Thursday, April 14, 2011

Robots

With the help of a remote human assistant, a person with disability pilots a robotic mobility and manipulation system and opens a refrigerator door to retrieve a pre-prepared meal from home. Cooperative control leaves the person with disability in command, and the ability to use the capabilities of both the local pilot and remote human assistant enable safe, effective, and efficient operation of the robotic system in natural environments.


More than that

Today, robots having a human-like body including a rotating head, arms, legs and six fingers and is capable of “seeing” three dimensional objects and can recognize people and jobs that need to be done. It has the dexterity, for instance, to pick up a dirty shirt, throw it into a washing machine and push the buttons to get the laundry done. So, in future the robot is design to help people in most of the time.

Reference:


Control the computer through brainwaves

SAN FRANCISCO (Business 2.0 Magazine) - -- Two years ago, a quadriplegic man started playing video games using his brain as a controller. That may just sound like fun and games for the unfortunate, but really, it spells the beginning of a radical change in how we interact with computers - and business will never be the same.
Someday, keyboards and computer mice will be remembered only as medieval-style torture devices for the wrists. All work - emails, spreadsheets, and Google searches - will be performed by mind control.
If you think that's mind-blowing, try to wrap your head around the sensational research that's been done on the brain of one Matthew Nagle by scientists at Brown University and three other institutions, in collaboration with Foxborough, Mass.-based company Cyberkinetics Neurotechnology Systems. The research was published for the first time last week in the British science journal Nature.
          Nagle, a 26-year-old quadriplegic, was hooked up to a computer via an implant smaller than an aspirin that sits on top of his brain and reads electrical patterns. Using that technology, he learned how to move a cursor around a screen, play simple games, control a robotic arm, and even - couch potatoes, prepare to gasp in awe - turn his brain into a TV remote control. All while chatting amiably with the researchers. He even learned how to perform these tasks in less time than the average PC owner spends installing Microsoft (Charts) Windows.
Decoding the brain
Nagle was able to accomplish all this because the brain has been greatly demystified in laboratories over the last decade or so. Researchers unlocked the brain patterns for thoughts that represent letters of the alphabet as early as 1999.
          Now, Cyberkinetics and a host of other companies are working on turning those discoveries into real products. Neurodevices - medical devices that compensate for damage to the brain, nerves, and spinal column - are a $3.4 billion business that grew 21 percent last year, according to NeuroInsights, a research and advisory company. There are currently some 300 companies working in the field.
          But Cyberkinetics is trying to do more than just repair neural damage: It's working on an implantable chip that Nagle and patients in two other cities are using to control electronic devices with their minds. (Check out this demonstration video).
          Already, the Brown researchers say, this kind of technology can enable a hooked-up human to write at 15 words a minute - half as fast as the average person writes by hand. Remember, though, that silicon-based technology typically doubles in capacity every two years.
So if improved hardware is all it takes to speed up the device, Cyberkinetics' chip could be able to process thoughts as fast as speech - 110 to 170 words per minute - by 2012. Imagine issuing commands to a computer as quickly as you could talk.
           But who would want to get a brain implant if they haven't been struck by a drastic case of paralysis? Leaving aside the fact that there is a lucrative market for providing such profoundly life-enhancing products for millions of paralyzed patients, it may soon not even be necessary to stick a chip inside your skull to take advantage of this technology.
What a tale your thoughts could tell
          Brain-reading technology is improving rapidly. Last year, Sony (Charts) took out a patent on a game system that beams data directly into the mind without implants. It uses a pulsed ultrasonic signal that induces sensory experiences such as smells, sounds and images.
          And Niels Birbaumer, a neuroscientist at the University of Tuebingen in Germany, has developed a device that enables disabled people to communicate by reading their brain waves through the skin, also without implants.
          Stu Wolf, one of the top scientists at Darpa, the Pentagon's scientific research agency which gave birth to the Internet, seriously believes we'll all be wearing computers in headbands within 20 years.
By that time, we'll have super fast, super tiny computers that make today's machines look like typewriters. The desktop will be dead, says Wolf, and the headband will dominate.
          "We already know we can trigger neurons mechanically," he says. "You can interact directly with the brain without implanted electrodes. Then the next step is being able to think something and have it happen: Flying a plane, driving a car, operating household machinery."
           Controlling devices with the mind is just the beginning. Next, Wolf believes, is what he calls "network-enabled telepathy" - instant thought transfer. In other words, your thoughts will flow from your brain over the network right into someone else's brain. If you think instant messaging is addictive, just wait for instant thinking.
           The only issue, Wolf says, is making sure it's consensual; that's a problem likely to tax the minds of security experts.
           But just think of the advantages. In the office of the future, the conference call, too, will be remembered as a medieval form of torture.
The article is taken from http://money.cnn.com/2006/07/21/technology/googlebrain0721.biz2/index.htm

