Simple Steps of Making Your Computer Safe

Viruses are very threatening these days. There are many people who are having problems with their computers because of these viruses. The good news is that there are many programs these days that can provide anyone with tight computer security. You can use internet security as well as antivirus software to protect your computer. These programs can also give them protection from hackers.

The first thing that you need to do to protect your computer is to download and then install any internet security program so that your computer cannot be assessed by hackers who have the intention of getting information for your PC. Hackers will also be disabled from getting into your system to destroy it. We must protect our computers from these hackers so that any intellectual properties stored in our computers will not be stolen.

Next, you must also ensure that your computer have antivirus software installed. This antivirus program will be able to protect your system from being attacked by internet viruses, malwares, and other destructive scripts. Over the years, there have been a lot of people who have the benefited from the antivirus programs. What is good about these programs is that these are very affordable. These can be downloaded directly from the internet and installed in your system right away to have a good form of computer security.

Once you already have these programs installed in you computer, you need to set automatic virus scanning. Scheduling automatic scanning will give you the assurance that your computer is constantly safe from getting virus threats. We all know how dreadful and how destructive viruses and malwares can be. These may even destroy computer systems for good. Aside from scheduling the software for automatic scanning, you also need to set for constant software or program update. This will allow you to continuously have updated software that can make you computers safe from viruses as you use the internet. It is through the internet that you get these viruses. This is how you can have better computer security.

Aside from doing all these, you should also set up your computer firewall. The firewall is an effective tool that will keep the hackers from sending viruses to your computer or get in to your system and steal important data from you. Over the years, firewall has been one of the most powerful tools that can provide better protection for your computers. You can set up this firewall whether you are using the computer for personal or business purposes.

Never install anything on your computer when you are not sure that it is safe. When you download something from the internet, you might observe that some programs and files will be accompanied by installers. Before you finalize the installation, it is important to first verify that it came from a reliable source and that it will not cause any harm to your computer system. This is how you can provide a good computer security that will eliminate the threats of getting your computer system destroyed.

Trent Presley works in computers and likes to write about anything related to computer software in his spare time. For more information you can visit his website Norton Antivirus Review.
Viruses are very threatening these days. There are many people who are having problems with their computers because of these viruses. The good news is that there are many programs these days that can provide anyone with tight computer security. You can use internet security as well as antivirus software to protect your computer. These programs can also give them protection from hackers.
The first thing that you need to do to protect your computer is to download and then install any internet security program so that your computer cannot be assessed by hackers who have the intention of getting information for your PC. Hackers will also be disabled from getting into your system to destroy it. We must protect our computers from these hackers so that any intellectual properties stored in our computers will not be stolen.
Next, you must also ensure that your computer have antivirus software installed. This antivirus program will be able to protect your system from being attacked by internet viruses, malwares, and other destructive scripts. Over the years, there have been a lot of people who have the benefited from the antivirus programs. What is good about these programs is that these are very affordable. These can be downloaded directly from the internet and installed in your system right away to have a good form of computer security.
Once you already have these programs installed in you computer, you need to set automatic virus scanning. Scheduling automatic scanning will give you the assurance that your computer is constantly safe from getting virus threats. We all know how dreadful and how destructive viruses and malwares can be. These may even destroy computer systems for good. Aside from scheduling the software for automatic scanning, you also need to set for constant software or program update. This will allow you to continuously have updated software that can make you computers safe from viruses as you use the internet. It is through the internet that you get these viruses. This is how you can have better computer security.
Aside from doing all these, you should also set up your computer firewall. The firewall is an effective tool that will keep the hackers from sending viruses to your computer or get in to your system and steal important data from you. Over the years, firewall has been one of the most powerful tools that can provide better protection for your computers. You can set up this firewall whether you are using the computer for personal or business purposes.
Never install anything on your computer when you are not sure that it is safe. When you download something from the internet, you might observe that some programs and files will be accompanied by installers. Before you finalize the installation, it is important to first verify that it came from a reliable source and that it will not cause any harm to your computer system. This is how you can provide a good computer security that will eliminate the threats of getting your computer system destroyed.
Trent Presley works in computers and likes to write about anything related to computer software in his spare time. For more information you can visit his website Norton Antivirus Review.
Viruses are very threatening these days. There are many people who are having problems with their computers because of these viruses. The good news is that there are many programs these days that can provide anyone with tight computer security. You can use internet security as well as antivirus software to protect your computer. These programs can also give them protection from hackers.
The first thing that you need to do to protect your computer is to download and then install any internet security program so that your computer cannot be assessed by hackers who have the intention of getting information for your PC. Hackers will also be disabled from getting into your system to destroy it. We must protect our computers from these hackers so that any intellectual properties stored in our computers will not be stolen.
Next, you must also ensure that your computer have antivirus software installed. This antivirus program will be able to protect your system from being attacked by internet viruses, malwares, and other destructive scripts. Over the years, there have been a lot of people who have the benefited from the antivirus programs. What is good about these programs is that these are very affordable. These can be downloaded directly from the internet and installed in your system right away to have a good form of computer security.
Once you already have these programs installed in you computer, you need to set automatic virus scanning. Scheduling automatic scanning will give you the assurance that your computer is constantly safe from getting virus threats. We all know how dreadful and how destructive viruses and malwares can be. These may even destroy computer systems for good. Aside from scheduling the software for automatic scanning, you also need to set for constant software or program update. This will allow you to continuously have updated software that can make you computers safe from viruses as you use the internet. It is through the internet that you get these viruses. This is how you can have better computer security.
Aside from doing all these, you should also set up your computer firewall. The firewall is an effective tool that will keep the hackers from sending viruses to your computer or get in to your system and steal important data from you. Over the years, firewall has been one of the most powerful tools that can provide better protection for your computers. You can set up this firewall whether you are using the computer for personal or business purposes.
Never install anything on your computer when you are not sure that it is safe. When you download something from the internet, you might observe that some programs and files will be accompanied by installers. Before you finalize the installation, it is important to first verify that it came from a reliable source and that it will not cause any harm to your computer system. This is how you can provide a good computer security that will eliminate the threats of getting your computer system destroyed.
Trent Presley works in computers and likes to write about anything related to computer software in his spare time. For more information you can visit his website Norton Antivirus Review.

Solving the Challenges of Offshore Software Application Development

The arena of web is vast and universal. This global medium has reach that no one can fathom and expansion that no one can measure. The world is one without any boundaries of nation or language, thanks to the web development and web applications. They are creating brands that are global and have universal reach. They are holistic in terms of scalability, flexibility and user friendly performance.
As web applications continue to reach new horizons,there have been some drawbacks too. Generally web applications consist of planning (usually with client for model structuring a website), designing, development, testing and implementation of application. However, the maintenance costs, poor quality, poor designing or maintenance, configuration management and usability come forward.To resolve this, here are some points that should be taken into consideration for a trouble-free web experience with offshore software application development vendor.
Understanding the Requirements
Most problems occur because offered web development services are different from what clients expect or need. The solution to this problem is simple and straight forward- Listen and Understand. If you are an offshore website development company your work doubles up as in most cases either would you be dealing through phone or email with clients. The wide hiatus and deviation between the needs and delivery model can be fulfilled by smart working and smart understanding of objectives and purposes of business of client.
Also, the customer handling and website functioning is important; it does count in the web development services you provide. This builds up your reputation of hitting the bull's eye at one instant and providing customer satisfaction with excellence.
Internationalization and Localization
It is true that World Wide Web is universal. It binds the whole world into one. However, in the lust of being global, you as an offshore website development company should not forget that the local elements should not be forgotten to ensure long term success. Your web applications should support local language and cater to international visitors also. However, it should not highlight the cultural and regional differences.
Estimation of Pricing
The other significant roadblock in offshore web development services is the correct estimation of prices of the services. Clients visit offshore vendors because of high quality solutions and cost effective methodology. To maintain the credibility of your performance and services, it is recommended to opt transparency in operations and while quoting costs for the work.
Customer Satisfaction with Quality Solutions
Quality still rules and is mandatory in this all glitzy work. Thoroughly test and trouble shoot the application before launching and releasing it before launch. Proper verification and validation should be done to ensure proper performance of the software and web application. Compatibility issues with local or overseas issues should be tackled before implementing.
Output
The result should match the expectations of your client. The web application should be post maintained keeping the market trends in the mind. Services and other maintenance should be guaranteed by you.
Daniel Jose is Software Development Services expert and has been sharing a proud association with Vcare Software Development (VSD) for long.He is working as a consultant on Software Application Development and web development services. VSD is a name that tops the list of services and aspects related to Software Development Services and offshore website development within your budget.

