Mar 20, 2018, 07:25 AM

News: - Used by 85,000 Members - SMS Backed up 7,35,000 - Contacts Stored  28,850 !!

Waana IT Hero in your office...... come on pick up ur question.......

Started by dhilipkumar, Sep 13, 2008, 05:23 PM

previous topic - next topic
Go Down



        COM+ is an extension of Component Object Model (COM), Microsoft's strategic building block approach for developing application programs. COM+ is both an object-oriented programming architecture and a set of operating system services. It adds to COM a new set of system services for application components while they are running, such as notifying them of significant events or ensuring they are authorized to run. COM+ is intended to provide a model that makes it relatively easy to create business applications that work well with the Microsoft Microsoft Transaction Server (MTS) in a Windows NT or subsequent system. It is viewed as Microsoft's answer to the Sun Microsystems-IBM-Oracle approach known as Enterprise JavaBeans (EJB).

Among the services provided by COM+ are:

#     An event registry that allows components to publish the possibility of an event and other components            to subscribe to be notified when the event takes place. For example, when a sales transaction is completed, it could trigger an event that would allow other programs to be notified for subsequent processing.
#     The interception of designated system requests for the purpose of ensuring security
#     The queues of asynchronously received requests for a service

How COM+ Works Briefly

A "component" is a building block program that is self-describing. This means that it can be run with a mix of other components and each will be able to understand the capabilities and characteristics of the other components. Practically, this means that a new application can be built by reusing components already known to exist and without having to compile the application. It also makes it relatively easy to distribute different components of an application among different computers in a network. Microsoft's Distributed Component Object Model (DCOM) adds interfaces to do this.

In addition to its self-description, a component consists of one or more classes that describe objects and the methods or actions that can be performed on an object. A class (or coclass in COM+ terminology) has properties described in an interface (or cointerface). The class and its interface are language-neutral.

Associated with the class are one or more methods and fields that are implemented in a specific language such as C++ or Java or a visual programming environment. When you instantiate a class, you create an object (something real that can be executed in the computer). Sometimes the term "class" is also used for the instantiated object (which can be confusing).

Using COM, objects (or classes) and their methods and associated data are compiled into binary executable modules, that are, in fact, files with a dynamic link library (DLL) or EXE file name suffix. A module can contain more than one class.


Save Time, Money and Manpower While Eliminating Redundancies from Your Data Backups

You already know about exponential data growth, in fact you are probably experiencing it in your own environment. Digital information is doubling every 18 months. For some, that growth is even faster. Your information assets are invaluable to your company, so managing and protecting those assets is a critical priority. Data loss can impact revenue, your customers, and your reputation. In fact, some businesses can even fail due to a data loss or a prolonged period of downtime. That's why many companies are looking for solutions that protect data today and manage ever higher volumes in the future.

View this TechRepublic Webcast, co-sponsored by PC Connection and HP, featuring moderator James Hilliard and guest speaker David Fairfield, Business Continuity Product Line Manager for HP, to get expert tips and advice on defending your network against the internal security threats that are introduced every day by your own end users. These key topics and more are addressed:

-> Review customer business challenges (Explosive data growth, security, efficient utilization of resources)

-> Highlight the cost implications of experiencing lost data

-> Define what potential data protection strategy fits your customer needs

-> Provide a summary of the the benefits of Data Deduplication and how this will help your customers with more efficient storage utilization and faster access to lost data


What is 4G

        4G is the short term for fourth-generation wireless, the stage of broadband mobile communications that will supercede the third generation (3G). While neither standards bodies nor carriers have concretely defined or agreed upon what exactly 4G will be, it is expected that end-to-end IP and high-quality streaming video will be among 4G's distinguishing features. Fourth generation networks are likely to use a combination of WiMAX and WiFi.
Technologies employed by 4G may include SDR (Software-defined radio) receivers, OFDM (Orthogonal Frequency Division Multiplexing), OFDMA (Orthogonal Frequency Division Multiple Access), MIMO (multiple input/multiple output) technologies, UMTS and TD-SCDMA. All of these delivery methods are typified by high rates of data transmission and packet-switched transmision protocols. 3G technologies, by contrast, are a mix of packet and circuit-switched networks.