Wednesday, April 6, 2011

Types of Database Management Systems

What is a Database Management System?

A Database Management System or DBMS is a single or set of computer programs that are responsible for creating, editing, deleting and generally maintaining a database or collection of data records. They type of database management system is determined by the database model. A database model is the manner in which the data collection is stored, managed and administered. The various database management systems based on these data models are:


Relational Database Management Systems

Relational database management systems are the most widely used database management systems today. They are relatively easy to use. Relational database management systems are named so because of the characteristic of normalizing the data which is usually stored in tables. The relational model relies on normalizing data within rows and columns in tables. The data can be related to other data in the same table or other tables which has to be correctly managed by joining one or more tables. Relational models may be somewhat less efficient than other models; however this may not be a problem with the processing power and memory found in modern computers. Data in this type of model is stored is fixed predefined structures and are usually manipulated using Structured Query Language (SQL). Relational database management systems include Oracle, Ms SQLServer, IBM DB2, mySQL, SQLite and PostgreSQL among others.


Flat File Based Database Management Systems

Flat File based database management systems are probably the simplest of them all. These are sometimes called Flat models. These come in human readable text formats as well as in binary formats. These are ideal for stand alone applications, holding software configuration and native format storage models. Flat files in a formatted row and column model rely on assumptions that every item in a particular model consists of the same data. One common example of this type of database is the CSV (Comma Separated Values) and another is a spreadsheet such as Ms Excel.


Hierarchical Database Management Systems

Hierarchical database management systems operates on the parent child tree-like model. These normally have a 1:N relationship and are good for storing data with items describing attributes, features and so on. These could store a book with information on chapters and verses. They can also be used to store a database of songs, recipes, models of phones and anything that can be stored in a nested format. Hierarchical database management systems are not quite efficient for various real world operations. One such example of a Hierarchical database management system is a XML document.


Network Database Management Systems

A Network database management system uses a data model similar to Hierarchical database management systems The major difference here is that the tree structure in the Network models can have a many parent to many child relational model. The Network model structure is based on records and sets and most of these databases use SQL for manipulation of their data. Network database management systems tend to be very flexible but are rarely used ad were very quite common in the1960s and 1970s. Searching for an item in this model requires the program to traverse the entire data set which is quit cumbersome. These have mainly been replaced by Relational database management systems in today's modern computing.


Object-oriented Database Management Systems

Object-oriented database management systems borrow from the model of the Object-oriented programming paradigm. In this database model, the Object and its data or attributes are seen as one ad accessed through pointers rather than stored in relational table models. Object-oriented database models consist of diverse structures and is quite extensible. This data model was designed to work closely with programs built with Object-oriented programming languages thereby almost making the data and the program operate as one. With this model applications are able to treat the data as native code. There is little commercial implementation of this database model as it is still developing. Examples of Object-oriented database management systems include IBM DB4o and DTS/S1 from Obsidian Dynamics.


References

1. John H. Porter Research Associate Professor, Department of Environmental Sciences, University of Virginia



Source: http://www.brighthub.com/internet/web-development/articles/110654.aspx

Systems Analyst

What is this job like?

Systems analysts figure out how to use computers to get things done. They tell businesses and other organizations which computers and software to buy, and they decide how to get those tools to work together.

Computer systems analysts start their work by asking people what they need their computers to do. Then, they plan a computer system that can do those tasks well. A system can include many computers working together and different types of software and other tools.

After analysts understand what the system needs to do, they break down the task into small steps. They draw diagrams and charts to show how information will get into the computers, how that information will be processed, and how it will get to the people who need it. For example, analysts might decide how sales information will get into a store's computers and how the computer will add up the information in a way that makes it useful for store managers.

