Techguide
Live Traffic and Transit in Google Maps Malaysia
Google Maps along with Google Maps for Android got updated today with a few features directed to us Kuala Lumpur folks. Among other things, live traffic in the urban city of Kuala Lumpur was added to facilitate travelling amidst the constant traffic lockups. You can see the screenshot here with the coloured lines depicting the amount of traffic of the current road.
The traffic data is updated as fresh as possible, and it refreshes in a matter of minutes automatically. The frequency of updates varies depending on a number of factors, so the update frequency may differ between different cities or even on different roads within a city.
The Google Maps Live Traffic is actually an accumulation of data from users travelling to and from the roads that are monitored from their mobile phones. This could be a data privacy risk though, we pretty much trust Google on what we’re doing on the web anyways right?
Google Maps also have implemented the Traffic layer, which provides data about real time road congestion right on the map. Users can quickly see whether roads are congested or flowing freely based on colour coding — red for choc-a-bloc, yellow for slow moving, and green for smooth flowing.
With the services offer by Goggle Maps it will making transit planning in the city much less hassle. Note that Android users are not only the ones that will be receiving this update. It is already live in the Google Maps website. Hence, head on to the link for more information or download yourself the Android update for Google Maps.
Read More..
The traffic data is updated as fresh as possible, and it refreshes in a matter of minutes automatically. The frequency of updates varies depending on a number of factors, so the update frequency may differ between different cities or even on different roads within a city.
The Google Maps Live Traffic is actually an accumulation of data from users travelling to and from the roads that are monitored from their mobile phones. This could be a data privacy risk though, we pretty much trust Google on what we’re doing on the web anyways right?
Google Maps also have implemented the Traffic layer, which provides data about real time road congestion right on the map. Users can quickly see whether roads are congested or flowing freely based on colour coding — red for choc-a-bloc, yellow for slow moving, and green for smooth flowing.
With the services offer by Goggle Maps it will making transit planning in the city much less hassle. Note that Android users are not only the ones that will be receiving this update. It is already live in the Google Maps website. Hence, head on to the link for more information or download yourself the Android update for Google Maps.
Read More..
Tweeting from Windows DOS ?
Tweeting from Dos window this really sounds funny ,but now you can tweet from DOS window using a text-based twitter client called Quitter which is still in beta.Quitter is portable,so you can carry it in USB drive and tweet from it.
Features of Quitter:
No installation required
It’s a freeware also
No ads will be shown on quitter
it’s a text based twitter client
How to install quitter and configure Quitter
1.Download quitter which is of 43 KB.
2.Run it ,quitter opens a CMD window first of all quitter needs to be allowed by twitter to access you account for that quitter opens twitter website in your default browser and you have to enter username and password to allow quitter .If you click “allow” then a PIN will be generated you have to enter that PIN in quitter and press enter .
That’s it you successfully configured quitter and you can tweet now happily.
Now here are some dos commands to tweet,retweet,to DM, and reply to other twitter users.
Here are quitter commands
[ENTER] then [ENTER] – Read all tweets
[ENTER] then [G] – Read tweets from specific group
[ENTER] then [U] – Read tweets from specific user
[P] – Post a tweet
[R] – Reply to a tweet or direct message
[T] – Retweet a tweet or direct message
[L] – Open a tweeted link in a web browser
[D] then [R] – Direct Messages, Read
[D] then [S] – Direct Message, Send
[C] – Configuration Menu
[Q] – Quit
You need enter P to post a tweet and enter quit to exit from quitter.
You can use ? for help to see all the commands.
Once you configured quitter for the first time you don’t need to go through process second time, you can start tweeting from dos window new to command prompt read
Command Prompt Tips &Tricks
Quitter ,It’s really a funny experience where there is no graphical user interface may be difficult to adopt to it as you are already using famous twitter clients like Tweetdeck.
System requirements for Quitter
OS:Windows XP/Vista
.Net framework 2.0 minimum to be installed Read More..
Features of Quitter:
No installation required
It’s a freeware also
No ads will be shown on quitter
it’s a text based twitter client
How to install quitter and configure Quitter
1.Download quitter which is of 43 KB.
2.Run it ,quitter opens a CMD window first of all quitter needs to be allowed by twitter to access you account for that quitter opens twitter website in your default browser and you have to enter username and password to allow quitter .If you click “allow” then a PIN will be generated you have to enter that PIN in quitter and press enter .
That’s it you successfully configured quitter and you can tweet now happily.
Now here are some dos commands to tweet,retweet,to DM, and reply to other twitter users.
Here are quitter commands
[ENTER] then [ENTER] – Read all tweets
[ENTER] then [G] – Read tweets from specific group
[ENTER] then [U] – Read tweets from specific user
[P] – Post a tweet
[R] – Reply to a tweet or direct message
[T] – Retweet a tweet or direct message
[L] – Open a tweeted link in a web browser
[D] then [R] – Direct Messages, Read
[D] then [S] – Direct Message, Send
[C] – Configuration Menu
[Q] – Quit
You need enter P to post a tweet and enter quit to exit from quitter.
You can use ? for help to see all the commands.
Once you configured quitter for the first time you don’t need to go through process second time, you can start tweeting from dos window new to command prompt read
Command Prompt Tips &Tricks
Quitter ,It’s really a funny experience where there is no graphical user interface may be difficult to adopt to it as you are already using famous twitter clients like Tweetdeck.
System requirements for Quitter
OS:Windows XP/Vista
.Net framework 2.0 minimum to be installed Read More..
100 Keyboard Shortcut
Here I would like to share some of information that I get.100 keyboard shortcuts.To me this is really helpful to make you as an efficient workers!
This shorcut help me a lot.Happy shortcut!!!
Check this out for 100 keybord shortcuts
CTRL+C (Copy)
CTRL+X (Cut)
CTRL+V (Paste)
CTRL+Z (Undo)
DELETE (Delete)
SHIFT+DELETE (Delete the selected item permanently without placing the item in the Recycle Bin)
CTRL while dragging an item (Copy the selected item)
CTRL+SHIFT while dragging an item (Create a shortcut to the selected item)
F2 key (Rename the selected item)
CTRL+RIGHT ARROW (Move the insertion point to the beginning of the next word)
CTRL+LEFT ARROW (Move the insertion point to the beginning of the previous word)
CTRL+DOWN ARROW (Move the insertion point to the beginning of the next paragraph)
CTRL+UP ARROW (Move the insertion point to the beginning of the previous paragraph)
CTRL+SHIFT with any of the arrow keys (Highlight a block of text)
SHIFT with any of the arrow keys (Select more than one item in a window or on the desktop, or select text in a document)
CTRL+A (Select all)
F3 key (Search for a file or a folder)
ALT+ENTER (View the properties for the selected item)
ALT+F4 (Close the active item, or quit the active program)
ALT+ENTER (Display the properties of the selected object)
ALT+SPACEBAR (Open the shortcut menu for the active window)
CTRL+F4 (Close the active document in programs that enable you to have multiple documents open simultaneously)
ALT+TAB (Switch between the open items)
ALT+ESC (Cycle through items in the order that they had been opened)
F6 key (Cycle through the screen elements in a window or on the desktop)
F4 key (Display the Address bar list in My Computer or Windows Explorer)
SHIFT+F10 (Display the shortcut menu for the selected item)
ALT+SPACEBAR (Display the System menu for the active window)
CTRL+ESC (Display the Start menu)
ALT+Underlined letter in a menu name (Display the corresponding menu)
Underlined letter in a command name on an open menu (Perform the corresponding command)
F10 key (Activate the menu bar in the active program)
RIGHT ARROW (Open the next menu to the right, or open a submenu)
LEFT ARROW (Open the next menu to the left, or close a submenu)
F5 key (Update the active window)
BACKSPACE (View the folder one level up in My Computer or Windows Explorer)
ESC (Cancel the current task)
SHIFT when you insert a CD-ROM into the CD-ROM drive (Prevent the CD-ROM from automatically playing) Dialog Box Keyboard Shortcuts
CTRL+TAB (Move forward through the tabs)
CTRL+SHIFT+TAB (Move backward through the tabs)
TAB (Move forward through the options)
SHIFT+TAB (Move backward through the options)
ALT+Underlined letter (Perform the corresponding command or select the corresponding option)
ENTER (Perform the command for the active option or button)
SPACEBAR (Select or clear the check box if the active option is a check box)
Arrow keys (Select a button if the active option is a group of option buttons)
F1 key (Display Help)
F4 key (Display the items in the active list)
BACKSPACE (Open a folder one level up if a folder is selected in the Save As or Open dialog box)
m*cro$oft Natural Keyboard Shortcuts
Windows Logo (Display or hide the Start menu)
Windows Logo+BREAK (Display the System Properties dialog box)
Windows Logo+D (Display the desktop)
Windows Logo+M (Minimize all of the windows)
Windows Logo+SHIFT+M (Restore the minimized windows)
Windows Logo+E (Open My Computer)
Windows Logo+F (Search for a file or a folder)
CTRL+Windows Logo+F (Search for computers)
Windows Logo+F1 (Display Windows Help)
Windows Logo+ L (Lock the keyboard) .
