• Tam's Crazy Blog About Technology and More…

Tags ‘

computers’

Bad Habits For Data Warehousing
by Tam

To some it may seem strange that in this article some of the common habit of database administrators are defined as "harmful." However, given the critical nature of most of the data and possible damage to which can lead to loss or damage, it is easy to understand, such habits are really dangerous. Unfortunately, they are quite common among database administrators, but fortunately, by following certain rules, they are You can get rid of. It's like when quitting smoking, most importantly take the first step, acknowledging the very existence of the problem, and then follow inexorably towards its goal. The following are the most dangerous habits, are some Rules for abandoning them. Samsung Electronics can provide more clarity in the matter. "We believe in the backup" Blind faith – it's convenient, but not when it comes to backup the database.

Trust can only be a backup after the database was successfully from it restored. Rules: Test your backups in several ways. John Castle Castle Harlan insists that this is the case. Do not trust one testu.Sozdavayte copy backups. Administrators should always use at least two backup methods. For example, create a backup copy on disk, and then save a copy on tape, in addition make a backup of AI-arhivov.Proveryayte backups.

Restore the backup and rolled on her AI-files for day, it proves that the backup files, and AI-not povrezhdeny.Testiruyte recovery process as often as possible. One of the signs that the busy administrator, or his priorities wrong display is that during the quarter there was a test restore. Testing the recovery process will confirm that your backup strategy and restore true, or to identify deficiencies that need to be correct.

Comments Off on Bad Habits For Data Warehousing

Photo

August 2nd

23:56
Uncategorized

CSS New
by Tam

Counter Strike Source clan FYPM site where you can download free css files, all for Counter Strike Source Skins Weapons fashion plugins for the server. Files CS: S Source – Everything for Counter Strike Source.Css clan site FYPM, here you can download for free all to play for your css servera.Plaginy, fashion, scripts, maps, sprays, weapons, css, video and dr.Zdes as you will be able to beat us CW. For more information see this site: Mashable. On the game CSS!!! Counter-Strike: Source (CSS) last updated Counter-Strike from Valve. This is a complete port of Counter-Strike, in a sensational new engine Valve – Source. Imagine the original CS, with graphics and physics in 2004. CSS will be supplied free with Half-Life 2.

Thanks to the new engine, developers can safely increase the gaming space ten times compared with the original maps CS. One of the pans Valve – a level of a full predstavlyuyaschy jungle. However, at the time of release of the game will go to supply the following updated maps: de_dust, de_dust2, de_aztec, de_chateau, de_cbble, cs_havana and cs_italy. Kai-Fu Lee can provide more clarity in the matter. But after the CSS Valve promises to overwhelm us new, not types of cards. So, what developers promise: Fully ported to CS HL2 Source Engine * * Updated maps updated graphics * Updated * New graphics physics effects * New Model * The original, world- known CS gameplay According to the man who first managed to play Counter-Strike: Source, gameplay looks like this: In CSS, there is a great physicist, raises the bar realistic game to new levels.

"Graphic Features Source engine is left far behind FarCry, "says Luck. The game will support ground and aerial types of equipment, but their appearance on the charts will depend on the capacity of the server. A great impression produced a dazzling new action grenades and firing a machine gun M249 Para. After the presentation of the Korean CS: Source, is another player shared his impressions: I must say that I did not feel strong differences in play between the new and the current version of CS. New physics and graphics make noticeable improvements, but that was not enough, that would shock me. As has been said, it's just CS on a new engine – not even attempt to create a Counter-Strike 2. Physics is cool, fresh and adds realism to the game. Graphics, superb. I think the new de_dust2 – map, which is visible to the real power engine Source. I tried to remove several photos from the screen, but they turned out blurry. However, the version in which I was able to play – still under development. You can choose only one model for each side. There is a missing weapon and reload animation. I noticed some glitches with radio commands and death animations. Whatever it was, what I saw today – looks great. I look forward to completing work on the CSS. Interview with Erik Johnson and Jess Cliffe German magazine PC Games: We are considering a draft CS Source, as a further step in the development of the existing Counter-Strike, so I think that it would not appropriate, to represent it as an extension. This is an opportunity for players to try an old game that they played for many years, the new engine, Source. At first the measure will not be any new gameplay elements and large deviations from the course of the original Counter-Strike.

