ITList Information Technology Blog » Software http://itlist.com Current IT field related information Mon, 20 Aug 2012 14:41:07 +0000 en-US hourly 1 The MVC programming pattern http://itlist.com/the-mvc-programming-pattern/ http://itlist.com/the-mvc-programming-pattern/#comments Fri, 09 Jan 2009 17:02:30 +0000 Tony http://itlist.com/?p=199 Modern programming is totally different from the way programming was just less than a decade ago.  Much of this is due to programmers preferring to move towards more organized and scalable programming paradigms and frameworks.  This are just some of the reasons why object-oriented programming and programming design patterns have become popular.  MVC is a programming design pattern that has become popular mainly because it allows for a more organized and scalable program.

MVC or Model-View-Controller is a design pattern that separates a program into three components, the View, the Model and the Controller. The View refers to the component that appears to the user.  It is the code that generates what is shown to the user and it also receives input from the user as needed.  The Controller on the other hand, refers on the code that determines what action should be taken when a request from the user is received.  Finally, the Model refers to the section of code that does the processing of the request and also saves or retrieves data for the user before handing it back to the View.

Now, let’s focus on this design pattern in the web application programming point of view. MVC is currently being implemented by two of the popular web programming languages.  It is used in J2EE through the Struts, Spring, and JSF frameworks while it is also implemented by Ruby through the Rails framework. Other languages also have similar frameworks available though not as popular as those mentioned.  Lately, Microsoft has also released an update for their .NET framework to support the MVC pattern.

What really makes this pattern so powerful is that it allows an application to be built independently from each other.  This means, changes made to the implementation of one component should not drastically affect the other sections.  This is especially beneficial for teams working on a program.  Some of them can be working on the View component; creating the HTML, JavaScript, and CSS code that allows for a more pleasing web interface for the user.  Others on the team could be working on the business logic of the program, focusing on how the data is processed and saved or retrieved from the database.  Most importantly, the controller can be used to direct where requests are sent and to what page will the information be displayed.

Let’s trace how a request is processed in an MVC pattern.  Let’s start with the request coming from the user.  The user usually makes their first request by invoking the initial page of a website by entering the website’s URL in the browser.  The controller catches the request for the initial page and invokes the proper action which makes the proper calls to the model components that accomplish the necessary processing.  Once all the required information are gathered, the page is rendered by the view and the page is shown to the user.

Volumes can be written about the MVC pattern and its intricacies so for more information, you may visit WikiPedia for more information and links to MVC frameworks for your programming language of choice.

]]>
http://itlist.com/the-mvc-programming-pattern/feed/ 0
KIDO’Z browser for young kids http://itlist.com/kidoz-browser-for-young-kids/ http://itlist.com/kidoz-browser-for-young-kids/#comments Wed, 07 Jan 2009 07:36:57 +0000 digitaldreamz http://itlist.com/?p=140 As a parent, you must always be worried about what your young kid is doing when he or she is on internet. The kid can by chance or sometimes knowingly stumble upon sites which you do not consider safe or morally right. It is not possible to be always looking out for what the child is doing and what activities is he engaged into. A very vivid solution to this problem has been provided by KIDOZ LTD, an Israeli startup in the form of KIDO’Z.A web browser specially created for kids so that they can browse internet safely and you need not be on surveillance all the time. This internet browser has a very attractive and appealing interface and loads of games to play. The kids can not only use internet for surfing sites but can also watch YouTube videos featuring cartoons, nursery rhymes and educational stuff.

Listing down some of the prominent features:

Safety

The system completely blocks any links or attempts to open unapproved sites preventing kids from using internet frivolously. When they are browsing on KIDO’Z, they are in safe hands.

Direct Access

The best websites and videos have already been searched and sorted in the browser and are just a click away. You don’t have to surf the web for hours and find the best possible sites for your kids. The sites are already listed down; all you have to do is click on the icon.

Easy Interface

The interface is so darn easy that even a young child in the age group of 3-5 years can fiddle with it without assistance.

YouTube Access

As they say “Picture says 1000 words” so nothing is more educational then letting your child learn his or her nursery rhymes through videos. KIDO’Z has lined up YouTube videos with nursery rhymes to give a perfect visual experience for kids. Other than nursery rhymes, they can watch cartoons and other educational videos pertaining to their interest. There are hundreds of videos which are separated into sections like Animals, babies etc

Game center

Apart from availability of games on the sites, it has a game center where lots of games are available and are just a click away. You need not surf the sites and look for games.

Platform Support

KIDO’Z is available on all platforms so you don’t have to worry about whether you can use it or not. Mac or Linux, you can run it without any hitches.

Upgrade process

Upgrade process for KIDO’Z is just like any other browser. On opening the browser, updater window pops up and with easy instructions to follow, you are ready with the new version.

Cost

KIDO’Z is absolutely free and available for download. You need to install Adobe AIR before going ahead with KIDO’Z installation.

Plugins

KIDO’Z is using Twitter. Twitter is again a free service that lets you be in touch with people and lets you exchange views. And twitter can also be used on phone.

Proposed features

Bookmarking, setting time limits are few of the features on the anvil which will soon make their way into the browser upgrades.
KIDO’Z is a browser with the best and safe websites packed in it for your kids. Do try it out.