When fully implemented, 4G is expected to enable pervasive computing, in which simultaneous connections to multiple high-speed networks provide seamless handoffs throughout a geographical area. Network operators may employ technologies such as cognitive radio and wireless mesh networks to ensure connectivity and efficiently distribute both network traffic and spectrum.

The high speeds offered by 4G will create new markets and opportunities for both traditional and startup telecommunications companies. 4G networks, when coupled with cellular phones equipped with higher quality digital cameras and even HD capabilities, will enable vlogs to go mobile, as has already occurred with text-based moblogs. New models for collaborative citizen journalism are likely to emerge as well in areas with 4G connectivity.

A Japanese company, NTT DoCoMo, is testing 4G communication at 100 Mbps for mobile users and up to 1 Gbps while stationary. NTT DoCoMo plans on releasing their first commercial network in 2010. Other telecommunications companies, however, are moving into the area even faster. In August of 2006, Sprint Nextel announced plans to develop and deploy a 4G broadband mobile network nationwide in the United States using WiMAX. The United Kingdom's chancellor of the exchequer announced a plan to auction 4G frequencies in fall of 2006.

4G technologies are sometimes referred to by the acronym "MAGIC," which stands for Mobile multimedia, Anytime/any-where, Global mobility support, Integrated wireless and Customized personal service.


what is Bluejacking:

                 Bluejacking is the practice of sending messages between mobile users using a Bluetooth wireless connection. People using Bluetooth-enabled mobile phones and PDAs can send messages, including pictures, to any other user within a 10-meter or so range. Because such communications don't involve the carrier, they are free of charge, which may contribute to their appeal.

                 Bluetooth was created to enable wireless communications between various devices; the user can set a device to be inaccessible, accessible to a specific device (through a process known as pairing), or discoverable, that is, accessible to all devices in range. Although Bluejacking is, in and of itself, a legitimate activity, it has enabled a number of less innocent practices, including bluesnarfing attacks, which involves theft of data from a mobile device, and reportedly a fad known as toothing, the practice of sending an invitation to nearby mobile device users for the purpose of setting up a quick sexual liaison.


                          GPS (Global Positioning System) messaging is a wireless messaging system for location-specific rather than recipient-specific messages. Somewhat like electronic sticky notes, the messages are sent and received by people with GPS locators in their wireless devices; messages are linked to the location of the sender and accessed by any equipped mobile user entering that location. GPS messaging is sometimes called mid-air messaging, because that's where the messages seem to be located. Hewlett-Packard has a prototype GPS messaging system running in its lab in Bristol, England.
GPS messaging is said to have enormous potential for both emergency situations and the less urgent, albeit ongoing, concerns of users. For example, tourists could leave messages outside a restaurant -- either praising it or complaining about it -- that other tourists would pick up when they were in that location, or highway workers could warn people about upcoming traffic hazards by leaving a message that they would receive when they approached a dangerous area. A project called the Nebraska GPS-Messaging and Satellite Voice Communication Demonstration and Field Test recently explored the use of GPS messaging for law enforcement, emergency response, and highway maintenance applications.

Here's how one version works: You upload a message (or perhaps an audio clip or an image); the message is tagged with your current geographic coordinates and stored on a Web page that is linked to those specific coordinates. Then, when anyone with a capable wireless device enters that location, they can access the message, either as text or image on a screen, or as an audio message through an earpiece. When you move from one location to another, the GPS receiver in your device checks the Web site for messages linked to your location and downloads any that are there. In effect, any GPS-resolvable space could have its own Web site that users would enter geographically.


              Push to talk (PTT), is a means of instantaneous communication commonly employed in wireless cellular phone services that uses a button to switch a device from voice transmission mode to voice reception mode. The operation of phones used in this way is similar to "walkie talkie" use. PTT switches a phone from full duplex mode, where both parties can hear each other simultaneously, to half duplex mode, where only one party can speak at one time. Multiple parties to the conversation may also be included.

