<?xml version="1.0" encoding="UTF-8" standalone="no"?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><rss xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" version="2.0"><channel><title>Computer information</title><description></description><managingEditor>noreply@blogger.com (Computer info)</managingEditor><pubDate>Thu, 5 Sep 2024 12:20:06 -0700</pubDate><generator>Blogger http://www.blogger.com</generator><openSearch:totalResults xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/">47</openSearch:totalResults><openSearch:startIndex xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/">1</openSearch:startIndex><openSearch:itemsPerPage xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/">25</openSearch:itemsPerPage><link>http://computerinfo4uall.blogspot.com/</link><language>en-us</language><itunes:explicit>no</itunes:explicit><itunes:subtitle/><itunes:owner><itunes:email>noreply@blogger.com</itunes:email></itunes:owner><item><title>I B M   Xeon Processors</title><link>http://computerinfo4uall.blogspot.com/2012/01/i-b-m-xeon-processors.html</link><author>noreply@blogger.com (Computer info)</author><pubDate>Mon, 23 Jan 2012 21:56:00 -0800</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-6909471109484533377.post-180616830787010615</guid><description>&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh-qkPQR5TQgpCR3Rqx3DjKnqXs43NAmervmFaULEC8pI44xW409WORIHoz9g5eQZcz492ycsefGxaPvSgvwSaOAcBK5cktwppCO416RfHLYWPMPPLC_yxc-3_5RTvXu-BSnKbM1jrGYFk/s1600/ibm+system+storage+ds3512+express.jpg"&gt;&lt;img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 178px; height: 45px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh-qkPQR5TQgpCR3Rqx3DjKnqXs43NAmervmFaULEC8pI44xW409WORIHoz9g5eQZcz492ycsefGxaPvSgvwSaOAcBK5cktwppCO416RfHLYWPMPPLC_yxc-3_5RTvXu-BSnKbM1jrGYFk/s400/ibm+system+storage+ds3512+express.jpg" border="0" alt=""id="BLOGGER_PHOTO_ID_5701078205013136722" /&gt;&lt;/a&gt;&lt;br /&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjeKviLUWxY9HOw0N2xvjBGczro18x27z8Y6jR88cLU3H9_unDZFbAMBh5Bckmf6J_tg3aY9bvA_G9fyL6Wq9n8b8LHe2EY9xmDu0FKbif8pbDPOXPkSJqwgWwvwoblQGOtKgN2-ppkyn4/s1600/ibm+system+x3650+m3.jpg"&gt;&lt;img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 178px; height: 45px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjeKviLUWxY9HOw0N2xvjBGczro18x27z8Y6jR88cLU3H9_unDZFbAMBh5Bckmf6J_tg3aY9bvA_G9fyL6Wq9n8b8LHe2EY9xmDu0FKbif8pbDPOXPkSJqwgWwvwoblQGOtKgN2-ppkyn4/s400/ibm+system+x3650+m3.jpg" border="0" alt=""id="BLOGGER_PHOTO_ID_5701078067388217250" /&gt;&lt;/a&gt;&lt;br /&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEigOJyDdZeF8WLIv78OvRv7XrEamKteOiYGsMS1qwnz-d0tVpyQLImanWdxLy9EAvpILs5puz3glf025Qm0MYkmJ5mU8TpyJqtMYPmbB3U-38S31U_ow21DqAFwtY8shCCMqE2q6yeUT9Q/s1600/ibm.jpg"&gt;&lt;img style="float:right; margin:0 0 10px 10px;cursor:pointer; cursor:hand;width: 178px; height: 178px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEigOJyDdZeF8WLIv78OvRv7XrEamKteOiYGsMS1qwnz-d0tVpyQLImanWdxLy9EAvpILs5puz3glf025Qm0MYkmJ5mU8TpyJqtMYPmbB3U-38S31U_ow21DqAFwtY8shCCMqE2q6yeUT9Q/s400/ibm.jpg" border="0" alt=""id="BLOGGER_PHOTO_ID_5701076652790631602" /&gt;&lt;/a&gt;&lt;br /&gt;Brand new server at a price that fits your budget.&lt;br /&gt;&lt;br /&gt;The new IBM System X3100 M4 Express Server with latest Intel ® Xeon ® processor 1200 E3-series is a powerful and extremely affordable entry-level server. Business-class management tools make the server just to support, saving you valuable time. With easy to use features and valuable experience of IBM Business Partners, you can enjoy the highest level server technology from IBM, to keep the business growing.&lt;br /&gt;&lt;br /&gt;IBM System X3100 M4 Express&lt;br /&gt;&lt;br /&gt;Rs. 43,500 / -*&lt;br /&gt;&lt;br /&gt;Specifications:&lt;br /&gt;PN: 2582I1A&lt;br /&gt;Intel ® Xeon ® Quad Core Processor E3-1220 series&lt;br /&gt;(Quad Core 3.1GHz / 1333mhx / 8MB)&lt;br /&gt;Standard Memory: 1X2GB&lt;br /&gt;HDD: 250GB 8,89 см SATA, RAID 0,1&lt;br /&gt;Warranty: 3/3/3&lt;br /&gt;&lt;br /&gt;BM System x3650 M3 Express&lt;br /&gt;&lt;br /&gt;Rs. 1,72,000 / -*&lt;br /&gt;&lt;br /&gt;Specifications:&lt;br /&gt;PN: 7945ROF&lt;br /&gt;Intel ® Xeon ® Processor E 5645 (6 Core) 2.40Ghz 12MB 1333MHz&lt;br /&gt;Memory 1x 8GB&lt;br /&gt;HDD: 1x300 GB SAS 6.35 "Hot Swap with integrated RAID 0,1&lt;br /&gt;Warranty: 3 years on site&lt;br /&gt;&lt;br /&gt;IBM System Storage DS3512 Express&lt;br /&gt;&lt;br /&gt;Rs. 5,00,877 / -*&lt;br /&gt;&lt;br /&gt;Specifications:&lt;br /&gt;PN: 1746A2D&lt;br /&gt;Dual Controller with 6 x 600 GB 15K 8,89 см SAS drives&lt;br /&gt;IBM System Storage DS3512 Dual 1&lt;br /&gt;600 GB 15K 8,89 см HDD 6&lt;br /&gt;3 years NBD Support&lt;br /&gt;IBM System X3100 M4 is just one of the broad proposals of the new IBM System X innovative portfolio of x86 servers&lt;span style="font-weight:bold;"&gt;&lt;span style="font-weight:bold;"&gt;&lt;/span&gt;&lt;/span&gt;&lt;div class="blogger-post-footer"&gt;Computer information&lt;/div&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh-qkPQR5TQgpCR3Rqx3DjKnqXs43NAmervmFaULEC8pI44xW409WORIHoz9g5eQZcz492ycsefGxaPvSgvwSaOAcBK5cktwppCO416RfHLYWPMPPLC_yxc-3_5RTvXu-BSnKbM1jrGYFk/s72-c/ibm+system+storage+ds3512+express.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>UK Based software</title><link>http://computerinfo4uall.blogspot.com/2011/03/uk-based-software.html</link><author>noreply@blogger.com (Computer info)</author><pubDate>Wed, 2 Mar 2011 19:36:00 -0800</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-6909471109484533377.post-1810737452782969242</guid><description>&lt;a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh0YX5QO4sviI8s6TPUvioJ9j8o7EkF8mIJN3SOdiDxbfqg4tubSb5HzCalDGc3uRBmx9bcQZGYHFkKSaWSo8QFvogbiMORLd4W_wEXpbipFgqlCVrmk4scDzMYFpia2NWnTlkt5soe3G8/s1600/uk+software.jpg"&gt;&lt;img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 225px; height: 225px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh0YX5QO4sviI8s6TPUvioJ9j8o7EkF8mIJN3SOdiDxbfqg4tubSb5HzCalDGc3uRBmx9bcQZGYHFkKSaWSo8QFvogbiMORLd4W_wEXpbipFgqlCVrmk4scDzMYFpia2NWnTlkt5soe3G8/s400/uk+software.jpg" border="0" alt=""id="BLOGGER_PHOTO_ID_5579693178132892530" /&gt;&lt;/a&gt;&lt;br /&gt;Richlyn Systems is a UK-based software and website development company. It was incorporated in 1983 and is based in the Blades Enterprise Centre at Sheffield United Football Club. The company developed a Property Integrated Management and Accounting System (PIMS) which is now used by many companies including Valad Property Group, HBOS, Evans Easyspace. Evans Property Group and Wykeland Property Group.&lt;br /&gt;&lt;br /&gt;The company has continued to develop other systems - Integrated Stock Control Order Processing and Accounting System (SCOPAC) and Integrated Paint Manufacturing System (IPMS) are the latest additions to its software portfolio.&lt;br /&gt;&lt;br /&gt;In 2003 Richlyn, at the request of its clients formed a website development team to provide data driven websites to operate with client's data in real time. In 2007 Richlyn was approached to maintain and develop the FRAX and NOGG websites at the request of Sheffield University. Richlyn has also developed a number of websites for dental practices nationwide.&lt;div class="blogger-post-footer"&gt;Computer information&lt;/div&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh0YX5QO4sviI8s6TPUvioJ9j8o7EkF8mIJN3SOdiDxbfqg4tubSb5HzCalDGc3uRBmx9bcQZGYHFkKSaWSo8QFvogbiMORLd4W_wEXpbipFgqlCVrmk4scDzMYFpia2NWnTlkt5soe3G8/s72-c/uk+software.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>UK software</title><link>http://computerinfo4uall.blogspot.com/2011/03/uk-software.html</link><author>noreply@blogger.com (Computer info)</author><pubDate>Wed, 2 Mar 2011 19:34:00 -0800</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-6909471109484533377.post-5889964570548661389</guid><description>&lt;a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiOVH6PHOw4sn9gnxgiDvAr3lQFEsGaLKPLwZlX6lNdOYu3ePYIoIJjHfu7C5Cl1uc6dVugPxQLYuoMNMzPS6LY23NiMdmbS5hxf4mTfjvuwKEVr7Au9XizykNhfGeqwt17IkQ_hCuCYy4/s1600/software.jpg"&gt;&lt;img style="float:left; margin:0 10px 10px 0;cursor:pointer; cursor:hand;width: 225px; height: 225px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiOVH6PHOw4sn9gnxgiDvAr3lQFEsGaLKPLwZlX6lNdOYu3ePYIoIJjHfu7C5Cl1uc6dVugPxQLYuoMNMzPS6LY23NiMdmbS5hxf4mTfjvuwKEVr7Au9XizykNhfGeqwt17IkQ_hCuCYy4/s400/software.jpg" border="0" alt=""id="BLOGGER_PHOTO_ID_5579692545754909506" /&gt;&lt;/a&gt;&lt;br /&gt;Chart-Track is a market research company that music, videos and software sales in the United Kingdom, Ireland and Denmark, and monitoring was established in 1996.