• You could benefit from an intranet (your employees who travel and telecommute don't always remember to tell you).
• You have high storage needs (and your loaded-down PCs wince and groan when you add more data).
• You'd like to run accounting software or other line-of-business application on more than one PC.
• Your company's growing and plans to add new computers and employees (congrats!).
• You mean business: You want to look professional (and bigger than you are).
• Your PCs are old, old, old, and you want to get rid of them. A server makes migration easier.
• Your PCs are old, old, old, and you want to keep them. A server takes a load off the PCs.

Saturday, May 8, 2010

Gareth McCray's views on Hitek Australia



2CH breakfast personality Gareth McCray began working in the Media in 1980 having worked on air at 2GB, 2CH, 2UE, 2SM, 2KM and 2KY.

Gareth was the Drive announcer for Radio 2SM up until July 2003. Prior to this he was Programme Director & Breakfast Announcer at 2KY on a news and current affairs show. He was also responsible for setting up a nostalgia radio station for the Labor Council of NSW.

For some time, Gareth was Head of the Radio Department and The Australian Film Radio & Television School. He has an A.Mus.A. from the Conservatorium, has lectured in English for the University of Sydney, as well as running Media courses with the Australian Catholic University.

Gareth also did some training at the Ensemble Theatre under the tutelage of Hayes Gordon. He was also national publicist for the Papal Tour during the Beatification of Mary MacKillop in January 1995. He has been awarded a Citation from the United Nations for the Media peace Awards.

You can hear Gareth along with Mardi as they present our breakfast show Monday to Friday morning between 5 and 9am and between 6.00am and 12 noon on Sunday as part of our Stress Free weekends

Thursday, April 22, 2010

Antivirus Update from McAfee Causes PCs to Crash.. (Source SMH)


Computers in companies, hospitals and schools around the world got stuck repeatedly rebooting themselves on Wednesday after an antivirus program identified a normal Windows file as a virus.
Antivirus vendor McAfee Inc confirmed that a software update posted on Wednesday morning caused its antivirus program for corporate customers to misidentify a harmless file. It has posted a replacement update for download.
"We are not aware of significant impact on consumers and believe we have effectively limited such occurrence," the company said in a statement.
Online bloggers begged to differ, saying thousands of computers running Windows XP with Service Pack 3 were affected.
At Rhode Island Hospital in the US, the computer lock-up prompted personnel to divert emergency room visitors without traumas to other hospitals. The hospital also postponed some elective surgeries.
Patient care continued uninterrupted using back-up procedures, according to Nancy Jean, spokeswoman for the health system.
In Kentucky in the US, state police were told to shut down the computers in their patrol cars as technicians tried to fix the problem.
Peter Juvinall, systems administrator at Illinois State University in Normal, USA, said that when the first computer started rebooting it quickly became evident that it was a major problem, affecting dozens of computers at the College of Business alone.
"I originally thought it was a virus," he said. When the tech support people concluded McAfee's update was to blame, they stopped further downloads of the faulty software update and started shuttling from computer to computer to get them working again.
Intel Corp also appeared to be one of the victims, according to employee posts on Twitter. Intel did not immediately return calls for comment.

Tuesday, April 13, 2010

Online & Offsite Backup Solutions

I would strongly recommend that everyone backup their critical files online & off-site. Here's a link to the one of the best in the business, Data Deposit Box. Most of my Server & Client databases are being backed up using their services.
Its simple to use with an easy sign up procedure and costs as little as $ 2.00 per GB per month for a completely secure backup. Once you install the software it takes over and ensures backup is being properly done.
They also have a trial period to ensure this is what you're looking for. Pls backup your essential files before it gets too late.

Sunday, April 4, 2010

Old Folk Story Retold - A Management Perspective



Please click on the movie above & pause and view each slide...

Let Your Customers Sell to Themselves....HBR

No one really likes to be sold to. Even the savviest salesman has to overcome people's resistance to the show-and-tell aspect of selling. Instead of persuading your customers to buy, try letting them sell to themselves. Don't just show them what is great about your products or services, let them experience and experiment. In a digital setting this may mean letting people participate in the creation of a new product or service (see Apple's App Store). In a retail setting, this could be providing samples or spaces in your stores where customers try out your products. Not only will this approach help you sell more, if used correctly, it will likely also teach you something about what your customers want.

Thursday, April 1, 2010

Apple iPad delayed in Australia..