]]>
http://itlist.com/kidoz-browser-for-young-kids/feed/ 0
Tips on how to choose the ideal Anti-Virus for your computer http://itlist.com/tips-on-how-to-choose-the-ideal-anti-virus-for-your-computer/ http://itlist.com/tips-on-how-to-choose-the-ideal-anti-virus-for-your-computer/#comments Tue, 06 Jan 2009 23:39:41 +0000 Janeita http://itlist.com/?p=51 Computers are mindless machines that function through programs that have been installed to meet the needs of their users. This fact makes them susceptible to viruses and hence requires the use of Anti-virus programs that protect and detect such attacks. An in depth research into the type of Anti-virus that best suits you depends entirely on your daily use of the computer. It is therefore essential an in depth knowledge regarding the most recent viruses and the old timers. Most Anti-viruses offer a 30 day test period and from there you can decide if you want to continue using their program. The most popular Anti-virus programs are Norton, AVG, MacAfee Anti-virus and Sophos Anti-virus just to name a few. A few tips that one should consider are:

The investment one is willing to make to acquire the Anti-virus. Expensive does not necessarily mean it is the best. Try to research on the features and advantages different anti-virus packages will give you when compared to their competitors

You own personal needs. Are you an entrepreneur or an organization? While you may take the necessary care to ensure that you follow all laid down guidelines to minimize all possible virus infections, your fellow man may not necessarily share the same interest. In cases like these you will need an Anti-virus program that offers protection against all possible viruses.

What are the features of the Anti-Virus you are considering? Does it have the latest updates against new viruses? You should always choose an Anti-virus program that has the latest definition and above all that is updated on a regular basis to protect your computer.

Ensure that the Anti-virus automatically updates itself as this will reduce the chances of virus infections if by chance you happen to forget to update it manually. This special feature not only guarantees that the update is done when you least expect it, it also can be configured to do so when you go online.

It is never advisable to use two Anti-virus programs at once. There can be conflict between the two programs and you end up creating a weak point for viruses to leash through on your computer. Therefore it is a myth to believe that two Anti-virus programs will guarantee maximum protection.

Ensure that your Anti-Virus offers you the option to eliminate the virus. It makes absolutely no sense detecting a virus and then not having features to be rid of it, after all who wants a virus ever present locked in quarantine on your computer?

]]>
http://itlist.com/tips-on-how-to-choose-the-ideal-anti-virus-for-your-computer/feed/ 0
Playing multiple video formats in Windows http://itlist.com/playing-multiple-video-formats-in-windows/ http://itlist.com/playing-multiple-video-formats-in-windows/#comments Mon, 05 Jan 2009 04:40:07 +0000 Tony http://itlist.com/?p=166 One of the most frustrating experiences for anyone using a computer is not being able to find out what to do after downloading a file.  How many times have you encountered a situation where you know that you downloaded a video file or you are opening a website where you should be able to watch a clip but ended up staring at a blank screen instead?  Some of us may have also experienced trying to watch a DVD on the computer and then receiving a cryptic message that a codec is required to watch it.  The reason for this is most undeniably the format of the movie you are trying to watch.  So how do we watch videos without the headache and heartache?

What we need is a codec.  Codec is an amalgamation of two words: coder and decoder.  A codec is used to either encode or decode a particular file.  Video file formats are encoded in different formats to address various needs and a codec is used in creating those files and later on, decoding them.  Some video formats allow for a more secure file.  They are usually used for videos that are being sold commercially on the internet so that only those with the required license will be able to watch the video.  Other video formats are used for compressing the videos so that the size of the video will be small enough for easy transmission over the internet.  Finally, some video formats are used to stream the video to your browser as opposed to downloading them to your computer in one file.

One of the most popular video formats on the internet is the Flash format.  The flash format is usually used by websites that stream the videos to your browser.  Some examples of these sites are YouTube, DailyMotion, and Multiply.  To play these videos, we need to install Adobe Flash onto the computer.  Adobe Flash Player is available for free from www.adobe.com.

How about videos that we’ve snapped up using our cellphones or perhaps our digital cameras?  These videos are usually encoded in 3gp or mp4(H.264) formats.  While some videos that can be downloaded from the internet are in xvid(avi), mkv(matroska) or divx(avi) formats.  Other websites would encode their videos in rmv(real video) or qt(quicktime) formats as well.  So how do we open this confusing mix of codecs and how should we know which one to use to open them?  Does it mean that we need to download a separate player for each of these videos?  Well, you could do that, or an easier alternative would be to download a player that can play all the formats mentioned.

Codec packs are usually included with some of the free multiformat video players on the internet.  Codec packs are bundles of codecs that are installed on your computer so that you can play any movie format concievable.  Two of the most popular players that have these codec packs are VLC Player and Media Player Classic.  VLC Player can be downloaded from http://www.videolan.org/vlc/  while Media Player Classic can be downloaded as part of the K-Lite Codec pack at: http://www.free-codecs.com/download/K_lite_codec_pack.htm .

Once you have installed these programs, you’d be hard-pressed to find a video you are unable to play.  So sit back and relax; enjoy the movie.

]]>
http://itlist.com/playing-multiple-video-formats-in-windows/feed/ 0
Windows 7: The next-generation Windows software http://itlist.com/windows-7-the-next-generation-windows-software/ http://itlist.com/windows-7-the-next-generation-windows-software/#comments Sun, 04 Jan 2009 22:06:44 +0000 Tony http://itlist.com/?p=156 As of this writing, Windows 7 is currently in its first beta build.  And for the first time, it seems that Microsoft is reaping praise from software testers for what they tout as the most stable operating system that Microsoft has produced so far.   Even during the early alpha stages of the operating system originally given the codename “Vienna”, Windows 7 showed remarkedly better performance than Windows Vista.