&lt;br /&gt;&lt;br /&gt;The company produces the official Irish music charts and collects data daily from major and independent record stores in Ireland on behalf of the Irish Recorded Music Association. In the UK, the company produces the official UK Software Charts on behalf of ELSPA and the official mobile game charts. In Denmark, the company produces the official Danish Software Charts on behalf of Multi Medie Foreningen (the professional organization for the Danish software industry).&lt;br /&gt;&lt;br /&gt;Major services include report: UK Leisure Software, Software Leisure Republic of Ireland, the European Free Software (in conjunction with GfK), the United Kingdom, hardware and peripherals, Republic of Ireland and music videos, Denmark Leisure Software Mobile Games UK&lt;div class="blogger-post-footer"&gt;Computer information&lt;/div&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiOVH6PHOw4sn9gnxgiDvAr3lQFEsGaLKPLwZlX6lNdOYu3ePYIoIJjHfu7C5Cl1uc6dVugPxQLYuoMNMzPS6LY23NiMdmbS5hxf4mTfjvuwKEVr7Au9XizykNhfGeqwt17IkQ_hCuCYy4/s72-c/software.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Launch of Video player in UK</title><link>http://computerinfo4uall.blogspot.com/2011/03/launch-of-video-player-in-uk.html</link><author>noreply@blogger.com (Computer info)</author><pubDate>Wed, 2 Mar 2011 19:08:00 -0800</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-6909471109484533377.post-7167134673748199213</guid><description>&lt;a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgT43laPD6bQxWGz1beTl3d2k2mIGonL0EsCdYHF6IyISEAd4Z-Kb-eU0UzZUljXac2iGUZm0N2hQUq75b_A0ezaOhcdt7uK9wuFs5sjTYhE9qX1iVU3RhCSLqhNwbB7nzojHRzjxmJbcw/s1600/video+game.jpg"&gt;&lt;img style="float:right; margin:0 0 10px 10px;cursor:pointer; cursor:hand;width: 253px; height: 199px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgT43laPD6bQxWGz1beTl3d2k2mIGonL0EsCdYHF6IyISEAd4Z-Kb-eU0UzZUljXac2iGUZm0N2hQUq75b_A0ezaOhcdt7uK9wuFs5sjTYhE9qX1iVU3RhCSLqhNwbB7nzojHRzjxmJbcw/s400/video+game.jpg" border="0" alt=""id="BLOGGER_PHOTO_ID_5579691703293766770" /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;MSN Video Player is an online video-on-demand player, launched in the UK by Microsoft on March 11, 2010.&lt;br /&gt;&lt;br /&gt;The service was available in beta form on August 3, 2009 with 300 hours shows from BBC Worldwide and All3Media.A spokeswoman for BBC Worldwide has confirmed that BBC programs on MSN Video Player is at least 180 days old's Were made available in both Windows Media Video and Flash formats, streaming without digital rights management copy protection, but only for those with a British address. During the opening 11 days of beta, MSN Video Player attracted a total of 167,487 video views by 154,841 users, with users staying for an average of 25 minutes.&lt;br /&gt;&lt;br /&gt;Microsoft has since agreed additional listings for over 1,000 hours of programming with independent product company Digital Rights Group, Endemol, Shed Media, Raw Cut, RDF Media. The company also has a separate agreement with Pact. - The UK trade association for independent TV and film producers - the full license for on-demand content, including availability periods and determines potential exclusives. Users on MSN Video Player is also possible to use the MSN Video service, with short-form clips, movie trailers and news items such access.&lt;br /&gt;&lt;br /&gt;The platform is optimized for Microsoft Silverlight - support in particular was missing in the beta - but it also works with Flash, and some of the content is available in HD streaming at 720p on the connections of 2 Mbps and more. All contents on. The service will be available for free, with half hour programs are preceded by short commercials, and programs of one hour or longer are interrupted by a commercial break.&lt;br /&gt;&lt;br /&gt;Ashley Highfield, Microsoft UK consumers and online managing director, said that in future the service will enable users to a Windows Live ID and are logged in, program recommendations offer - based on their previous viewing habits and that there is a tie-up with games from Microsoft console, the Xbox 360 would be on the cards. MSN UK head of video, Rob Crossen, added: "An obvious place to redress MSN Video Player -. considering the quality of content that you see on the platform - the TV, and there are a number of ways, widgets on the internet connected TVs, we have our own products within the Microsoft network, Xbox and Windows Media Center, for example. "When asked if a mobile MSN Video Player was probably for the upcoming Windows 7 Phone Series "We have a fantastic product comes later in the year, but no solid plans we are announcing today.On May 10, 2010, a Microsoft spokeswoman said there were currently no plans to roll out the service in other regions.On May 19, 2010, MSN Video Player is added to Windows Media Center TV Strip.&lt;div class="blogger-post-footer"&gt;Computer information&lt;/div&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgT43laPD6bQxWGz1beTl3d2k2mIGonL0EsCdYHF6IyISEAd4Z-Kb-eU0UzZUljXac2iGUZm0N2hQUq75b_A0ezaOhcdt7uK9wuFs5sjTYhE9qX1iVU3RhCSLqhNwbB7nzojHRzjxmJbcw/s72-c/video+game.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Molecular Biology software</title><link>http://computerinfo4uall.blogspot.com/2010/10/molecular-biology-software.html</link><author>noreply@blogger.com (Computer info)</author><pubDate>Sat, 23 Oct 2010 00:16:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-6909471109484533377.post-8656209712593743880</guid><description>&lt;a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh9SXBLhRi7HYzwaafc3If6PYEbLBlf9pzsbJeXVBFnyCwQyOK5QUbSBZ38fe-iYxiBrT6Z9aPDgZMHVOOwVj0Jr455MWIVZLYyW1Dcu9BCsgJKNEJRLanOoisLyx_yeyUcu9bK-yaMVWw/s1600/dna.jpg"&gt;&lt;img style="float:left; margin:0 10px 10px 0;cursor:pointer; cursor:hand;width: 256px; height: 197px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh9SXBLhRi7HYzwaafc3If6PYEbLBlf9pzsbJeXVBFnyCwQyOK5QUbSBZ38fe-iYxiBrT6Z9aPDgZMHVOOwVj0Jr455MWIVZLYyW1Dcu9BCsgJKNEJRLanOoisLyx_yeyUcu9bK-yaMVWw/s400/dna.jpg" border="0" alt=""id="BLOGGER_PHOTO_ID_5531138934615461298" /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;Visual OMPTM: The industry's most accurate and comprehensive software for secondary structure analysis plus design and simulation of probes / primers, RT-PCR, Taqman, Multiplex PCR, late-PCR, Scorpions, Beacons, allele-specific and FRET assays, microarrays, RNAi, and new formats. Unique is good for PCR buffer additives, fluorophores, quenchers, and plus more ...&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;    &lt;br /&gt;      OMP Developer EditionTM: This Software brings customizable, command line, high-throughput OMPTM (Oligonucleotide Modeling PlatformTM) software engine to power your big test design project or enterprise application. Fits easily into the existing bioinformatics pipelines.&lt;br /&gt;&lt;br /&gt;&lt;a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiFr4KKHwEFpFAyKCbPgJuV9iOzHFFq5zhjLv6u5-ZjGfCx5sg8sj7hRI1q0TckLbL3QDnkhEdfr2m1x7H21alwjaHbKAaJW_erEYqLdd47GXGd2R-w7mQghkG_4h2VhVQXxkjwgrfRpUU/s1600/onscreen_dna_lite_for_mac-223461-1237791325.jpeg"&gt;&lt;img style="float:right; margin:0 0 10px 10px;cursor:pointer; cursor:hand;width: 400px; height: 367px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiFr4KKHwEFpFAyKCbPgJuV9iOzHFFq5zhjLv6u5-ZjGfCx5sg8sj7hRI1q0TckLbL3QDnkhEdfr2m1x7H21alwjaHbKAaJW_erEYqLdd47GXGd2R-w7mQghkG_4h2VhVQXxkjwgrfRpUU/s400/onscreen_dna_lite_for_mac-223461-1237791325.jpeg" border="0" alt=""id="BLOGGER_PHOTO_ID_5531138746952458098" /&gt;&lt;/a&gt;&lt;br /&gt;    &lt;br /&gt;      ThermoBLASTTM: Better than BLAST for the control test designs. Combines the capabilities of BLAST database with the exact thermodynamics of OMPTM. Quickly and accurately scans DNA, RNA, or modified oligonucleotides against large genome databases and found thermodynamically stable hybridization and thus eliminates off-target effects testing and false positives. Available as a module for Visual OMPTM or individual, command line, Developer EditionTM version.