Analysts experiment with different computer system plans. They try various tools and steps until they find the system that is fastest, easiest, and costs the least.

Next, analysts decide which computers, software, and tools to buy. They also tell computer programmers how to make any new software that is needed. They give the programmers step-by-step instructions. Some analysts help make the software, too.

The main job for some systems analysts is getting computers to work together. They connect them into a network. Analysts decide how to get information from one computer to another. Many help people get data from the Internet.

After planning a system, analysts test it to make sure it works. They check to make sure that information is processed quickly and without mistakes. They also watch to see if the system is easy to use. Often, they have to change their plans to make the systems better.

Computer systems analysts work in offices or computer labs. Some work from home. Working on a computer for a long time can give these workers eye, back, or wrist problems.

Sometimes, these workers work long hours to get a project done on time.

Analysts usually work as part of a team.


How do you get ready?

Many computer systems analysts have a college degree in computer science, information science, or management information systems. Some analysts get college degrees in other subjects. Then, they take computer classes and get computer experience.

Analysts need to understand computers, math, and planning. They need to know math so that they can solve problems and figure out how much computer power different systems would use.

Logical thinking skills are also important. Analysts need good speaking and writing skills, too, so that they can explain their systems and give good instructions.


What about the future?

The number of computer systems analysts is expected to grow much faster than average through the year 2018.

People with proper training should have good job prospects. Those who have college degrees in business and courses related to computers also should be able to find jobs in this field.

New jobs are expected as more companies try to use computers to improve their businesses. New Internet and wireless technologies are also expected to create more jobs.


Source: http://www.bls.gov/k12/computers06.htm

What is a Programming Language?

What Does A Programming Language Do?:

A programming language is used to write computer programs such as

•Applications
•Utilities
•Servers
•Systems Programs

A program is written as a series of human understandable computer instructions that can be read by a compiler and linker, and translated into machine code so that a computer can understand and run it.


Are There Many Programs In A Computer?:

From the moment you turn on your computer, it is running programs, carrying out instructions, testing your ram, resetting all attached devices and loading the operating system from hard disk or CD-Rom.

Each and every operation that your computer performs has instructions that someone had to write in a programming language. These had to be created, compiled and tested- a long and complex task.

An operating system like Microsoft's Windows Vista took millions of man hours to write and test the software.


Examples Of Programming Languages:

These languages include Assembler, C or C++. A computer motherboard with the CPU, RAM and ROM), the instructions to boot the computer are limited to a small amount of memory in the boot ROM chip and so are usually written in assembler. Operating systems like Linux or Windows are written in C and C++.


Traditional Programming Languages:

In the late 40s and early 50s, computer programs were entered by flicking switches. It was quickly realised how inefficient and slow that was and computer languages soon appeared.

Thousands of programming languages have been invented since then, many as PhD research projects, but only a few have been really successful. Through the 60s and 70s, these languages :

•Fortran
•Cobol
•Basic
all ruled the roost but declined when better languages came into being. Basic hung in there the longest but is now declining.


What Programming Languages Are Now In Use?:

It is mainly Java and C++ with C# starting to gain popularity and C holding its own. There have been many attempts to automate this process, and have computers write computer programs but the complexity is such that for now, humans still write the best computer programs.

More advanced techniques, for instance using

•Objects
•Generics
•Multi-threading


How Are These Newer Programming Languages Better?:

Lower level languages like

•Assembly Language
•C,
•C++

Force the programmer to think more about the problem in computer terms, instead of the business logic. Less about payrolls and more about how the data is stored.

C# though does not use pointers, so that removes the chances of a pointer being corrupted or not freed. The .NET runtime handles things like garbage collection, so the developer doesn't have to reinvent this wheel.


The Future Of Programming Languages:

The most popular programming languages are currently :

•C
•C++
•Java
(Sources: tiobe.com). As computers get faster, have more RAM, applications will get more complex, it is likely that more development will shift from C++ to the higher level languages such as Java and C#.
Microsoft have put a lot of faith in C# as their answer to Java and have the financial leverage to continue plugging it for a very long time. I expect both Java and C# to become the two dominant programming languages.