Excel Formulas - 7 Basic Elements Revealed

If you are relatively new to writing Excel formulas, pay attention to these concepts.
Ignoring them will lead you to unnecessary headaches...
1) Every Excel formula starts with the = sign
The = sign is automatically entered when you insert an Excel function.
A formula without the equal sign is considered a cell content.
Let's see an example...
Given the fact that the cell A1 contains the number 10 and the cell A2 contains the number 20; the formula: =A1+A2 will retrieve 30, while the formula A1+A2 will be pure content. It will be shown as A1+A2 in the given cell.
At the same time, the function =SUM(A1:A15) will retrieve the results, while this one SUM(A1:A15) not.
The = sign must be entered by hand when you write the formula directly on a cell.
Important reminder: a formula entered on a cell that is formatted as text will not be evaluated even if it has the = sign.
2) An Excel formula may contain numbers (constants) or references to cells
The formula: =A1+20 contains a reference and a number.
A1 has the value of the content of the cell A1, while the number 20 is always 20.
The advantage of having references instead of constants is that you can change a whole spreadsheets by changing the input cells.
Otherwise, you should edit each instance of the formula in the sheet.
3) The Excel formula may contain plain Math, other functions or a combination of them
You can write a formula this way: =(A1+A2+A3+A4)/4+10 with plain Math or this way using a function and Math: =AVERAGE(A1:A4)+10.
4) Arguments are separated by commas and should be entered according to a specific order (syntax)

The arguments of a function are separated by commas.
The order in which they are entered are unambiguous and correspond to the given function syntax. For example: the formula =SUMIF(A1:A10,">20",B1:B10) corresponds to this syntax: =SUMIF( range, criteria, sum_range )
5) The result of an Excel formula is retrieved in the same cell on which was written
After you hit enter, the formula is calculated and the result is shown in the same cell.
Important reminder: Excel won't calculate the formula result when it lacks inputs. On the other hand, you will get a result if all the arguments and logic are correctly entered.
6) You cannot see an Excel formula in a cell just its results.
You can see the contents in the formula bar, by pressing F2 or by showing formulas instead of results (CTRL + ` )
A formula shows by default its result in the cell where it is contained.
This may lead you to confusion with the inputs. An input and a formula result are not distinguishable at first sight.
7) Excel computes formulas in a well known order
If you combine several operators in a single formula, Excel performs the operations in the order shown in the following sequence.
  1. - Negation (as in -1)
  2. % Percent
  3. ^ Exponentiation
  4. * and / Multiplication and division
  5. + and - Addition and subtraction
  6. & Connects two strings of text (concatenation)
  7. = < > <= >= <> Comparison
If a formula contains operators with the same precedence. For example: if a formula contains both a multiplication and division operator; Excel evaluates the operators from left to right.
To change the order of evaluation, enclose in parentheses the part of the formula to be calculated first.
The formula multiplies 2 by 3 and then adds 5 to the result.
=5+2*3=11
In contrast, if you use parentheses to change the syntax, Excel adds 5 and 2 together and then multiplies the result by 3 to produce 21.
=(5+2)*3=21
Conclusion
These Excel formula nuggets will help you to get started on the fascinating world of Excel spreadsheets.
For more professional Excel tips and advice, visit http://www.excel-spreadsheet-authors.com/
Learn more about: Excel Formulas

MillatFacebook.com Jejaring Sosial Mirip Facebook

ISLAMABAD, KOMPAS.com - Orang Pakistan yang marah pada Facebook sehubungan dengan karikatur yang menghujat Nabi Muhammad SAW, telah menciptakan laman jejaring pemisahan diri yang mereka impikan dapat menghubungkan 1,6 miliar Muslim di seluruh dunia.

Sekelompok enam profesional muda TI dari Lahore, ibukota budaya dan hiburan Pakistan, meluncurkan www.millatfacebook.com pada Selasa buat orang Muslim untuk berinteraksi "daring" (dalam jaringan) dan memprotes penghujatan.

Perusahaan swasta tersebut lahir setelah satu pengadilan Pakistan memerintah pemblokiran terhadap Facebook sampai 31 Mei, karena rakyat Pakistan tersinggung dengan laman "Everyone Draw Mohammed Day" yang menghujat dan menistakan Nabi Muhammad.

"Millatfacebook adalah laman jejaring sosial pertama yang dimiliki Pakistan. Laman buat Muslim oleh Muslim, tempat orang-orang yang baik dari agama lain juga diterima dengan tangan terbuka," kata jejaring itu kepada orang tertarik untuk bergabung.

Setiap anggota memiliki "tembok" buat teman untuk menyampaikan komentar. Laman tersebut menawarkan fasilitas surat elektronik, foto, video, bercakap-cakap dan diskusi.

Dalam bahasa Urdu kata "Millat" digunakan oleh umat Muslim untuk merujuk kepada bangsa mereka. Jejaring itu menyatakan telah menarik 4.300 anggota dalam tiga hari belakangan --kebanyakan orang Pakistan yang mampu berbahasa Inggris dalam usia 20-an tahun.

Jumlah peminat diduga akan bertambah, tapi masyarakat tersebut hanyalah setetes air di lautan 2,5 juta penggemar Facebook di Pakistan dan ada reaksi pedas pada saat peluncuran jejaring itu.

"Kami ingin memberitahu orang-orang Facebook, ’jika mereka macam-macam dengan kami, mereka harus menghadapi konsekuensi’," kata Usman Zaheer (24), pemimpin petugas pelaksana rumah perangkat lunak yang menampung laman baru tersebut.

"Jika seseorang menghujat Nabi Muhammad SAW, kami akan menjadi pesaing mereka dan memberi kerugian besar dalam bisnis," katanya. Ia memimpinkan dapat membuat jejaring sosial Muslim terbesar.

sumber : Kompas.com

Tenang Bro.. Facebook tetap Gratis

WASHINGTON, KOMPAS.com — Untuk meyakinkan para pengguna Facebook, CEO Facebook Mark Zuckerberg menulis surat terbuka yang dimuat di situs web Washington Post, Senin (24/5/2010). Tulisan itu sebagai respons atas keluhan banyak pihak, khususnya di Amerika Serikat dan Eropa, yang memprotes keamanan privasi di situs jejaring sosial tersebut.

Zuckerberg menjelaskan lima prinsip yang menjadi pedoman Facebook terkait privasi pengguna. Prinsip pertama, Facebook akan selalu memberikan kontrol pengaturan privasi kepada setiap pengguna.

"Banyak orang memutuskan untuk mempersilakan beberapa informasi pribadi dilihat orang lain sehingga banyak orang yang dikenalnya mudah menemukannya di Facebook. Kami sudah menyediakan kontrol untuk membatasi munculnya informasi tersebut dan kami akan mengusahakannya semakin andal," ujar Zuckerberg.

Prinsip kedua, tulis Zuckerberg, Facebook tidak akan memberikan informasi pribadi penggunanya kepada orang lain atau layanan pihak ketiga yang tidak diinginkan pengguna. Ketiga, Facebook tidak akan pernah memberikan infrormasi titu kepada pengiklan.

