Skip to main content

Posts

Showing posts from 2009

HTML 5

It was about 10 years of HTML 4.0 / HTML 4.01 is known in the world of web development, time to switch to HTML 5? Year - this year is a period in which web technologies develop so rapidly. Important point of the current web technology is how a web application as an alternative to the more trusted to perform various forms of activities that used to only be done by desktop applications Many things have been achieved by a web application up to this day, we often find a web application for office and business, a web-based online games, online document collaboration, and a series of other activities that may not have been imagined in the past. Technically, is still a limitation is the ability to access the web application level low operating and accessing computer systems, which of course also limited the browser as the client side. May 2009, when Google announced a new service called Google Wave and demonstrated at the conference Google I / O, again made a breakthrough with the display cap

Vista Control Panel Applet CONTROL PANEL DIALOGUE BOXES ORDERS TAB

Setting the Vista Control Panel You could have all day searching the manual and help files of Windows Vista. But guaranteed, there are few references to the Control Panel and Group Policies Editor The following command line to run the control panel applet Applet CONTROL PANEL DIALOGUE BOXES ORDERS TAB Add Hardware Control hdwwiz.cpl N / A Administrative Tools Control admintools N / A Bluetooth Devices Control bthprops.cpl 4 Date and Time Control timedate.cpl 3 Personalization (Display Settings) Control desk.cpl 1 Ease of Access Center Control access.cpl N / A Folder Options Control folders N / A Fonts Control fonts N / A Game Controllers Control joy.cpl N / A Internet Options Control inetcpl.cpl 7 Infrared Control irprops.cpl 3 Control iscsicpl iSCSI initiator. cpl N / A Keyboard Control Keyboard N / A Mouse Control mouse N / A Network Connection Control ncpa.cpl N / A People Near Me collab.cpl Control 2 Pen and Input Devices Control tabletpc.cpl N / A Phone and Modem Options Control t

Introduction to Character by Using Artificial Neural Network (Part 1 from 3)

Wonder how the character recognition application can recognize the image and converts it to characters or text may be in the edit? This first section will discuss the basics of his theory. Imagine you're reading a long article in a magazine. Then, you are interested to send the contents of the article to one of his colleagues by e-mail. In order for the article is more flexible, you think to type it so that it can be sent in text form. You start your typing and it spent 3 hours until finally the article is finished Technology OCR (Optical Character Recognition) will resolve the issue. To article with the scan, will produce an image (which must have text in them can still edit) for the text in the image can be converted into text that can be edited, it is necessary to an OCR software, which will process the image and produce output text form. Talking about OCR software, actually is taken from technology Artificial Neural Network (ANN) which is one part of the field of artificial int

Hardware Test: ZOTAC GeForce 9600 GT Supreme

Video Card Low-End NVIDIA PCI Express Maximalists probably is the right word to describe the video card from ZOTAC this one. Where are here seen ZOTAC efforts to bring the maximum level of performance of a GeForce 9600 GT. And that while maintaining the standard of design, such as single-slot HSF solution and guaranteed operational from using the best components. To enable this, one of the most visible modifications is the implementation of a fairly extreme overclocking. Along with it all, ZOTAC still keep bidding prices are not too high. Therefore, he still can get into the test with a limit class products from low-end price range below $ 100. For the nominal itself, these ZOTAC products are almost close to $ 100. However, ZOTAC bundle still includes plenty of users, and it also became one of the benefits. From the fact that, the words "Supreme" describes quite well be his wish as the best product and offer it with the lowest possible price. Switch on the performance, he got

Graphical User Interface in Java (Part 2 From 3)

Make a window in Java is easy. Unfortunately, to put the components into the window is not as easy as making Know Your Swing components In section 1, has discussed how to display a window using Swing in Java. In this second part, we will learn to Swing lay various components in the window. Some of the most common components used are: a. JLabel, is used to display labels or text in the window b. JTextField, is used to receive from the user enter text in the form c. JButton, used as a button that can trigger an event when the click d. JCheckBox, used as an option that can be checked e. JComboBox, used as an option in the dropdown form that lets users choose to type or click one of the options available f. JList, used to give the user a list of options g. JPanel, used to group several components or can also be used as a canvas area to draw geometric shapes. JPanel component is not a component that can accept input from the user, but only serves as a container for accommodating other compo

Graphical User Interface in Java (Part 1 From 3)