&lt;br /&gt;&lt;br /&gt;    &lt;br /&gt;&lt;br /&gt;      ModifiedsTM: Expanding the power of thermonuclear blast and OMP ™ ™ (in both the Windows and command line version) of modified nucleotides (eg LNA, 5-methylcytosine DNA, 2'-O-methyl RNA, plus many more). Makes (1) to predict secondary structure plus design and simulation of oligos with modified nucleotides, and (2) scanning of modified oligos against genomic hybridization to all sites and databases expandable to identify amplicons.&lt;div class="blogger-post-footer"&gt;Computer information&lt;/div&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh9SXBLhRi7HYzwaafc3If6PYEbLBlf9pzsbJeXVBFnyCwQyOK5QUbSBZ38fe-iYxiBrT6Z9aPDgZMHVOOwVj0Jr455MWIVZLYyW1Dcu9BCsgJKNEJRLanOoisLyx_yeyUcu9bK-yaMVWw/s72-c/dna.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Stock Exchange Software</title><link>http://computerinfo4uall.blogspot.com/2010/10/stock-exchange-software.html</link><author>noreply@blogger.com (Computer info)</author><pubDate>Sat, 23 Oct 2010 00:12:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-6909471109484533377.post-6696717923863704948</guid><description>&lt;a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhzw87hcPqL5cU7M4OB_7UpCZaDrCN7-pXCPf7gpDmmKGuYzHkueVYbIAx5sp7rnIt6XQq-WihvPQeut5Y4Av-mWkogZwIBIIMqtyggvmTb91x113Ld_1oyrTKN8l3215-zsuA8Nkd0M44/s1600/softwre.jpg"&gt;&lt;img style="float:right; margin:0 0 10px 10px;cursor:pointer; cursor:hand;width: 305px; height: 165px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhzw87hcPqL5cU7M4OB_7UpCZaDrCN7-pXCPf7gpDmmKGuYzHkueVYbIAx5sp7rnIt6XQq-WihvPQeut5Y4Av-mWkogZwIBIIMqtyggvmTb91x113Ld_1oyrTKN8l3215-zsuA8Nkd0M44/s400/softwre.jpg" border="0" alt=""id="BLOGGER_PHOTO_ID_5531136884894776626" /&gt;&lt;/a&gt;&lt;br /&gt;The stock market is a lucrative and a fluctuating market. There is no guarantee how the stock market fluctuate. In a moment it can take you on a ride with high, but the next moment it will meet you in a flash. Therefore, it is almost impossible to play with the stock market. It is almost impossible to trust someone, while investment in stocks. It can be storage experts around the world who claim that their predictions are true, and say people around the world that inside information about what the company up to, the direct impact on the nature of stocks in the market. But even if you listen to them, take some risk that significant and unavoidable, if one step in the stock market. Therefore, what you need is a reliable source of information, even if it is impossible to predict the stock market, you are to keep banks safe all the time. You need a constant source of information that a number of calculations can you do and know what works best for you. Sometimes a human advice is simply not enough to kill your money. Therefore, you must split the help of some of this second calculation and can help you put your money in the safe place. You need software that is known as Exchange software. This type of software is used by experts camps all over the world. This software is very useful software that is either used to filter prices or choose the right companies to invest in. It helps the gambling aspect of stock market.&lt;br /&gt;&lt;a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgj0WHah4HK_g_q2V-FRWJ-MgllVxF1iO8t9SQMuzL5eZujl2c-bUH_OA1sAtQmwE1nugn24-3Likwax7x6VQ414rLmGpbcIpxBulCcDdm6vbfnIR7V4aEp0M9Zntg6xxQ-gE0E7Xmm0r0/s1600/forex.jpg"&gt;&lt;img style="float:left; margin:0 10px 10px 0;cursor:pointer; cursor:hand;width: 167px; height: 167px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgj0WHah4HK_g_q2V-FRWJ-MgllVxF1iO8t9SQMuzL5eZujl2c-bUH_OA1sAtQmwE1nugn24-3Likwax7x6VQ414rLmGpbcIpxBulCcDdm6vbfnIR7V4aEp0M9Zntg6xxQ-gE0E7Xmm0r0/s400/forex.jpg" border="0" alt=""id="BLOGGER_PHOTO_ID_5531136765883248098" /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;There can be many parameters that you are looking for a company before investing in the company. Investment is a serious business and if they sell a lot of money for something, make sure that you are completely satisfied with your investment in the company. This can only happen if you have enough information to prove that the company is sound and you see the good way, your stock goes up with this company collected. However, there are many companies out there on the market and it is very difficult for you to get the precise company with the exact parameters that you find. So even though you have the right parameters you the precise determination of companies with such parameters will be very difficult. Here is where will exchange software to get help. The trading software ensures that the right company that you are looking for on the exchange. It is through the various companies out there on the market and the screen one by one until you see the list of companies that invest your exact needs and the parameters you have chosen to. This program is much more reliable than the human calculations. You must maintain on human error to take care of everything.&lt;br /&gt;&lt;br /&gt;According to the parameters that you can get in the stock exchange software has a long list of companies. Therefore, you should make sure that you set the right parameters to the specific list of companies that you can get your money on. The trading software will work for you non-stop and get the best results if you are sure your parameters. Therefore, they think well before you decide to invest in a company and you will get a variety of results with the stock software. Once your software you run most often end up with a large amount of results. You can continue these results by reducing more and more parameters to the search that will help your results to the company that you invest in. Once you are on a list that is short enough and that the view is filter only has enough company, you can for each of them to help you to finally nail down the research, the company you want to invest in. There is also an option in the trading software for professional opinions about to see the company. You can look at them as the state of the company know in the market.&lt;br /&gt;&lt;br /&gt;There are many exchange software on the Internet today. If you are looking for such software, a simple Google search, with many areas, but make sure that if you buy one, use one alleged by a source that will help you get the best investment. have with the right choice in software and in exchange of your shares, you can very successfully in stocks in no time.&lt;div class="blogger-post-footer"&gt;Computer information&lt;/div&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhzw87hcPqL5cU7M4OB_7UpCZaDrCN7-pXCPf7gpDmmKGuYzHkueVYbIAx5sp7rnIt6XQq-WihvPQeut5Y4Av-mWkogZwIBIIMqtyggvmTb91x113Ld_1oyrTKN8l3215-zsuA8Nkd0M44/s72-c/softwre.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title/><link>http://computerinfo4uall.blogspot.com/2010/04/what-is-antivirus-software-there-are.html</link><author>noreply@blogger.com (Computer info)</author><pubDate>Sun, 4 Apr 2010 08:05:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-6909471109484533377.post-1450205868423181750</guid><description>What is antivirus software?&lt;br /&gt;There are a variety of antivirus software packages that are active in many different ways, depending on how the vendor chose to implement their software. What they have in common is that they all look for patterns in files or memory of your computer that the possible presence of a virus in te geven. Antivirus packages know what to look through the use of virus profiles (sometimes called "signatures") provided by the seller.