Thursday, 3 September 2015

Windows 9, on Failure Microsoft Answers Windows 8


Software products from Microsoft's much criticized on the users. Most complained about the features that eliminated the Start button, unlike previous versions of Windows OS. Try to accommodate the wishes of the loyal users, Microsoft launched the Windows version 8.1 which is an update to restore the Start button. In Windows 8.1, the company is also pinning many of the features in the OS available to consumers on 17 October 2013. Although he has appeared Windows 8.1, the complaint does not stop there. Users reportedly still feel uncomfortable because Windows 8.1 does not address all the flaws in Windows 8, such as the poor level of integration between Metro style apps and desktop interfaces. Product-reviews, Monday (10/02/2014) report, whether you are ready to welcome the release date of Windows 9? Windows 8 is still a new operating system in the eyes of most consumers. Rumors of the presence of Windows 9 start sticking a few times lately. Possibility, before Windows 9 was introduced, the Redmond-based company's first announced the appearance of Windows 8.2. The public would expect, Windows 9 has the code name 'Threshold' will accommodate many of the features, improvements and enhancement of Windows 8. Microsoft has not revealed officially on Windows 9 and when this new OS will be launched. There is no evidence definitely Windows 9 will be sampled in 2014. Rumor call this new OS will be announced in April 2015. The public will continue to be bombarded with information rumor until Microsoft officially unveil the latest OS makes. In April this year, the company founded Bill Gates is expected to explain about Windows 9 at the Microsoft Build 2014 event. Most users expect Windows 9 will offer more features than the Windows 8. OK Eastlink website reveals, the release of Windows 9 in 2015, means that Windows 8 has been available for nearly three years since October 26, 2012. Does Windows 8 will start to be abandoned next year? Eastlink revealed that the possibility of consumers will go to look for the tablet device or a PC with a newer OS. It takes hard work for Microsoft to get an interest users who adopt Windows 8. Paul Thurott, author Winsupersite the attention OS Microsoft revealed Windows 8.1 upgrade for free with much improved feature used by approximately 25 million users PC. Windows 9 should be able to scoop up more users than Windows 8.1. The new Windows OS is also expected to remove all the disappointment of users, who complained about the poor experience of the use of Windows 8. Paul believes that Windows 9 will provide a big change, improve and refine the user interface (UI) that is modern. In addition, Microsoft is also expected to provide a new version of Windows for consumers and the enterprise. Microsoft actually did not expect Windows 8 will be the same fate with Windows Vista. Last month, as reported by BGR, circulated information that employees Microsoft calls Windows 8 as a 'new Vista'. According to Paul, the Microsoft employee calls Thus, in recognition for OS Windows 8 has not been able to reach the company's goal to reignite interest in the PC. Needed some serious changes.

Facts About The Mouse Cursor Italic


Has it occurred to us, why the design of the mouse cursor on the computer made crooked? So often we see the cursor, perhaps that question never occurred to us. The mouse cursor which we know so far is generally in the form of arrows and shown tilted about 45 degrees to the left. But, you know that before the cursor made straight? Then why sloped? To answer these questions, we must go back in time to the beginning of the mouse is made, in the era of the computer display is still a low-resolution pixel array. According to the explanation on the site Stack Exchange, the mouse and the cursor was first made by Douglas Englebart in 1968. Initially, the cursor is made perpendicular to the top. However, when the computer Xerox PARC made around 1970, the cursor then made oblique. The reason, with low resolution screens at that time, the mouse cursor that is perpendicular hard to find on the screen. With a lower pixel resolution, the display cursor is difficult to distinguish from other objects displayed a computer screen, especially when the screen display is monochrome. Therefore, by making the transverse cursor 45 degrees, it will be easier for users looking for the cursor on the screen. After that, the cursor tilted to the left Englebart findings are then adopted by policy-makers of computer software until now. These include done by the creator of Apple, Steve Jobs, who borrowed the cursor to the Mac OS, and then Bill Gates with his Windows.

