Search For This Site

Monday, March 16, 2009

Says About Google Chrome

Paul Zucker says

http://www.pcuser.com.au/pcuser/hs2.nsf/lookup+1/0FE5CB237D67D0A7CA2574B9000A81C6


New Open Source Browser Combines Simple User-Interface with Sophisticated Technology

SYDNEY, AUSTRALIA – September 3, 2008 – Google Inc. today launched Google Chrome, a new open source browser intended to create a better web experience for users around the world. Available in beta in more than 40 languages, Google Chrome is a new approach to the browser that's based on the simplicity and power that users have come to expect from Google products.

In the early days of the Internet, web pages were frequently little more than text. But today the web has evolved into a powerful platform that enables users to collaborate with friends and colleagues through email and other web applications, edit documents, watch videos, listen to music, manage finances and much more. Google Chrome was built for today's web and for the applications of tomorrow.

"We think of the browser as the window to the web – it's a tool for users to interact with the web sites and applications they care about, and it's important that we don't get in the way of that experience," said Sundar Pichai, Vice President of Product Management, Google Inc. "Just like the classic Google homepage, Google Chrome has a simple user interface with a sophisticated core to enable the modern web."

Making the web experience better for users

Google Chrome was designed to make it easy for users to search and navigate the web for the content they're looking for.

- A combined search and address bar quickly takes users where they want to go, often in just a few keystrokes.

- When users open a new tab in Google Chrome, they'll see a page that includes snapshots of their most-visited sites, recent searches and bookmarks, making it even easier to navigate the web.

Google Chrome was engineered to deliver a seamless web experience for users. At its core is a multi-process platform that helps provide users with enhanced stability and security.

- Each browser tab operates as a separate process; by isolating tabs, should one tab crash or misbehave, others remain stable and responsive, and users can continue working without having to restart Google Chrome.

- Google also built a new JavaScript engine, V8, that not only speeds up today's web applications, but enables a whole new class of web applications that couldn't exist on today's browsers.

Contributing to the innovation of browsers through openness

"While we see this as a fundamental shift in the way people think about browsers, we realise that we couldn't have created Google Chrome on our own," said Linus Upson, Director of Engineering, Google Inc. "Google Chrome was built upon other open source projects that are making significant contributions to browser technology and have helped to spur competition and innovation."

To further advance the openness of the web, Google Chrome is being released as an open source project. The intent is that Google will help make future browsers better by contributing the underlying technology in Google Chrome to the market, while continuing to develop additional features.

How to get Google Chrome

Google Chrome is being released in beta for Windows and can be downloaded at www.google.com/chrome. Google Chrome for Mac and Linux users will be available in the coming months. For more information on the open source project, Chromium, visit www.chromium.org.


Friday, March 13, 2009

Prayer reminder in Mozilla Firefox

For those of you who frequent browsing (exploring) the virtual world with Mozilla Firefox, so if there is no reminder, could forget the time when prayer has been entered. Among the benefits of Firefox is support Add-ons (additional functions) that there are so many. One of them is a prayer reminder.
One of the add-ons that are quite useful Pray Times!, Prayer reminder for Firefox.
Pray Times! calculation algorithm using a similar (possibly the same) with a prayer reminder application, such as Shollu, Azan Times and others. So if Shollu have been using, then look almost the same time.
What are the features of Pray Times!
* Different methods of prayer time calculation
* Information within the time prayer
* Automatic azan voice or other audio when the time comes
* Support various places in the world
* The calculation of local (does not need internet connection)
* Display information prayer time when the mouse on the area of Pray Times!
* Not limited Operating System that is used, which use web browser Mozilla Firefox
* Various options (calculation) that can be entered manually
* Available jadwan monthly prayer time



quoted by:
SUPRIYANTO
http://computer-semin.blogspot.com/

Wednesday, January 14, 2009

Ancillary equipment used by networks

To keep a network operating, to diagnose failures or degradation, and to circumvent problems, networks may have a wide-ranging amount of ancillary equipment.

Providing Electrical Power

Individual network components may have surge protectors - an appliance designed to protect electrical devices from voltage spikes. Surge protectors attempt to regulate the voltage supplied to an electric device by either blocking or shorting to ground voltage

above a safe threshold

Beyond the surge protector, network elements may have uninterruptible power supplies (UPS), which can be anywhere from a line-charged battery to take the element through a brief power dropout, to an extensive network of generators and large battery banks that can protect the network for hours or days of commercial power outages. A network as simple as two computers linked with a crossover cable has several points at which the network could fail: either network interface, and the cable. Large networks, without careful design, can have many points at which a single failure could disable the network.