Source: http://cplus.about.com/od/introductiontoprogramming/p/programming.htm

Tuesday, March 29, 2011

Iranian hacker claims credit for SSL certificate theft

'ComodoHacker' splits security research community, downplays political motivation

Forget Social Security numbers -- cyber criminals want your intellectual property

A report warns companies to drop reactive approach to network security or risk losing data to increasingly sophisticated hackers

McAfee's website full of security holes, researcher says

The portion of the site that could be used for cross-site scripting attacks host some of McAfee's files for downloading software

Amazon's cloud new offers dedicated hardware

Amazon is aiming to lower entry barriers for its cloud services, says an analyst

Monday, March 28, 2011

Java founder Gosling joins Google

Java legend James Gosling decided to leave Oracle after it purchased Sun Microsystems

Analysis: How MySQL.com and Sun.com got hacked

Hackers broke into the MySQL.com and Sun.com websites using, of all things, a SQL injection technique

Yahoo to release code for selected technologies to open source community

Yahoo is seeking support for technologies that will provide significant value outside of company

 

Yahoo plans to release some technologies, including storage technologies, to the open source community, a senior executive of the company said.
These are systems that Yahoo built to help it handle large numbers of users on its websites, but that don't necessarily give it a competitive advantage, said David Chaiken, chief architect at Yahoo, in an interview in Bangalore on Friday.
[ Get your websites up to speed with HTML5 today using the techniques in InfoWorld's HTML5 Deep Dive PDF how-to report. | Learn how to secure your Web browsers in InfoWorld's "Web Browser Security Deep Dive" PDF guide. ]
In 2009, Yahoo donated its Traffic Server scalable caching proxy to the Apache Software Foundation.
A working group on open source at Yahoo is currently evaluating technologies that could qualify to be released to open source.
The company has to first make sure that each of the technologies will really be useful and provide significant value outside Yahoo, before releasing it to open source, Chaiken said. It takes time and effort to go through the open source process, and to build a community around open source, so the company has to first make sure there will be interest from developers, he added.
Releasing technology to the open source community helps Yahoo build recognition and a technical brand in the technical community, as well as develop relationships with universities and companies, Chaiken said. There could also be some financial benefits in getting community developers to work on a project, he added.
A large part of Yahoo's IT infrastructure is built around open source software, including the Hadoop scalable distributed computing platform, which helps Yahoo execute at a very large scale, Chaiken said.
Yahoo said earlier this year that it is discontinuing its distribution of Hadoop and will instead focus on Apache Hadoop, a project of the Apache Software Foundation.
Hadoop is likely to be critical as Yahoo attempts to reduce diversity and unify its IT infrastructure. The company is for example standardizing its asynchronous or batch computation and storage using Hadoop, Chaiken said.
As a result of acquisitions and in-house projects that were rushing to bring new products and technologies to market, Yahoo over the years ended up with a lot of different systems that in some cases are fulfilling the same purpose, Chaiken said.
Each of the different science groups that were writing algorithms for extracting signal from the company's data were essentially operating on their own dedicated analytics infrastructure and storage, each building different models in a slightly different way, and each operating on different data sets, Chaiken said.
In the last four years, Yahoo has integrated the infrastructure for the science groups across the world, and removed the data and algorithm silos, he added.
Yahoo is also working on unifying its content and communications systems, on top of a "content agility platform" that depends to a large extent on Hadoop, Chaiken said. The company is in the process of unifying its media and communications properties.
John Ribeiro covers outsourcing and general technology breaking news from India for The IDG News Service. Follow John on Twitter at @Johnribeiro. John's email address is john_ribeiro@idg.com.

 source:http://www.infoworld.com/d/open-source-software/yahoo-release-code-selected-technologies-open-source-community-888

Tuesday, March 22, 2011

Top 10 presentation tool

1. AuthorSTREAM


authorstream
With AuthorSTREAM, you can take your PowerPoint presentations and upload them to be shared with others. You can download the presentations that you create to embed them in blogs and send them to your favorite video hosting site. The basic service is free, the premium services boost the number of presentations you can have.

2. Empressr


empressr
This application takes your slides, video, audio and photos and allows you to Empress your colleagues with cool looking presentations. You can share your work on all of the social media sites, or keep it private. The on-line library helps you to manage your media assets quickly.