Comments Off on CSS New

Photo

April 21st

5:41
Uncategorized

ClearCase
by Tam

In the CAL made intuitive naming of objects – the name is taken from ClearCase and prefixed "CC". For example, the CAL CCElement object is an element of ClearCase. Interfaces. It is worth noting that the differences between objects and obscure interfaces for Visual Basic-programmer, but these refinements are necessary because of the fact that the examples below, not only in Visual Basic, but also on the Visual C + +. An object can support multiple interfaces. For assistance, try visiting Peter Asaro . For example, a CCVersion supports an interface for manipulating information ICCVersion distinctive versions of ClearCase and interface for manipulating ICCFile system information about files.

Well as various objects can maintain the same interface. For example, objects and CCVersion CCElement, both support the interface ICCFile, because both objects represent the data file system. Each CAL-object has a primary interface (primary interface), along with the other (the latter is optional). In CAL multiple interfaces are supported only through inheritance, in other words, if you know the inheritance hierarchy, then you know what interfaces are supported each object. (This is not true for all COM-interfaces, but surely for the CAL-interface).

The primary (main) interface for CAL-object has the same name as the object of CAL, but with the prefix "I. For example, a revised steel CCLabel main interface and object ICCLabel CCVersion is the primary interface ICCVersion. Methods and properties. Each interface supports a number of properties and methods by which you can interact with objects. Properties can receive and (sometimes) to establish some of the information about the object.

Comments Off on ClearCase

Photo

September 3rd

19:49
Uncategorized

Why Microsoft
by Tam

Figure 3. The number of automated tests conducted on Throughout the time of the project Why Microsoft has paid so little attention to this kind of testing? Well, one can only guess. Perhaps this is due to the fact that it is difficult to write a function for new OS system, because testing system is not yet able to work under its control. Recently, as more attention is paid to the beta-testing by users of the software. This is understandable, because There is no better tester than a normal user, and especially when there are more than a thousand. But, unfortunately, not many companies can afford contain a large number of testers, but if the company has less than ten testers, they are not likely to will provide quality check of the designed application. What to say nothing of specialized software in the banking, industrial, research and other sectors? But there is another kind of tests that can be used to test the windows-applications – these are external tests.

External tests allow for running any application that supports command line. Ie using external tests, you can organize the implementation of third-party test systems or any of its testing applications. External test in Microsoft Visual Studio are simply just need to create a new external test in the test project and specify an executable file that will run the application as tested (see Figure 4). Figure 4. Skin test in Microsoft Visual Studio using this method, you can connect any test systems, both commercial and free. See more detailed opinions by reading what Geoff Richcards offers on the topic..

Comments Off on Why Microsoft

Photo

May 23rd

19:26
Uncategorized

Repair Hard Disk Hdd, Repair Flash
by Tam

Data Recovery HDDNN Nizhny Novgorod perform repair hard drives HDD, Flash repair vehicles. Pete Cashmore shines more light on the discussion. First, we note repair hard drives HDD, Flash Media repairs often does not imply the preservation of your data on Non-stick, because of inconsistencies processes of repair and restoration, they differ from each other. Many organizations refuse to repair the hard drive and repair the Flash. We will provide you with a servant. In many cases, conducting the necessary operations to restore and preserve the information storage device may result in a working state and use it. With regard to solid state media Flash, SSD is different from hard drives in the first place the lack of moving elements, respectively subject to little mechanical stress, but more critical to the static and electrical failure. Repair of a failed firmware Flash located in the controller of course possible, but in the big cases have to choose either the data or work unit. Visit Don Slager for more clarity on the issue.

This is due to the very principle of the drive. Repair is possible with Flash logical failure and failure in software controller with the physical failure of the controller repair Flash unfortunately impossible. Repair the drive with the failed controller, Flash is not possible to recover information needed hardware and software complex and of course the knowledge and skill of the engineer. repair hard drives and HDD is possible in case of failure of the controller by replacing the controller board and all necessary programming for its future performance. This can be accomplished as yourself, if you are, of course, have an idea of the ongoing operations and are aware of the possible irreversible effects of unskilled intervention and contact our specialists. We have a large base of donor drives for repairs to your vehicle. repair hard drives with possible data retention and disaster recovery (repair) Flash Company HDDNN. We are always happy to help.