100 Unique Internet Domain Launched


Internet Corporation for Assigned Names and Numbers (ICANN) since the year 2013 opened a new program to set up the first level domain name of a general nature (Generic Top Level Domains / gTLD). The organization that manages Internet domain names around the world is finally delegate 100 new gTLD names, Thursday (23/01/2014). One hundred domain name that is unique. ICANN has published the names on his official web site, among others .rich, .sexy, .ninja, .pink, .email, .photo, .photography, .guitars, .marketing, .agency, .dance, .ceo, .tips, .coffee, .domains, and others. Of the 100 new domain names, there is one domain in Arabic, two Russian and one Chinese. The existence of this new domain will be a new business in the internet world. Some registrars who manage gTLD domain registrar company is new. However, there is also the old registrar companies already established. Not only that, large companies are also targeting domain known as the .anything (dot anything). Google for example, they are targeting domains .google, .android, .youtube, and .tech. Microsoft is also eyeing several domains, among others .bing, .skype, .docs. While Apple only target a single domain, namely .apple. ICANN itself predicts, there will be 1,400 new gTLD name. The new gTLD program will provide an alternative to existing gTLD 22 so far, including .com, .net, .org. Thus, the more pillihan for various parties to choose the Internet domain name. ICANN has received nearly 2,000 applications from the registrar about to get a new gTLD. Most of the registrar compete for popular domain name, such as .shop, .store, .taxi, and so on.

Human impact on the development of the Internet Of The Future


A shocking study conducted by 1,500 experts around the world that technology in the future development of Internet technology will be more dynamic. Internet users, eventually going to change in many ways, a good attitude, behavior and tolerance among humans will semakian look kesenjangannnya. Professor Janna Anderson of Elon Universty in his report that the internet will become visible so important in everyday life. Ranging from personal interaction to the decisions made by the government and companies worldwide. According to experts, will cause a lot of positive sides, but not least also cause problems. Surveys conducted since 2004, said Anderson shows how people so interested with today's technology. Plus the development of technology in recent world increasingly strongly felt. "We now hear the enthusiasm, but also hear more negative, more than ever before. People began to realize that the power of the Internet communication technologies can be used by everyone, could be good or bad, "he said.   Positive and Negative On the positive side, the increasing reach of the Internet will increase global connectivity, which could encourage more positive relations between communities, according to the report. "Humans will increasingly be in a world where decisions are made by a set of devices that cooperate with each other. Internet (and computer-mediated communication in general) will be wider but less explicit and visible. Internet, to some extent, together with all of our activities. "Said David Clark, a senior research scientist in the Laboratory of Computer Science and Artificial Intelligence at MIT. Experts also see the use of devices that can be used which can monitor various aspects of life, provide input for peggunanya to improve themselves, for example, to personal health. While, on the downside, experts warned of the growing divisions between the rich and the poor which could end in violence. In the next 10 years, experts say that the Internet will continue to experience violations, such as pornography, crime and bullying, and others. Social gap The report also warned that the freedom of the Internet will face the threat of the government and businessmen, because they apply security and cultural norms. "I hope there will be more transparency, more democratic participation, less central control and greater freedom," said Marc Rotenberg, president of the Electronic Privacy Information Center. So we must Playing the main challenge: whether the Internet in 2025 will be a network or infrastructure of freedom and opportunity for social control? " In the end, the report said that privacy will continue to be eroded and will be something that can only be enjoyed by the upper class. "Over the last few years, people who have the power and control that can protect their privacy," said Anderson. "The rich will be able to find ways to keep their data to remain private data," he added

How to Enable WiFi Manually


How to Enable WiFi Manual - Many places, both public and private housing area, which has been equipped with a WiFi network. Ranging from schools, colleges, offices, hospitals, parks, even to the edge of the cafe jalanpun not want to miss equip themselves with a WiFi connection. Many electronic devices helped immerse WiFi technology into its products. Can certainly not be sold in the market if there are currently no products laptop that its WiFi feature. As well as with smartphones, WiFi facility seemed to have become mandatory to be in it. Well, this particular laptop user, I will give How to Enable WiFi Manual. Here are the steps: Click the button on the taskbar windows under the far left; Go to "Control Panel" by clicking on it; In the Control Panel window, under "Hardware and Sound", select it and click "Adjust commonly used mobility settings"; Will open a new window, the logo will be seen that the wireless LAN in the off state (see picture). Then click "Turn on wireless" to activate; Done. Your WiFi is now active and ready to use. So first we pembahasn about How to Enable WiFi Manual hopefully useful for everything. Thank you.!