3. Google Docs Presentation


google docs
With Google Presentation, you can import video, slides, and tables to make a show. You can collaborate with others all over the world using this application. After creation with this no frills program, you can download your finished project as a PowerPoint file, PDF or text document. You can also upload it to YouTube.

4. myPlick


myplick
Import most of the major file formats including PDF, OpenOffice, PowerPoint, Word, JPG, MP3 and WMA. You can synch audio with video on your ‘plicks’ and share them with users worldwide. Presentations have to be kept to 150 slides and uploads to 50MB. This is a free service.

5. PreZentit


prezentit
Prezentit is a free presentation application. It offers online editing and collaboration, where you can make changes simultaneously. There is a 250MB upload limit on PreZentit, and you can bring as many people as you want in on a presentation. You can edit your presentations by hand since they are all stored as web pages.

6. Prezi


prezi
Using Prezi, you can collaborate with others to produce high quality flash documents. The web-based program has an editor that is designed to be intuitive. The basic level of Prezi is free, but there are two levels of subscription which offer you more than the 100MB of disk space that the public license offers.

7. Sliderocket


sliderocket
You can upload almost any file format to your presentation, including video from YouTube and information from Google Docs. You can put transitions and effects into your presentations and download the finished product for later viewing. The basic service is free. With a monthly subscription, you can get a good collaboration tool.

8. Spresent


spresent
You can take content from YouTube or Flickr and create a flash presentation. By embedding your presentations into blogs, emails and web sites, you can get your message across quickly and easily. For $29.95/yr, you can import more file formats and have a copy of Spresent on your desktop.

9. VCASMO


vcasmo
VCASMO allows you to upload all kinds of audio and video formats into your presentation. Two of its cool features are video seeking and the ability to add subtitles to your slide. You can keep your presentation public or private, synchronize video and audio, and bring that slideshow to your blog of web page.

10. Zoho Show


zoho
Zoho offers a wide range of online document applications. Show is a fully collaborative presentation program which can import a wide range of file types. You can export your slide shows to HTML, PowerPoint and PDF. One great feature of Zoho Show is that the presenter can use online chat to communicate with the viewers.
Whether it is from a small cafe in London, or a Starbuck’s in Seattle, you can access your presentation files from anywhere using these web-based applications. Eliminate travel and boarding costs by making your presentations on the internet.

This article is taken from http://aext.net/2010/06/10-leading-presentation-tools/

Sunday, March 20, 2011

Mozilla: A new Firefox every 16 weeks

After Firefox 4's release next week, Mozilla hopes to put out new browser versions every four months

Saturday, March 19, 2011

Experts see wide use of flash-hard disk hybrids by 2016

Hybrid drives will keep costs down while approaching solid-state drive performance, two storage experts said

EMC: RSA SecurID info swiped via sophisticated hack attack

Company exec warns customers that stolen information could be used to more easily penetrate customers' systems

Tuesday, March 15, 2011

Executive Support System

Executive Support System (ESS) is a reporting tool (software) that allows you to turn your organization's data into useful summarized reports. These reports are generally used by executive level managers for quick access to reports coming from all company levels and departments such as billing, cost accounting , staffing, scheduling, and more.

In addition to providing quick access to organized data from departments, some Executive Support System tools also provide analysis tools that predicts a series of performance outcomes over time using the input data. This type of ESS is useful to executives as it provides possible outcomes and quick reference to statistics and numbers needed for decision-making.

The exact reporting tools and outcome of an Executive Support System completely depends on the ESS developer and it's intended industry use. For example, Cambridge Systematics has ESS to support the investment planning process for the Ministry of Transportation. The features and functions of this Executive Support System are entirely different from the Executive Support System developed by Meditech, which is useful to health care organizations.

Several companies offer pre-designed Executive Support System packages (usually suited to one particular industry), while others offer packages which can be customized your your organization's needs.



Reference: http://www.webopedia.com/TERM/E/Executive_Support_System.html

What is decision support system

Abbreviated DSS, the term refers to an interactive computerized system that gathers and presents data from a wide range of sources, typically for business purposes. DSS applications are systems and subsystems that help people make decisions based on data that is culled from a wide range of sources.