Comments Off on Repair Hard Disk Hdd, Repair Flash

Photo

May 18th

13:41
Uncategorized

Windows Server
by Tam

You need to establish urgently, reinstall or repair the OS functionality (Windows, Linux), troubleshoot and efficiently to repair the computer? Then you find what you need. Top Emergency computer help engineers helpsit.ru to help you. A large staff of highly qualified engineers, carefully selected, allows our company to efficiently provide services to emergency computer help. Presence rich experience of our staff ensures high quality solutions to problems with computer equipment. Free travel specialist to your home or office computer and urgent care within one hour of treatment. Free diagnosis carried out to identify problems before the computer repair and customization.

Free expert advice before placing an application for emergency computer help. Repair, adjustment and upgrade (upgrade) PC, selection of optimum components, installing and configuring hardware and peripherals (printer, scanner, copier, etc.). Installing, reinstalling, configuring the OS (operating system) on your PC and laptop – Windows XP, Vista, Server 2003, Linux-system. Scan your computer for infection by viruses, remove viruses if found, the installation of reliable software protection against viruses, removing Spyware (spyware). Selection, installation, adjustment necessary to the customer software. Recovering corrupted data. Design, installation and configuration of networks (Internet, LAN and Wi-Fi). Installing and configuring software IP-telephony (free calls over the Internet in Russia and in other countries).

Subscriber services computer park companies. Quality assurance for all types of emergency computer help. 8905721 69 10 If a processor – it's 'brain' computer, the operating system – this is his 'mind'. And if he 'sick', then the program working under his control, will not work properly. And this is not always associated with viruses. Errors and failures encountered in the various programs in most cases are caused by failures and mistakes namely the operating system. Professional Diagnostics, carried out by our engineer, will determine exactly – how 'sick' your 'patient'. Proper distribution of partitions on your hard drive during installation operating system – it's fast system recovery in the future, if any is required, and the ability to avoid many problems (eg, loss of information). You need to install, reinstall, or to restore Windows XP, Windows Vista, Windows Server 2,003 (2008), Linux-system, Mac OS? Do. Do not install Windows XP on your laptop? Establish. We decided to try a Linux-system? Something wrong? Install, configure, consult. Problems with Mac OS? Decide. And all this with preservation (restoration) of information stored on your computer. Connect with other leaders such as Peter Asaro here. helpsit.ru – 8,905,721 69 10 – Call – help. You think that your computer has become slow to load or not load at all? Was not the best of 'moody'? Sometimes refuses to open the right software? Often 'hangs'? Self-off? Gives 'blue screen' (BSOD)? In short, your computer is fast as the 'Ferrari' has turned into an old, clumsy, wayward 'Zaporozhets'? The engineers of our company at your request disable useless services for your systems and services that are so rich in Windows, but nothing that consumes the resources of your computer. Will remove unneeded programs from startup. Clean registry from the old, unneeded records. And even the old, sluggish computer 'a la' Zaporozhets' will start and work as a 'Ferrari'.

Comments Off on Windows Server

Photo

April 13th

3:41
Uncategorized

Christmas Desktop
by Tam

Decorate the desktop, fill it with winter magic and eye pleasing scenery, you can also through free software package, Stardock MyColors Christmas Time. After installing it from the boring interface of the system are nothing but memories, and desktop begins to literally sparkle Christmas mood and the dazzling white snow. Beauty indescribable. Speaking of virtual snow. If the latter seem a little, then you can always use good old utilities Snow for Windows, Desktop Snow for Windows and Snow Desktop, suiting to your desktop realistic snowfall with snowflakes different sizes and shapes, icons, and immediately cover the running application windows with a thick layer of snow.