Type Speed ​​Internet Access


Type Speed ​​Internet Access - Access speed will depend on the network technology around the distance and distance / environmental conditions when the internet connection is made. The development of information and communication technology today allows us to connecting computer to the Internet in some way. There are several types of options / type internet speeds that can be used. Here is the internet speed in accordance with the selected channel. Dial-Up connection (via the PSTN Line) Before there were mobile, communication is generally done through telephone lines. We can access the Internet by connecting the computer to the home telephone wiring via analog modem (conventional). This method is often referred to as a dial up connection. Dial-up via the PSTN (Public Switched Telephone Network) is the way we connect to the ISP (Internet Service Provider) via the regular telephone network (PSTN), for example, is "Instant Telkomnet" from ISP Telkom. ADSL connection ADSL (Asymetric Digital Subscriber Line) is a modem technology that works at a frequency between 34 kHz to 1104 kHz. This is the major cause of data transfer speed difference between an ADSL modem with a conventional modem (that works at frequencies below 4 kHz). ADSL advantage is to provide the ability to access high-speed internet and voice / fax simultaneously (on the customer side by using a splitter to separate the telephone line and a modem line). What is the maximum bandwidth that is obtained when we use internet access using ADSL: For a 384 kbps line rate, maximum bandwidth obtained close to 337 kbps. For a 384 kbps line rate, average throughput (speed donlod) that can be obtained about 40 Kb / s. For a line rate of 512 kbps, which is obtained close to the maximum bandwidth of 450 kbps. For a 512 kbps line rate, average throughput (speed donlod) that can be obtained about 52 Kb / s. Examples ADSL connection is "Speedy" from Telkom. Compared to dial-up connections, ADSL connections much more rapidly that many are turning to service this connection. GPRS connection In theory GPRS promises speeds ranging from 56 kbps to 115 kbps, allowing Internet access, transmission of multimedia data to a computer, notebook and handheld computers. However, in its implementation, it depends on the following factors: The configuration and allocation of time slots at BTS level Software used Support features and mobile applications used This explains why at certain times and in certain locations GPRS access was slow, even slower than the access CSD which has a speed of 9.6 kbps. 3G connection 3G network is not an upgrade from 2G; 2G operators affiliated with 3GPP need to replace many components to be able to provide 3G services. While the 2G operators that are affiliated with the 3GPP2 technologies easier to upgrade to 3G because of its various network element has been designed for the direction of broadband wireless services (wireless broadband). Telecom mobile phone network has increased towards the use of 3G services from 1999 to 2010. Japan is the first country to introduce 3G nationally and transition to 3G in Japan already achieved in 2006. After Korea became the first adopters of 3G networks and the transition has been accomplished in the early 2004 and lead the world in the field of telecommunications. HSDPA In a crowded office environments users can enjoy streaming video with an estimated speed of 300 Kbps. Excess HSDPA is to reduce delays in downloading the data (delay) and provide faster feedback when the user uses interactive applications such as mobile office or high-speed Internet access for use of the facility to download games or audio and video. Another advantage HSDPA, increase system capacity without requiring additional frequency spectrum. This leads to reduced costs of mobile data services significantly. WiFi Wi-Fi (Wireless Fidelity) is a wireless connection such as mobile phones by using radio technology, so users can transfer data quickly and securely. Wi-Fi not only allows you to access the Internet, Wi-Fi can also be used to create a wireless network in the company. Because of that many people associate Wi-Fi with "Freedom" because Wi-Fi technology gives freedom to users to access the internet or transfer data from the meeting room, hotel room, campus, and cafes are marked "Wi-Fi Hot Spot". Also one of the advantages of Wi-Fi is practicality, no longer need to install the cable network. For the problem of speed depending on the signals obtained. Wireless Broadband Broadband Wireless Access also called still acceptable in a vehicle speed of 60 kilometers per hour. WiBro was developed jointly with Samsung Electronics and Technology Research Institute (ETRI) and has received a certificate from the WiMAX Forum. This technology is able to transmit data at speeds up to 50 Mbps. Data transfer speed is able to outperform the data transfer speed of HSDPA platform that has the ability to send data up to 14 Mbps. LAN Commonly abbreviated Local Area Network LAN is a computer network that the network only covers a small area. Today, most LAN based on the IEEE 802.3 Ethernet technologies using a switch device, which has a data transfer speed of 10, 100, or 1000 Mbit / s. In addition to Ethernet technology, the current 802.11b technology (commonly called Wi-Fi) is also often used to form a LAN. Cable TV In the home network, the cable from the "cable" used coaxial cable and installed a "dividing line" (splitter) cable. After the cable from the network (cable network) past the splitter, cables channeled into two channels, one for TV and one to the cable modem. From the new cable modem to the Ethernet card and then to the computer.