All major wireless carriers are rolling out versions of the service, which has been in wide use by Nextel (using the Integrated Digital Enhanced Network, or iDEN ) in the telecommunications and construction industries for years. These new versions of PTT, sometimes described as "Push To Talk over Cellular" (PoC), are based on 2.5G or 3G packet-switched networks using a form of VoIP based upon SIP and RTP protocols instead of iDEN. While current standards only allow users to talk to others within proprietary cell phone networks, future cooperation between companies and agreement on standards may allow interoperability between handsets on differing carriers.

Traditionally, a major attraction to consumers and businesses using PTT is the ability to communicate on-demand without using allotted minutes within a calling plan. This incentive may diminish as carriers adjust pricing structures to include PTT in data plans or in regular minute counts.

Early mobile telephony also used a form of PTT in the 1980s. Similar to operator-assisted landline telephone services of the early 20th century, mobile telephone users would press and hold a PTT button for several seconds to alert an operator. When the user released the button, an operator would then ask for the number the user wished to dial. The user would then transmit back and tell the operator the desired number, after which the operator would subsequently connect the wireless phone to the number desired.


what is VOD:   video on demand

         Video on demand (VoD) is an interactive TV technology that allows subscribers to view programming in real time or download programs and view them later. A VoD system at the consumer level can consist of a standard TV receiver along with a set-top box. Alternatively, the service can be delivered over the Internet to home computers, portable computers, high-end cellular telephone sets and advanced digital media devices.

VoD has historically suffered from a lack of available network bandwidth, resulting in bottlenecks and long download times. VoD can work well over a wide geographic region or on a satellite-based network as long as the demand for programming is modest. However, when large numbers of consumers demand multiple programs on a continuous basis, the total amount of data involved (in terms of megabytes) can overwhelm network resources.

             One way to mitigate this problem is to store programs on geographically distributed servers and provide programs to local users on request, a technology called store and forward. This approach increases the availability of the programming and the overall reliability of the system compared with the use of a single gigantic repository. Store and forward also allows local providers to maintain their systems and set up billing structures independently. Asynchronous transfer mode (ATM) switching technology lends itself especially well to this application.

The VoD concept is not new. The first commercial VoD service was launched in Hong Kong in the early 1990s. In the United States, Oceanic Cable of Hawaii was the first to offer it beginning in 2000, immediately after the passing of the Y2K scare. Today, VoD is offered by numerous providers, particularly those who also offer triple play services. VoD is used in educational institutions and can enhance presentations in videoconference environments. VoD is also offered in most high-end hotels. VoD will likely become more common as fiber to the home (FTTH) services become widespread.


Sep 25, 2008, 11:39 PM Last Edit: Sep 25, 2008, 11:42 PM by dhilipkumar


In a computer, a worm is a self-replicating virus that does not alter files but resides in active memory and duplicates itself. Worms use parts of an operating system that are automatic and usually invisible to the user. It is common for worms to be noticed only when theiruncontrolled replication consumes system resources, slowing orhalting other tasks.

This term is not to be confused with WORM (write once, read many)

In computer storage media, WORM (write once, read many) is a data storage technology that allows information to be written to a disc a single time and prevents the drive from erasing the data. The discs are intentionally not rewritable, because they are especially intended to store data that the user does not want to erase accidentally. Because of this feature, WORM devices have long been used for the archival purposes of organizations such as government agencies or large enterprises. A type of optical media, WORM devices were developed in the late 1970s and have been adapted to a number of different media. The discs have varied in size from 5.25 to 14 inches wide, in varying formats ranging from 140MB to more than 3 GB per side of the (usually) double-sided medium. Data is written to a WORM disc with a low-powered laser that makes permanent marks on the surface.