Windows Logo+R (Open the Run dialog box)
Windows Logo+U (Open Utility Manager)
Accessibility Keyboard Shortcuts
Right SHIFT for eight seconds (Switch FilterKeys either on or off)
Left ALT+left SHIFT+PRINT SCREEN (Switch High Contrast either on or off)
Left ALT+left SHIFT+NUM LOCK (Switch the MouseKeys either on or off)
SHIFT five times (Switch the StickyKeys either on or off)
NUM LOCK for five seconds (Switch the ToggleKeys either on or off)
Windows Logo +U (Open Utility Manager)
Windows Explorer Keyboard Shortcuts
END (Display the bottom of the active window)
HOME (Display the top of the active window)
NUM LOCK+Asterisk sign (*) (Display all of the subfolders that are under the selected folder)
NUM LOCK+Plus sign (+) (Display the contents of the selected folder)
NUM LOCK+Minus sign (-) (Collapse the selected folder)
LEFT ARROW (Collapse the current selection if it is expanded, or select the parent folder)
RIGHT ARROW (Display the current selection if it is collapsed, or select the first subfolder)
Shortcut Keys for Character Map
After you double-click a character on the grid of characters, you can move through the grid by using the keyboard shortcuts:
RIGHT ARROW (Move to the right or to the beginning of the next line)
LEFT ARROW (Move to the left or to the end of the previous line)
UP ARROW (Move up one row)
DOWN ARROW (Move down one row)
PAGE UP (Move up one screen at a time)
PAGE DOWN (Move down one screen at a time)
HOME (Move to the beginning of the line)
END (Move to the end of the line)
CTRL+HOME (Move to the first character)
CTRL+END (Move to the last character)
SPACEBAR (Switch between Enlarged and Normal mode when a character is selected)
m*cro$oft Management Console (MMC) Main Window Keyboard Shortcuts
CTRL+O (Open a saved console)
CTRL+N (Open a new console)
CTRL+S (Save the open console)
CTRL+M (Add or remove a console item)
CTRL+W (Open a new window)
F5 key (Update the content of all console windows)
ALT+SPACEBAR (Display the MMC window menu)
ALT+F4 (Close the console)
ALT+A (Display the Action menu)
ALT+V (Display the View menu)
ALT+F (Display the File menu)
ALT+O (Display the Favorites menu)
MMC Console Window Keyboard Shortcuts
CTRL+P (Print the current page or active pane)
ALT+Minus sign (-) (Display the window menu for the active console window)
SHIFT+F10 (Display the Action shortcut menu for the selected item)
F1 key (Open the Help topic, if any, for the selected item)
F5 key (Update the content of all console windows)
CTRL+F10 (Maximize the active console window)
CTRL+F5 (Restore the active console window)
ALT+ENTER (Display the Properties dialog box, if any, for the selected item)
F2 key (Rename the selected item)
CTRL+F4 (Close the active console window. When a console has only one console window, this shortcut closes the console)
Remote Desktop Connection Navigation
CTRL+ALT+END (Open the m*cro$oft Windows NT Security dialog box)
ALT+PAGE UP (Switch between programs from left to right)
ALT+PAGE DOWN (Switch between programs from right to left)
ALT+INSERT (Cycle through the programs in most recently used order)
ALT+HOME (Display the Start menu)
CTRL+ALT+BREAK (Switch the client computer between a window and a full screen)
ALT+DELETE (Display the Windows menu)
CTRL+ALT+Minus sign (-) (Place a snapshot of the active window in the client on the Terminal server clipboard and provide the same functionality as pressing PRINT SCREEN on a local computer.)
CTRL+ALT+Plus sign (+) (Place a snapshot of the entire client window area on the Terminal server clipboard and provide the same functionality as pressing ALT+PRINT SCREEN on a local computer.)
m*cro$oft Internet Explorer Navigation
CTRL+B (Open the Organize Favorites dialog box)
CTRL+E (Open the Search bar)
CTRL+F (Start the Find utility)
CTRL+H (Open the History bar)
CTRL+I (Open the Favorites bar)
CTRL+L (Open the Open dialog box)
CTRL+N (Start another instance of the browser with the same Web address)
CTRL+O (Open the Open dialog box, the same as CTRL+L)
CTRL+P (Open the Print dialog box)
CTRL+R (Update the current Web page)
CTRL+W (Close the current window)
Copy & paste from Virtual Web Portal articel
Read More..
This shorcut help me a lot.Happy shortcut!!!
Check this out for 100 keybord shortcuts
CTRL+C (Copy)
CTRL+X (Cut)
CTRL+V (Paste)
CTRL+Z (Undo)
DELETE (Delete)
SHIFT+DELETE (Delete the selected item permanently without placing the item in the Recycle Bin)
CTRL while dragging an item (Copy the selected item)
CTRL+SHIFT while dragging an item (Create a shortcut to the selected item)
F2 key (Rename the selected item)
CTRL+RIGHT ARROW (Move the insertion point to the beginning of the next word)
CTRL+LEFT ARROW (Move the insertion point to the beginning of the previous word)
CTRL+DOWN ARROW (Move the insertion point to the beginning of the next paragraph)
CTRL+UP ARROW (Move the insertion point to the beginning of the previous paragraph)
CTRL+SHIFT with any of the arrow keys (Highlight a block of text)
SHIFT with any of the arrow keys (Select more than one item in a window or on the desktop, or select text in a document)
CTRL+A (Select all)
F3 key (Search for a file or a folder)
ALT+ENTER (View the properties for the selected item)
ALT+F4 (Close the active item, or quit the active program)
ALT+ENTER (Display the properties of the selected object)
ALT+SPACEBAR (Open the shortcut menu for the active window)
CTRL+F4 (Close the active document in programs that enable you to have multiple documents open simultaneously)
ALT+TAB (Switch between the open items)
ALT+ESC (Cycle through items in the order that they had been opened)
F6 key (Cycle through the screen elements in a window or on the desktop)
F4 key (Display the Address bar list in My Computer or Windows Explorer)
SHIFT+F10 (Display the shortcut menu for the selected item)
ALT+SPACEBAR (Display the System menu for the active window)
CTRL+ESC (Display the Start menu)
ALT+Underlined letter in a menu name (Display the corresponding menu)
Underlined letter in a command name on an open menu (Perform the corresponding command)
F10 key (Activate the menu bar in the active program)
RIGHT ARROW (Open the next menu to the right, or open a submenu)
LEFT ARROW (Open the next menu to the left, or close a submenu)
F5 key (Update the active window)
BACKSPACE (View the folder one level up in My Computer or Windows Explorer)
ESC (Cancel the current task)
SHIFT when you insert a CD-ROM into the CD-ROM drive (Prevent the CD-ROM from automatically playing) Dialog Box Keyboard Shortcuts
CTRL+TAB (Move forward through the tabs)
CTRL+SHIFT+TAB (Move backward through the tabs)
TAB (Move forward through the options)
SHIFT+TAB (Move backward through the options)
ALT+Underlined letter (Perform the corresponding command or select the corresponding option)
ENTER (Perform the command for the active option or button)
SPACEBAR (Select or clear the check box if the active option is a check box)
Arrow keys (Select a button if the active option is a group of option buttons)
F1 key (Display Help)
F4 key (Display the items in the active list)
BACKSPACE (Open a folder one level up if a folder is selected in the Save As or Open dialog box)
m*cro$oft Natural Keyboard Shortcuts
Windows Logo (Display or hide the Start menu)
Windows Logo+BREAK (Display the System Properties dialog box)
Windows Logo+D (Display the desktop)
Windows Logo+M (Minimize all of the windows)
Windows Logo+SHIFT+M (Restore the minimized windows)
Windows Logo+E (Open My Computer)
Windows Logo+F (Search for a file or a folder)
CTRL+Windows Logo+F (Search for computers)
Windows Logo+F1 (Display Windows Help)
Windows Logo+ L (Lock the keyboard) .