The Apple iPad will be available in the US on April 3, but we're going to have to wait a bit longer I'm afraid, you won't be able to buy an iPad in Australia until late April.
The good news about this delayed release date however, is that both the Wi-Fi and 3G models of the iPad will be available at the same time.
Unfortunately it looks like iBooks and the iBookstore are not going to be available when the iPad is released in Australia, in fact iBooks is only available in the US at the time of writing.
The delay of iBooks is disappointing but understandable -- when Apple first announced the iPad on January 28, they only had a few US book publishers signed up. Let's hope the delay isn't too long though, because I think the iPad is going to make an awesome e-book reader, and it's one of the main reasons I'm going to buy one.
Pricing for Australia has not been confirmed yet -- the iPad is priced from $499 in the US, so I think we'll see prices staring at around $599 in Australia.
Apple iPad (Courtesy of Apple)
"iPad is something completely new," said Steve Jobs, Apple's CEO. "We're excited for customers to get their hands on this magical and revolutionary product and connect with their apps and content in a more intimate, intuitive and fun way than ever before."
iPad lets users browse the web, read and send email, enjoy and share photos, watch videos, listen to music, play games, read ebooks and much more. iPad is just 1.27 centimetres thick and weighs just 680 grams, it's thinner and lighter than any laptop or netbook, and delivers battery life of up to 10 hours.*
iPad's revolutionary Multi-Touch interface makes surfing the web an entirely new experience, dramatically more interactive and intimate than on a computer. You can read and send email on iPad's large screen and almost full-size "soft" keyboard or import photos from a Mac, PC or digital camera, see them organised as albums, and enjoy and share them using iPad's elegant slideshows. iPad makes it easy to watch movies, TV shows and YouTube, all in HD, or flip through the pages of an ebook while listening to your music collection.
The App Store on iPad lets you wirelessly browse, buy and download new apps from the world's largest app store. iPad includes 12 new innovative apps designed especially for iPad and will run almost all of the more than 150,000 apps on the App Store, including apps already purchased for your iPhone or iPod touch. Developers are already creating exciting new apps designed for iPad that take advantage of its Multi-Touch interface, large screen and high-quality graphics.
The iTunes Store gives iPad users access to the world's most popular online music, TV and movie store. All the apps and content you download on iPad from the App Store, and iTunes Store will be automatically synced to your iTunes library the next time you connect with your computer.
*Battery life depends on device settings, usage and other factors. Actual results vary.The Apple iPad will be available in the US on April 3, but we're going to have to wait a bit longer I'm afraid, you won't be able to buy an iPad in Australia until late April.
The good news about this delayed release date however, is that both the Wi-Fi and 3G models of the iPad will be available at the same time.
Unfortunately it looks like iBooks and the iBookstore are not going to be available when the iPad is released in Australia, in fact iBooks is only available in the US at the time of writing.
The delay of iBooks is disappointing but understandable -- when Apple first announced the iPad on January 28, they only had a few US book publishers signed up. Let's hope the delay isn't too long though, because I think the iPad is going to make an awesome e-book reader, and it's one of the main reasons I'm going to buy one.
Pricing for Australia has not been confirmed yet -- the iPad is priced from $499 in the US, so I think we'll see prices staring at around $599 in Australia.
Apple iPad (Courtesy of Apple)
"iPad is something completely new," said Steve Jobs, Apple's CEO. "We're excited for customers to get their hands on this magical and revolutionary product and connect with their apps and content in a more intimate, intuitive and fun way than ever before."
iPad lets users browse the web, read and send email, enjoy and share photos, watch videos, listen to music, play games, read ebooks and much more. iPad is just 1.27 centimetres thick and weighs just 680 grams, it's thinner and lighter than any laptop or netbook, and delivers battery life of up to 10 hours.*
iPad's revolutionary Multi-Touch interface makes surfing the web an entirely new experience, dramatically more interactive and intimate than on a computer. You can read and send email on iPad's large screen and almost full-size "soft" keyboard or import photos from a Mac, PC or digital camera, see them organised as albums, and enjoy and share them using iPad's elegant slideshows. iPad makes it easy to watch movies, TV shows and YouTube, all in HD, or flip through the pages of an ebook while listening to your music collection.
The App Store on iPad lets you wirelessly browse, buy and download new apps from the world's largest app store. iPad includes 12 new innovative apps designed especially for iPad and will run almost all of the more than 150,000 apps on the App Store, including apps already purchased for your iPhone or iPod touch. Developers are already creating exciting new apps designed for iPad that take advantage of its Multi-Touch interface, large screen and high-quality graphics.
The iTunes Store gives iPad users access to the world's most popular online music, TV and movie store. All the apps and content you download on iPad from the App Store, and iTunes Store will be automatically synced to your iTunes library the next time you connect with your computer.
*Battery life depends on device settings, usage and other factors. Actual results vary.

Sunday, March 28, 2010

Upgrading Memory & Not Sure? Try this...

You've got a PC, Notebook, Netbook or a Mac and you'd like to get it to work faster by adding more RAM and you're not sure whether its possible. Try this scanner from crucial.com which is awesome and will give you advice on the amount of memory slots you have in your system, how many are free and how much it would cost in US$.
Simply click on the Crucial System Scanner Tool and follow the prompts to get free advice and outsmart your nerd!