&lt;br /&gt;&lt;br /&gt;New viruses are discovered daily. The effectiveness of antivirus software is dependent on the latest virus profiles installed on your computer so they can look for recently discovered viruses. It is important to these profiles up to date.&lt;div class="blogger-post-footer"&gt;Computer information&lt;/div&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title/><link>http://computerinfo4uall.blogspot.com/2010/04/data-security-companies-that-value.html</link><author>noreply@blogger.com (Computer info)</author><pubDate>Sun, 4 Apr 2010 08:05:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-6909471109484533377.post-8398447041301139767</guid><description>Data Security&lt;br /&gt;Companies that value their data need a detailed scheme for the recovery backup. This includes on site backups for least amount of time set, a copy of this data off site in case the computer room disaster and contingency plans in place. Unfortunately, an easy way to access a company to retrieve data is to obtain access to backup tapes and delicate prints. Therefore, all sensitive data stored in locked cabinets. Backup tapes should be sent site in containers. Old sensitive printouts and tapes should be destroyed.&lt;br /&gt;&lt;br /&gt;To protect the computer from damage due to power outages (and spikes), given to the computers on a UPS. This ensures consistent power, protects against downtime, and protects the computer against power surges. Ideally, a backup generator for production systems. On non-production, there must be an automatic way to shutdown the computer if the power to transfer to the UPS for more than 1 / 2 the time the UPS is rated to supply.&lt;div class="blogger-post-footer"&gt;Computer information&lt;/div&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title/><link>http://computerinfo4uall.blogspot.com/2010/04/who-wants-to-break-into-my-home.html</link><author>noreply@blogger.com (Computer info)</author><pubDate>Sun, 4 Apr 2010 08:03:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-6909471109484533377.post-6887989186026886721</guid><description>Who wants to break into my home computer?&lt;br /&gt;Intruders (also referred to as hackers, attackers, or crackers) may not care about your identity. Often they want to take control of your computer, so that they can use to launch attacks on other computer systems.&lt;br /&gt;&lt;br /&gt;After verifying your computer gives them the opportunity to develop their true location as they often launch attacks against high-profile computer systems such as government or financial systems to hide. Even if you have a computer connected to the Internet just the latest games or to email to friends and family, your computer can be a target.&lt;br /&gt;&lt;br /&gt;Intruders may be able to keep all your actions on the computer, or harm your computer by reformatting your hard drive or changing your data view.&lt;div class="blogger-post-footer"&gt;Computer information&lt;/div&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title/><link>http://computerinfo4uall.blogspot.com/2010/04/computer-security-do-i-every.html</link><author>noreply@blogger.com (Computer info)</author><pubDate>Sun, 4 Apr 2010 08:03:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-6909471109484533377.post-3436293364788215853</guid><description>Computer Security Do I?&lt;br /&gt;Every organization and individual has certain vital information - a unique formula, specialized customer database, a personal journal, annual financial data, etc. The organization would be compromised when they fall into the wrong hands.&lt;br /&gt;Until a few years ago, the protection of such information is relatively simple. All required a strong one was safe with a single key to access. However, as privacy no longer exists. Encryption is the only way to protect your valuables. Currently, with the exception of a few strong encryption packages, there are no resources for this critical encryption function.&lt;br /&gt;&lt;br /&gt;Passwords within most programs (Word, Excel, Access etc.) can be broken by a few beginners without any knowledge of computing. Such password breaking tools are easily found on the worldwide web for as little as $ 5.95, or sometimes even free!&lt;br /&gt;&lt;br /&gt;Most companies invest millions of dollars in setting up firewalls and try to secure their networks. Ironically, they have the least amount of money to spend to protect the area where the data actually resides or has made the PC for their employees to use. The costs involved in securing data at the level of the user minimum. They just refuse to pay $ 35 for a security.&lt;br /&gt;&lt;br /&gt;Encryption makes your data even if accessed by an unauthorized person, incomprehensible and unusable. By adopting the simple preventive techniques you can ensure complete data privacy.&lt;br /&gt;&lt;br /&gt;Hacking no longer requires experts. There are literally thousands of off-the-shelf programs available on the Internet that are as easy as using the software packages that you are so familiar. Anyone, even a child with limited or no computer know-how, these packages can hack into your systems. There is no defined requirement learning curve - or the amount of background knowledge essential to an effective 'hacker' is almost zero.&lt;br /&gt;Simple acts like going online to check your email to expose your machine is hacked. It is a trivial task to 'listen' someone e-mail, so that all future correspondence is now in the inbox of the hacker as well.&lt;br /&gt;&lt;br /&gt;On http://www.cs.auckland.ac.nz/ ~ pgut001/pubs/secure_del.html find a scientific study made by Peter Gutmann, from Department of Computer Science at the University of Auckland, which is explained in full technical details of the principles of magnetic order principle and which methods can be used to recover files after they have been overwritten several times with data. You can also find a ton of references to other scientific paper on the same subject.&lt;div class="blogger-post-footer"&gt;Computer information&lt;/div&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title/><link>http://computerinfo4uall.blogspot.com/2010/04/what-is-cable-modem-cable-modem-allows.html</link><author>noreply@blogger.com (Computer info)</author><pubDate>Sun, 4 Apr 2010 08:02:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-6909471109484533377.post-1554612585096454287</guid><description>What is cable modem?&lt;br /&gt;A cable modem allows a single computer (or network of computers) to connect to the Internet via cable TV network. The cable modem usually has an Ethernet LAN (Local Area Network) connection to the computer, and is capable of speeds exceeding 5 Mbps.&lt;br /&gt;&lt;br /&gt;Typical speeds are generally lower than the maximum, but since cable services by all districts in LANs that share the same bandwidth. Because of this "shared-medium" topology, cable modem users can access the network slightly slower experience during periods of peak demand, and perhaps more susceptible to risks such as packet sniffing and unprotected Windows users to share than other forms of connectivity&lt;div class="blogger-post-footer"&gt;Computer information&lt;/div&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title/><link>http://computerinfo4uall.blogspot.com/2010/04/how-is-broadband-different-from-network.html</link><author>noreply@blogger.com (Computer info)</author><pubDate>Sun, 4 Apr 2010 08:01:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-6909471109484533377.post-8026672506242406429</guid><description>How is broadband different from the network I use at work?&lt;br /&gt;Corporate bonds and government networks are typically protected by many layers of security, ranging from network firewalls to encryption. Moreover, they usually have support staff who maintain the security and availability of these network connections.&lt;br /&gt;&lt;br /&gt;Although your ISP is responsible for maintaining the services they provide to you, you probably will not have dedicated staff on hand to manage and operate your home network. You are ultimately responsible for your own computers. As a result, it is up to you to take reasonable precautions to make your computers from accidental or intentional abuse secured.