In contrast, Windows Vista became the poor recipient of much ridicule from a vast majority of users upon its release.  Those who have used it complained of slowness and poor driver support.  Though the latter problem of poor driver support was soon addressed when hardware vendors eventually offered Vista compatible drivers, the problem with slowness was not easily dispelled.  Experts complained that the operating system used up too much system resources unnecessarily.  They further added that aside from the aesthetic changes to the graphical user interface (GUI), there was really nothing useful that was added to Windows Vista that wasn’t already available in Windows XP.

With the arrival of Windows 7 to the scene, testers are saying that this is the version of Windows that Windows Vista should have been.   Similar comments have also been said for Windows Server 2008 however, the clamour is becoming louder as Windows 7 comes nearer to its final release.

Some of the features to look out for in Windows 7 include:

  • an updated taskbar
  • jumplists and libraries
  • screen hotspots for maximizing or resizing windows
  • new bootscreen
  • wallpaper slideshow
  • desktop preview
  • updated themes
  • faster and more responsive interface
  • more efficient memory management
  • easier networking and device management

Tons of new features are also included for those who will be lucky enough to buy a multi-touch screen PC like the HP TouchSmart since Windows 7 will include customized features for these kinds of PCs that include enhanced jumplists and gestures.

However, some concerns have been raised with one of the main features of Windows 7 which is the updated taskbar.  Consistency is not followed on how the icons on the taskbar appear.  The same is true with the jumplists and the taskbar notification icons.  If you wish to know more about this, try reading Paul Thurrott’s article entitled: Windows 7 Beta: Notes and Observations

Some speculations have stipulated that Windows 7 might be released as early as mid-2009.  However, Microsoft insists it is set for a 2010 release date.  Microsoft is also being vague as to whether Windows 7 is going to be a major Windows version or if it will just be an enhancement for Windows Vista.

No matter how you choose to see it, Windows 7 is going to be the next big thing for Windows users.  Hopefully, the almost obligatory upgrade to more powerful hardware won’t be necessary since that was one of the major reasons why users hated Windows Vista so much.  But looking into the early showing of Windows 7, it appears to be doing a lot of things right that makes it stand out as a winner to the eyes of a lot of users.

]]>
http://itlist.com/windows-7-the-next-generation-windows-software/feed/ 0
Opening archived files http://itlist.com/opening-archived-files/ http://itlist.com/opening-archived-files/#comments Sat, 03 Jan 2009 10:49:25 +0000 Tony http://itlist.com/?p=174 Storage space has always been a concern for computer users.  This has been such a big issue for those who were into computers in its early years since storage space was sparse and came at a premium. Though storage media for computers has steadily become larger in recent years, the need to transfer files over a network or through the internet still meant that making files smaller is still something that is desirable in today’s computing world.

Making files smaller is usually called file compression or archiving while opening them is called decompression or extracting.  Separate software are usually needed to create these file archives and to open them later on.  Some file compression software also allow for secure archiving by adding password protection and encryption to the file.  Some software also allows to span or to divide a file archive into several smaller pieces so that they may be copied or transmitted in smaller chunks.

Over the years, several archive formats have been created and some of them have become more popular than others.  Currently, the most popular file archive formats are ZIP, RAR, and 7z. 

The ZIP format is one of the most popular if not the most popular formats for file compression.  As proof of its popularity, Windows XP and Mac OS X 10.3 and above have zip compression and decompression included in the OS. The term “zipping” a file to refer to compression of a file was coined from the zip format as well.  Among the popular file formats mentioned earlier, the zip format can be considered the least capable in creating the most compressed format, however it is sufficient for general file archive use. Zip files generally have a file extension of .zip.

The RAR format comes in close as the most popular archive format next to ZIP.  However, unlike the zip format that has several available software that allow you to create zip archives, RAR files can only be created with the use of WinRAR.  WinRAR is a commercial shareware product that can be downloaded for free at: http://www.rarlab.com/.   Being shareware though, it pops up a nag screen every time you open it until you purchase the full license.  The RAR format is much better than the ZIP format when it comes to compression so it may be a good choice for those looking for better compression of their files. RAR files have the file extension .rar, .r00, .r01, r02, and so on.

The 7z format is an open-source compression archive format that is under the GNU Lesser General Public License.  The use of the 7-zip file archive software is generally the preferred software for creating and opening 7z files.  The 7-zip software can be downloaded for free at: http://www.7-zip.org/. Like the RAR format, the 7z file format offers better compression than ZIP.

If you are in need of a program that is able to open all three of the archive formats, your best bet would be to download 7-zip or another program called PeaZip.  Both are free and are able to open the said formats.  However, if you wish to create RAR archives, your only option is to use WinRAR.  Generally, you won’t need anything extra to create zip files, however, if you want better control or if you want to create zip files that span into several files, you can also get third party software like WinZip to do the job.  Take note that Winzip like WinRAR is a shareware product, you will have to purchase the full license if  you want to use it without being bothered by a nag screen while opening the program.

]]>
http://itlist.com/opening-archived-files/feed/ 0
Virtualization for everyone http://itlist.com/virtualization-for-everyone/ http://itlist.com/virtualization-for-everyone/#comments Sat, 03 Jan 2009 04:50:26 +0000 Tony http://itlist.com/?p=170 As computer processor vendors start to move from single processing to multi processing, one technology is also starting to gain popularity.  Virtualization technology is now starting to be used widely not only in the technology niche but in the mainstream computing public as well.