Keempat, Facebook tidak akan menjual informasi apa pun terkait penggunanya kepada pihak lain. Kelima, Zuckerberg menegaskan bahwa Facebook akan tetap selamanya menjadi layanan yang gratis bagi setiap orang.

sumber : kompas.com

Kolaborasi Peta, E-mail, dan IM antara Yahoo dan Nokia

Inilah berita yang cukup menggembirakan bagi para pengguna Nokia dan Penggemar Yahoo. Menurut berita yang diturunkan Kompas.com hari ini menyebutkan bahwa Dua perusahaan teknologi besar tersebut, Nokia dan Yahoo, sepakat melakukan kerja sama dalam tiga bidang, yaitu layanan pemetaan, e-mail, dan instant messaging (IM). Yahoo akan menggunakan peta dan navigasi Nokia Ovi Maps, sementara Nokia akan menggunakan teknologi e-mail dan IM dari Yahoo.

Kesepakatan itu dilakukan hari Senin (24/5/2010) antara CEO Yahoo Carol Bartz dan CEO Nokia Oli-Pekka Kallasvuo di New York, Amerika Serikat. Kerja sama ini merupakan upaya kedua belah pihak memperkuat layanannya masing-masing.

CEO Yahoo Carol Bartz menyatakan, selama ini Yahoo tidak terlalu fokus dalam pengembangan layanan peta sehingga tertinggal jauh dengan Google. Melalui kerja sama ini, Yahoo bakal kembali bersaing di layanan peta dan navigasi. Sementara itu, CEO Nokia Oli-Pekka Kallasvuo menyatakan, dengan bekerja sama dengan Yahoo, pihaknya punya peluang merambah pangsa pasar lebih besar di AS. Meski produsen ponsel terbesar di dunia, Nokia kalah di pasar Amerika.

Layanan itu akan tetap mempertahankan merek masing-masing dengan cara co-branding. Layanan navigasi Yahoo akan dilabeli "powered by Ovi", sedangkan layanan Ovi Mail dan Ovi Chat dari Nokia akan ditambah label "powered by Yahoo".

sumber : kompas.com

Manfaat Wortel

Tahukah anda apa manfaat dari wortel. Ternyata wortel yang kita gunakan untuk sayuran atau kadang-kadang dapat juga kita buat jus tersebut mempunyai sederet manfaat bagi kesehatan. Wortel mempunyai banyak manfaat yang dapat kita ambil. Mari kita simak postingan berikut untuk mengetahui lebih banyak tentang manfaat dari wortel untuk kesehatan tubuh kita

Wortel (Daucus carota) adalah tumbuhan sayur yang ditanam sepanjang tahun. Terutama di daerah pegunungan yang memiliki suhu udara dingin dan lembab, kurang lebih pada ketinggian 1200 ineter di atas permukaan laut. Tumbuhan wortel mernbutuhkan sinar matahari dan dapat turnbuh pada sernua musim. Wortel mempunyai batang daun basah yang berupa sekumpulan pelepah (tangkai daun) yang muncul dari pangkal buah bagian atas (umbi akar), mirip daun seledri. Wortel menyukai tanah yang gembur dan subur. Menurut para botanis, wortel (Daucus carota) dapat dibedakan atas beberapa jenis, di antaranya: WORTEL (Daucus carota, Linn.) - jenis imperator, yakni wortel yang memiliki umbi akar berukuran panjang dengan ujung meruncing dan rasanya kurang manis. - jenis chantenang, yakni wortel yang memiliki umbi akar berbentuk bulat panjang dan rasanya manis. - jenis mantes, yakni wortel hasil kornbinasi dari jenis wortel imperator dan chantenang. Umbi akar wortel berwarna khas oranye.

Diantara jenis sayur lainnya, wortel termasuk sayuran yang paling digemari banyak orang, baik itu dewasa maupun anak - anak. Citarasanya yang manis dan teksturnya renyah, cocok sekali dijadikan hidangan yang menyehatkan. Jika anda tidak suka sayuran kesukaan kelinci ini, anda termasuk kelompok yang merugi. Sebab, anda banyak kehilangan manfaat yang diberikan wortel bagi kesehatan.

Mendengar kata "wortel" yang dalam bahasa Inggrisnya disebut carrot, kita pasti langsung teringat pada buah yang berwarna oranye dan bentuknya memanjang, serta salah satunya meruncing. Wortel termasuk dalam tumbuhan sayur yang dalam ilmu biologi, wortel dimasukan dalam famili Apiaceae.

Bagian yang dapat dimakan dari wortel adalah bagian umbi atau akarnya. Wortel adalah tumbuhan biennial dengan siklus hidup 12 - 24 bulan yang mampu menyimpan karbohidrat dalam jumlah besar untuk tumbuhan tersebut berbunga pada tahun kedua. Batang bunga tumbuh setinggi sekitar 1m, dengan bunga berwarna putih.

Wortel atau dalam bahasa latinnya disebut Daucus carota adalah tumbuhan sayur yang dapat ditanam sepanjang tahun. Terutama didaerah pegunungan yang memiliki suhu udara dingin dan lembab. Tumbuhan wortel membutuhkan sinar matahari dan dapat tumbuh pada semua musim. Wortel mempunyai batang daun basah yang berupa sekumpulan pelepah (tangkai daun) yang muncul dari pangkal buah bagian atas (umbi akar), mirip daun seledri.

Menurut para botanis, wortel (Daucus carota) dapat dibedakan menjadi beberapa jenis, diantaranya :

  1. Jenis imperator, yakni wortel yang memiliki umbi akar berukuran panjang dengan ujung meruncing dan rasanya kurang manis.
  2. Jenis chantenang, yakni wortel yang memiliki umbi akar berbentuk bulat panjang dan rasanya manis.
  3. Jenis mantes, yakni wortel hasil kombinasi dari jenis wortel imperator dan chantenang. Umbi akar wortel berwarna khas oranye.

Berikut adalah sederet manfaat wortel yang perlu Anda ketahui. Siapa tahu ada resep yang Anda butuhkan.

  • Wortel merupakan jenis sayuran terpopuler keduya setelah kentang. Wortel mengandung vitamin A yang tinggi. Vitamin A dan Beta karoten kadang - kadang diresepkan untuk hal yang sama, karena beta karoten didalam tubuh dikonversi menjadi vitamin A. Beta karoten sendiri termasuk dalam golongan karotenoida dan telah diidentifikasi terdapat lebih dari 600 jenis karoten yang berbeda. Antara lain yang cukup dikenal didunia kesehatan adalah karoten, lutein, dan lycopen.
  • Beta karoten merupakan bagian penting dari karoten. Jika tubuh diberi asupan beta karoten maka tubuh akan membentuk vitamin A sesuai yang diperlukan tubuh sehingga menyantap wortel menjadikan cara yang aman untuk memperoleh vitamin A.
  • Mencegah kanker. Dibandingkan dengan sayuran lain, wortel paling banyak mengandung beta karoten, rata - rata 12.000 IU ; para ahli menganjurkan 15.000 - 25.000 IU perhari. Ini terkait kandungan tinggi beta karoten yang mampu mencegah penyakit kanker, karena sifat antioksidanya yang melawan kerja destruktif sel - sel kanker. Disamping itu beta karoten membantu sistem kekebalan tubuh yang menghasilkan "killer cell" alami.
  • Mencegah Rabun Senja dan Memperbaiki Penglihatan. Karoten juga baik untuk kesehatan mata. Membantu mencegah terjadinya rabun senja dan memperbaiki penglihatan yang lemah. Kekurangan vitamin A atau yang dikenal dalam istilah kedokteran sebagai vitaminosis A, dapat menyebabkan buta ayam atau rabun senja.
  • Menurunkan Kolesterol Darah. Didalam wortel juga terkandung pectin yang baik untuk menurunkan kolesterol darah. Serat yang tinggi juga bermanfaat untuk mencegah terjadinya konstipasi. Dengan adanya kandungan kalium dalam wortel, dapat membantu menetralkan asam dalam darah dan vitamin A membantu hati menghilangkan toksin didalam tubuh.
  • Wortel mentah atau dimasak merupakan sumber kalium dan vitamin C. Mendapatkan dan mengonsumsi wortel sangatlah mudah, dapat dicampur dalam berbagai variasi makanan, minuman jus ataupun suplemen.