&lt;div class="blogger-post-footer"&gt;Computer information&lt;/div&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title/><link>http://computerinfo4uall.blogspot.com/2010/04/computers-and-hardware-mechanisms-to.html</link><author>noreply@blogger.com (Computer info)</author><pubDate>Sun, 4 Apr 2010 08:01:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-6909471109484533377.post-3549103616022168557</guid><description>Computers and hardware mechanisms to protect data&lt;br /&gt;Hardware-assisted or computer security provides an alternative to software-only computer security. Devices such dongles can be regarded as more secure due to the physical access needed to be compromised.&lt;br /&gt;While many software-based security to encrypt the data to data from being stolen, a malicious program or hacker can corrupt data in order to irreparable or unusable. Also, encrypted systems are corrupted by a hacker or a malicious program, making the system unusable. Hardware-based security solutions can prevent read and write access to data and therefore provides very strong protection against tampering and unauthorized access. [Edit]&lt;br /&gt;Works of hardware-based security: a device allows the user to log in and log on different levels of duty by doing manual operations. The device uses biometric technology to prevent malicious users to log on, log off, and changing privilege levels. The current state of a user of the device is both read by a computer and peripheral controllers such as hard disks. Illegal access by a malicious user or a malicious program is suspended based on the current state of a user hard drive and DVD controllers enable illegal access to data impossible. Hardware-based access control is safer than using login and log out of OS operating system are vulnerable to malicious attacks. Since the software can manipulate the user privilege levels, it is impossible for a hacker or a malicious program to access data protected by the hardware safely or to perform illegal acts to gain privileged. The hardware protects the image of the operating system and file system privileges tampering. Therefore, a completely secure system should be created using a combination of hardware-based security and systems security policy.&lt;div class="blogger-post-footer"&gt;Computer information&lt;/div&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title/><link>http://computerinfo4uall.blogspot.com/2010/04/secure-operating-systems-one-use-of.html</link><author>noreply@blogger.com (Computer info)</author><pubDate>Sun, 4 Apr 2010 07:57:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-6909471109484533377.post-6455200590905359058</guid><description>Secure operating systems&lt;br /&gt;One use of the term refers to computer security technology to implement a secure operating system. Much of this technology is based on science in the 1980s developed and used to produce what some of the most impenetrable besturingssystemen ever. While still valid, the technology is in limited use today, especially since a number of changes in the management of the system imposes and also because not much understood. This ultra-strong secure operating systems are based on the operating system kernel technology that can guarantee that certain security policies are absolutely enforced in an operational environment. An example of such a computer security is the Bell-La Padula model. The strategy is based on a coupling of special microprocessor hardware features, often involving the memory management unit, special correctly implemented operating system kernel. This forms the basis for a veilig operating system, where certain key components are designed and correctly, the absolute impossibility of penetrating hostile van elementen guarantee. This capability is enabled because the configuration not only imposes a security policy, but in theory completely protects itself from corruption. Simple systems, on the other hand, not the features that assure you that this maximum level of security. The design methodology to produce such secure systems are accurate, deterministic and logical.&lt;br /&gt;&lt;br /&gt;Systems are designed with a similar method with the state of the art [Clarification Needed] computer security although products using such security are not well known. In sharp contrast to most types of software, they meet specifications with verifiable certainty comparable to specifications for size, weight and strength. Secure operating systems designed this way are used primarily for national security information, to protect military secrets, and the data from the international financial institutions. These are very powerful security tools and very few secure operating systems are certified at the highest level (Orange Book A-1) to work on the scope of the "Top Secret" to "unclassified" (including Honeywell SCOMP , USAF SACDIN, NSA Blacker and Boeing MLS LAN.) The assurance of safety depends not only on the soundness of the draft strategy, but also to ensure the accuracy of performance, and therefore there are degrees of security force defined for COMPUSEC. The Common Criteria quantifies security strength of products in terms of two components, security functionality and assurance level (EAL, such as mirrors), and these are described in a Protection Profile for a Security Target and requirements for product descriptions. None of these ultra-high assurance secure general purpose operating systems are produced for decades or certified under Common Criteria.&lt;br /&gt;&lt;br /&gt;In the United States usage, the term High Assurance usually suggests the system has appropriate security features that are robust enough to DoD and DOE to protect classified information out. Medium suggests that security can protect less valuable information, such as income tax information. Secure operating systems designed for medium robustness levels of security functionality and reliability to meet have seen wider use within both government and commercial markets. Medium robust systems may provide the same functions as a high security assurance secure operating systems, but doing so at a lower assurance level (such as Common Criteria EAL4 levels or EAL5). Lower levels mean we are less certain that the safety functions are performed flawlessly, and therefore less reliable. These systems can be found in use on web servers, guards, database servers and the management of hosts and are used not only to the data stored on these systems to protect, but also a high level of network and routing services.&lt;div class="blogger-post-footer"&gt;Computer information&lt;/div&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">1</thr:total></item><item><title/><link>http://computerinfo4uall.blogspot.com/2010/04/first-three-chips-first-three-press.html</link><author>noreply@blogger.com (Computer info)</author><pubDate>Sun, 4 Apr 2010 07:57:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-6909471109484533377.post-8693809561366492208</guid><description>THE FIRST THREE CHIPS&lt;br /&gt;The first three press time, three groups have been claiming to have put the first computer chip: Central Air Data Computer (CADC), Intel ® 4004, and Texas Instruments TMS 1000 naval insignia Cadca system "combat aircraft in 1970" is eventually. Often exemption, since it is a CPU chip and off. TMS 1000 as a calculator Tiwari was the first in the market, but - the difference between the Intel 4004 independent image, now as before, because often cited (guilt, was a one in four of being in chips). In fact, it is not what it was before. Parents, lamp, radio - and many before and after - say it was in the ether, how could it be enough with other innovations, their time had come&lt;div class="blogger-post-footer"&gt;Computer information&lt;/div&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title/><link>http://computerinfo4uall.blogspot.com/2010/04/risc-use-of-technology-risc-stands-for.html</link><author>noreply@blogger.com (Computer info)</author><pubDate>Sun, 4 Apr 2010 07:56:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-6909471109484533377.post-4749484117346167252</guid><description>RISC USE OF TECHNOLOGY&lt;br /&gt;RISC stands for "Reduced Instruction Set Computing, or a humorous vein, the exile" of the important things that a translator, "and also known as the architecture of the burden of the store. In the 1970s research at IBM was the result surprising is that some action is indeed slower than several smaller operations in the same thing. A famous example of this was the VAX's INDEX instruction, which ran slower than the execution of a cycle the same code. RISC began to be adopted in a big way during the 1980s, but many of the projects before the ethics embodied in this design. A notable example is the 1964 CDC 6600 by Seymour Cray Supercomputer, who sports designer, load-store architecture , addressing modes and a lot of two pipelines of arithmetic and logic functions (more pipelines are necessary when you are coming and going task instructions and the CPU in parallel rather than linearly). Most RISC machines only have around five simple ways to deal - with fewer addressing modes, reduced instruction set (the IBM 360 system, only three modes). Easier to design a processor pipeline, if you use a simple addressing modes.