Virtualization allows multiple operating systems to co-exist and run at the same time on one host computer.   These operating systems are usually called guest operating systems and the platform where they are installed are called virtual machines.  For the guest operating systems to be able to access the actual hardware installed on the computer, virtual devices are created to represent these actual devices to the guest operating system.

Though this technology has been available since the 60′s, only with the advent of the Intel VT or AMD-V technologies did it become available to consumer hardware platforms.  Previously, support for virtualization on the PC was limited to software implementations which only allowed the guest operating systems to see virtual devices in the created virtual machine.  With virtualization now being available through hardware, it is now possible to create virtual machines that can provide performance similar to running the operating system directly on the hardware.

Some of the striking results of virtualization that is available in the market now is that of Mac OS X 10.5.  Now, it is possible to have both Mac OS X and Windows installed on a Mac computer.  So if you are a Mac user but you really have no choice but to use a Windows application, you no longer had to have two machines.  You can have the best of both worlds with your Mac computer.  Another good example is that of Ubuntu Linux allowing the user to install Ubuntu as a virtual machine instead of creating separate partitions for it on your hard drive before installation.  Ubuntu can now be installed just like a common Windows application all thanks to the new Wubi installer included with Ubuntu 8.04 and above.  Now, there is no risk to find out what Linux is all about while still having the ease of mind knowing that you can always go back to Windows if you need to.

Hardware OEMs are also starting to get into virtualization.  Asus recently implemented Splashtop features in some of its laptop and PC machines.  Splashtop, created by DeviceVM, allows the user to quickly boot up the computer in 4 to 5 seconds and immediately connect to the Internet while waiting for Windows to load in the background.  It is no longer required that the user wait for Windows to finish loading before they can enjoy going online.  It is really fast because the software needed for that feature is installed directly on the motherboard of the computer.

No doubt, power users of virtualization technology would still purchase separate software to allow them to create multiple virtual machines at will. But for most consumers, the added ability to run a whole separate operating system in their current machine or one that just allows them to use the computer quickly while waiting for their main operating system to boot up is already a great boon, and all that is possible thanks to virtualization.

]]>
http://itlist.com/virtualization-for-everyone/feed/ 0
Script.aculo.us – a fabulous javascript framework http://itlist.com/scriptaculous-a-fabulous-javascript-framework/ http://itlist.com/scriptaculous-a-fabulous-javascript-framework/#comments Thu, 01 Jan 2009 16:36:50 +0000 Tony http://itlist.com/?p=182 Script.aculo.us has gained much recognition from javascript programmers as a useful animation framework.  It is available for free and can be used for adding the much needed eye candy that is becoming predominant in today’s multimedia rich websites.  Fly out menus, text fading in and out, and objects zooming in and out usually required the use of specialized software to create.

Years before, Internet Explorer introduced DHTML or Dynamic HTML to allow these kinds of effects to be done from within the browser.  However, this was available to Microsoft’s Internet Explorer only.  There is a way to implement these effects via Javascript however, you had to know about animation and mathematical and physics equations to create them.  However, with the arrival of Script.aculo.us, these effects can now be easily created.

Script.aculo.us is not only for animation though.  It also has several functions that allow the programmer to add drag and drop functionality, in place editing, dynamic creation of Document Object Model(DOM) elements on the page, AJAX functionality, playing sounds, and unit testing.  That’s quite a mouthful of useful features that could not only make pages you make attractive but also make it functional and easier to program.

Checking out the homepage of Script.aculo.us, we can find links for all the features of the framework.  They are categorized into 6 groups.  These categories include: Core Effects, Combination Effects, Effect Helpers, Behaviours, Controls, and Miscellaneous.

The functions for the animation effects are found in the Core Effects, Combination Effects, and Effect helpers groups.  Some of the effects that can be created include:

  • highlight
  • morph
  • move
  • opacity
  • scale
  • parallel
  • queues

Parallel and queues are not really separate effects but are instead a way for the programmer to string together several effects to create the illusion of one continuous effect.  Combination effects are a mixture of the core effects that have already been customized in a way so that they appear to be one smooth effect.

As for behaviors, script.aculo.us includes the following functions:

  • draggable
  • droppable
  • sortable
  • form element dalayed observer

These functions allow the programmer to create elements on the page that can be dragged and dropped using the mouse, sort values and text, and provide a way to monitor page events and respond to them after a specified time delay.

For AJAX programmers, the controls group of script.aculo.us would be beneficial.  These functions include:

  • in place editor
  • in place editor for collections
  • auto-complete
  • auto-complete with results from a local array
  • slider

The in place editors allows the programmer to allow the user to change values of elements on the page and save them immediately.  The auto-complete features on the other hand allows the user to experience a more responsive system while typing information in the form of auto-suggest lists.  Finally, the slider feature allows the user to use slider bars to choose from a range of values instead of typing in the values manually.

The miscellaneous group of features are truly varied.  The builder feature allows the programmer to insert new elements to the page, while the sound feature provides a way to play and stop music on the page.  Finally, the unit testing features allows the programmer to test sections of their program without much difficulty.

So if you’re a web programmer looking for a way to integrate great effects and features to your page without the pain of creating them all from scratch, you may want to give script.aculo.us a test drive today!