For example: a national on-line book seller wants to begin selling its products internationally but first needs to determine if that will be a wise business decision. The vendor can use a DSS to gather information from its own resources (using a tool such as OLAP) to determine if the company has the ability or potential ability to expand its business and also from external resources, such as industry data, to determine if there is indeed a demand to meet. The DSS will collect and analyze the data and then present it in a way that can be interpreted by humans. Some decision support systems come very close to acting as artificial intelligence agents.

DSS applications are not single information resources, such as a database or a program that graphically represents sales figures, but the combination of integrated resources working together.



Reference: http://www.webopedia.com/TERM/D/decision_support_system.html

MIS

Short for management information system or management information services, and pronounced as separate letters, MIS refers broadly to a computer-based system that provides managers with the tools for organizing, evaluating and efficiently running their departments. In order to provide past, present and prediction information, an MIS can include software that helps in decision making, data resources such as databases, the hardware resources of a system, decision support systems, people management and project management applications, and any computerized processes that enable the department to run efficiently.

Within companies and large organizations, the department responsible for computer systems is sometimes called the MIS department. Other names for MIS include IS (Information Services) and IT (Information Technology).




Reference: http://www.webopedia.com/TERM/M/MIS.html

Transaction Processing System

A transaction processing system is a type of information system. TPSs collect, store, modify, and retrieve the transactions of an organization

A transaction is an event that generates or modifies data that is eventually stored in an information system. To be considered a transaction processing system the computer must pass the ACID test.

The essence of a transaction program is that it manages data that must be left in a consistent state. E.g. if an electronic payment is made, the amount must be both withdrawn from one account and added to the other; it cannot complete only one of those steps. Either both must occur, or neither.

In case of a failure preventing transaction completion, the partially executed transaction must be 'rolled back' by the TPS. While this type of integrity must be provided also for batch transaction processing, it is particularly important for online processing: if e.g. an airline seat reservation system is accessed by multiple operators, after an empty seat inquiry, the seat reservation data must be locked until the reservation is made, otherwise another user may get the impression a seat is still free while it is actually being booked at the time. Without proper transaction monitoring, double bookings may occur.

Other transaction monitor functions include deadlock detection and resolution (deadlocks may be inevitable in certain cases of cross-dependence on data), and transaction logging (in 'journals') for 'forward recovery' in case of massive failures.



Reference: http://en.wikipedia.org/wiki/Transaction_processing_system

Monday, March 14, 2011

New attacks leverage unpatched IE flaw, Microsoft warns

The bug was disclosed in January, but it's now being used in targeted attacks

By Robert McMillan
March 12, 2011 01:32 AM ET
 
IDG News Service - An Internet Explorer flaw made public two months ago is now being used in online attacks.
The flaw, which has not yet been patched, has been used in "limited, targeted attacks," Microsoft said Friday in an update to its security advisory on the issue.
Google concurred, and offered a few more details. "We've noticed some highly targeted and apparently politically motivated attacks against our users," Google said in blog post. "We believe activists may have been a specific target. We've also seen attacks against users of another popular social site."
The attack is triggered when the victim is tricked into visiting a maliciously encoded Web page -- what's known as a Web drive-by attack. It gives the attacker a way of hijacking the victims browser and accessing Web applications without authorization.
The flaw lies in the Windows MHTML (Mime HTML) parsing software used by Internet Explorer, and affects all currently supported versions of Windows. It was disclosed on the Full Disclosure mailing list in January.
Microsoft has released a Fixit tool that users can download to repair the problem, but has not said when, or even if, it plans to push out a comprehensive security update to all users.
Google isn't saying who exactly was targeted in this latest incident, but Chinese activist groups have been the focus of cyber attacks in the past. This may be another example of an ongoing and methodical effort to track and steal information from pro-democracy and Tibetan activists.
Now that the flaw is being exploited in attacks, the pressure is mounting on Microsoft to produce a reliable patch for the issue that can be pushed out to hundreds of millions of customers.
"For now, we recommend concerned users and corporations seriously consider deploying Microsoft's temporary Fixit to block this attack until an official patch is available," Google said.

source:http://www.computerworld.com/s/article/9214259/New_attacks_leverage_unpatched_IE_flaw_Microsoft_warns
 

Wednesday, March 9, 2011

Window Defender


Ish!!!! Why my laptop always appears a statement about update window defender….I felt impatient..… what is the window defender actually?? Is it important to our system??