&lt;div class="blogger-post-footer"&gt;Computer information&lt;/div&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title/><link>http://computerinfo4uall.blogspot.com/2010/04/earlier-intel-4004-8008-and-8080-intel.html</link><author>noreply@blogger.com (Computer info)</author><pubDate>Sun, 4 Apr 2010 07:56:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-6909471109484533377.post-8689172920202536380</guid><description>Earlier Intel: 4004, 8008, and 8080&lt;br /&gt;Intel all its only 4 a bit - in the chip end Intel 4004 in November 1971. It is a clock frequency of 108 kHz and Rome, RAM, and ports for 2300 with transistors / A was originally developed for use on a computer with an Intel had his contract as a stand-negotiate new market for single processor can. It was inspired by Jesus in December PDP -8. Intel was introduced in April 8008 1972, and was nothing more than a farce about a 4004th 8 bits The principal claim was that his own fame a. C. - Computer Terminal Corporation (CTC), the chip provided by the Commission - are the basis for 8080, with 8086 and later (and therefore also for x86) architecture. At the moment around 4040 includes Intel's password, bewitched the instructions were logical and 4004 and add 32-bit Intel Intel 432nd put the 8080, which is considered one of the first 8008 to teach at the map and is generally considered the first truly usable microprocessor used. 8080 16-bit address bus and a bus 8-bit data, a 16-bit memory, the 8008 internal rate of 8 lot lot had changed, and a program counter 16-bit. These 256 I / O ports, I / O address space of the device or path can be added without the intervention. This is an indication that a separate bank of memory capture PIN was possible that a lot. These qualities made him a truly modern microprocessor. The Altair 8800, one of the first popular computer to use (the other applicants that MIT Lincoln in 1963 with the title bit "to 12 laboratories LINC / laboratory equipment, including computer components and December 1965-8 December PDP created himself). Although 4004 was the first company, it's really 8080, that their future is going to win - was clear and that in 1974 the company changed its phone number for the last four digits will be 8080th&lt;div class="blogger-post-footer"&gt;Computer information&lt;/div&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title/><link>http://computerinfo4uall.blogspot.com/2010/04/some-facts-about-microprocessors.html</link><author>noreply@blogger.com (Computer info)</author><pubDate>Sun, 4 Apr 2010 07:55:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-6909471109484533377.post-3175445287182233163</guid><description>SOME FACTS ABOUT MICROPROCESSORS&lt;br /&gt;Originally, Intel was the first microprocessor called 4040. This is a 4-bit processor that can process means that only 4 bits at a time. Then it was revised to a better version called the 8080 which is 8-bit processors. Then came the Intel 8085 processor.This creates attraction worldwide for its architecture and processing power. But after that really steal the scene for both 8086 and 8088. These processors are 16-bit capacity and really revolutionized the way people consider microprocessor.Many devices to start with the microprocessor and thus was born the computer by connecting the appropriate devices. 8086 is the first processor that can be used commercially as a computer processor. This is the birth of the legendary 8086 x86 series includes 80,186, 80,286, and then calls the Pentium series&lt;div class="blogger-post-footer"&gt;Computer information&lt;/div&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title/><link>http://computerinfo4uall.blogspot.com/2010/04/information-8-bit-intel-intel-4004-was.html</link><author>noreply@blogger.com (Computer info)</author><pubDate>Sun, 4 Apr 2010 07:54:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-6909471109484533377.post-5520896249350771440</guid><description>INFORMATION 8-bit Intel&lt;br /&gt;Intel 4004 was followed in 1972 by the Intel 8008, first 8-bit world. According to the History of Modern Computing (MIT Press), pp. 220-21, Intel has signed a contract with Computer Terminals Corporation, later called Datapoint, of San Antonio TX, for a chip for a terminal that was designed. Datapoint later decided not to use the chip, and Intel marketing and in April 8008, 1972. This was the first chip 8-bit world. This was the basis for the famous game of "Mark-8 computer is advertised in the magazine Radio-Electronics in 1974. 8008 was the precursor of the highly successful Intel 8080 (1974), Zilog Z80 (1976), and secondary processors Intel in 8-bits. Competitive 6800 Sony Ericsson was launched in August 1974 and related to MOS Technology 6502 in 1975 (mostly the same people). Z80 6502 rivaled in popularity during the 1980s. A generally low cost, small packaging, simple computer bus applications, and sometimes otherwise provided by the external security hardware (Z80 has a built-in refresh your memory) allowed the home computer "revolution" to accelerate significantly to early 1980, eventually sending cheap car such as Sinclair ZX-81, which sold for $ 99. Western Design Center, Inc. (WDC) introduced the CMOS 65C02 in 1982 and licensed the design to several companies. The used as the CPU in the Apple IIc and IIe personal computers, as well as medical grade implantable defibrillators, heart stimulants, automotive, industrial and consumer devices. WDC pioneered licensing chip designs, followed later by ARM and other microprocessor Intellectual Property (IP) providers in the 1990s. MC6809 Motorola introduced in 1978, an ambitious design sources and the thought of 8-bit compatible with 6800 and executed by the simple use of wired logic. (microprocessors of 16 - microcode bit general purpose to some extent, as the design requirements are too complex for simple hard-wired logic only.) Another 8-bit microprocessor was the Signetics early 2650, has enjoyed a surge in short interest because a powerful new architecture and instruction set. A seminal microprocessor in the world of spaceflight was RCA RCA 1802 (aka CDP1802, RCA COSMAC) (introduced in 1976), which is used in NASA's Voyager probes Viking space of the 1970s, as well as on board the Galileo probe to Jupiter (launched 1989, arrived in 1995). COSMAC RCA was the first to implement CMOS technology. CDP1802 was used because it can run on very low power and because its production process (Silicon on sapphire) to ensure better protection against cosmic radiation and electrostatic discharges than any other processor time. Thus, 1802 is said to be the first chip of radiation toast. RCA 1802 had what is called a static design, which means that the clock frequency can be arbitrarily low, even at 0 Hz, a total stop condition. This leaves the Voyager / Viking / Galileo spacecraft use minimum electrical energy over long travel periods without problems. timers and / or sensors would awaken / improve processor performance in time of important tasks, such as updates navigation, attitude control, data acquisition, and radio communication.