Nah, untuk memperoleh manfaat wortel secara maksimal yang harus diperhatikan adalah jeli memilih wortel. Pilih wortel yang berwarna agak muda dan terang. Ini menandakan bahwa wortel tersebut masih muda dan segar.(Sumber: Lezat Edisi 081/IV/23 Mei - 5 Juni 2007/Dv/Ijs)

Manfaat Buah Tomat

Tahukah anda manfaat buah tomat bagi kesehatan ? Manfaat tomat tidak sekedar buat lalapan pas kita makan sate kambing aja, tetapi setelah kita baca-baca di beberapa literatur ternyata buah tomat memiliki khasiat untuk kesehatan. Tetapi ngomong-ngomong anda pernah makan Buah tomat belum sih ? Dibuat jus enak juga lho ... Mari kita simak bersama apa manfaat buah tomat bagi kesehatan tubuh kita. Tomat, adalah tanaman yang paling mudah dijumpai. Warnanya yang cerah sungguh menarik. Biasanya sih merah merona, asyik deh pokoknya. Selain kaya vitamin C dan A, tomat konon dapat mengobati bermacam penyakit.

Kalau dirunut sejarahnya, tomat atau Lyopercisum esculentum pada mulanya ditemukan di sekitar Peru, Ekuador dan Bolivia. Di Prancis, tomat dinamakan ‘apel cinta’ atau pomme d’amour. Dikatakan sebagai apel cinta, karena tomat diyakini mampu memulihkan lemah syahwat dan meningkatkanjumlah sperma serta menambah kegesitan gerakannya.

Tomat juga banyak digunakan untuk masakan, seperti sup, jus, pasta, dllnya. Rasanya yang sedikit asam bahkan membuat selera makan meningkat. Lebih jauh menurut penelitian DR. John Cook Bennet dari Wiloughby University, Ohio, sebagai orang pertama yang meneliti manfaat tomat, pada November 1834, menunjukkan bahwa tomat dapat mengobati diare, serangan empedu,gangguan pencernaan dan memulihkan fungsi lever. Peneliti lain dari Rowett Research Institute di Aberdeen, Skotlandia, juga berhasil menemukan manfaat tomat lainnya. Menurutnya, gel berwarna kuning yang menyelubungi biji tomat dapat mencegah penggumpalan dan pembekuan darah yang dapat menyebabkan penyakit jantung dan stroke.

Hal ini juga diakui oleh dokter gizi, Dr. Leane Suniar Manurung, MSc. Melihat khasiat tomat begitu banyak, maka tomat baik dikonsumsi siapapun sejak usia dini. “Apalagi tomat juga timggi kandungan vitamin C dan vitamin A, yang bermanfaat untuk meningkatkan kekebalan tubuh.” Tapi tomat seperti apa yang baik dikonsumsi? Jika melihat dipasaran, kita bisa menemukan tomat dengan dua warna, yakni warna merah dan hijau. Perbedaan warna ini menunjukan kandungan vitaminnya. Menurut Leane, tomat yang baik dikonsumsi adalah tomat merah. Tomat berwarna merah mengandung vitamin C dan vitamin A lima kali lebih banyak dibandingkan dengan tomat hijau.Semakin matang tomat, semakin kaya kandungan vitaminnya. “Karena itu anak kecil sebaiknya dibiasakan banyak makan tomat merah. Ini penting untuk kesehatan matanya,” ujar Leane. Jadi, tak pelu ragu memberi si kecil tomat. Sejak usia 6 bulan, seorang anak mulai dibiasakan memakan tomat yang dicampur dengan sayuran lainnya. Menghancurkan Radikal Bebas

Dalam pigmen warna merah pada tomat, mempunyai nilai lebih lainnya. Warna merah pada tomat lebih banyak mengandung lycopene, yaitu suatu zat antioksidan yang dapat menghancurkan radikal bebas dalam tubuh akibat rokok, polusi dan sinar ultraviolet. Selain itu, belakangan diketahui lycopene juga berkhasiat membantu mencegah kerusakan sel yang dapat mengakibatkan kanker leher rahim, kanker prostat, kanker perut dan kanker pankreas. “Memang lycopene tidak hanya ditemukan pada tomat, tetapi juga pada anggur merah, semangka dan pepaya. Namun, lycopene yang paling banyak terdapat pada tomat,” terang Leane.

Untuk mendapat khasiatnya, terutama untuk orang dewasa, lanjut Leane tomat sebaiknya dimakan setiap pagi sebanyak satu atau dua buah. Rasa asam pada tomat berasal dari kandungan asam sitrat menyebabkan tomat terasa segar, sehingga dapat menambah nafsu makan. Rasa asam ini sangat baik dokonsumsi saat kita mengalami mual atau dikonsumsi oleh para wanita yang mengalami PMS (Pre Menstrual Syndrome). Jika tak kuat dengan rasa masamnya, terutama untuk yang yang memiliki penyakit maag, Leane tak menyarankan mengkonsumsinya walapun dalam bentuk jus yang sudah ditambah gula, sebab akanmemperburuk kondisi penyakit. Lebih Baik Diolah


Berbeda dengan sayuran lainnya yang lebih bermanfaat jika dimakan mentah-mentah, ternyata tomat lebih baik dicampur dengan masakan atau dihancurkan sebelum dimakan. Para peneliti menemukan lycopene yang dikeluarkan pada tomat tersebut lebih banyak dibandingkan dengan tomat yang langsung dimakan tanpa diolah terlebih dahulu. Sayangnya, meskipun kandungan lycopennya berlimpah, pasta tomat dan saus tomat yang dijual dipasaran sudah banyak dibubuhi bahan tambahan makanan seperti pewarna atau pengawet sintetis. ” Bahan tambahan ini justru merangsang munculnya banyak radikal bebas yang memicu kanker.

Manfaat Buah Tomat antara lain :
  1. Membantu menurunkan resiko gangguan jantung
  2. Menghilangkan kelelahan dan menambah nafsu makan.
  3. Menghambat pertumbuhan sel kanker pada prostat, leher rahim, payudara dan endometrium.
  4. Memperlambat penurunan fungsi mata karena pengaruh usia ( age-related macular degeneration).
  5. Mengurangi resiko radang usus buntu.
  6. Membantu menjaga kesehatan organ hati, ginjal, dan mencegah kesulitan buang air besar.
  7. Menghilangkan jerawat.
  8. Mengobati diare
  9. Meningkatkan jumlah sperma pada pria
  10. Memulihkan fungsi lever.
  11. Mengatasi kegemukan


Tips Mengolah Tomat Sebagai Obat

Untuk mengobati keseleo:
Sembuhkan dengan ramuan tomat. Buah tomat diblender, lalu sarinya dicampur dengan minyak wijen, dengan perbandingan 1:1. Setelah itu, dipanaskan hingga tinggal minyaknya saja. Kemudian, minyak tersebut dipakai memijat sendi-sendi yang keseleo tadi.

Untuk mengobati bisul:
Ambil sebuah tomat. Lalu, seluruh daging dan biji tomat dipanaskan, dan diletakkan di atas bisul. Tak lama kemudian bisul itu pecah, dan sekaligus disembuhkannya.

Untuk pengobatan jerawat:
Ambilah sebuah tomat yang telah direbus, kemudian potong-potong. Gosokkan potongan itu pada wajah yang berjerawat secara perlahan. Diamkan selama sepuluh menit. Setelah itu bilas wajah dengan air. Lakukan rutin selama satu bulan.