Windows Logo+R (Open the Run dialog box)
Windows Logo+U (Open Utility Manager)
Accessibility Keyboard Shortcuts
Right SHIFT for eight seconds (Switch FilterKeys either on or off)
Left ALT+left SHIFT+PRINT SCREEN (Switch High Contrast either on or off)
Left ALT+left SHIFT+NUM LOCK (Switch the MouseKeys either on or off)
SHIFT five times (Switch the StickyKeys either on or off)
NUM LOCK for five seconds (Switch the ToggleKeys either on or off)
Windows Logo +U (Open Utility Manager)
Windows Explorer Keyboard Shortcuts
END (Display the bottom of the active window)
HOME (Display the top of the active window)
NUM LOCK+Asterisk sign (*) (Display all of the subfolders that are under the selected folder)
NUM LOCK+Plus sign (+) (Display the contents of the selected folder)
NUM LOCK+Minus sign (-) (Collapse the selected folder)
LEFT ARROW (Collapse the current selection if it is expanded, or select the parent folder)
RIGHT ARROW (Display the current selection if it is collapsed, or select the first subfolder)
Shortcut Keys for Character Map
After you double-click a character on the grid of characters, you can move through the grid by using the keyboard shortcuts:
RIGHT ARROW (Move to the right or to the beginning of the next line)
LEFT ARROW (Move to the left or to the end of the previous line)
UP ARROW (Move up one row)
DOWN ARROW (Move down one row)
PAGE UP (Move up one screen at a time)
PAGE DOWN (Move down one screen at a time)
HOME (Move to the beginning of the line)
END (Move to the end of the line)
CTRL+HOME (Move to the first character)
CTRL+END (Move to the last character)
SPACEBAR (Switch between Enlarged and Normal mode when a character is selected)
m*cro$oft Management Console (MMC) Main Window Keyboard Shortcuts
CTRL+O (Open a saved console)
CTRL+N (Open a new console)
CTRL+S (Save the open console)
CTRL+M (Add or remove a console item)
CTRL+W (Open a new window)
F5 key (Update the content of all console windows)
ALT+SPACEBAR (Display the MMC window menu)
ALT+F4 (Close the console)
ALT+A (Display the Action menu)
ALT+V (Display the View menu)
ALT+F (Display the File menu)
ALT+O (Display the Favorites menu)
MMC Console Window Keyboard Shortcuts
CTRL+P (Print the current page or active pane)
ALT+Minus sign (-) (Display the window menu for the active console window)
SHIFT+F10 (Display the Action shortcut menu for the selected item)
F1 key (Open the Help topic, if any, for the selected item)
F5 key (Update the content of all console windows)
CTRL+F10 (Maximize the active console window)
CTRL+F5 (Restore the active console window)
ALT+ENTER (Display the Properties dialog box, if any, for the selected item)
F2 key (Rename the selected item)
CTRL+F4 (Close the active console window. When a console has only one console window, this shortcut closes the console)
Remote Desktop Connection Navigation
CTRL+ALT+END (Open the m*cro$oft Windows NT Security dialog box)
ALT+PAGE UP (Switch between programs from left to right)
ALT+PAGE DOWN (Switch between programs from right to left)
ALT+INSERT (Cycle through the programs in most recently used order)
ALT+HOME (Display the Start menu)
CTRL+ALT+BREAK (Switch the client computer between a window and a full screen)
ALT+DELETE (Display the Windows menu)
CTRL+ALT+Minus sign (-) (Place a snapshot of the active window in the client on the Terminal server clipboard and provide the same functionality as pressing PRINT SCREEN on a local computer.)
CTRL+ALT+Plus sign (+) (Place a snapshot of the entire client window area on the Terminal server clipboard and provide the same functionality as pressing ALT+PRINT SCREEN on a local computer.)
m*cro$oft Internet Explorer Navigation
CTRL+B (Open the Organize Favorites dialog box)
CTRL+E (Open the Search bar)
CTRL+F (Start the Find utility)
CTRL+H (Open the History bar)
CTRL+I (Open the Favorites bar)
CTRL+L (Open the Open dialog box)
CTRL+N (Start another instance of the browser with the same Web address)
CTRL+O (Open the Open dialog box, the same as CTRL+L)
CTRL+P (Open the Print dialog box)
CTRL+R (Update the current Web page)
CTRL+W (Close the current window)
Copy & paste from Virtual Web Portal articel
Read More..
5 tips - Linux application installation
Most people don't realize how easy it is to install applications on modern releases of the Linux operating system.
How can you avoid these traps and be one of those Linux users happily installing application after application? With these five tips, that's how.
1: Get to know your package manager
Probably the single most user-friendly package management system, on any operating system, is the Ubuntu Software Center. This tool is simply an evolution of the typical GUI front end for Linux package management systems. All you have to do is open that tool, search for the application you want to install, mark it for installation, and click Apply. And because there are thousands upon thousands of applications available, you can happily spend hours upon hours finding new and helpful applications to install.
2: Install the necessary compilers
If you have an application thatmust be installed from source, you will need to have the necessary compilers installed. Each distribution uses either a different compiler or a different release of a compiler. Some distributions, such as Ubuntu, make this task simple by having a single package to install (issue the command sudo apt-get install build-essential). Once you have the compiler installed, you can then install applications from source.
3: No .exe allowed
This is one of those concepts that is so fundamental, yet many users don't understand it. The .exe installers are for Windows only. For Linu,x you are looking for extensions such as .deb or .rpm for installation. The only way to install .exe files on a Linux machine is with the help of WINE, but most new users should probably steer clear of this tool. If you find a binary file online (one that works with your distribution), you should be prompted by your package manager if you want to install the downloaded file. If you have WINE installed,and your system is configured correctly, you will prompted (with the help of WINE) to install even .exe files.
4: Understand dependencies
This is probably one of the trickiest aspects of installing packages in Linux. When using a package manager (such as PackageKit, Synaptic, or Ubuntu Software Center) the dependencies are almost always taken care of automatically. But if you are installing from source, you will have to manually install the dependencies. If you don't get all the dependencies installed (and installed in the correct locations), the application you are installing will not work. And if you try to force the installation (without installing all dependencies), the application will not work properly.
5: Always start with the package manager
There are several reasons why distributions use package managers. Outside of user-friendliness, the single most important reason for package managers is to ensure system cohesiveness. If you use a patchwork of installation methods, you can't be sure that your system is aware of everything installed. This is also true for tools like Tripwire, which monitor changes in your system. You want to be as uniform and as standardized as you can in your installations. To that end, you should ALWAYS start with your package manager. Only when you can't find a precompiled binary for your distribution should you turn to installing from source. If you remain consistent with this installation practice, your system will run smoother longer. If you mix and match, you might find some applications are not aware of other applications, which can really cause dependency issues
By following some simple guidelines, anyone (regardless of experience level) can have an easy time managing their Linux desktop. So, users do not have to fear ok.
Read More..
How can you avoid these traps and be one of those Linux users happily installing application after application? With these five tips, that's how.
1: Get to know your package manager
Probably the single most user-friendly package management system, on any operating system, is the Ubuntu Software Center. This tool is simply an evolution of the typical GUI front end for Linux package management systems. All you have to do is open that tool, search for the application you want to install, mark it for installation, and click Apply. And because there are thousands upon thousands of applications available, you can happily spend hours upon hours finding new and helpful applications to install.
2: Install the necessary compilers
If you have an application thatmust be installed from source, you will need to have the necessary compilers installed. Each distribution uses either a different compiler or a different release of a compiler. Some distributions, such as Ubuntu, make this task simple by having a single package to install (issue the command sudo apt-get install build-essential). Once you have the compiler installed, you can then install applications from source.
3: No .exe allowed
This is one of those concepts that is so fundamental, yet many users don't understand it. The .exe installers are for Windows only. For Linu,x you are looking for extensions such as .deb or .rpm for installation. The only way to install .exe files on a Linux machine is with the help of WINE, but most new users should probably steer clear of this tool. If you find a binary file online (one that works with your distribution), you should be prompted by your package manager if you want to install the downloaded file. If you have WINE installed,and your system is configured correctly, you will prompted (with the help of WINE) to install even .exe files.
4: Understand dependencies
This is probably one of the trickiest aspects of installing packages in Linux. When using a package manager (such as PackageKit, Synaptic, or Ubuntu Software Center) the dependencies are almost always taken care of automatically. But if you are installing from source, you will have to manually install the dependencies. If you don't get all the dependencies installed (and installed in the correct locations), the application you are installing will not work. And if you try to force the installation (without installing all dependencies), the application will not work properly.
5: Always start with the package manager
There are several reasons why distributions use package managers. Outside of user-friendliness, the single most important reason for package managers is to ensure system cohesiveness. If you use a patchwork of installation methods, you can't be sure that your system is aware of everything installed. This is also true for tools like Tripwire, which monitor changes in your system. You want to be as uniform and as standardized as you can in your installations. To that end, you should ALWAYS start with your package manager. Only when you can't find a precompiled binary for your distribution should you turn to installing from source. If you remain consistent with this installation practice, your system will run smoother longer. If you mix and match, you might find some applications are not aware of other applications, which can really cause dependency issues
By following some simple guidelines, anyone (regardless of experience level) can have an easy time managing their Linux desktop. So, users do not have to fear ok.
Read More..
5 tips to use Server Core
Server Core lacks a lot of the GUI features found in more traditional Windows Server deployments. It's a lightweight server operating system, which makes it ideal for use in virtual data centers.
So, I provide 5 tips how to use Server Core
1: Set up a lab machine
Without a doubt, the best advice I can give you is to set up a few lab machines and install Server Core. That way, you can experiment with configuring and managing the operating system without having to worry about harming your production systems.
As you do, don't be afraid to get your hands dirty. The deeper you dig into Server Core on your lab machines, the better equipped you will be to manage Server Core deployments in the real world.
2: Understand the difference between the command line and PowerShell
I have read several blog posts that have incorrectly reported that administrators must use PowerShell cmdlets to manage Server Core operating systems. Although Server Core is managed from the command line, there is a difference between the command line and PowerShell.
The command line traces its roots back to DOS and has existed in one form or another in every version of Windows ever released for the X86 / X64 platform. Although some command -ine commands will work in PowerShell, PowerShell commands will not work in a command-line environment.
The command line is the primary interface for managing Server Core. In fact, PowerShell isn't even natively supported on Windows Server 2008 Server Core servers (although there is an unofficial workaround that can be used to add PowerShell support). PowerShell is natively available on Server Core servers that are running Windows Server 2008 R2, but it's not installed by default. Microsoft Support provides instructions for enabling PowerShell.
3: Check out the available graphical utilities
Even though the whole point of Server Core is that it's supposed to be a lightweight server OS without a GUI, it actually does have a GUI. Several graphical utilities can help you with the initial server configuration process.