]]>
http://itlist.com/scriptaculous-a-fabulous-javascript-framework/feed/ 0
Windows Live Writer: Making blogging powerful http://itlist.com/windows-live-writer-making-blogging-powerful/ http://itlist.com/windows-live-writer-making-blogging-powerful/#comments Wed, 31 Dec 2008 14:10:12 +0000 digitaldreamz http://itlist.com/?p=103 Windows Live Writer, a blog editing software from Microsoft, is a wonderful tool for more efficient blogging. This is a free, downloadable application that makes it easy to publish content, share photos, videos and support almost all blogging services may it be blogger, wordpress, Type Pad or live Journal. Many tools have already swarmed this market like Ecto, Performancing and Qumana. Windows Live Writer has many advantages over these already available tools:

WYSIWYG view

WYSIWYG (what you see is what you get) view allows knowing exactly how a blog post will look like before actually publishing it. This saves a lot of time spend in republishing the articles again and again after modifications.

Customizable API

Windows live Writer provides a customizable SDK (software development kit) that allows developers to have additional content types thereby extending the functionalities of the software. E.g.: Product thumbnails, tags, embedded videos etc.

Photo Sharing

Windows Live Writer allows uploading photos, customizing and publishing an easier task. You can   modify the size, borders; perform text wrapping and many other things. It publishes all the stuff automatically when you post.

Embedding video clips

Easiest way of embedding videos is provided by Windows Live Writer. The code needs to be copied straight away and it is recognized in a flash.

Map Publishing

It is a special feature for traveling blogs and sites that allows publishing maps in your posts and can also customize them to provide different views.

Screenshot images

If need arises to insert screenshots into the blog, Windows live writer lets you do it without using any third party tool. You can just Print Screen and paste it in writer and use it.

Wider platform support

Writer supports almost all the blogging services like Live Journal, Word Press, blogger, Type Pad etc. and the endeavor is to support all and sundry.

Live Writer Backup

Live Writer Backup utility allows carrying settings of writer if you are continuously changing your workstations.

Dictionary

Most of the times, you come across common words like blogger, phishing etc, which are not recognized by editors, you use. Windows Live Writer overcomes that obstacle and saves time on editing.

Dynamic Templates

For more tech savvy people, dynamic templates allow to do variety of experiments with Windows Live Writer like user data input, adding date instantaneously.

Auto linking

Windows live Writer provides the feature of auto linking for those who usually link web pages to their posts. So when you type in a familiar word, it automatically links to the appropriate web page.

This tool is currently available in 6 different languages and is going strong. Windows Live Writer makes the entire experience of blogging far more easy, powerful and intuitive. It is such an easy application that even a novice can make use of it and take the benefits.  That’s why they say, “The best things in life are for free” and so is Windows Live Writer.  Go ahead and download it now and start writing your own stories online.

]]>
http://itlist.com/windows-live-writer-making-blogging-powerful/feed/ 0
Antivirus and Firewall software http://itlist.com/antivirus-and-firewall-software/ http://itlist.com/antivirus-and-firewall-software/#comments Wed, 31 Dec 2008 01:39:25 +0000 Tony http://itlist.com/?p=67 As more and more computers connect to the Internet, it becomes more lucrative for virus makers to keep on making programs that expose a victim’s data.  The proliferation of viruses on the Windows platform have become cannon fodder for Windows detractors to further rub in the fact that Windows alone is not secure.  So what can a common Windows user do to protect themselves from such attacks?  The answer is to install an antivirus and firewall on your computer.

Installing a firewall and antivirus on your computer is essential for anyone whose computer is connected to the internet.  Surely, even those who frequently transfer data from one computer to another should also consider getting at least an antivirus to make sure that their data are safe from attack.  So what should one look for in an antivirus and firewall?

First of all, remember that a firewall is only necessary if you will be connecting to a network or to the internet.  The main function of a firewall is to monitor or control the incoming and outgoing data on your computer.  Essentially, it helps in blocking harmful connections from other computers to your computer.  Take note that some malicious software or even hackers would be able to easily take control of your computer if it is not sufficiently protected from attack.  This are usually done by injecting data or getting data from your computer through one of your computer’s ports.  Ports can be compared to openings on your computer where a user with enough knowledge can send and retrieve data to and from your computer.A firewall is able to prevent attacks by blocking or closing down ports on your computer and also monitor those that are required for your computer to continue functioning correctly.  Not all ports should be closed or blocked and your choice of firewall should be one which has the ability to determine which of these ports are dangerous and which can be safely used.

Antivirus programs on the other hand are programs that prevent your computer from getting viruses, or in the event that your computer does get infected by a virus, be able to remove the virus and either quarantine it or get rid of it permanently.  Unlike firewall software though, an antivirus program is essential on any computer that transfers data through other means like through floppy disks, USB flash drives or even direct network connections to another computer.  Viruses are designed not only to expose your data but are sometimes designed to modify or destroy the data completely.  This could be very costly for people with valuable data stored on their computers indeed.

Windows XP and Windows Vista comes with their own built-in firewall but these firewall programs pale in comparison to third-party firewall programs that one can purchase or get for free from the internet.  Some of the more popular firewall programs even have antivirus features included in their more advanced products.

ZoneAlarm is one of the most popular firewall programs which can be downloaded for free or for a fee for more advanced versions.  The free version of ZoneAlarm only includes firewall protection without the antivirus features included in its paid versions.

On the flipside, most antivirus programs also feature firewall protection in their more advanced paid versions.  When it comes to free antivirus, some of the leading programs include AVG, Avast, BitDefender and Avira AntiVir.  As for paid antivirus programs, the popular ones include Norton, McAfee, and TrendMicro.  Take note that for the paid versions of all these great antivirus products, firewall features are usually included already, thus there is no need to install a separate firewall anymore.