Tips Memilih Tomat

  • Pilih tomat yang matang berwarna merah tua.
  • Pilih tomat yang masih keras dan tidak ada bagian yang lunak. Jika ada bagian yang lunak, berarti ada bagian yang sudah mulai membusuk di dalamnya.
  • Jangan pilih tomat yang kusam, pilih yang warnanya masih mengkilap.
  • Perhatikan pada pangkal tomat, jika berbau agak asam dan sudah mulai berarir, berarti sudah mulai terjadi pembusukan. Pilih tomat yang kulitnya masih segar dan belum keriput, untuk menandakan bahwa tomat tersebut masih baru.
Keterangan di atas mudah-mudahan berguna untuk tips kesehatan kita. Kesehatan itu mahal harganya, dan mari kita jaga sedemikian sehingga kita tetap diberikan kesehatan lahir batin. Setelah kita mengetahui manfaat dari buah tomat, sudah selayaknya jika informasi tentang manfaat buah tomat ini kita sebarluaskan kepada teman-teman dekat kita supaya kita bisa membantu sesama meskipun hanya sekedar informasi yang bermanfaat.
referensi : http://www.karonia.co.cc

Operation of Central Processing Unit (CPU)

Ramsey SBRGB1 SMT Multi Color Microprocessor Blinky Kit
The fundamental operation of most CPUs, regardless of the physical form they take, is to execute a sequence of stored instructions called a program. The program is represented by a series of numbers that are kept in some kind of computer memory. There are four steps that nearly all CPUs use in their operation: fetch, decode, execute, and writeback.

The first step, fetch, involves retrieving an instruction (which is represented by a number or sequence of numbers) from program memory. The location in program memory is determined by a program counter (PC), which stores a number that identifies the current position in the program. In other words, the program counter keeps track of the CPU's place in the current program. After an instruction is fetched, the PC is incremented by the length of the instruction word in terms of memory units.[6] Often the instruction to be fetched must be retrieved from relatively slow memory, causing the CPU to stall while waiting for the instruction to be returned. This issue is largely addressed in modern processors by caches and pipeline architectures (see below).

The instruction that the CPU fetches from memory is used to determine what the CPU is to do. In the decode step, the instruction is broken up into parts that have significance to other portions of the CPU. The way in which the numerical instruction value is interpreted is defined by the CPU's instruction set architecture (ISA).[7] Often, one group of numbers in the instruction, called the opcode, indicates which operation to perform. The remaining parts of the number usually provide information required for that instruction, such as operands for an addition operation. Such operands may be given as a constant value (called an immediate value), or as a place to locate a value: a register or a memory address, as determined by some addressing mode. In older designs the portions of the CPU responsible for instruction decoding were unchangeable hardware devices. However, in more abstract and complicated CPUs and ISAs, a microprogram is often used to assist in translating instructions into various configuration signals for the CPU. This microprogram is sometimes rewritable so that it can be modified to change the way the CPU decodes instructions even after it has been manufactured.

After the fetch and decode steps, the execute step is performed. During this step, various portions of the CPU are connected so they can perform the desired operation. If, for instance, an addition operation was requested, an arithmetic logic unit (ALU) will be connected to a set of inputs and a set of outputs. The inputs provide the numbers to be added, and the outputs will contain the final sum. The ALU contains the circuitry to perform simple arithmetic and logical operations on the inputs (like addition and bitwise operations). If the addition operation produces a result too large for the CPU to handle, an arithmetic overflow flag in a flags register may also be set.

The final step, writeback, simply "writes back" the results of the execute step to some form of memory. Very often the results are written to some internal CPU register for quick access by subsequent instructions. In other cases results may be written to slower, but cheaper and larger, main memory. Some types of instructions manipulate the program counter rather than directly produce result data. These are generally called "jumps" and facilitate behavior like loops, conditional program execution (through the use of a conditional jump), and functions in programs.[8] Many instructions will also change the state of digits in a "flags" register. These flags can be used to influence how a program behaves, since they often indicate the outcome of various operations. For example, one type of "compare" instruction considers two values and sets a number in the flags register according to which one is greater. This flag could then be used by a later jump instruction to determine program flow.

After the execution of the instruction and writeback of the resulting data, the entire process repeats, with the next instruction cycle normally fetching the next-in-sequence instruction because of the incremented value in the program counter. If the completed instruction was a jump, the program counter will be modified to contain the address of the instruction that was jumped to, and program execution continues normally. In more complex CPUs than the one described here, multiple instructions can be fetched, decoded, and executed simultaneously. This section describes what is generally referred to as the "Classic RISC pipeline", which in fact is quite common among the simple CPUs used in many electronic devices (often called microcontroller). It largely ignores the important role of CPU cache, and therefore the access stage of the pipeline.

Introduction to Microprocessor

The introduction of the microprocessor in the 1970s significantly affected the design and implementation of CPUs. Since the introduction of the first commercially available microprocessor (the Intel 4004) in 1970 and the first widely used microprocessor (the Intel 8080) in 1974, this class of CPUs has almost completely overtaken all other central processing unit implementation methods. Mainframe and minicomputer manufacturers of the time launched proprietary IC development programs to upgrade their older computer architectures, and eventually produced instruction set compatible microprocessors that were backward-compatible with their older hardware and software. Combined with the advent and eventual vast success of the now ubiquitous personal computer, the term "CPU" is now applied almost exclusively to microprocessors.
Previous generations of CPUs were implemented as discrete components and numerous small integrated circuits (ICs) on one or more circuit boards. Microprocessors, on the other hand, are CPUs manufactured on a very small number of ICs; usually just one. The overall smaller CPU size as a result of being implemented on a single die means faster switching time because of physical factors like decreased gate parasitic capacitance. This has allowed synchronous microprocessors to have clock rates ranging from tens of megahertz to several gigahertz. Additionally, as the ability to construct exceedingly small transistors on an IC has increased, the complexity and number of transistors in a single CPU has increased dramatically. This widely observed trend is described by Moore's law, which has proven to be a fairly accurate predictor of the growth of CPU (and other IC) complexity to date.
While the complexity, size, construction, and general form of CPUs have changed drastically over the past sixty years, it is notable that the basic design and function has not changed much at all. Almost all common CPUs today can be very accurately described as von Neumann stored-program machines. As the aforementioned Moore's law continues to hold true, concerns have arisen about the limits of integrated circuit transistor technology. Extreme miniaturization of electronic gates is causing the effects of phenomena like electromigration and subthreshold leakage to become much more significant. These newer concerns are among the many factors causing researchers to investigate new methods of computing such as the quantum computer, as well as to expand the usage of parallelism and other methods that extend the usefulness of the classical von Neumann model.

Media Player

Media player is a term typically used to describe computer software for playing back multimedia files. Most software media players support an array of media formats, including both audio and video files.

Some media players focus only on audio or video and are known as audio players and video players respectively. The producers of these players usually focus on providing a better user experience as they are specifically tailored toward the media type. Live At The Troubadour [CD / DVD Combo]

Microsoft Windows comes with pre-loaded Windows Media Player. The latest is Windows Media Player 12, which is bundled with Windows 7. Mac OS X comes pre-loaded with Quicktime Player for playing Quicktime movies and iTunes for playing a variety of media formats. Winamp supports Apple iPods and other portables like Creative's Zen while also supporting audio and video playback. Linux distributions come pre-loaded with various media players including Amarok, VLC, MPlayer, xine, and Totem.

Many media players use libraries. The library is designed to help you organize, or catalog, your music into categories such as genre, year, rating or other. Good examples of media players that include media libraries are Winamp, Windows Media Player, iTunes, RealPlayer, Amarok and ALLPlayer.

Introduction to Dashboards (management information systems)

In management information systems, a dashboard is an executive information system user interface that (similar to an automobile's dashboard) is designed to be easy to read. For example, a product might obtain information from the local operating system in a computer, from one or more applications that may be running, and from one or more remote sites on the Web and present it as though it all came from the same source.

Types of dashboards

Digital dashboards may be laid out to track the flows inherent in the business processes that they monitor. Graphically, users may see the high-level processes and then drill down into low level data. This level of detail is often buried deep within the corporate enterprise and otherwise unavailable to the senior executives.