The best of these utilities (in my opinion) is Core Configurator 2.0, an open source utility that's available as a free download. It's designed to help you to do things such as naming your server, configuring its network settings, and licensing the server.
In addition, Microsoft includes a configuration utility called Sconfig with Windows Server 2008 R2. Simply enter SCONFIG.CMD at the command prompt, and Windows will launch the Server Configuration utility. This utility is similar to the Core Configurator, but its options aren't quite as extensive. The Server Configuration utility will help you to do things like joining a domain or installing updates.
4: Don't forget about graphical management tools
When you manage a normal Windows 2008 server, you use built-in management utilities, such as the Active Directory Users And Computers Console and the Service Control Manager. Although such utilities connect to the local server by default, they're designed to let you manage other servers on your network, including servers that are running Server Core.
Even though Server Core operating systems don't come with a comprehensive suite of management utilities, there is absolutely nothing stopping you from connecting to a core server from another server's management consoles and managing that core server in exactly the same way that you would if it were running a graphical Windows Server operating system.
5: Learn Server Core's limitations
Because Server Core is a lightweight server operating system, it's not suitable for all purposes. Plenty of third-party applications simply will not run on a Server Core deployment.
In addition, many of the roles and role services that are often run on traditional Windows Server 2008 R2 servers are not supported on Server Core deployments. The actual roles that are supported by Server Core vary depending on the edition of Windows you are installing.
For instance, Windows Server 2008 R2 Web Edition supports only three roles, while the Datacenter and Enterprise Editions support 11 roles:
Active Directory Certificate Services
Active Directory Domain Services
Active Directory Lightweight Directory Service
BranchCache Hosted Cache
DHCP Server
DNS Server
File Services
Hyper-V
Media Services (this role must be downloaded separately)
Print Services
Web Services (IIS)
Microsoft provides a full list of the roles that are supported by the various editions of Windows Server 2008 R2. Read More..
So, I provide 5 tips how to use Server Core
1: Set up a lab machine
Without a doubt, the best advice I can give you is to set up a few lab machines and install Server Core. That way, you can experiment with configuring and managing the operating system without having to worry about harming your production systems.
As you do, don't be afraid to get your hands dirty. The deeper you dig into Server Core on your lab machines, the better equipped you will be to manage Server Core deployments in the real world.
2: Understand the difference between the command line and PowerShell
I have read several blog posts that have incorrectly reported that administrators must use PowerShell cmdlets to manage Server Core operating systems. Although Server Core is managed from the command line, there is a difference between the command line and PowerShell.
The command line traces its roots back to DOS and has existed in one form or another in every version of Windows ever released for the X86 / X64 platform. Although some command -ine commands will work in PowerShell, PowerShell commands will not work in a command-line environment.
The command line is the primary interface for managing Server Core. In fact, PowerShell isn't even natively supported on Windows Server 2008 Server Core servers (although there is an unofficial workaround that can be used to add PowerShell support). PowerShell is natively available on Server Core servers that are running Windows Server 2008 R2, but it's not installed by default. Microsoft Support provides instructions for enabling PowerShell.
3: Check out the available graphical utilities
Even though the whole point of Server Core is that it's supposed to be a lightweight server OS without a GUI, it actually does have a GUI. Several graphical utilities can help you with the initial server configuration process.
The best of these utilities (in my opinion) is Core Configurator 2.0, an open source utility that's available as a free download. It's designed to help you to do things such as naming your server, configuring its network settings, and licensing the server.
In addition, Microsoft includes a configuration utility called Sconfig with Windows Server 2008 R2. Simply enter SCONFIG.CMD at the command prompt, and Windows will launch the Server Configuration utility. This utility is similar to the Core Configurator, but its options aren't quite as extensive. The Server Configuration utility will help you to do things like joining a domain or installing updates.
4: Don't forget about graphical management tools
When you manage a normal Windows 2008 server, you use built-in management utilities, such as the Active Directory Users And Computers Console and the Service Control Manager. Although such utilities connect to the local server by default, they're designed to let you manage other servers on your network, including servers that are running Server Core.
Even though Server Core operating systems don't come with a comprehensive suite of management utilities, there is absolutely nothing stopping you from connecting to a core server from another server's management consoles and managing that core server in exactly the same way that you would if it were running a graphical Windows Server operating system.
5: Learn Server Core's limitations
Because Server Core is a lightweight server operating system, it's not suitable for all purposes. Plenty of third-party applications simply will not run on a Server Core deployment.
In addition, many of the roles and role services that are often run on traditional Windows Server 2008 R2 servers are not supported on Server Core deployments. The actual roles that are supported by Server Core vary depending on the edition of Windows you are installing.
For instance, Windows Server 2008 R2 Web Edition supports only three roles, while the Datacenter and Enterprise Editions support 11 roles:
Active Directory Certificate Services
Active Directory Domain Services
Active Directory Lightweight Directory Service
BranchCache Hosted Cache
DHCP Server
DNS Server
File Services
Hyper-V
Media Services (this role must be downloaded separately)
Print Services
Web Services (IIS)
Microsoft provides a full list of the roles that are supported by the various editions of Windows Server 2008 R2. Read More..
10 easy ways to speed up an Access database
There are things you could do to help, but the good news is that you can offer a few tips that might help them improve performance on their own. All of the following tips are simple enough that most users can put them to good use with decent results.
1: Disable or eliminate subdatasheets
Access displays subdatasheets between related tables by default. Unfortunately, they slow things down. If you work a lot in Datasheet view and seeing related data is valuable, it's a great feature. Most of us, however, don't need to see data presented this way. Advise users to disable this feature, as follows:
Open the table in Design view and then open the table's Property sheet by pressing [Alt]+[Enter] or by clicking Property Sheet in the Show/Hide group on the Design tab.
Change the SubdatasheetName property from [Auto] to [None].
2: Let Access advise
Access has two utilities that offer suggestions for improving performance. The Performance Analyzer lists potential problems and provides suggestions for correcting them. You can analyze all objects or just specific objects in a database. Another insightful utility is the Table Analyzer. This tool will help users properly normalize their data, and a properly normalized database performs better overall. These utilities are simple to run and users should be able to apply the resulting suggestions with little or no help from you.
In Access 2007/2010, both tools are on the Database Tools tab in the Analyze group. In Access 2003, choose Analyze from the Tools menu. These utilities will usually catch something -- in a user-built database, they might find a lot. Advise users to run the Table Analyzer before building forms and reports, so they can build them on properly normalized tables.
3: Reduce the size of graphics
Embedding graphics is a surefire way to consume resources and degrade performance. Linking is usually better than embedding, but users won't always know how to link to graphic files outside the database. When this is the case, Access can reduce the bloat that comes with embedded graphics. Advise users to set the following option when they embed graphics:
In Access 2007, click the Office button and then click Access Options. In Access 2010, click the File tab and choose Options (under Help).
Choose Current Database in the left pane.
In the Application Options section, click the Preserve Source Image Format (Smaller File Size) option under Picture Property Storage Format.
Click OK.
In mdb versions (Access 2003 and earlier), Access stored two sets of each graphic, which significantly increased the size of the database -- the original and a bitmap image Access actually displayed. The Preserve Source Image Format setting stores only one file and dynamically generates a bitmap when needed. The savings are substantial, but users won't know about it. Advise users to set this option during the design/development process. It won't convert existing graphics--it works only with new graphic files, as you embed them.
4: Split the database
By default, Access stores your data and your user interface objects (forms, reports, and so on) together. Some developers claim that splitting these single files into two, one with the data and one with the user interface objects, improves performance. Users work in the front end, which contains the user interface objects that retrieve data, as needed, from a linked back end. There are a number of reasons to split a database, as you can read about in 10+ reasons to split an Access database, but managing the data and the database itself are greater incentives than performance. Users can sometimes improve performance by splitting a database (but that isn't always the case).
If a database has only one user, you can still split it, but tell users to store both ends on the local system to avoid the network bottleneck. The idea might intimidate some of your users, but encourage them to try it--they'll be surprised how easy it really is.
5: Improve performance for split databases
As stated in #4, splitting a database sometimes slows things down. When that happens, there are simple things that users can do to improve performance to a linked backend:
Keep record navigation to a minimum. Moving from record to record against data in a linked table can slow things down.
A browsing form retrieves data across your network connection and consequently, can be slow. When entering data, set the form's Data Entry property to Yes.
Use queries to limit the data retrieved in order to reduce the amount of data Access retrieves from the linked table(s). Limit both fields and records.
Create local tables for static data, such as state abbreviations, ZIP codes, and so on.
6: Compact regularly
Compacting reclaims resources you free up by deleting objects and records. It also reorganizes records and updates statistics. Compacting almost always improves performance. If users don't compact regularly, the change will be noticeable. Compact And Repair Database is in the Tools group on the Database Tools tab. In Access 2003, it's on the Tools menu. Users can also have Access compact automatically, as follows:
In Access 2010, click the File tab and then click Options (under Help); in 2007, click the Office button and then click Access Options.
Choose Current Database in the left pane.
Check the Compact On Close option in the in the Applications Options section.
Click OK.
In Access 2003, do the following:
Choose Options from the Tools menu.
Click the General tab.
Check the Compact On Close option.
Click OK.
Instruct users to set this option so the database will compact every time they close it. Be sure users know to back up their database before compacting.