Windows Defender is software that helps protect your computer against pop-ups, slow performance, and security threats caused by spyware.
Benefit  of Window Defender:
Improved Internet browsing safety
  • Windows Defender helps stop spyware before it infiltrates your computer. Windows Defender also offers a continuous safeguard designed to target all the ways that spyware can infiltrate your computer.
Protection against the latest threats
  • To help protect your computer from the latest threats, you can choose to have updates that counteract new spyware automatically downloaded to your computer.

Is the window defender important??

In my opinion, Windows Defender detects and removes known spyware only. It cannot to give full protect  to our system. For example, it cannot protect from malicious software(viruses, trojan horses, and worms). So I think it is not really important to our system and it can be replace by other antivirus. Such as Norton Antivirus, Kapersky Anti-Virus, ZoneAlarm Anti-virus, Shield Deluxe and more. All of these anti-virus can protect from spyware, malware and more.

In a conclusion, it is better to have a good anti-virus than window defender!!!

                                                               




                        

Tuesday, March 8, 2011

Kaspersky Internet Security 2011 Wins Top Marks for Treating Malware in AV-Test's Q4 2010 Report

Kaspersky Lab, a leading manufacturer of secure content and threat management solutions, announces that Kaspersky Internet Security 2011 has earned a top award in tests performed in the fourth quarter of 2010 by AV-Test.org, an authoritative German research center. Kaspersky Internet Security 2011 was the only solution to earn top marks for successfully treating infected computers during the test.
Twenty-three popular antivirus solutions were tested in order to determine the level of protection they offer against malicious programs, their usability and their ability to restore infected machines to working condition. During protection testing, the programs' levels of static and dynamic detection was evaluated, i.e. the capability of each solution to detect threats with and without executing the suspect code. During restoration testing, the competing solutions were assessed for their ability to neutralize malicious programs introduced onto the test machines prior to each security product being launched. During usability testing, the security products were tested for their ability to operate without producing false positives or making a noticeable impact on the test computer's performance. All solutions used their default settings on computers running 32-bit Microsoft Windows Vista SP2.
Kaspersky Internet Security 2011 achieved top scores in all of the tests and received a prestigious award certificate from AV-Test.org. The solution's security performance was the best of all the solutions tested, with an exemplary 5.5 points, and was the only solution to earn a straight 6 points out of 6 for restoring previously infected machines.
Kaspersky Internet Security 2011 far exceeded the average performance of the tested products in all aspects of malware treatment, including deleting active and inactive malware components, eliminating unwanted modifications to the system and detecting and deleting hidden rootkits and other dangerous programs.
"The malicious programs that penetrate a user's computer can change the system settings or make changes to various files," says Nikita Shvetsov, Director of Malware Research at Kaspersky Lab. "Aside from deleting the malicious programs it detects, a security solution must also repair modified files and disk system areas. Kaspersky Internet Security 2011 perfectly handles these important tasks, as this test has clearly demonstrated." For details of the testing performed by AV-Test.org, please visit: http://www.av-test.org/certifications
16 Feb 2011 

source:http://www.kaspersky.com/news?id=207576274

A short story about Microsoft Word 2010 Part

Today, i would like to recommand the function of setting a budgets on Microsoft Word 2010. Before i describing the steps, i would like to add some point about the benefit of setting a budgets. Firstly, a good budgets can helps us to save money. As we know, as the increasing of standard living, the cost of living also increased, so to be survive in this situation, a good budgets planning a required. Secondly, good budgets also can control our expenses. This because the budgets setting as the guideline when we expenses on something, so we did not spend our money on unimportant things. Here, i would like to describe the steps taken on setting budgets through Microsoft Word.
    Step 1: Download the form of budgets on Microsoft Word, which located the page of new templates
    Step 2: The form you download will display at the word as shown at the figure below

    Step 3: Fill in your expenses on each category and summarizes it
    Step 4: Finally, your upcoming budgets will display and printing is needed if you want to keep the expenses on track

*Good budgets is depend on good planning, so plan before you expense.