The biggest question for those who have decided to get an antivirus and firewall on their computer is which product should I get?  All the antivirus and firewall programs mentioned earlier have their merits and corresponding weaknesses.  Depending on your needs, you may not need an overly complex program to scan or protect your computer.  It all boils down to usage and preference.  Being a careful and responsible computer user can save you more often than having the best antivirus and firewall money can buy.  If you stick to legitimate websites and careful with the files and programs you keep on your computer, even the most basic of firewall and antivirus software on your computer will suffice.  Remember, when it comes to virus and hacker attacks, the best defense is good common sense.

]]>
http://itlist.com/antivirus-and-firewall-software/feed/ 0
The rules of impropriety in chats http://itlist.com/the-rules-of-impropriety-in-chats/ http://itlist.com/the-rules-of-impropriety-in-chats/#comments Tue, 30 Dec 2008 19:07:29 +0000 GoniG http://itlist.com/?p=85 This article addresses the topic of the poor and incorrect language that is used in chat rooms. Drawing on ethnographic data, tries to show that this theory is incorrect, in fact, a very important feature of the registration communicative available to users. This topic of research must be put in the context of academic study on computer mediated communication (CMO), and-as it comes to defending the text not be read as an article on language and the Internet but as a article on the digital society.

At this point, the Internet is nothing new. We no longer have to find or start any article on the ‘social’ on the Internet explaining what it is or how it first emerged. Finally, you finished the stage in the glare and exaggerated allegations of apologetic and apocalyptic are melting at an address less exclamation and more realistic.

Throughout the past few years, we have incorporated the new medium between our daily habits, both in terms of work and in the personal. Its importance and its scope are reflected by something as evident as its ubiquity. Internet as a tool has become a daily thing that we have integrated, with no apparent trauma, in our daily practices. We were informed via the Internet; electronic mail has become one of the channels of interpersonal communication more immediate cash in the history of mankind and use people and organizations that have made this space for their own dissemination has meant a change radical of its promotion channels, purchase and sale.

All this is of great importance; however it can be analyzed from an instrumental. The Internet-Instrument, or set of instruments, is a strong pillar of Western society today, everything that it has again and there are many socio-cultural implications that we can find in their path. However, as always, and uses tools, machines and people, can not be analyzed separately nor properly understood without a watch from a standpoint that identifying them as sides of the same coin.

An analysis of social Internet can not afford to ignore its size and technological instrumental in the same way as any technical investigation can not be carried out regardless of the social practices that protect the results of that investigation. In the same way as the railways and the steam engine are much more than icons of industrial society and are crucial to understanding society and culture of the nineteenth century, micro-processors and software technologies that enable communication between machines are at the very foundation of this society that is not only post-industrial and many people called, so quite accurate, digital society.

As social scientists, in these years of discovery and habituation, the line seems drawn out a route from which they were initially on studies of what ‘social’ identíficábamos in or around-the-new information technologies and communication towards what should be increasingly clear, research on the digital society.

In this connection, one of the most famous statements of Marshall McLuhan, we illustrated the big difference between a first phase of use of the new-technology-it is used for tasks and functions prior to her and a second phase, the really interesting in that-new-technology and its users generate new uses, new features and new social spaces. It is in this second phase where we must search for the real ‘revolutions’ technology and it is in this second stage where we can put this so-called digital society. No longer be satisfied with studying the social impact of a set of new tools, because what we have on hand is much more than a series of social consequences and corollaries of something technological. The under construction digital society would be equivalent to that second phase of use of the technology described by McLuhan and this is a digital society that we must turn our gaze as social scientists.

The issue of language and Internet belongs in a sense, this first phase of use of technology just mentioned. This is true if we understand the phenomenon as follows:

Since the eighties, the various tools that we can unite under the name ‘Internet’ have enabled new channels of communication. These new channels of communication quickly became popular thanks to its great effectiveness in improving the existing communication channels, especially since the first ninety in the English-speaking and Scandinavian and later in the rest of the Western world and privileged. The popularization of the new instruments, however, be understood from its effectiveness in relation to some previous Internet communication needs. In this sense, for example, e-mail is often seen in specialized jargon, a ‘killer app’ because it made available to users with a new form of communication revolutionarily faster, and dynamic individual.

The studies on language and Internet and / or language on the Internet often focus on analyzing how we change our registration language on the Internet, understanding the Internet purely as a technology and registration as a pre-existing language and to some extent, stable. The resulting equation, therefore, part of the combination of two factors that are taken in a way decontentexed, as if there were an isolated manner and default: on the one hand, the tongue (its regulatory code and its variants for the oral and written records , Etc.).’s Another technology (machines, cables, software, etc.).. Thus one can make interpretations based on the existence of two separate entities, objective and static and they can get to describe a variety of effects and consequences. In a way, this type of approach has a lot of naturalist-positivist: an ‘A’ exists (for example, the sea), an entity ‘B’ suddenly appears (for example, several thousand tons of oil) and produces an interaction whose effects are perfectly observable and comparable with the situation prior to the interaction. Will produce some changes and establishing comparisons with the previous situation.

Within the framework of the topic of academic research that the language is not static, nor is stable rather than overcome. Similarly, we also read and heard on many occasions that technology alone is nothing, that everything depends on the uses to which it is made. However, these two statements we should lay the basis for any investigation of language and / on the Internet have not been enough on the eve of this area of study. Perhaps the reason why this fact is that this is a new problem, which makes much of the first studies on this subject and the vast majority of the outreach approaches have been built to it from a perspective of the type described as a positivist in the preceding paragraph. One type of analysis is positivist more quickly and effectively to establish relationships, consequences and regularities. And, of course, when launching ‘hold’ and big statements on the matter, something always effective in the context in which we live. However, social scientists have discovered long ago that the social analysis can not rely on simplifications of the social positivist, as’ social ‘always turns out to be much more complex.