7: Keep controls to a minimum
Users might think that more is better, but a simple form is usually faster than a complex one with dozens of controls. A busy form can take a while to load and respond to requests. Advise users to create numerous task-specific forms instead of one complex form.
8: Base bound forms and reports on queries
Users tend to save queries for forms and reports based on more than one table. Recommend that they base all bound forms and reports on a query instead. Then, they can use the query to limit the number of fields and records used to populate the form or report. The less data, the faster the form or report will perform.
9: Be smart about indexing
Indexing isn't an art, but it can be confusing -- and over-indexing is as bad as inadequate indexing. Although there are many rules about indexing, they all boil down to one simple guideline that most users can understand: Apply an index to fields you sort or search regularly, unless the values are repetitive. If users are unsure, remind them to run the Performance Analyzer (#2).
10: Keep tables narrow
The number of records stored in a table has less impact on performance than the number of fields in the table. Advise users to keep fields to a minimum. Normalizing goes a long way (and the Table Analyzer can help there). But sometimes, even a properly normalized table can have dozens of fields. If you suspect that a wide table is a performance problem, advise the user to remove seldom-used fields to a new table. Then, force a one-to-one relationship between the tables. If the number of fields is your true culprit, this arrangement should improve performance. Recommend this solution to only your most knowledgeable Access users, though. It isn't difficult, but it does require knowledge of normalization and table design. Read More..
1: Disable or eliminate subdatasheets
Access displays subdatasheets between related tables by default. Unfortunately, they slow things down. If you work a lot in Datasheet view and seeing related data is valuable, it's a great feature. Most of us, however, don't need to see data presented this way. Advise users to disable this feature, as follows:
Open the table in Design view and then open the table's Property sheet by pressing [Alt]+[Enter] or by clicking Property Sheet in the Show/Hide group on the Design tab.
Change the SubdatasheetName property from [Auto] to [None].
2: Let Access advise
Access has two utilities that offer suggestions for improving performance. The Performance Analyzer lists potential problems and provides suggestions for correcting them. You can analyze all objects or just specific objects in a database. Another insightful utility is the Table Analyzer. This tool will help users properly normalize their data, and a properly normalized database performs better overall. These utilities are simple to run and users should be able to apply the resulting suggestions with little or no help from you.
In Access 2007/2010, both tools are on the Database Tools tab in the Analyze group. In Access 2003, choose Analyze from the Tools menu. These utilities will usually catch something -- in a user-built database, they might find a lot. Advise users to run the Table Analyzer before building forms and reports, so they can build them on properly normalized tables.
3: Reduce the size of graphics
Embedding graphics is a surefire way to consume resources and degrade performance. Linking is usually better than embedding, but users won't always know how to link to graphic files outside the database. When this is the case, Access can reduce the bloat that comes with embedded graphics. Advise users to set the following option when they embed graphics:
In Access 2007, click the Office button and then click Access Options. In Access 2010, click the File tab and choose Options (under Help).
Choose Current Database in the left pane.
In the Application Options section, click the Preserve Source Image Format (Smaller File Size) option under Picture Property Storage Format.
Click OK.
In mdb versions (Access 2003 and earlier), Access stored two sets of each graphic, which significantly increased the size of the database -- the original and a bitmap image Access actually displayed. The Preserve Source Image Format setting stores only one file and dynamically generates a bitmap when needed. The savings are substantial, but users won't know about it. Advise users to set this option during the design/development process. It won't convert existing graphics--it works only with new graphic files, as you embed them.
4: Split the database
By default, Access stores your data and your user interface objects (forms, reports, and so on) together. Some developers claim that splitting these single files into two, one with the data and one with the user interface objects, improves performance. Users work in the front end, which contains the user interface objects that retrieve data, as needed, from a linked back end. There are a number of reasons to split a database, as you can read about in 10+ reasons to split an Access database, but managing the data and the database itself are greater incentives than performance. Users can sometimes improve performance by splitting a database (but that isn't always the case).
If a database has only one user, you can still split it, but tell users to store both ends on the local system to avoid the network bottleneck. The idea might intimidate some of your users, but encourage them to try it--they'll be surprised how easy it really is.
5: Improve performance for split databases
As stated in #4, splitting a database sometimes slows things down. When that happens, there are simple things that users can do to improve performance to a linked backend:
Keep record navigation to a minimum. Moving from record to record against data in a linked table can slow things down.
A browsing form retrieves data across your network connection and consequently, can be slow. When entering data, set the form's Data Entry property to Yes.
Use queries to limit the data retrieved in order to reduce the amount of data Access retrieves from the linked table(s). Limit both fields and records.
Create local tables for static data, such as state abbreviations, ZIP codes, and so on.
6: Compact regularly
Compacting reclaims resources you free up by deleting objects and records. It also reorganizes records and updates statistics. Compacting almost always improves performance. If users don't compact regularly, the change will be noticeable. Compact And Repair Database is in the Tools group on the Database Tools tab. In Access 2003, it's on the Tools menu. Users can also have Access compact automatically, as follows:
In Access 2010, click the File tab and then click Options (under Help); in 2007, click the Office button and then click Access Options.
Choose Current Database in the left pane.
Check the Compact On Close option in the in the Applications Options section.
Click OK.
In Access 2003, do the following:
Choose Options from the Tools menu.
Click the General tab.
Check the Compact On Close option.
Click OK.
Instruct users to set this option so the database will compact every time they close it. Be sure users know to back up their database before compacting.
7: Keep controls to a minimum
Users might think that more is better, but a simple form is usually faster than a complex one with dozens of controls. A busy form can take a while to load and respond to requests. Advise users to create numerous task-specific forms instead of one complex form.
8: Base bound forms and reports on queries
Users tend to save queries for forms and reports based on more than one table. Recommend that they base all bound forms and reports on a query instead. Then, they can use the query to limit the number of fields and records used to populate the form or report. The less data, the faster the form or report will perform.
9: Be smart about indexing
Indexing isn't an art, but it can be confusing -- and over-indexing is as bad as inadequate indexing. Although there are many rules about indexing, they all boil down to one simple guideline that most users can understand: Apply an index to fields you sort or search regularly, unless the values are repetitive. If users are unsure, remind them to run the Performance Analyzer (#2).
10: Keep tables narrow
The number of records stored in a table has less impact on performance than the number of fields in the table. Advise users to keep fields to a minimum. Normalizing goes a long way (and the Table Analyzer can help there). But sometimes, even a properly normalized table can have dozens of fields. If you suspect that a wide table is a performance problem, advise the user to remove seldom-used fields to a new table. Then, force a one-to-one relationship between the tables. If the number of fields is your true culprit, this arrangement should improve performance. Recommend this solution to only your most knowledgeable Access users, though. It isn't difficult, but it does require knowledge of normalization and table design. Read More..
10 things to know about Mac OS X Server
Technology professionals, particularly those earning stripes battling Windows tours of duty, aren't fully aware of the strides made in Mac OS X Server. Snow Leopard extends functionality and performance even further. From a single Mac Mini powering the platform to an Xgrid Distributed Computing initiative, Snow Leopard packs serious potential. Here are 10 things enterprise administrators should know about Mac OS X Snow Leopard Server.
1: Serious scalability
From a simple chassis, such as Apple's US$999 specially designed Mac Mini, to near state-of-the-art Xserve rack-mount servers, Snow Leopard Server is capable of scaling to most any organization's needs. Mac OS X Snow Leopard Server can manage the load, whether it's a small workgroup requiring shared calendaring, email, and file services or large enterprises requiring instant, simultaneous access to terabytes of data in multiple locations.
2: Simplified administration
Apple's hallmark has long been approachability and the ease with which its systems can be deployed, maintained, and operated. The same is true with Mac Snow Leopard Server. Users and groups are easily managed, thanks to the clean but powerful Workgroup Manager interface. The Server Status Dashboard makes short work of monitoring the server's health. System Image Utility simplifies the process of creating and deploying system images, while NetBoot permits enterprise Mac administrators to boot multiple systems using a disk-based image hosted on a single server. Snow Leopard also adds iPhone deployment and remote system restore (NetStore) tools, too.
3: No CALs required
Mac server administrators lose the headache that is client access license management. Mac OS X Server licensing does not use client access licenses. Mac OS X Snow Leopard ships for $499, with unlimited clients. So does Apple's enterprise Xserve servers. Organizations benefit in two ways: lower costs and time saved having to chase down, purchase, and record server, email ,and database CALs.
4: High availability design
Apple engineers have designed Mac OS X Snow Leopard Server for high availability. Organizations can leverage the platform's automatic recovery, file system journaling, RAID, and clustering capabilities to ensure uptime (including clustering support for email services). Business continuity is further enhanced by Snow Leopard Server's support for image capturing and deployment, rsync, ditto, tar and asr backups, and even basic Time Machine backup and recovery.
5: Directory services support
Directory services, which track information about users, groups, and their requisite permissions, have become critical infrastructure within organizations small and large alike. Mac OS X Snow Leopard Server includes a broad range of support for existing directory services and authentication technologies, including Open Directory (OpenLDAP, Kerberos, and SASL included), Windows NT Domain Services (using Samba 3), Backup Domain Controller (BDC), and RADIUS, among others.