&lt;div class="blogger-post-footer"&gt;Computer information&lt;/div&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title/><link>http://computerinfo4uall.blogspot.com/2010/04/intels-first-microprocessor-intel-4004.html</link><author>noreply@blogger.com (Computer info)</author><pubDate>Sun, 4 Apr 2010 07:52:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-6909471109484533377.post-1031617287733530554</guid><description>Intel's first microprocessor&lt;br /&gt;Intel 4004 microprocessor is generally regarded as the first and cost thousands of dollars. The first contest known for 4004 is the date of November 1971, she appeared on the news. The project has generated 4004 Born in 1969, when Busicom, a Japanese calculator manufacturer, asked Intel to create a set of calculator chips for high-performance desktop. Busicom original design includes a programmable chip that consists of 7 different cards, three of them of a special purpose CPU in its program stored in ROM and data stored in shift register read / write memory. Ted Hoff, Intel engineer assigned to evaluate the project, believed Busicom design can be simplified by using dynamic RAM for storing data, instead of logging memory change, and a more traditional CPU architecture general purpose. Hoff came up with a proposed architecture of four chips: one chip ROM for program storage, a classification of dynamic RAM chip data, a simple drive E / S and a central processing 4-bit (CPU), who considered that they could be integrated into a single chip, although not a designer of chips. This chip later said the 4004 chip. Architecture and specifications of 4004 were the result of interaction with Stanley Mazor Intel Hoff, a software engineer reporting Busicom Hoff Engineering and Masatoshi Shima. In April 1970, Intel hired Federico Faggin led the design of seven four chips. Faggin, who originally developed the silicon gate technology (sergeant) at Fairchild Semiconductor in 1968 [10] (and also designed the first shopping mall in the world using integrated Sergeant - Fairchild 3708), has the background necessary to implement the project after the sergeant was allowed to design a CPU on a chip with the correct speed, power dissipation and cost. Faggin also developed a new methodology for the design of random logic gate based on silicon, making possible 4004. The production of 4004 units were delivered for the first time in March 1971 and sent to other customers Busicom late 1971.&lt;div class="blogger-post-footer"&gt;Computer information&lt;/div&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Creation and production of memory chips</title><link>http://computerinfo4uall.blogspot.com/2010/03/creation-and-production-of-memory-chips.html</link><author>noreply@blogger.com (Computer info)</author><pubDate>Fri, 26 Mar 2010 20:25:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-6909471109484533377.post-2227222807158436728</guid><description>&lt;a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjmwXOHOE2CeLlnBtDp_LFAH_rbyV3W7EVlQLwPlsroyX9KoZs0PjKZ34A5EM6qkRXs08Nvo42qwlFU-uXRrg1s6z4sin2HgHbjHYDAIUNOf3SOaC_yB77KPHzFoxprxKa7zJbZisNNSTA/s1600/mc.jpeg"&gt;&lt;img style="float:left; margin:0 10px 10px 0;cursor:pointer; cursor:hand;width: 130px; height: 130px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjmwXOHOE2CeLlnBtDp_LFAH_rbyV3W7EVlQLwPlsroyX9KoZs0PjKZ34A5EM6qkRXs08Nvo42qwlFU-uXRrg1s6z4sin2HgHbjHYDAIUNOf3SOaC_yB77KPHzFoxprxKa7zJbZisNNSTA/s400/mc.jpeg" border="0" alt=""id="BLOGGER_PHOTO_ID_5453149610683308722" /&gt;&lt;/a&gt;&lt;br /&gt;Intel has been on 18 Founded in July 1968 by Gordon E. Moore and Robert Noyce as the Moore-Noyce Electronics in Mountain View, California, after they had left Fairchild Semiconductor. Soon afterwards, was also recruited Andy Grove, who led the company in the 1980s and 1990s. The company's aim was to develop semiconductor-based memory for your computer and bring it to market. The highly integrated (Very Large Scale Integration, VLSI) of transistors on silicon was in the year 1968 still in its infancy, and Intel developed the MOS process for the manufacture of semiconductors.&lt;br /&gt;&lt;br /&gt;The first product the company was a 64--Bit Schottky Bipolar RAM. It was introduced in April 1969 under the name "Intel 3101". Only in July 1969 with the Intel 1101 was the first SRAM chip, which was produced by MOS process, put on the market. But it was in October 1975 - yet after only half the originally estimated time - managed the first major leap forward: Intel released under the name "1103" before the first DRAM memory chip, which was based on the MOS process and the benefits of had to offer highly integrated. During the bipolar process only at high-speed devices the advantage enjoyed emerged as the preferred technology for MOS semiconductor manufacturing technology.&lt;br /&gt;&lt;br /&gt;As farsighted integration strategist Gordon Moore was recognized as early as 1965 a trend that later as Moore's Law not only the history of Intel, but the development of the entire semiconductor technology decisively influenced.&lt;br /&gt;&lt;br /&gt;Until the mid 1980s, DRAM was the main business of Intel. The growing competition from Japanese semiconductor manufacturers and the resulting decline in sales but led 1983 at the re-orientation of the business model. The success of the personal computer from IBM led Intel to focus now on microprocessors and DRAMs abandon production. One of the main suppliers of Intel owns the Taiwanese company Foxconn.&lt;div class="blogger-post-footer"&gt;Computer information&lt;/div&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjmwXOHOE2CeLlnBtDp_LFAH_rbyV3W7EVlQLwPlsroyX9KoZs0PjKZ34A5EM6qkRXs08Nvo42qwlFU-uXRrg1s6z4sin2HgHbjHYDAIUNOf3SOaC_yB77KPHzFoxprxKa7zJbZisNNSTA/s72-c/mc.jpeg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Application of supercomputers</title><link>http://computerinfo4uall.blogspot.com/2010/03/application-of-supercomputers.html</link><author>noreply@blogger.com (Computer info)</author><pubDate>Fri, 26 Mar 2010 20:24:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-6909471109484533377.post-5830225819840734781</guid><description>&lt;a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh_SAwit9j-_zk4LT7Ef965ltkxByvUxRx70tNCm-wnfyHnygGqvCpvypesc5XDWUuNbF_5XAx5ueRb4IRTT8LsKuNmtIdsYiWhLdm22RYFd567bm9elDPwSCD9we-fMv-cU5LyGlKs1Ik/s1600/sc+2.jpeg"&gt;&lt;img style="float:right; margin:0 0 10px 10px;cursor:pointer; cursor:hand;width: 150px; height: 98px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh_SAwit9j-_zk4LT7Ef965ltkxByvUxRx70tNCm-wnfyHnygGqvCpvypesc5XDWUuNbF_5XAx5ueRb4IRTT8LsKuNmtIdsYiWhLdm22RYFd567bm9elDPwSCD9we-fMv-cU5LyGlKs1Ik/s400/sc+2.jpeg" border="0" alt=""id="BLOGGER_PHOTO_ID_5453149355933094738" /&gt;&lt;/a&gt;&lt;br /&gt;The cost of a supercomputer from the TOP10 now stands at a very high double digits, often already digit million euro amount. Upwards are no limits. Planning for the new standing in the field by 10 supercomputer PFLOPS are currently almost 700 million euros budgeted. These huge amounts of investment is inevitably the question of what these are needed very expensive equipment and whether the investment in the development of such a device, except for pure prestige, profitable.&lt;br /&gt;&lt;br /&gt;Today's supercomputers are used mainly for simulation purposes. The more realistic a simulation of complex relationships, the more processing power is needed in the rule. The advantage of the supercomputer is also that they can take account of their extremely fast and large computing power ever more interdependent. This then allows the inclusion of wider still, often inconspicuous secondary or boundary conditions for the actual simulation, and also guarantee a more meaningful overall.&lt;br /&gt;&lt;br /&gt;The current main areas of the supercomputer encompass the areas of biology, chemistry, geology, aerospace, medicine, weather and climate research, military, and physics.