Three main types of digital dashboard dominate the market today: stand alone software applications, web-browser based applications, and desktop applications also known as desktop widgets. The last are driven by a widget engine.

Specialized dashboards may track all corporate functions. Examples include human resources, recruiting, sales, operations, security, information technology, project management, customer relationship management and many more departmental dashboards.

Digital dashboard projects involve business units as the driver and the information technology department as the enabler. The success of digital dashboard projects often depends on the metrics that were chosen for monitoring. Key performance indicators, balanced scorecards, and sales performance figures are some of the content appropriate on business dashboards.

Interface design styles

Like a car's dashboard (or control panel), a software dashboard provides decision makers with the input necessary to "drive" the business. Thus, a graphical user interface may be designed to display summaries, graphics (e.g., bar charts, pie charts, bullet graphs, "sparklines," etc.), and gauges (with colors similar to traffic lights) in a portal-like framework to highlight important information.

History

The idea of digital dashboards followed the study of decision support systems in the 1970s. With the surge of the web in the late 1990s, digital dashboards as we know them today began appearing. Many systems were developed in-house by organizations to consolidate and display data already being gathered in various information systems throughout the organization. Today, digital dashboard technology is available "out-of-the-box" from many software providers. Some companies however continue to do in-house development and maintenance of dashboard applications. For example, GE Aviation has developed a proprietary software/portal called "Digital Cockpit" to monitor the trends in aircraft spare parts business.

In the late 1990s, Microsoft promoted a concept known as the Digital Nervous System and "digital dashboards" were described as being one leg of that concept.

Benefits of digital dashboards

Digital dashboards allow managers to monitor the contribution of the various departments in their organization. To gauge exactly how well an organization is performing overall, digital dashboards allow you to capture and report specific data points from each department within the organization, thus providing a "snapshot" of performance.

Benefits of using digital dashboards include:

  1. Visual presentation of performance measures
  2. Ability to identify and correct negative trends
  3. Measure efficiencies/inefficiencies
  4. Ability to generate detailed reports showing new trends
  5. Ability to make more informed decisions based on collected business intelligence
  6. Align strategies and organizational goals
  7. Save time over running multiple reports
  8. Gain total visibility of all systems instantly   
Microsoft Office Home and Student 2007
 source : www.wikipedia.org

Computer-aided Design Overview

Computer-aided design (CAD) is the use of computer technology for the design of objects, real or virtual. CAD often involves more than just shapes. As in the manual drafting of technical and engineering drawings, the output of CAD often must convey also symbolic information such as materials, processes, dimensions, and tolerances, according to application-specific conventions.

CAD may be used to design curves and figures in two-dimensional ("2D") space; or curves, surfaces, and solids in three-dimensional ("3D") objects.Adobe Photoshop Elements 8

CAD is an important industrial art extensively used in many applications, including automotive, shipbuilding, and aerospace industries, industrial and architectural design, prosthetics, and many more. CAD is also widely used to produce computer animation for special effects in movies, advertising and technical manuals. The modern ubiquity and power of computers means that even perfume bottles and shampoo dispensers are designed using techniques unheard of by engineers of the 1960s. Because of its enormous economic importance, CAD has been a major driving force for research in computational geometry, computer graphics (both hardware and software), and discrete differential geometry.

The design of geometric models for object shapes, in particular, is often called computer-aided geometric design (CAGD)

Current Computer-Aided Design software packages range from 2D vector-based drafting systems to 3D solid and surface modellers. Modern CAD packages can also frequently allow rotations in three dimensions, allowing viewing of a designed object from any desired angle, even from the inside looking out. Some CAD software is capable of dynamic mathematic modeling, in which case it may be marketed as CADD — computer-aided design and drafting.

CAD is used in the design of tools and machinery and in the drafting and design of all types of buildings, from small residential types (houses) to the largest commercial and industrial structures (hospitals and factories).

CAD is mainly used for detailed engineering of 3D models and/or 2D drawings of physical components, but it is also used throughout the engineering process from conceptual design and layout of products, through strength and dynamic analysis of assemblies to definition of manufacturing methods of components. It can also be used to design objects.

CAD has become an especially important technology within the scope of computer-aided technologies, with benefits such as lower product development costs and a greatly shortened design cycle. CAD enables designers to lay out and develop work on screen, print it out and save it for future editing, saving time on their drawings.

Occupations that use CAD include designers, architects, and developers.

Computer-aided engineering Overview

Computer-aided engineering (CAE) is the broad usage of computer software to aid in engineering tasks. It includes computer-aided design (CAD), computer-aided analysis (CAA), computer-integrated manufacturing (CIM), computer-aided manufacturing (CAM), material requirements planning (MRP), and computer-aided planning (CAP).

Software tools that have been developed to support these activities are considered CAE tools. CAE tools are being used, for example, to analyze the robustness and performance of components and assemblies. The term encompasses simulation, validation, and optimization of products and manufacturing tools. In the future, CAE systems will be major providers of information to help support design teams in decision making.

In regard to information networks, CAE systems are individually considered a single node on a total information network and each node may interact with other nodes on the network.

CAE systems can provide support to businesses. This is achieved by the use of reference architectures and their ability to place information views on the business process. Reference architecture is the basis from which information model, especially product and manufacturing models.

The term CAE has also been used by some in the past to describe the use of computer technology within engineering in a broader sense than just engineering analysis. It was in this context that the term was coined by Dr. Jason Lemon, founder of SDRC in the late 70's. This definition is however better known today by the terms CAx and PLM.Living Organized: Proven Steps for a Clutter-Free and Beautiful Home

source : www.wikipedia.org

Classification of Application Software

We know if there many types application of software. There are many types of application software :
  1. An application suite consists of multiple applications bundled together. They usually have related functions, features and user interfaces, and may be able to interact with each other, e.g. open each other's files. Business applications often come in suites, e.g. Microsoft Office, OpenOffice.org, and iWork, which bundle together a word processor, a spreadsheet, etc.; but suites exist for other purposes, e.g. graphics or music.
  2. Enterprise software addresses the needs of organization processes and data flow, often in a large distributed environment. (Examples include Financial, Customer Relationship Management, and Supply Chain Management). Note that Departmental Software is a sub-type of Enterprise Software with a focus on smaller organizations or groups within a large organization. (Examples include Travel Expense Management, and IT Helpdesk)
  3. Enterprise infrastructure software provides common capabilities needed to support enterprise software systems. (Examples include Databases, Email servers, and Network and Security Management)
  4. Information worker software addresses the needs of individuals to create and manage information, often for individual projects within a department, in contrast to enterprise management. Examples include time management, resource management, documentation tools, analytical, and collaborative. Word processors, spreadsheets, email and blog clients, personal information system, and individual media editors may aid in multiple information worker tasks.
  5. Content access software is software used primarily to access content without editing, but may include software that allows for content editing. Such software addresses the needs of individuals and groups to consume digital entertainment and published digital content. (Examples include Media Players, Web Browsers, Help browsers, and Games)
  6. Educational software is related to content access software, but has the content and/or features adapted for use in by educators or students. For example, it may deliver evaluations (tests), track progress through material, or include collaborative capabilities.
  7. Simulation software are computer software for simulation of physical or abstract systems for either research, training or entertainment purposes.
  8. Media development software addresses the needs of individuals who generate print and electronic media for others to consume, most often in a commercial or educational setting. This includes Graphic Art software, Desktop Publishing software, Multimedia Development software, HTML editors, Digital Animation editors, Digital Audio and Video composition, and many others.
  9. Product engineering software is used in developing hardware and software products. This includes computer aided design (CAD), computer aided engineering (CAE), computer language editing and compiling tools, Integrated Development Environments, and Application Programmer Interfaces. Avatar (Two-Disc Blu-ray/DVD Combo) [Blu-ray]

Aplication Software

Do you know about Application software ? If you use a computer you must know about application software.
Application software, also known as applications or apps, is computer software designed to help the user to perform singular or multiple related specific tasks. Examples include Enterprise software, Accounting software, Office suites, Graphics software and media players.