6: Cross-platform compatible
Snow Leopard Server's support for numerous directory services technologies enables integration with other network operating systems. Organizations still requiring legacy or Windows platforms to run specific components of their business need not start from scratch when deploying Mac OS X as their NOS or abandon past IT infrastructure or investments. With the server's support for common standards and protocols (including but not limited to SMTP, POP, SSL, AFP, SMB, CIFS, IPP, DNS, DHCP, NAT, VPN, SSL, WebDAV, and MySQL), Apple's server platform is compatible with Windows, Linux, and other platforms.
7: Collaboration-friendly
Email is already a critical tool today. Increasingly, organizations are embracing team sites, instant messaging, mobile communications, and shared calendaring functionality. Snow Leopard Server natively supports all these technologies out of the box, with no additional software packages or licensing required. iCal Server 2 powers shared calendaring and meeting and event coordination. Wiki Server 2 provides a customizable wiki-powered Web site for empowering team communication and collaboration. Mobile Access Server securely connects remote users to centralized corporate resources, while iChat Server supports instant messaging.
8: Clustering-capable
Organizations requiring leading edge distributed computing capability can power their networks using Snow Leopard Server. Apple's Xgrid technology, included within Mac OS X and Mac OS X Server, enables connecting a wide-ranging collection of Mac desktops, workstations, and servers into a supercomputer. Systems need not even be in the same location to join an Xgrid cluster. The Xgrid Admin interface provides administrators with a simplified console for configuring the resulting incredibly powerful clusters. In fact, one of the world's largest Xgrids is working to cure cancer in TechRepublic's home state of Kentucky.
9: Superior Web infrastructure
Whether an organization needs to build and maintain a team collaboration Web site (Wiki Server 2), host Web pages or Web applications (integrated Apache), or produce and distribute audio and video programming on the Web (Podcast Producer 2), Snow Leopard Server is a step ahead of competing network operating systems. While many network operating systems simply host content, Mac OS X Server includes features that aid production, workflow, and publication as one streamlined process.
10: Reasonable system requirements
Despite having supercomputer potential, Mac OS X Snow Leopard Server can be installed on a Mac desktop, if need be. Smaller organizations will find they can run the platform on a Mac with a single Intel processor, 10GB of free hard disk space, and just 2GB of RAM. While 8-core Xeon Xserv systems with 48GB of RAM and three 2TB drives are available off the shelf, the platform can be run confidently on a Mac Mini within some environments.
Read More..
1: Serious scalability
From a simple chassis, such as Apple's US$999 specially designed Mac Mini, to near state-of-the-art Xserve rack-mount servers, Snow Leopard Server is capable of scaling to most any organization's needs. Mac OS X Snow Leopard Server can manage the load, whether it's a small workgroup requiring shared calendaring, email, and file services or large enterprises requiring instant, simultaneous access to terabytes of data in multiple locations.
2: Simplified administration
Apple's hallmark has long been approachability and the ease with which its systems can be deployed, maintained, and operated. The same is true with Mac Snow Leopard Server. Users and groups are easily managed, thanks to the clean but powerful Workgroup Manager interface. The Server Status Dashboard makes short work of monitoring the server's health. System Image Utility simplifies the process of creating and deploying system images, while NetBoot permits enterprise Mac administrators to boot multiple systems using a disk-based image hosted on a single server. Snow Leopard also adds iPhone deployment and remote system restore (NetStore) tools, too.
3: No CALs required
Mac server administrators lose the headache that is client access license management. Mac OS X Server licensing does not use client access licenses. Mac OS X Snow Leopard ships for $499, with unlimited clients. So does Apple's enterprise Xserve servers. Organizations benefit in two ways: lower costs and time saved having to chase down, purchase, and record server, email ,and database CALs.
4: High availability design
Apple engineers have designed Mac OS X Snow Leopard Server for high availability. Organizations can leverage the platform's automatic recovery, file system journaling, RAID, and clustering capabilities to ensure uptime (including clustering support for email services). Business continuity is further enhanced by Snow Leopard Server's support for image capturing and deployment, rsync, ditto, tar and asr backups, and even basic Time Machine backup and recovery.
5: Directory services support
Directory services, which track information about users, groups, and their requisite permissions, have become critical infrastructure within organizations small and large alike. Mac OS X Snow Leopard Server includes a broad range of support for existing directory services and authentication technologies, including Open Directory (OpenLDAP, Kerberos, and SASL included), Windows NT Domain Services (using Samba 3), Backup Domain Controller (BDC), and RADIUS, among others.
6: Cross-platform compatible
Snow Leopard Server's support for numerous directory services technologies enables integration with other network operating systems. Organizations still requiring legacy or Windows platforms to run specific components of their business need not start from scratch when deploying Mac OS X as their NOS or abandon past IT infrastructure or investments. With the server's support for common standards and protocols (including but not limited to SMTP, POP, SSL, AFP, SMB, CIFS, IPP, DNS, DHCP, NAT, VPN, SSL, WebDAV, and MySQL), Apple's server platform is compatible with Windows, Linux, and other platforms.
7: Collaboration-friendly
Email is already a critical tool today. Increasingly, organizations are embracing team sites, instant messaging, mobile communications, and shared calendaring functionality. Snow Leopard Server natively supports all these technologies out of the box, with no additional software packages or licensing required. iCal Server 2 powers shared calendaring and meeting and event coordination. Wiki Server 2 provides a customizable wiki-powered Web site for empowering team communication and collaboration. Mobile Access Server securely connects remote users to centralized corporate resources, while iChat Server supports instant messaging.
8: Clustering-capable
Organizations requiring leading edge distributed computing capability can power their networks using Snow Leopard Server. Apple's Xgrid technology, included within Mac OS X and Mac OS X Server, enables connecting a wide-ranging collection of Mac desktops, workstations, and servers into a supercomputer. Systems need not even be in the same location to join an Xgrid cluster. The Xgrid Admin interface provides administrators with a simplified console for configuring the resulting incredibly powerful clusters. In fact, one of the world's largest Xgrids is working to cure cancer in TechRepublic's home state of Kentucky.
9: Superior Web infrastructure
Whether an organization needs to build and maintain a team collaboration Web site (Wiki Server 2), host Web pages or Web applications (integrated Apache), or produce and distribute audio and video programming on the Web (Podcast Producer 2), Snow Leopard Server is a step ahead of competing network operating systems. While many network operating systems simply host content, Mac OS X Server includes features that aid production, workflow, and publication as one streamlined process.
10: Reasonable system requirements
Despite having supercomputer potential, Mac OS X Snow Leopard Server can be installed on a Mac desktop, if need be. Smaller organizations will find they can run the platform on a Mac with a single Intel processor, 10GB of free hard disk space, and just 2GB of RAM. While 8-core Xeon Xserv systems with 48GB of RAM and three 2TB drives are available off the shelf, the platform can be run confidently on a Mac Mini within some environments.
Read More..
10 obscure Linux office applications to try
If you've ever checked out the list of applications available for the Linux operating system (OS), you know there are tons of them out there. The only problem is determining which ones are worth trying.
This is especially true of office applications. You could dig through those apps for hours just to come up with a handful of gems. So I thought I would do the grunt work for you and highlight 10 of the more obscure applications that actually have valid use in your workplace. These tools range in scope and purpose, but each one of them offers an obvious business value.
1: PDF Chain
PDF Chain is a great graphical tool that allows you to merge, split, set background or watermark, and add attachments to PDF documents. It's a front end for pdftk and is written in gtkmm. You can merge up to 26 PDFs into one file. You can also rotate pages, set permissions for pages, and encrypt pages. If you work with PDF documents, PDF Chain is a must-have on the Linux platform.
2: gLabels
gLabels is an incredibly flexible label and business card designer for the GNOME desktop. It will work with almost all inkjet or laser peel-off labels and business card sheets. Not only does gLabels allow you to design labels and cards with the same types of tools you would find in image editing software, it also offers a mail-merge feature that any business user will appreciate.
3: Kraft
Kraft is a KDE business organizational tool that helps you create and manage business communications documents. Kraft really shines in the area of creating invoices, offers, etc. It also helps you manage customers, create text templates, perform calculations, manage materials, create PDFs, and much more.
4: MDB Viewer
MDB Viewer can save you a ton of time, effort, and worry by allowing you to read data from a Microsoft Access database (MDB file). It serves as a user-friendly interface for MDB Tools. If MDB Viewer doesn't offer you enough, you can give Kexi a go. Kexi is a KDE-based data management app.
5: Okular
Okular is the Linux answer to the Mac OS X Preview tool. Okular is a universal file viewer that can view PDF, images, Postscript, DjVu, CHM, and many other file formats. From Okular, you can print documents, extract text, view information, search documents, and much more. The developers are currently working on annotation of PDF documents, which will further enhance Okular's use.
6: GoldenDict
GoldenDict is a dictionary manager that serves as a one-stop-shop for all your dictionary needs. It lets you manage dictionaries of all types, including Babylon, StartDict, Dictd, and ABBYY Lingvo. GoldenDict supports Wikipedia/Wictionary/Media-Wiki lookups and enables you to search for and listen to pronunciations from forvo.com. GoldenDict also allows you to search for words using a Hunspell-based morphology system for word stemming and spelling-based suggestions. If you use multiple dictionaries in your office, you need a dictionary manager like GoldenDict.