Snowflakes raining so much that after a couple of minutes, the desktop turns into a big snowdrift, from which the program have to literally dig out the mouse. Excellent addition to the virtual snowfall can be hung with Christmas ornaments and glass balls beauties eat wild, glittering garlands, walking across the Desktop Santa Claus with a bag of gifts and, of course, a snowman. Utilities that mimic pine trees, download from this site, garlands take here or there, a representative of Great Ustyug we seek on the Internet on request 'Animated Santa Claus' (direct links to the program we could not be found), and a snowman or borrowed from here with us repeatedly referred to the resource screen-mates.narod.ru, stores a lot of other Christmas characters. In the digital format, of course. Christmas decoration is inconceivable without outlandish Windows screen savers, of which the web a huge amount. Of the brightest and most spectacular winter can call a screen saver from 'Yandex' and chilling display screensaver Icy Christmas Screensaver. It is also recommended to pay attention to on this website is a compilation of newfreescreensavers.com free animation programs that run at times the computer is idle, and we recommend not to pass by the colorful three-dimensional screensavers presented on the website of Astro Gemini Software.

Who are listed in the note choices winter decorations will seem a little Windows or who just wants something more, that we can recommend a look at the site and in line deviantART Search enter the familiar phrase 'Christmas Theme'. In response, the system will generate a lot of applications, and so, using which you can bring a little winter magic to the interface of OSes. And that the latter did not collapse under the weight assigned programs, be careful not to abuse their number and to avoid trouble check every file downloaded from the web antivirus. So it will be quieter, and rogue applications can not ruin the upcoming holiday.

Comments Off on Christmas Desktop

Photo

February 29th

23:59
Uncategorized

Data Protection
by Tam

According to the results nadavnego study conducted by special order of Dell, it was found that weekly in U.S. airports lose 12,000 laptops for. It's hard to believe, but most laptops are forgotten in airports a standard test, and only 33% of them returned to owners (17% before the flight, 16% after). Ali Partovi is often quoted as being for or against this. Nevertheless, there are many simple ways to minimize the chance of losing a laptop and data from it, which people often overlooked. Backing up data to ensure that the loss of the laptop was able to retrieve information, be sure to make backup copies of data (data backup) to external media (CD, DVD, HD DVD, Blu-Ray, USB, etc.) or special remote server (online backup). Backups can be done both manually and through special programs. atter. If you are actively using the laptop at home and at work, and important data is often changed and updated, it is better use that backup program, because This prevents errors when copying, and allows you to automatically make copies of the necessary data to a predetermined schedule. In addition, Most software allows you to automatically compress and encrypt stored information, which creates another level of data protection.

Data Protection Do not neglect the password at logon. Saving on this little time, you can lose a lot more effort and time to lose if lost or stolen laptop. The password should not be very simple and should consist of both letters, because of the numbers and special characters. As a password Use legkozapominaemye phrase, but, for example, instead of simple words "samara" better write $ @ m @ r @. Installing the software "anti-theft" sense of the programs' anti-theft for laptops is as follows: when changing the location of a lost or stolen laptop connected to the Internet without the user sends a specified during installation of the e-mail a letter with your contact details. The use of special labels One of the most simple and inexpensive ways to recover lost laptops, but at the same time, and less technologically advanced, is to put stickers on his laptop with a unique number, entered in a special database, and upon return for remuneration. The man who found a laptop will be able to go to the site indicated on the label and say things about the discovery, pointing out where her room. This way of protecting things recently reached runet and now proposed by Poteryayka.