Application software is contrasted with system software and middleware, which manage and integrate a computer's capabilities, but typically do not directly apply them in the performance of tasks that benefit the user. A simple, if imperfect analogy in the world of hardware would be the relationship of an electric light bulb (an application) to an electric power generation plant (a system). The power plant merely generates electricity, not itself of any real use until harnessed to an application like the electric light that performs a service that benefits the user.Breach of Trust

Terminology

In computer science, an application is a computer program designed to help people perform a certain type of work. An application thus differs from an operating system (which runs a computer), a utility (which performs maintenance or general-purpose chores), and a programming language (with which computer programs are created). Depending on the work for which it was designed, an application can manipulate text, numbers, graphics, or a combination of these elements. Some application packages offer considerable computing power by focusing on a single task, such as word processing; others, called integrated software, offer somewhat less power but include several applications.[1] User-written software tailors systems to meet the user's specific needs. User-written software include spreadsheet templates, word processor macros, scientific simulations, graphics and animation scripts. Even email filters are a kind of user software. Users create this software themselves and often overlook how important it is. The delineation between system software such as operating systems and application software is not exact, however, and is occasionally the object of controversy. For example, one of the key questions in the United States v. Microsoft antitrust trial was whether Microsoft's Internet Explorer web browser was part of its Windows operating system or a separable piece of application software. As another example, the GNU/Linux naming controversy is, in part, due to disagreement about the relationship between the Linux kernel and the operating systems built over this kernel. In some types of embedded systems, the application software and the operating system software may be indistinguishable to the user, as in the case of software used to control a VCR, DVD player or microwave oven. The above definitions may exclude some applications that may exist on some computers in large organizations. For an alternative definition of an application: see Application Portfolio Management.

Criticism and Incidents of The iPod Nano


The initial consumer response to the iPod Nano was overwhelmingly positive and sales were heavy. The Nano sold its first million units in only 17 days, Justify Fullhelping Apple Inc. to a record billion-dollar profit in 2005.

Apple's release of the iPod Nano as a replacement for the iPod Mini was viewed by many as a risky move. Steve Jobs has argued that the iPod Nano was a necessary risk since competitors were beginning to catch up to the iPod Mini in terms of design and features, and believed the iPod Nano would prove to be even more popular and successful than the iPod Mini.

Within days of the Nano's release, some users reported damage to the Nano, suggesting that the LCD screen had become so scratched that it was unreadable, even when the backlight was on. Many have reported fine scratches on their Nano caused by microfiber cloths. Other owners reported that their Nano's screen cracked with no provocation. On September 27, 2005, Apple confirmed a small percentage ("less than 1/10 of 1 percent") of iPod Nanos shipped with a faulty screen and agreed to replace any Nanos with cracked screens, but denied the iPod Nano was more susceptible to scratching than prior iPods. Apple started shipping iPod Nanos with a protective sleeve to protect them from scratches. In October 2005 a class action lawsuit was filed against Apple, with the plaintiffs seeking reimbursement for the device, legal fees, and "unlawful or illegal profits" from sales of the iPod Nano. Lawyers for the plaintiffs claim that the devices "scratch excessively during normal usage, rendering the screen on the Nanos unreadable, and violating state consumer protection statutes". Similar lawsuits were later filed in Mexico and the United Kingdom. As of early 2009, Apple is in the process of settling a court case over the scratched iPod Nano screens, it has been suggested for Apple to set aside $22 million to refund users. A Judge will need to sign off the terms by April 28, 2009. Some commentators such as BusinessWeek's Arik Hesseldahl have criticized the lawsuits. Hesseldahl dismissed them as "stupid" and suggested that they benefitted "no one but the trial lawyers," but also suggested that Apple could have avoided litigation by offering "full refunds on unwanted Nanos" instead of charging a re-stocking fee and lengthening the return period from 14 days (when purchased through Apple retail or online) to 30 or 60 days.

Incidents

In Australia, an iPod Nano caught fire while being charged on a PC. Since the limited warranty was over, the consumer was not able to get a replacement right away.

Another iPod incident happened in the Hartsfield-Jackson Atlanta International Airport while a man was working in the airport.[18] His iPod Nano set his pants on fire. Apple Inc. refused to release a statement regarding this issue.

In addition, an iPod Nano sparked in Japan in January while it was recharging. Although no one was injured during the incident, Apple Inc. is currently investigating it. It was reported on August 19, 2008 that 17 incidents of abnormal overheating with 1st-generation iPod Nano units while recharging had been reported in Japan, including cases in which tatami mats had been charred.

source : wikipedia.org

Introduction to The iPod Nano

The iPod Nano (trademarked, marketed, and stylized as iPod nano) is a portable media player designed and marketed by Apple. The first generation of the iPod Nano was introduced in the end of 2005 as a replacement for the iPod mini. It uses flash memory, like the iPod Shuffle, but with a 2.2 inch (diagonal) QVGA display on the latest model, and the "click wheel" found on the iPod Classic. The iPod Nano has gone through five models, or generations, since its introduction. The fifth generation (current) supports FM radio, video recording, a microphone for voice memos, a pedometer, and a slightly larger screen than that of the previous generation.


Supported audio formats

  • AAC (16 to 320 kbps)
  • Protected AAC (from the iTunes Store)
  • MP3 (16 to 320 kbps, including variable bitrate files)
  • Audible (formats 2, 3 and 4)
  • Apple Lossless
  • AIFF
  • WAV
  • MP4

First generation

Advertising emphasized the iPod Nano's small size: it is 1.6 in (40 mm) wide, 3.5 in (90 mm) long, 0.27 in (6.9 mm) thick and weighs 1.5 ounces (42 grams). Its stated battery life is up to 14 hours. The screen is 176 x 132 pixels, 1.5 in (38 mm) diagonal, and can display 65,536 colors (16-bit color).

History

Development work on the design of the iPod Nano started only nine months before its launch date. The Nano was launched in two colors (black and white) with two available sizes: 2 GB (roughly 500 songs) and 4 GB (1000 songs). On February 7, 2006, Apple updated the lineup with the 1 GB model (240 songs). Apple also released some accessories, including armbands and silicone "tubes" designed to bring color to the Nano and protect it from scratches, as well as a combination lanyard-earphone accessory that hangs around the neck, and avoids the problem of tangled earphone cords.

Electronics

The iPod Nano uses general-purpose integrated circuits (IC) instead of smaller, low-cost custom-developed chips, possibly to reduce time-to-market. This design, however, increases the number of electronic components and increases the cost. Japanese engineers estimated the component cost of the 2 GB Nano as between JP¥22,000 and JP¥27,000 (US$185-US$227),[citation needed] which was high compared to the retail price of JP¥21,800 (US$183) at the time.[citation needed] The cost of 2 GB Nano flash memory was about JP¥14,000 (US$118).[citation needed] Apple also opted for the 0603 (1.6x0.8 mm) surface mount technology which was just beginning widespread use in mobile phones in 2005. The iPod Nano uses a PortalPlayer PP5021C "system on a chip" with dual embedded 80 MHz ARM 7TDMI processors.

source : wikipedia.org

Invention of Integrated circuit

The idea of integrated circuit was conceived by a radar scientist working for the Royal Radar Establishment of the British Ministry of Defence, Geoffrey W.A. Dummer (1909-2002), who published it at the Symposium on Progress in Quality Electronic Components in Washington, D.C. on May 7, 1952. He gave many symposia publicly to propagate his ideas. Dummer unsuccessfully attempted to build such a circuit in 1956.

Jack Kilby recorded his initial ideas concerning the integrated circuit in July 1958 and successfully demonstrated the first working integrated circuit on September 12, 1958. In his patent application of February 6, 1959, Kilby described his new device as “a body of semiconductor material ... wherein all the components of the electronic circuit are completely integrated.” Kilby won the 2000 Nobel Prize in Physics for his part of the invention of the integrated circuit.