Frankly, graphics-based applications are always more interesting than the application of command-line based. And the good news, building graphical applications in Java, it is not as difficult as imagined Java is a programming language first released by Sun Microsystems in 1995. Java philosophy of "Write Once, Run Everywhere" make Java become one of the popular programming languages today. According to the official website of Java, Java technology currently used in 4.5 billion devices (more than 800 million PCs, 1.5 billion gadgets, 2.2 billion smart cards) and still did not include use in printers, web-cam, games, car navigation systems, medical devices, etc Know Java If you've heard of Java, but not so deeply in the program, chances are you will be confused with terms such as Java 2 SDK, JDK, Java Applets, Java Script, Java Runtime Engine (JRE), Java SE 6, etc. All of the Java technology, but if you want to learn to develop Java applications on a PC, the Java SE (Standar

Game Test: Ghostbusters The Videogame

For most young people today, Ghostbusters may not mean anything. However, if you are a teenager at the end of 1980, guaranteed you will be surprised and delighted exclaimed "Wow ... Ghostbusters!" Yes, indeed cartoon movie ever been phenomenal the past two decades. Now as a 25-year anniversary of this series, Atari published a game of Ghostbusters. However, the developers took the character representation instead of wide screen film version. This game has a setting in the year 1991, exactly two years after setting the second movie. The story begins when a wave of supernatural from a museum that caused all the ghosts released into the real world. In this game, you are not going to play as one of the members of the Ghostbusters, but it became a new member of the Ghostbusters. Your character anonymous, no name, but served as an experimental weapon specialist. That means you'll get new weapons or upgrade the existing weapon capabilities created Egon Are not for you know Ghost

Game Test: Prototype

The experiment that failed, epidemic, virus, mutant monsters, zombies, and the involvement of the military as a reference standard to create an exciting plot for a game. God knows how many games that adopt this plot, and the prototype is not an exception This game tells of Alex Mercer, a man who is the object of the experiment failed, actually more accurately called very successful. She has amnesia, so do not remember anything about him. One thing he knows, he has extraordinary abilities. He is as strong as superman. Although it can not fly, she can climb a vertical wall in a far more spectacular than Spiderman. He can jump from a skyscraper without injured. More terrible again, she can devour and absorb the victim's body. After absorbing the victim, she can transform herself into the victim, who has mastered the ability, knowing his memory, and even develop new skills. The main characters are very superior in Balance should be commensurate with the opposite or at least challenging

Windows Scripting With VBScript

If it works in Windows operating system environment, the days you will often associated with programs written in Visual Basic Perhaps the day you use a database application created with the language of Visual Basic / VB.NET, or using the web site programmers work ASP / ASP.NET or loyal user application macro written with VBA (Visual Basic for Application) and if your unlucky day , you are a victim of the virus made with VBScript Of the various types mentioned Visual Basic, VBScript is a scripting language is readily available and used in the Windows environment. You do not need to install an IDE, compiler, or application specific tools. About VBScript Made an initial target of VBScript (and JScript) is for the purposes of web development with a focus on the use of Microsoft Internet Explorer browser, the script was executed from the client side (client side scripting). Until this very day you are still able to insert a VBScript in your website, egg for validation purposes or a particu

Making Linux Server more Secure and Fast

Once your Linux server is active and operational. And you want to safe as possible. However, what the service should be terminated (permanently) that remain secure and how to stop it? Of course, how to stop a service depends on the distribution you use. Not all the same, but most of the service can be stopped using the init. On the Ubuntu machine, you can stop the service with the command sudo / etc / init.d / command_line stop. At the Red Hat distribution. You can stop them (as root) with the command / etc / rc.d / init.d / command_name stop. Here are the commands you can use to stop the service which can be dangerous to the security server, so you can more safely. Sendmail That we must admitted sendmail unless you know the outside in, then you should not use it. Sendmail has much famous rift security. So soon may stop immediately. Sendmail can be stopped with the command / etc / init.d / sendmail stop. Now if you need a mail server, move to Postfix or other mail daemon that is easily

How to Easy Handle on Linux Network

We see how the ease of handling Linux network. You never know when need to use the command line or when the need to support graphical interface to iptables Network now has become a need. Whether in the home or corporate environment, the network is one aspect to computing, without a doubt, necessary to perform the work. And with some help, operating system Linux can be a king of the network, both in terms of ease of use and security. However, that does not mean that the user level (and sometimes even users who are experts) do not need some assistance. Following tips will make your Linux network a bit more smoothly. Take advantage of the file / etc / hosts File is used to host a static host name and is a quick way to create a network shortcut. One of the first things you must do in the Linux machine is a machine to enter a different file / etc / hosts. Thus, you do not have to type the IP address. Writing on the file format is IP_ADDRESS NICKNAME. For example, if you perform backups on t