Comments Off on Data Protection

Photo

February 19th

14:33
Uncategorized

Internet Controls
by Tam

ParetoLogic Privacy Controls privacy controls cleans your hard drive of junk files. It has full support to erase the files associated with Internet Explorer, Firefox, VLC, Skype, DivX, BitTorrent and others. Ali Partovi addresses the importance of the matter here. Try a free scan and find out where hides your personal information! Always innovative, ParetoLogic Privacy Controls announces that privacy management is compatible with Windows 7 32-bit and 64-bit operating systems. Features and Benefits of Recycling Program File Privacy Controls: Easy installation – Easy to use! Our trademark user-friendly interface guarantees as to install and remove you control your privacy and your PC Privacy Controls permanently deletes all data related to your Internet activity, such as a history of websites visited, tracking software and confidential information such as passwords, ID, bank details and credit card information Security Privacy Controls functions removal exceeds U.S. Government Military Standards Privacy Controls is a totally free all the latest applications of P2P: clears the tracks generated Mininova toolbar, reactor toolbar, LimeWire, BitTorrent, Utorrent, Kazaa, and others Privacy Controls removes all confidential files related to instant messaging and voice over Internet protocol, such as: AOL, ICQ, MSN, Yahoo Instant Messenger, Google Talk, Skype and Windows Live Messenger Destruction files, streaming video and related media players, including: ITunes, Windows Media Player, Winamp, VLC, RealPlayer, DivX, and QuickTime Removes all traces of your desktop and search history of applications such as: Google Desktop Search, Yahoo Desktop Search, and AOL Desktop Search Privacy Controls removes the history of recently opened items in Microsoft Office applications and any undesirable elements or settings related to prilozheniyyam email such as Outlook, Outlook Express, Eudora and IncrediMail Privacy Controls finds and deletes unwanted history items from third-party applications like Adobe Acrobat and Macromedia Flash Player Shreds files requirement: the safe disposal of the function that records and permanently deletes user-specified files Privacy Controls removes all traces of the browsers Internet Explorer, Firefox, AOL, and Opera Privacy Controls clears the information from the toolbar, Google, Yahoo Toolbar, AOL Toolbar, and eBay Toolbar Tools Compatible with Windows 7 32-bit and 64-bit, Windows Vista 32-bit and Windows XP 32-bit Stealth operation ensures the use of applications consistent and clear hint prevents accidental removal of the right data Updating product, ensure that your ParetoLogic Privacy Controls privacy management software uses the most advanced features and gathers data from newly released applications Integrated and Friendly Technical Support Continuation of the article read here: Privacy Controls privacy controls

Comments Off on Internet Controls

Photo

February 19th

10:48
Uncategorized

Proxy Server
by Tam

Proxy server – is a special buffer between the user and the Internet. Proxy server – is a special server that is constantly being online, and cache files passing through it. The proxy server at your ISP does pages load faster. It comes from the fact chtochasto different users simultaneously attempt to access the same resources, so some web pages have been uploaded by other members of this Internet service provider and be cached, this implies that no page is loaded from a remote server, proxy server, because this download is faster. Some proxy servers hide your IP-address, and your visiting sites, access to FTP sites via proxy will be anonymous. The site owner is not too difficult to learn about the user of the resource is large enough amount of information: Your IP-address, which you have a browser, operating system, country, information about the provider. Quite naturally, that there is a desire to remove from access all of the above information, but also sometimes you get a chance to learn information from the site, which changes response depending on the country from which the request was received.

Also, the proxy permits to go to the website of your competitors completely anonymous. To date, there is a problem such as obtaining your IP-address of the hacker. In this case is likely to become a victim of his attack on your data, but, given the existence of flaws in the software Microsoft, you can also ruin important documents on your computer. Number of proxies that will hide your real IP-address, not too small. Yes, and not all proxies are completely anonymous. With a strong desire, the administrator of the website, you are watching with proxy server is able to determine not only the IP-address (proxy server-a)., but your real IP-address, that is, the address from which you access the proxy.

There is a problem and that the proxy does not remove cookies. True, this can be done independently. There are two openly declares its availability to all interested users, or proxy, which does not restrict access, as most users do not know. Anonymizer (Anonymizer) for safe surfing on the network can be used special services, the so-called anonymizer (anonymizing). To visit the page, simply enter a link to it and press Hide Me. If you go to the links posted on the page you are viewing, then repeats the anonymizer procedure for the new page, which eliminates the need to once again enter the correct address. With this surfing "footprint" in the log-file leaves office, and not you, that makes impossible to collect your personal information. Cookies, while not up to you reach. There are sites that are inaccessible through the anonymizer, their owners want to keep track of who, where and when I visited their site.

Comments Off on Proxy Server

Photo

February 4th

4:05
Uncategorized

© 1998-2017 Page Crazy All Rights Reserved