Robert Noyce also came up with his own idea of an integrated circuit half a year later than Kilby. Noyce's chip solved many practical problems that Kilby's had not. Noyce's chip, made at Fairchild Semiconductor, was made of silicon, whereas Kilby's chip was made of germanium.

Early developments of the integrated circuit go back to 1949, when the German engineer Werner Jacobi (Siemens AG) filed a patent for an integrated-circuit-like semiconductor amplifying device showing five transistors on a common substrate arranged in a 2-stage amplifier arrangement. Jacobi discloses small and cheap hearing aids as typical industrial applications of his patent. A commercial use of his patent has not been reported.

A precursor idea to the IC was to create small ceramic squares (wafers), each one containing a single miniaturized component. Components could then be integrated and wired into a bidimensional or tridimensional compact grid. This idea, which looked very promising in 1957, was proposed to the US Army by Jack Kilby, and led to the short-lived Micromodule Program (similar to 1951's Project Tinkertoy). However, as the project was gaining momentum, Kilby came up with a new, revolutionary design: the IC.

Robert Noyce credited Kurt Lehovec of Sprague Electric for the principle of p-n junction isolation caused by the action of a biased p-n junction (the diode) as a key concept behind the IC.

source : wikipedia.org

Introduction of Integrated circuit

In electronics, an integrated circuit (also known as IC, microcircuit, microchip, silicon chip, or chip) is a miniaturized electronic circuit (consisting mainly of semiconductor devices, as well as passive components) that has been manufactured in the surface of a thin substrate of semiconductor material. Integrated circuits are used in almost all electronic equipment in use today and have revolutionized the world of electronics.

A hybrid integrated circuit is a miniaturized electronic circuit constructed of individual semiconductor devices, as well as passive components, bonded to a substrate or circuit board.

Integrated circuits were made possible by experimental discoveries which showed that semiconductor devices could perform the functions of vacuum tubes, and by mid-20th-century technology advancements in semiconductor device fabrication. The integration of large numbers of tiny transistors into a small chip was an enormous improvement over the manual assembly of circuits using electronic components. The integrated circuit's mass production capability, reliability, and building-block approach to circuit design ensured the rapid adoption of standardized ICs in place of designs using discrete transistors.

There are two main advantages of ICs over discrete circuits: cost and performance. Cost is low because the chips, with all their components, are printed as a unit by photolithography and not constructed as one transistor at a time. Furthermore, much less material is used to construct a circuit as a packaged IC die than as a discrete circuit. Performance is high since the components switch quickly and consume little power (compared to their discrete counterparts) because the components are small and close together. As of 2006, chip areas range from a few square millimeters to around 350 mm2, with up to 1 million transistors per mm2.

source : wikipedia.org

How to Choose Camera Digital

Digital cameras cost more out of the box than regular cameras, but offer the convenience of immediate viewing, multiple image storage, computer connectivity - and there's no film to develop.

The question I get asked more than any other about Digital Photography is 'How do I choose the right digital camera?' There are so many digital cameras currently on the market with more being introduced weekly (over 120 new ones this year alone so far) - how does one make the decision of which digital camera to choose?

A lot has been written online on this subject. Some take a very technical approach and talk about resolution, file formats and sensors, others talk more about usability and design while others seem to be looking for the latest gadget or feature. There is no one way to approach the decision of which digital camera and so we've decided to list some of the more helpful tutorials and tips that attempt to answer - 'Which digital camera should I choose?

  1. Buy the camera with the highest resolution you can afford, at least 2 to 3 megapixels (2 million to 3 million pixels), if possible.
  2. Look for a 100 percent glass lens as opposed to a plastic one.
  3. Buy a camera with as much RAM as you can afford. More RAM means the camera can store more pictures, so you won't need to download or erase them as often.
  4. Expect zoom to be the feature you will use most. Compare optical, as opposed to digital, zoom capabilities.
  5. Compare flash modes, if any.
  6. Investigate viewfinders: Look for an optical (through-the-lens) viewfinder as well as an LCD display.Numbered List
  7. Consider autofocus and macro features, shutter-release lag times, and bundled software.
  8. Compare additional features you might want: interchangeable lenses, steady-shot, burst mode, auto exposure, automatic white balance, voice memo, variable shutter speeds, manual focus and self-timer.
  9. Compare removable media of various types (if you need more storage space for your photos).
  10. Investigate batteries, chargers and battery-saving features.
  11. Look for additional features you might need, such as USB or IEEE 1394 (FireWire) connectivity (to connect the camera to the appropriate port on your computer), a battery-time-remaining indicator, an AC adapter or video-out connections for outputting to a television.

Ini Baru Heboh, Monitor LCD Terbaru dari HP – HP S2031, HP S2231 dan HP S2331

Ini dia monitor LCD terbaru dari HP, sebuah perusahaan terkemuka. Buat teman-teman yang masih menggunakan monitor jaman doeloe ada baiknya segera beralih ke monitor LCD, karena disamping irit listrik tentu saja radiasinya jauh lebih kecil daripada monitor bukan LCD.

Ada tiga monitor LCD baru dari HP yang dipasarkan dengan harga cukup murah. Yang pertama adalah monitor 20 inch S2031, kedua berukuran 21.5 inch yaitu S2231, dan ketiga 23 inch dengan tipe S2331.

Masing-masing monitor ini memiliki contrast ratio 1000:1. koneksi VGA dan HDCP compliant DVI-D, serta dua panel lampu untuk penghematan listrik. Untuk response time adalah 5ms.Ketiga model monitor ini bisa dikatakan hampir sama persis hanya beda ukuran ;D

Resolusi Monitor S2031 adalah 1600×900px dengan tingkat kecerahan 250 nits, sedangkan yang lain memiliki resolusi full HD, yaitu 1080p dan tingkat kecerahan 300 nits. Bicara harga, Monitor LCD HP S2031 dihargai 150 USD atau 1,5 jutaan, S2231 adalah 190 USD atau 1,7 jutaan rupiah, dan S2331 adalah 220 USD yaitu dua jutaan rupiah.

Ketiga monitor LCD HP terbaru ini akan dirilis 15 Mei 2010 ini.

sumber:electronista.com, beritateknologi.com

Microsoft Office 2010 dan Share Point 2010

Inilah yang kita tunggu-tunggu, Microsoft Office 2010 dan Share Point 2010. Microsoft sebuah perusahaan besar benar-benar tidak main-main dalam mengembangkan softwarenya.

Microsoft baru saja mengumumkan tersedianya produk baru Microsoft Office 2010 dan Microsoft SharePoint 2010 serta Microsoft Visio 2010 dan Microsoft Project 2010 pada tanggal 12 Mei 2010 untuk seluruh konsumen bisnis di dunia.

Office 2010 dan SharePoint 2010 ini akan diharapkan meningkatkan produktivitas kita dengan berbagai fiturnya.

Program beta Office 2010 dan SharePoint 2010 merupakan program beta yang memiliki banyak pengguna sebagai tester, kurang lebih 8.6 juta sudah mencoba menggunakannya dan lebihd ari 1000 partner Microsoft telah membangun solusi di atasnya.

Pada Office 2010 ini juga dilengkapi Microsoft Office Web Apps yang merupakan pelengkap online untuk aplikasi Word, PowerPoint, Microsoft Excel dan OneNote. Melalui Office Web Apps maka kit bisa mengakses file dari PC, ponsel maupun browser.
Office Mobile 2010 juga sudah tersedia melalui Windows® Phone Marketplace untuk semua ponsel Windows Mobile 6.5.

Situs peluncuran Office 2010 ini dapat diakses di http://www.the2010event.com

Untuk info Office 2010 lebih lanjut: http://office2010.microsoft.com

Dan ingin tahu lebih lanjut tentang Office Web Apps: http://office2010.microsoft.com/en-us/web-apps/