In this case, the first studies and approaches to the problem that we have described here as’ positivists’-have been proposed, in most cases, comparisons between the written record (or, more rarely The oral) and the recording media used by users on sites such as Internet chats. These comparisons, as we said before, was down from a starting point and somewhat dubious (the ‘stability’ of the tongue) and with the desire to describe the extent to which the record in communicative chats away from what is usual and standards in previous records.

It is useful, of course, the job description and characterization of what is perceived as a ‘new’ or ‘different’ in a novel communicative as is the chat. This is a material that, if developed properly, you must be a source of ethnographic information needed. In any case, our objections are at the moment what this work of observation, description and classification takes an ethical nuance and the opportunity to develop value-affirmations about the goodness or evil-what found in these descriptions. Often we read this kind of working in which the language of chat rooms is analyzed and assessed in comparison with other registries and on the basis of criteria somewhat dubious as the correction-correction or the lack of normative, quality or wealth lexical, and so on.

A first phase of research on what cyber in this approach have had their starting point: to analyze the language on the Internet itself, describe how far away from the ‘other’ linguistic registers, in particular, the written record and develop – conclusions on this’ removal ‘, almost always kind of pejorative. On many occasions we have come to the cries of alarm about the degeneration of the language in chats on ‘damage’ that makes the respect of the regulatory codes, and so on. These positions are and have been very abundant over the past few years and beyond show a state of anxiety regarding the new effects and social trends that are developing as a result of the popularity of chat, should not be taken into account In any case, working as academic.

Such assertions are quickly discredited by the field study. It seems doubtful that can establish a strong correlation between knowledge and use of the rules of the code written and the routine use of chats leading to the assertion that the latter has a negative impact on the former. In fact, our own field work indicates the opposite: the routine use of chats, if any effect on the knowledge and application of the code policy in general is increasing.

And this is not without a certain dose of logic: a chat, a user spends many hours a week writing, actively, with an intensity and focus much greater than in any other area where he used some form of written language register. Regardless of the degree of use of grammar and spelling rules, the regular use of a chat implies a continued and active contact with a variant of code written with a multitude of other users of it, to a level of intensity, interactivity and much dedication more than in any other situation of written communication in the history of mankind.

]]>
http://itlist.com/the-rules-of-impropriety-in-chats/feed/ 0
Virtual classrooms as a model for knowledge management http://itlist.com/virtual-classrooms-as-a-model-for-knowledge-management/ http://itlist.com/virtual-classrooms-as-a-model-for-knowledge-management/#comments Tue, 30 Dec 2008 18:52:06 +0000 GoniG http://itlist.com/?p=76 Introduction

Education today is facing many challenges and one of them is to respond to the profound social changes, economic and cultural rights as provided for the so-called “Information Society and Knowledge” in this era of Information and Communication, and the Internet which has generated a huge interest in all areas of our society and its thanks to its growing use for educational purposes has become an open field for reflection and research.

Knowing that the “virtual classrooms” are half in which teachers and learners are to carry out activities that lead to learning, and that the concept of knowledge is the ability to transform data and information into effective action and effective, in the next lecture discuss the topic of “Virtual Room as a Model of Knowledge Management ‘, and try some of these concepts: influential factors, classification, usage and other items that have some connection with such innovative topic.

Concept of Virtual Classroom

The world in which we live is identified with the dynamics, where what is true today, perhaps tomorrow does not have the same value, being the only constant change it. For that reason, educators and learners, we have been waiting for the arrival of new forms of education and tools to achieve efficiency and effectiveness, implementation, in some cases and innovation in others, the process of finding a means of bringing the Internet to the public officer new features and elements that provide access to knowledge without the involvement or have moved nourished budgets to purchase materials and make available to everyone. It is known that most Internet through Web pages on the classroom resources that before were not even imaginable to a low-cost and easy access. Is that this source of inexhaustible facilities has been embraced by a large number of teachers from different systems and levels of education. Thus, this has led to the birth of sites and web sites designed for teaching and the idea of doing an educational use of the Internet. These spaces are what some experts have called “virtual classrooms”.

Modern organizations need to update the resource materials, and most importantly, the human capacity to give timely and effective response to new challenges proposed by the “Information Society and Knowledge.” The concept of virtual classrooms has come to fill the gap that for many years has had a traditional education, as educational need in this society has been in the technological changes of great magnitude, in which an increasing number of people from all socio-economic levels who need training in order to keep pace with the changes around us, without necessarily having to adapt to traditional training that are not commensurate with their daily lives.

Knowledge and Management of the same

We understand the importance of knowledge as each of the sensory faculties of man.

The management of knowledge some experts define it as a way to identify, detect, rework, and make available to the entire organization knowledge and practices that bring added value to the members of any entity. Joyanes, (2003) also said that the management of knowledge means to deliver those data and information needed to be efficient (effective) in their work or organizations, which is the organizational and institutional process which technologies should allow:

* Identify necessary knowledge,
* Identify where and who has the knowledge or if you need to be created,
* Collect and capture the knowledge identified,
* Determine its importance,
* Summarize and synthesize the information available,
* Distributing information at different levels,
* Update, delete and modify the outdated knowledge and
* Save and organize knowledge obsolete, if any, for future reference.