&lt;br /&gt;&lt;br /&gt;Except for the military, which operates mainly military simulations to identify the areas in that we are dealing with very complex systems or subsystems that are linked to each other far-reaching measure. Thus, changes in one subsystem, usually more or less strong impact on adjacent or connected systems. Through the use of supercomputers, it is always easier to take into account many of these consequences, or even to predict, which could already far ahead of any countermeasures are taken. This applies for example in simulations of climate change, the predictions of earthquakes or volcanic eruptions, as well as in medicine in the simulation of new drugs on the organism. (However, logically, such simulations are only as accurate as it allow the programmed parameters and models for the calculation.) The huge amounts of investment in the steady increase in FLOPS and thus the development of ever-faster supercomputers, especially with the use benefit and the possible " knowledge advantage "is justified for humanity, not from the aspects of the general technological progress.&lt;div class="blogger-post-footer"&gt;Computer information&lt;/div&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh_SAwit9j-_zk4LT7Ef965ltkxByvUxRx70tNCm-wnfyHnygGqvCpvypesc5XDWUuNbF_5XAx5ueRb4IRTT8LsKuNmtIdsYiWhLdm22RYFd567bm9elDPwSCD9we-fMv-cU5LyGlKs1Ik/s72-c/sc+2.jpeg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Construction of super computers</title><link>http://computerinfo4uall.blogspot.com/2010/03/construction-of-super-computers.html</link><author>noreply@blogger.com (Computer info)</author><pubDate>Fri, 26 Mar 2010 20:23:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-6909471109484533377.post-1668086327605293721</guid><description>&lt;a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjrU4Ov_XVbSwf97K3NweSxsLP59ZmRUL6hRiqplBF6yz_84ywLmggI6_zTsTZ2if9ei760CU2yBvfGjjODiyoaxj7yRWw-Lp4htphg1jyQZ0P9Gr3xvHAvDbibJHE3p73aoEfsa162beE/s1600/sc+1.jpeg"&gt;&lt;img style="float:left; margin:0 10px 10px 0;cursor:pointer; cursor:hand;width: 99px; height: 132px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjrU4Ov_XVbSwf97K3NweSxsLP59ZmRUL6hRiqplBF6yz_84ywLmggI6_zTsTZ2if9ei760CU2yBvfGjjODiyoaxj7yRWw-Lp4htphg1jyQZ0P9Gr3xvHAvDbibJHE3p73aoEfsa162beE/s400/sc+1.jpeg" border="0" alt=""id="BLOGGER_PHOTO_ID_5453149111395677650" /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;Since can not build any fast processors, are all high-performance parallel computers. A parallel computer is a computer that will be distributed simultaneously in the operations on multiple CPUs to increase the operating speed. Be tuned for optimal utilization of a supercomputer, the programming so as closely as possible on the individual parallel processors.&lt;br /&gt;&lt;br /&gt;Supercomputers are now generally conceived as a vector or Skalarrechner calculator. They are based on different processor architectures. Vector processors (or vector computers, array processors called) perform a calculation simultaneously on many data (in a vector or array) from. Skalarprozessoren other hand, can process only a Operandenpaar per command. Skalarrechner therefore often based on thousands of standard processors that are networked together) (computer cluster.&lt;br /&gt;&lt;br /&gt;Originally, the outstanding performance by maximum utilization of available technology was achieved by designs were chosen that were too expensive for large volume production (eg, liquid cooling, exotic materials and components, compact design for short signal paths), the number of processors was rather low. For a long time to establish more so-called clusters that are interconnected in which a large number of (mostly cheap) individual computers to a large computer. Compared to a vector computer nodes in a cluster have their own peripherals and only its own local memory. Clusters use standard components, so they initially offer cost advantages over vector computers. But they require a far higher programming costs. It is examined whether the established programs lend themselves to being distributed across many processors. Used programming languages include Fortran and C.&lt;br /&gt;&lt;br /&gt;Closely associated with the term, the Cray supercomputer. It is named after its founder, Seymour Cray, and made the first supercomputer in the 1970s. The first Cray-1 supercomputer installed officially abolished 1976 130 mega-flops. (For comparison, a normal PC can now run multiple GigaFLOPS.)&lt;div class="blogger-post-footer"&gt;Computer information&lt;/div&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjrU4Ov_XVbSwf97K3NweSxsLP59ZmRUL6hRiqplBF6yz_84ywLmggI6_zTsTZ2if9ei760CU2yBvfGjjODiyoaxj7yRWw-Lp4htphg1jyQZ0P9Gr3xvHAvDbibJHE3p73aoEfsa162beE/s72-c/sc+1.jpeg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title/><link>http://computerinfo4uall.blogspot.com/2010/03/supercomputer-or-super-computer-is-high.html</link><author>noreply@blogger.com (Computer info)</author><pubDate>Fri, 26 Mar 2010 20:21:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-6909471109484533377.post-6886350318022719758</guid><description>&lt;a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhxEdbqtePtsUOyBsF_1woYFU_vLj6RPznr3QG1cRqYi-4pa8UhVu6drr1J3is4BPvjM7yS81vGyNO7i6S1-B73sU1fT8lE6gHqC5MMkSmVvuTg8YVbVYbWEmyvQnwP3CbOYiqXjHkhs7M/s1600/180px-Columbia_Supercomputer_-_NASA_Advanced_Supercomputing_Facility.jpg"&gt;&lt;img style="float:right; margin:0 0 10px 10px;cursor:pointer; cursor:hand;width: 180px; height: 131px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhxEdbqtePtsUOyBsF_1woYFU_vLj6RPznr3QG1cRqYi-4pa8UhVu6drr1J3is4BPvjM7yS81vGyNO7i6S1-B73sU1fT8lE6gHqC5MMkSmVvuTg8YVbVYbWEmyvQnwP3CbOYiqXjHkhs7M/s400/180px-Columbia_Supercomputer_-_NASA_Advanced_Supercomputing_Facility.jpg" border="0" alt=""id="BLOGGER_PHOTO_ID_5453148681357706114" /&gt;&lt;/a&gt;&lt;br /&gt;Supercomputer or a super computer is a high performance computer is working at the time of its introduction in the top performance range achievable. It does not matter, based on which construction of the machine. A typical feature of a modern supercomputer is its large number of processors that can access to shared peripherals and a partially shared memory.&lt;div class="blogger-post-footer"&gt;Computer information&lt;/div&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhxEdbqtePtsUOyBsF_1woYFU_vLj6RPznr3QG1cRqYi-4pa8UhVu6drr1J3is4BPvjM7yS81vGyNO7i6S1-B73sU1fT8lE6gHqC5MMkSmVvuTg8YVbVYbWEmyvQnwP3CbOYiqXjHkhs7M/s72-c/180px-Columbia_Supercomputer_-_NASA_Advanced_Supercomputing_Facility.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Various ways to open a task manager</title><link>http://computerinfo4uall.blogspot.com/2010/03/various-ways-to-open-task-manager.html</link><author>noreply@blogger.com (Computer info)</author><pubDate>Sat, 6 Mar 2010 06:52:00 -0800</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-6909471109484533377.post-6390186232575986116</guid><description>&lt;a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi6sFtxTyEV4h650GJt-3R8ahtJ0dy9Z14U9UwProKBb_BomnIiLDEQrdaYEnFu7JurvclF9rUHuyvsSJPEAMBvuHtCPQAvrJbUhqCeroYZju8F4bQ4nFnarxPoLaJ3ur0DKsIAvpVSugc/s1600-h/images1.jpeg"&gt;&lt;img style="float:left; margin:0 10px 10px 0;cursor:pointer; cursor:hand;width: 141px; height: 103px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi6sFtxTyEV4h650GJt-3R8ahtJ0dy9Z14U9UwProKBb_BomnIiLDEQrdaYEnFu7JurvclF9rUHuyvsSJPEAMBvuHtCPQAvrJbUhqCeroYZju8F4bQ4nFnarxPoLaJ3ur0DKsIAvpVSugc/s320/images1.jpeg" border="0" alt=""id="BLOGGER_PHOTO_ID_5445533937578606722" /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&gt;click ctrl+alt+del&lt;br /&gt;&lt;br /&gt;&gt;click shift+ctrl+esc&lt;br /&gt;&lt;br /&gt;&gt;right click task bar and select task manager&lt;br /&gt;&lt;br /&gt;&gt;in run type taskmgr.exe to open task manager&lt;div class="blogger-post-footer"&gt;Computer information&lt;/div&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi6sFtxTyEV4h650GJt-3R8ahtJ0dy9Z14U9UwProKBb_BomnIiLDEQrdaYEnFu7JurvclF9rUHuyvsSJPEAMBvuHtCPQAvrJbUhqCeroYZju8F4bQ4nFnarxPoLaJ3ur0DKsIAvpVSugc/s72-c/images1.jpeg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item></channel></rss>