7: Simple Scan
Simple Scan is a scanning utility that ships with Ubuntu and really does live up to its name. Its user-friendly interface makes it easy for any user, at any level of competency, to create scans as either images or PDF files. Unfortunately, if your scanner isn't supported in Linux, Simple Scan will not work. Simple Scan was created by Canonical for Ubuntu but now is available for other distributions, such as Fedora.
8: RedNoteBook
RedNoteBook is a great journaling application that allows you to create journal entries and then tag, spell check, format, add images/links/files, do a live search, use word clouds, export to various formats, and translate them into more than 20 languages. With RedNoteBook, you can create templates that will make your journaling even simpler. You can also make annotations and view statistics of your entries.
9: TOra
TOra is an outstanding GUI that allows you to manage most of the common database formats (Oracle, MySQL, Postgresql). It has been built for Linux, Windows, and Mac and offers regular database queries and browsing. It includes a SQL worksheet with syntax highlighting, a PL/SQL debugger, and a full set of DBA tools. Although TOra isn't directed toward the average office user, anyone who needs to manage a database will appreciate it.
10: KeePassX
KeePassX is a must-have for anyone who has to remember a lot of passwords or other forms of secure data. With this tool, you can save user names, passwords, URLs, sign-on information, attachments, and comments in a single, protected database. This database of sensitive information is then encrypted with either AES or Twofish, using a 256-bit key. KeePassX has a user-friendly interface that any level of user will find easy to use.
Read More..
This is especially true of office applications. You could dig through those apps for hours just to come up with a handful of gems. So I thought I would do the grunt work for you and highlight 10 of the more obscure applications that actually have valid use in your workplace. These tools range in scope and purpose, but each one of them offers an obvious business value.
1: PDF Chain
PDF Chain is a great graphical tool that allows you to merge, split, set background or watermark, and add attachments to PDF documents. It's a front end for pdftk and is written in gtkmm. You can merge up to 26 PDFs into one file. You can also rotate pages, set permissions for pages, and encrypt pages. If you work with PDF documents, PDF Chain is a must-have on the Linux platform.
2: gLabels
gLabels is an incredibly flexible label and business card designer for the GNOME desktop. It will work with almost all inkjet or laser peel-off labels and business card sheets. Not only does gLabels allow you to design labels and cards with the same types of tools you would find in image editing software, it also offers a mail-merge feature that any business user will appreciate.
3: Kraft
Kraft is a KDE business organizational tool that helps you create and manage business communications documents. Kraft really shines in the area of creating invoices, offers, etc. It also helps you manage customers, create text templates, perform calculations, manage materials, create PDFs, and much more.
4: MDB Viewer
MDB Viewer can save you a ton of time, effort, and worry by allowing you to read data from a Microsoft Access database (MDB file). It serves as a user-friendly interface for MDB Tools. If MDB Viewer doesn't offer you enough, you can give Kexi a go. Kexi is a KDE-based data management app.
5: Okular
Okular is the Linux answer to the Mac OS X Preview tool. Okular is a universal file viewer that can view PDF, images, Postscript, DjVu, CHM, and many other file formats. From Okular, you can print documents, extract text, view information, search documents, and much more. The developers are currently working on annotation of PDF documents, which will further enhance Okular's use.
6: GoldenDict
GoldenDict is a dictionary manager that serves as a one-stop-shop for all your dictionary needs. It lets you manage dictionaries of all types, including Babylon, StartDict, Dictd, and ABBYY Lingvo. GoldenDict supports Wikipedia/Wictionary/Media-Wiki lookups and enables you to search for and listen to pronunciations from forvo.com. GoldenDict also allows you to search for words using a Hunspell-based morphology system for word stemming and spelling-based suggestions. If you use multiple dictionaries in your office, you need a dictionary manager like GoldenDict.
7: Simple Scan
Simple Scan is a scanning utility that ships with Ubuntu and really does live up to its name. Its user-friendly interface makes it easy for any user, at any level of competency, to create scans as either images or PDF files. Unfortunately, if your scanner isn't supported in Linux, Simple Scan will not work. Simple Scan was created by Canonical for Ubuntu but now is available for other distributions, such as Fedora.
8: RedNoteBook
RedNoteBook is a great journaling application that allows you to create journal entries and then tag, spell check, format, add images/links/files, do a live search, use word clouds, export to various formats, and translate them into more than 20 languages. With RedNoteBook, you can create templates that will make your journaling even simpler. You can also make annotations and view statistics of your entries.
9: TOra
TOra is an outstanding GUI that allows you to manage most of the common database formats (Oracle, MySQL, Postgresql). It has been built for Linux, Windows, and Mac and offers regular database queries and browsing. It includes a SQL worksheet with syntax highlighting, a PL/SQL debugger, and a full set of DBA tools. Although TOra isn't directed toward the average office user, anyone who needs to manage a database will appreciate it.
10: KeePassX
KeePassX is a must-have for anyone who has to remember a lot of passwords or other forms of secure data. With this tool, you can save user names, passwords, URLs, sign-on information, attachments, and comments in a single, protected database. This database of sensitive information is then encrypted with either AES or Twofish, using a 256-bit key. KeePassX has a user-friendly interface that any level of user will find easy to use.
Read More..
10 things to look for in an ISP
Internet service providers (ISPs) have become critical IT infrastructure partners. As cloud computing, e-mail, and Internet connectivity have grown in importance, so too have the circuits that connect organizations to the Internet. When selecting an ISP, don't base your choice only on price or familiarity. Consider these 10 factors when seeking an ISP.
1: Uptime commitments
Of all the promises ISPs make, none is worth anything if the ISP doesn't fulfill its uptime commitments. The circuits simply have to work. If they don't, organizations become dependent upon redundant or backup service. Look for service level agreements that provide real and measurable targets for uptime, not just 99.9 percent operational guarantees. Insist on specific wording that governs what happens when service fails. Does your organization receive credit off its bill? Will the ISP scramble a technician 24x7? Both? Ensure these details are in writing.
2: Downstream speed
Many, including most customers, tend to rate an ISP solely on advertised downstream speeds. While many ISPs promote 20Mbps or faster service to businesses, these claims need to be tested. Too often, IT pros hear "2Mbps is the best service we can get in that building" or "Circuits in that part of the city aren't as fast as other locations". Marketing claims are occasionally excessive; excuses are plentiful. Test all new circuits' downstream speeds the day they're installed, a month later, and quarterly after that.
Better yet, before ordering, inquire what other clients, using the same service, are experiencing nearby. That'll give you a better barometer as to how potent an ISP's downstream speeds actually are.
3: Upstream capacity
As with downstream speeds, upstream speed claims must be tested, too. The increasing popularity of VPNs, remote access, and automated offsite backups place great premiums on an ISP's upstream capacities. As organizations need to push more and more data to mobile users in the field, upstream bandwidth capacity will only grow in importance.
4: Port freedom
Don't assume that once a telecommunications circuit is in place, an organization is ready to get to work. Many ISPs, in an effort to optimize network performance, selectively block ports. I've been unable to use Telnet and other ports, depending upon the ISP's policies. Worse, the policies aren't always uniform across an entire ISP's network. ISP A may block Telnet on networks on the east side of town, but not the west. ISP B, meanwhile, may not block Telnet at all.
5: SMTP flexibility
Many ISPs, and I see this with former Ma Bell companies in particular, block SMTP port 25 traffic to any mail servers but their own. Obviously, the goal is to reduce the distribution of unsolicited e-mail, but the solution places an undue burden on customers. Typically, the ISP recommends setting its servers as the outbound SMTP servers within e-mail clients or switching to alternative ports, but that poses trouble for users who also travel with laptops or who are less technical. Be sure to check with the ISP to learn whether it supports open SMTP port 25 traffic.
6: Accessible technical support
When things go wrong, and they will go wrong, how accessible is technical support? I've called for assistance recovering a downed business circuit only to hear a recorded message stating support hours are between 9am and 5pm Monday through Friday. That's unacceptable for an ISP. Be sure the ISP you select provides technical support that meets your organization's requirements. If you close up shop everyday at 5pm, this won't be an issue. But if you run critical third shifts 24x7x365, better support is a necessity.
7: Responsive field service
If a failure occurs (the most common issue I see is failed modems due to lightning strikes, but I've also repeatedly seen wiring go bad in the ISP-supported network interface device, or NID), how quickly does the ISP commit to resolving the outage? In many cases, ISPs think nothing of mailing a replacement modem or rolling a truck a full business day later. That could mean the organization is dead in the water, unable to process credit cards, send or receive e-mail, access the Internet, or process orders for days. Be sure you know the ISP's field response policies, and be sure they match your organization's requirements, before signing a contract.
8: Equipment quality
IT professionals know which modems fail and how often. They also know which modems with built-in firewalls should really be set to bridge mode and mated to better business-class routers. Not wanting to disparage any manufacturers, I'll just say that when my office has an opportunity to work with Westell or Motorola modems, we feel better. ISPs often don't provide a choice of modem; they just deploy the model they support. When comparing two ISPs' bids, consider the quality of each firm's equipment. The less time an IT pro must spend on site administering, reconfiguring, or restarting network equipment, the better.