Origins of Computer Viruses


Origins in Computer Virus | This time I will share information about the Origins of Computer Virus. Maybe some of you already know what it komputr virus, but do not know the history or origin, right ?. Well here I will reveal in full to you about the origin of computer ....... Happy reading Origins on Computer Viruses The concept of making the virus was discovered in 1949. At that time, John von Neuman, had thought that there are programs that can replicate itself. This is evidenced by three programmers from AT & T Bell Laboratories who witnessed their creation program fighting for control over the computer in an experiment called "Core Wars'. The most striking evidence is the first virus to be officially recognized (C) Brain not come from America or Europe as the inventor of the computer state, but coming from Pakistan. In 1986 two brothers Basit and Amjad, the owner of a computer store in Lahore, Pakistan, was the first to incorporate a small program in the boot sector on a floppy disk 360 KB which will run automatically when the computer starts. Keep in mind that at that time almost all computers can only be turned on via a floppy disk, only a few are using the hard drive because it was still very expensive and not general. Upon entry into the boot sector, this program will remain in the computer's memory to replicate itself to other floppies inserted into drive A or drive B. A year later, the University of Delaware realized that they had been infected with the virus because of the label '(c) Brain "on floppy disks they use. Once discovered by two brothers Basit and Amjad, the development of increasingly sophisticated viruses. This is evidenced by a programmer called Ralf Burger. In the same year with the discovery of two brothers Basit and Amjad, burgers, be aware that the file can be programmed to conduct automatic coffee by inserting itself into other files. He wrote a sample program called VIRDEM that can infect .COM files Then the sophistication of the virus was also revealed by Fred Cohen of the University of Southern California, who conducted the first doctoral dissertation on the topic of computer viruses. Cohen discovered the fact that once you create a good virus, the impact caused by this virus and its spread would be very unusual, if not unexpected though its creator. Meanwhile, in Tel Aviv, a programmer another experiment with creating the first virus with Suriv name-1, these malicious programs can infect all .COM files After the success, munculah Suriv-2 can infect EXE file, then the third generation of this virus is more advanced because it can infect .COM and .EXE file types. Creation of four that shook the world and is known as the Jerusalem virus, every Friday the 13th of this virus deleting files that run so often known as Friday the 13th. The virus is named after the Jerusalem because it was found at the Hebrew University of Jerusalem by Yisrael Radai. In other parts of the world, a young student at the University of Wellington, New Zealand discovered a very simple technique to make the virus very effectively. Each eight-time boot from an infected floppy disk, it will display the message "Your PC is now Stoned" which also gives the name to the virus, Stoned. The virus is only a few hundred bite, but because of its ability to reproduce itself and replicates Stoned become the most widespread virus in the world in his day. At the beginning of the era of the emergence of viruses, only Stoned, Cascade and Jerusalem are dominating. Meanwhile, in Indonesia known Denzuko, known as the Den Zuk or Ohio (the name given by McAfee since the virus was first discovered in Ohio State University). An Italian programmer creating a virus called Ping Pong. As the name implies, this program displays the bouncing ball on the screen. The virus is quite horrendous, but not had time to spread rapidly because of limitations that only runs on computers 8088 and 8086. Just like Brain, which can infect only 360 KB floppy disks. Other viruses are well known in the early emergence of the virus is Cascade, written by a German programmer. Cascade introduces a new technique, namely encryption complicates repair infected files. This technique also developed by Mark Washburn when writing polymorphic viruses (many forms to complicate identification by antivirus software) first, namely 1260 (Chameleon) or virus Chameleon.