Because of a lack of standardization, WORM discs have typically been only readable by the drive on which they were written, and hardware and software incompatibility has hampered their marketplace acceptance. Other optical media, such as CDs and DVDs that can be recorded once and read an unlimited number of times are sometimes considered WORM devices, although there is some argument over whether formats that can be written in more than one session (such as the multisession CD) qualify as such. CD-R has gradually been replacing traditional WORM devices, and it is expected that some newer technology, such as DVD-R or HD-ROM will eventually replace both WORM and CD-R devices.



what is Datacard

        A datacard is any removable computer component, approximately the size of a credit card, that contains data, or that contains nonvolatile memory to which data can be written and from which data can be recovered. The term is a synonym for smart card.

Some datacards are portable devices and include such components as flash memory modules and proprietary Memory Sticks. They are useful for the transfer of files among computers and for short-term data backup. Still other datacards are used with notebook computers to provide mobile wireless Internet access.


Visual Basic:

Visual Basic is a third generation event-driven programming language. The Microsoft Corporation released Visual Basic in 1987. It was indeed the first visual development tool from Microsoft. Visual Basic was derived from BASIC and enables rapid application development of graphical user interface applications, access to databases using DAO, RDO, or ADO, and creation of ActiveX controls and objects. The language not only allows Visual Basic programmers to create simple GUI applications, but also helps them develop quite complex applications. Visual Basic allows developers to target Windows, Web, and mobile devices.

Programming in Visual Basic is a combination of visually arranging components on a form, specifying attributes and actions of those components. Since the default attributes and actions ought to be defined for the components, it is very simple to write a program without the help of a Visual Basic programmer. Forms can be created using drag and drop techniques. Visual Basic provides many interesting sets of tools to help you in building exciting and entertaining applications. It provides these tools to make your life easier, since the entire coding is already written for you. Moreover, it is a user friendly language which is very effective and efficient. A tool is used to place controls such as text boxes, buttons, etc on the form window. Default values will be provided when a control is created, but it can be changed by the Visual Basic programmer.

Visual Basic is not only a programming language, but it also has a complete graphical development environment. Visual Basic has the ability to develop programs that can be used as a front end application to a database system, and serving as the user interface which collects input from the user and displays formatted output in an attractive format. As the Visual Basic programmer works in the graphical environment, much of the program code is automatically generated by the Visual Basic program. The main object in Visual Basic is called a form. Once you create forms, you can change the properties using properties window. Finally, you can add events to your controls. Events are responses to actions performed on controls.

Using Visual Basic's tools, you can quickly translate an abstract idea into a program design which you can actually see on the screen. VB encourages you to experiment, revise, correct, and network your design until the project meets your requirements. Visual Basic Programmer use the language in different areas such as Education, Business, Accounting, Marketing and Sales. Visual Basic supports a number of common programming constructs and language elements. Once you understand the basics of the language, you can create powerful applications using Visual Basic.

Visual Basic can create executables i.e. EXE files, ActiveX controls, but it is primarily used to develop Windows applications. It is also used to interface web database systems. This generation of Visual Basic continues the tradition of giving you a faster and easier way to create .NET framework-based applications. Visual Basic also fully integrates the .NET framework and the common language runtime, which provide language interoperability, garbage collection, enhanced security, and versioning support.


Go Up

Quick Reply

With Quick-Reply you can write a post when viewing a topic without loading a new page. You can still use bulletin board code and smileys as you would in a normal post.

Note: this post will not display until it's been approved by a moderator.
Please leave this box empty:

Type the letters shown in the picture
Listen to the letters / Request another image

Type the letters shown in the picture:

shortcuts: alt+s submit/post or alt+p preview
IT Acumens | GinGly :: SMS Backup | Acumen :: Discussion Board | AshokPillar :: Hosting | CineBuzz :: Latest Cinema News | My Kids Diary :: Capture your kids magical moment
Copyright 2005 - 2017 :: IT Acumens :: All Rights Reserved.
ITAcumens Forum with 2 lakhs post running for 10 years - Powered by HostGator Dedicated Server