When networks are critical the general rule is that they should have no single point of failure. The broad factors that can bring down networks, according to the Software Engineering Institute [6] at Carnegie-Mellon University:

1. Attacks: these include software attacks by various miscreants (e.g., malicious hackers, computer criminals) as well as physical destruction of facilities.

2. Failures: these are in no way deliberate, but range from human error in entering commands, bugs in network element executable code, failures of electronic components, and other things that involve deliberate human action or system design.

3. Accidents: Ranging from spilling coffee into a network element to a natural disaster or war that destroys a data center, these are largely unpredictable events. Survivability from severe accidents will require physically diverse, redundant facilities. Among the extreme protections against both accidents and attacks are airborne command posts and communications relays[7], which either are continuously in the air, or take off on warning. In like manner, systems of communications satellites may have standby spares in space, which can be activated and brought into the constellation.


Dealing with Power Failures

One obvious form of failure is the loss of electrical power. Depending on the criticality and budget of the network, protection from power failures can range from simple filters against excessive voltage spikes, to consumer-grade Uninterruptible Power Supplies(UPS) that can protect against loss of commercial power for a few minutes, to independent generators with large battery banks. Critical installations may switch from commercial to internal power in the event of a brownout,where the voltage level is below the normal minimum level specified for the system. Systems supplied with three-phase electric power also suffer brownouts if one or more phases are absent, at reduced voltage, or incorrectly phased. Such malfunctions are particularly damaging to electric motors. Some brownouts, called voltage reductions, are made intentionally to prevent a full

power outage.


Some network elements operate in a manner to protect themselves and shut down gracefully in the event of a loss of power. These might include noncritical application and network management servers, but not true network elements such as routers. UPS may provide a signal called the "Power-Good" signal. Its purpose is to tell the computer all is well with the power supply and that the computer can continue to operate normally. If the Power-Good signal is not present, the computer shuts down. The Power-Good signal prevents the computer from attempting to operate on improper voltages and damaging itself

To help standardize approaches to power failures, the Advanced Configuration and Power Interface (ACPI) specification is an open industry standard first released in December 1996 developed by HP, Intel, Microsoft, Phoenix and Toshiba that defines common interfaces for hardware recognition, motherboard and device configuration and power management

.

Monitoring and Diagnostic Equipment

Networks, depending on their criticality and the skill set available among the operators, may have a variety of temporarily or permanently connected performance measurement and diagnostic equipment. Routers and bridges intended more for the enterprise or ISP market than home use, for example, usually record the amount of traffic and errors experienced on their interfaces. Diagnostic equipment, to isolate failures, may be nothing more complicated than a spare piece of equipment. If the problem disappears when the spare is manually replaced, the problem has been diagnosed. More sophisticated and expensive installations will have spare elements that can automatically replace a failed unit. Failures can be made transparent to user computers with techniques such as the Virtual Router Redundancy Protocol (VRRP), as specified in RFC 3768.


Thursday, November 13, 2008

Building a simple computer network

A simple computer network may be constructed from two computers by adding a network
adapter (Network Interface Controller (NIC)) to each computer and then connecting them
together with a special cable called a crossover cable. This type of network is useful for
transferring information between two computers that are not normally connected to each
other by a permanent network connection or for basic home networking applications.
Alternatively, a network between two computers can be established without dedicated
extra hardware by using a standard connection such as the RS-232 serial port on both
computers, connecting them to each other via a special crosslinked null modem cable.
Practical networks generally consist of more than two interconnected computers and
generally require special devices in addition to the Network Interface Controller that each
computer needs to be equipped with. Examples of some of these special devices are hubs,
switches and routers.

Tuesday, November 11, 2008

Routers

Routers are the networking device that forward data packets along networks by using
headers and forwarding tables to determine the best path to forward the packets. Routers
work at the network layer of the TCP/IP model or layer 3 of the OSI model. Routers also
provide interconnectivity between like and unlike media (RFC 1812) This is
accomplished by examining the Header of a data packet, and making a decision on the
next hop to which it should be sent (RFC 1812) They use preconfigured static routes,
status of their hardware interfaces, and routing protocols to select the best route between
any two subnets. A router is connected to at least two networks, commonly two LANs or
WANs or a LAN and its ISP's network. Some DSL and cable modems, for home use,
have been integrated with routers to allow multiple home computers to access the
Internet.