9: Equipment flexibility
Some ISPs enable customers to supply their own modems. Take advantage of these opportunities, as supplying your own network equipment not only allows you to select the quality you want but potentially lowers costs, too. Occasionally, ISPs lease modems to customers. I believe it makes more sense to purchase network equipment, where possible, to achieve lower total costs of ownership.
10: Pricing
Price is the last factor that should be considered when selecting an ISP. Uptime, capacity, service accessibility, and field response are much more critical, especially considering the importance of Internet circuits to businesses today. But price matters, too. When all else is equal--from uptime to performance, support, and equipment--price becomes the differentiating factor. When factoring price, however, be sure to compare apples to apples. Some ISPs require customers to purchase a modem or CSU/DSU, while others lease this equipment. And some ISPs require multi-year contracts. Such lease and long-term arrangements may end up costing more in the long run, so compare costs carefully. Read More..
1: Uptime commitments
Of all the promises ISPs make, none is worth anything if the ISP doesn't fulfill its uptime commitments. The circuits simply have to work. If they don't, organizations become dependent upon redundant or backup service. Look for service level agreements that provide real and measurable targets for uptime, not just 99.9 percent operational guarantees. Insist on specific wording that governs what happens when service fails. Does your organization receive credit off its bill? Will the ISP scramble a technician 24x7? Both? Ensure these details are in writing.
2: Downstream speed
Many, including most customers, tend to rate an ISP solely on advertised downstream speeds. While many ISPs promote 20Mbps or faster service to businesses, these claims need to be tested. Too often, IT pros hear "2Mbps is the best service we can get in that building" or "Circuits in that part of the city aren't as fast as other locations". Marketing claims are occasionally excessive; excuses are plentiful. Test all new circuits' downstream speeds the day they're installed, a month later, and quarterly after that.
Better yet, before ordering, inquire what other clients, using the same service, are experiencing nearby. That'll give you a better barometer as to how potent an ISP's downstream speeds actually are.
3: Upstream capacity
As with downstream speeds, upstream speed claims must be tested, too. The increasing popularity of VPNs, remote access, and automated offsite backups place great premiums on an ISP's upstream capacities. As organizations need to push more and more data to mobile users in the field, upstream bandwidth capacity will only grow in importance.
4: Port freedom
Don't assume that once a telecommunications circuit is in place, an organization is ready to get to work. Many ISPs, in an effort to optimize network performance, selectively block ports. I've been unable to use Telnet and other ports, depending upon the ISP's policies. Worse, the policies aren't always uniform across an entire ISP's network. ISP A may block Telnet on networks on the east side of town, but not the west. ISP B, meanwhile, may not block Telnet at all.
5: SMTP flexibility
Many ISPs, and I see this with former Ma Bell companies in particular, block SMTP port 25 traffic to any mail servers but their own. Obviously, the goal is to reduce the distribution of unsolicited e-mail, but the solution places an undue burden on customers. Typically, the ISP recommends setting its servers as the outbound SMTP servers within e-mail clients or switching to alternative ports, but that poses trouble for users who also travel with laptops or who are less technical. Be sure to check with the ISP to learn whether it supports open SMTP port 25 traffic.
6: Accessible technical support
When things go wrong, and they will go wrong, how accessible is technical support? I've called for assistance recovering a downed business circuit only to hear a recorded message stating support hours are between 9am and 5pm Monday through Friday. That's unacceptable for an ISP. Be sure the ISP you select provides technical support that meets your organization's requirements. If you close up shop everyday at 5pm, this won't be an issue. But if you run critical third shifts 24x7x365, better support is a necessity.
7: Responsive field service
If a failure occurs (the most common issue I see is failed modems due to lightning strikes, but I've also repeatedly seen wiring go bad in the ISP-supported network interface device, or NID), how quickly does the ISP commit to resolving the outage? In many cases, ISPs think nothing of mailing a replacement modem or rolling a truck a full business day later. That could mean the organization is dead in the water, unable to process credit cards, send or receive e-mail, access the Internet, or process orders for days. Be sure you know the ISP's field response policies, and be sure they match your organization's requirements, before signing a contract.
8: Equipment quality
IT professionals know which modems fail and how often. They also know which modems with built-in firewalls should really be set to bridge mode and mated to better business-class routers. Not wanting to disparage any manufacturers, I'll just say that when my office has an opportunity to work with Westell or Motorola modems, we feel better. ISPs often don't provide a choice of modem; they just deploy the model they support. When comparing two ISPs' bids, consider the quality of each firm's equipment. The less time an IT pro must spend on site administering, reconfiguring, or restarting network equipment, the better.
9: Equipment flexibility
Some ISPs enable customers to supply their own modems. Take advantage of these opportunities, as supplying your own network equipment not only allows you to select the quality you want but potentially lowers costs, too. Occasionally, ISPs lease modems to customers. I believe it makes more sense to purchase network equipment, where possible, to achieve lower total costs of ownership.
10: Pricing
Price is the last factor that should be considered when selecting an ISP. Uptime, capacity, service accessibility, and field response are much more critical, especially considering the importance of Internet circuits to businesses today. But price matters, too. When all else is equal--from uptime to performance, support, and equipment--price becomes the differentiating factor. When factoring price, however, be sure to compare apples to apples. Some ISPs require customers to purchase a modem or CSU/DSU, while others lease this equipment. And some ISPs require multi-year contracts. Such lease and long-term arrangements may end up costing more in the long run, so compare costs carefully. Read More..
5 tips for spotting signs of malware
If you've ever experienced a malware infection, you know what a hassle they can be. Cleaning your PC of these infections as quickly as possible will help ensure that the malware doesn't do any more damage or infect another machine. These tips should go a long way to help you recognize the symptoms of a malware infection.
1: Software
This is the most obvious method. Tons of anti-malware applications are available, and the choice is as subjective as your choice of antivirus software. You can choose tools like Malwarebytes or Spybot Search and Destroy. There are also some antivirus tools that can scan for both virus and malware (such as Ashampoo Magical Security 2). One of the issues you might face with certain anti-malware tools is a lack of real-time scanning. Because of this, you have to make sure your end-users do frequent manual scans to catch any infections. When a client neglects a scan, not only can that malware cause more issues, more malware may be picked up.
2: PC slowdowns
Malware is notorious for slowing down machines, be it network connections or speed of application use (or opening/closing said application). Of course, a slowdown alone does not a malware infection make. Since many other issues can cause a slowdown, I would advise taking steps to cure that slowdown first (defragmenting, adding RAM...the usual). If the PC is still running poorly after you've taken the necessary steps to address a slowdown, it's likely to be malware.
3: Pop-ups
One potentially embarrassing sign of malware is the popup. Lately, we've seen a spike in porn-related popup malware issues that either put a blush on the user's face or elicit pure anger. Unwanted pop-ups (especially those that happen when a browser is not open) are a sure sign of malware infection. The problem here is that they can't always be removed in standard mode. In those cases, the machine must be booted into safe mode. As with nearly all malware, you'll need a strong anti-malware application to remove them.
4: Change of home and/or Google links
If a browser's home page changes without your intervention, more than likely there is a malware problem. The same is true if you Google a topic, click a Google-provided link, and are sent to a random link. If you're seeing this behavior, you have a malware or virus infection.
5: Browser offline
If you can't browse the Internet but you know your network connection is up and running (a ping check is an easy way to test this), you probably have a malware infection. To double-check this, go to your browser's network connections settings and make sure a proxy hasn't been set (without your or your IT department's knowledge). If this is the case, and you know you don't use a proxy, you have a malware infection. Read More..
1: Software
This is the most obvious method. Tons of anti-malware applications are available, and the choice is as subjective as your choice of antivirus software. You can choose tools like Malwarebytes or Spybot Search and Destroy. There are also some antivirus tools that can scan for both virus and malware (such as Ashampoo Magical Security 2). One of the issues you might face with certain anti-malware tools is a lack of real-time scanning. Because of this, you have to make sure your end-users do frequent manual scans to catch any infections. When a client neglects a scan, not only can that malware cause more issues, more malware may be picked up.
2: PC slowdowns
Malware is notorious for slowing down machines, be it network connections or speed of application use (or opening/closing said application). Of course, a slowdown alone does not a malware infection make. Since many other issues can cause a slowdown, I would advise taking steps to cure that slowdown first (defragmenting, adding RAM...the usual). If the PC is still running poorly after you've taken the necessary steps to address a slowdown, it's likely to be malware.
3: Pop-ups
One potentially embarrassing sign of malware is the popup. Lately, we've seen a spike in porn-related popup malware issues that either put a blush on the user's face or elicit pure anger. Unwanted pop-ups (especially those that happen when a browser is not open) are a sure sign of malware infection. The problem here is that they can't always be removed in standard mode. In those cases, the machine must be booted into safe mode. As with nearly all malware, you'll need a strong anti-malware application to remove them.
4: Change of home and/or Google links
If a browser's home page changes without your intervention, more than likely there is a malware problem. The same is true if you Google a topic, click a Google-provided link, and are sent to a random link. If you're seeing this behavior, you have a malware or virus infection.
5: Browser offline
If you can't browse the Internet but you know your network connection is up and running (a ping check is an easy way to test this), you probably have a malware infection. To double-check this, go to your browser's network connections settings and make sure a proxy hasn't been set (without your or your IT department's knowledge). If this is the case, and you know you don't use a proxy, you have a malware infection. Read More..
Subscribe to:
Posts (Atom)