]]>
http://itlist.com/virtual-classrooms-as-a-model-for-knowledge-management/feed/ 0
Video games, do we train to kill? http://itlist.com/video-games-do-we-train-to-kill/ http://itlist.com/video-games-do-we-train-to-kill/#comments Tue, 30 Dec 2008 18:35:54 +0000 GoniG http://itlist.com/?p=73 Introduction

Much has been said about those video games that contain lots of violence, inciting children to play, to act more violent since suffering a stunning toward violent behavior. This article reflects on the ethical dilemmas that will be presented in such a situation, because as you know, and it has been claimed in some media, video games can cause physical, mental and behavioral players, such as tendinitis , Epilepsy and a more aggressive or antisocial behavior.

1. ISSUE

Much has been said about that video games that contain lots of violence, inciting children to play, to act more violent since suffering a stunning toward violent behavior.

I’d like to reflect on the ethical dilemmas that will be presented in such a situation, because as you know, and it has been claimed in some media, video games can cause physical, mental and behavioral players, such as tendinitis (Space Invader’s Wrist), epilepsy and a more aggressive or antisocial behavior.

It seems that life in us, with so many satisfactory and amenities offered to us, it has become at the same time, very monotonous and boring that it is very difficult for us in our daily activities experienced many thrills, that’s why we are so attractive to consume a the product that we provide.

2. Market of video games

Video games such as Nintendo, Sega, Play Station or are targeted primarily for use by children and adolescents, and precisely through the stages of development for which they are happening, are very susceptible to the influences of the environment, since they are constantly learning, so they receive encouragement and values should be positive.

But the market for video game exploits violence to sell more, this is obvious when we know that games that are sold are to fight and destroy those monsters or people, and although many are only for sale to seniors or warnings of “Parental Control”, in reality they are also played by children and adolescents under age.

We all think of video games with violent content very conducive to children who play more aggressive behaviors present due to the stunning that the same game they produce toward violent behavior.

3. Market Violence

We have all noticed that the TV series, on the news, in movies, and virtually all media, has increased the content of violence, and many spectators, the more violence there in the movie, article or television series, I think it is more “exciting” or “fun”.

This would have been saturating both senses, it is now necessary to introduce greater violence to try to generate strong emotions in the viewer so that you can catch it. The consumer feels more attracted to the product, while it will provide more excitement.

Children and adolescents due to the stages of development for which are going on, are very susceptible to the influences of the environment. They are in an age of constant learning, so that they receive encouragement and values should be positive. But as what matters is to sell more video games exploit the violence and the producers do not care much to be consumed by minors. This is evident knowing that the more games that are sold are to fight and those which destroy monsters or people, and although many of these games are sold only to people over age or have warnings of “Parental Control”, are actually played by children and adolescents under age.

Competition for the market means that the contents are increasingly violent, as some reports indicate, initially did not have Nintendo games with a high content of violence, but after 1992 it reported sales of 24% against 68% who have filed for Sega most violent games, changed its trend of releasing games such as Sega.

]]>
http://itlist.com/video-games-do-we-train-to-kill/feed/ 0
Virtual Education http://itlist.com/virtual-education/ http://itlist.com/virtual-education/#comments Mon, 29 Dec 2008 18:56:11 +0000 GoniG http://itlist.com/?p=29 The Virtual Education governing the use of new technologies, to develop alternative methodologies for the learning of students in special populations that are limited by their geographic location, quality of teaching and the time available.

Principles

The virtual education as the education of the twenty-first century, has the following principles:
• Self
• Self Learning
• The orientation
• Virtualization
• The technology
• The virtual sociability

Features
• It is appropriate for data, text, graphics, sound, voice and images through regular television programming classes.
• It is cheap, because there is no need to scroll to the presence of teachers or to school.
• Is innovative as the motivation of new interactive learning scenarios
• It is a motivator in learning, to be in four walls of the classroom.
• It is present, because it allows the latest news via the Internet and information systems.

Positive Aspects To learners
• You can adapt the study to your personal schedule.
• You can make their holdings so meditated by the possibility of working offline.
• The student has an active role.
• All students have access to education, not to be harmed those who can not attend classes regularly for work purposes, the distance …
• There improving the quality of learning.
• Optimization of significant learning: At the same time assimilating other learning.
• Save time and money.
• The learner does not have to focus at the center of study.
• The student and player is responsible for their own learning process.
• The student receives a more personalized instruction.

Issues at institutional level
• It allows the university to offer training to businesses without the added weight of travel, accommodation and allowances of its employees.
• It enlarges its offer training to those people or workers who can not access the classes.
• Improved efficiency in the school due to technological advancement.
• Improving the performance of teachers, as part of the time previously devoted to the class, will be invested in better curriculum design and research.

Negative Aspects
• Unequal access to the population.
• Technical malfunctions that could disrupt classes.
• Lack of standardization of computers and multimedia.
• Lack of programs in quantity and quality in the Spanish language, although there are many in the English language.
• It can be slow and therefore unmotivated.
• Not offered the same person to person contact as well as classes.
• It requires an effort of greater accountability and discipline on the part of the student.
• Not everything can be learned from the Internet.

Role of Technology in Education
• Assistant students to write and calculate
• Guide to students.
• To facilitate the purchase of educational resources from remote locations
• To assist teachers in evaluating student progress and administration of the investigation.
• Encourage collaboration between students and teachers

Impact of computers in Students
• Learn more in classes where receiving instruction based computers.
• They learn lessons in less time with computer-based instruction.
• For students like most classes where receiving help from computers.
• Develop more positive attitudes toward computers when they receive help from them in the study.

]]>
http://itlist.com/virtual-education/feed/ 0