Cool Computer "Stuff" -IT Essentials - Cisco - HTML - CSS - Project Management (from nevadadodge7)
Friday, December 4, 2009
Herman Hollerith
Herman Hollerith looks out over the invention that brought data processing to the world. Sixty-two million cards were placed in the readers of these machines and then dropped into the sorting box (right) when the appropriate lid opened. (Image courtesy of The Computer History Museum, www.computerhistory.org)
from: http://www.pcmag.com/encyclopedia_term/0,2542,t=Hollerith+machine&i=44307,00.asp
World's First Hard Drive!!
Just Gotta Love Technology!!!!
IBM unveiled the 305 RAMAC on September 13th, 1956. The computer was nothing but a revolution since it could store up to 4.4MB of data (5 million characters) – an enormous amount of data back then. The data was stored on fifty 24 inch magnetical disks. More than 1000 systems were built and the production ended in 1961. IBM leased the computers for $3,200 per month.
from: http://gadgets.fosfor.se/history-of-data-storage/
Friday, October 16, 2009
Love Buffie
Does this mean I will never own an Apple product or own a Linux computer? Had you asked me that 6 months ago Iwould have said, "Duh, of course not." But even the hardest of heads can be changed. I now own a computer with Ubuntu and I own 2 iPhones. Will I own an Apple PC? If donated, I would LOL. Why do I say this? Because my mom was right when she said, "money doesn't grow on trees." In the future, I may actually buy an Apple PC, but for now I stay with Windows.
The next thing that was asked was, "Do you think there is room for both Windows and Linx?" Absolutely! There are too many nerds in the world to let Linux die. Linux really is a nerd's delight. With the fully customizable atmosphere and the ability to have complete control of your OS, who wouldn't love it? Plus with the user actually dictating what changes need to be made instead of a team of "professionals," Linux holds something Windows will never have: 100% customer backing. The only negative thing I have ever read about Linux, is from users who are less than computer savy.
This brings me to my final point. Windows will be a huge player in the OS world due to ease of use. Not everyone is computer savy and able to do "nerd code". Plus they have things like the automotive industry in their back pocket. Yes even your car runs Windows. But will they always be top dog? That I cannot answer but I suspect if Windows 7 bombs like Vista did, I am putting my money on no. Already Apple is taking a bite out of Windows' profit with mildly funny commercials attacking the PC, playing on the way people have with Vista. Apple is opening the eyes of Microsoft victims to a new horizon. Only time will tell if the Apple will fall from the tree, but I have a feeling the Windows will be shut before long.
Great stuff Buffie!!! Keep it coming!!!
Thursday, October 15, 2009
Intel CPU's
Intel doesn’t need to launch a pair of new CPUs today. Its thousand dollar Core i7-965 Extreme is already the fastest chip out there by a comfortable margin. Its five hundred-something dollar Core i7-940 slides into second place without an issue. And the company’s entry-level Core i7, the 920, is reasonably priced to the point where it fits into our $1,300 System Builder Marathon parts list (and of course, it also helps that the 2.66 GHz chip approaches 4 GHz with some regularity).
Nevertheless, the company is taking advantage of Computex to launch a pair of fresh Core i7s—the 975 Extreme and the 950. Given their names, you’d think that these newcomers would fall into place on either side of the i7-965. But that’s not the plan at all. Instead, Intel says the i7-975 Extreme will replace the 965 at its exorbitant $1,000 price point and the i7-950 will replace the 940 at $562.
For the time being, 940s will probably float around in the channel at reduced prices. But with i7-920s still the overclocking darlings for less than $300, even a discounted i7-940 would still cost more than we’d be otherwise willing to pay for it.
Source: http://www.tomshardware.com/reviews/core-i7-975,2318.html
Tuesday, August 25, 2009
Mr. Jon Peltier
http://peltiertech.com/Excel/Charts/format.html
He has an amazing website devoted to Excel charts....
I bought him a cup of coffee!!
If he helps you out, so should you!
:-)
Saturday, May 9, 2009
Who would of thought...........
http://commandwindows.com/runline.htm
http://commandwindows.com/index.html
Wonderful computer tips.....
http://tips.vlaurie.com/
Picssa Tutorial......
Part One: http://www.makeuseof.com/tag/picasa-101-getting-started/
Part Two: http://www.makeuseof.com/tag/picasa-101-enjoying-the-view/
Friday, May 1, 2009
OSI Model

7-Application
6-Presentation
5-Session
4-Transport
3-Network
2-Data Link
1-Physical
7-The Application Layer
Protocols:
Application Layer
SMB, NCP, FTP,TFTP, NFS. SNMP,Telnet, SMTP
This layer is very closer to user than other layers.in this layer the user interface protocols like FTP,Telnet,SMTP and so on is working.in another word this layer take data from sender system interface and give it to receiver system interface in other side. the Aplication layer interfaces is Winsock And NetBios(microsoft base network only). the applicatio layer protocols often include the session and presentation layer functions.
6-The Presentation Layer
Protocols:
Presentation Layer
NCP, Telnet, FTP,TFTP, NFS, SNMP,SMTP
This layer purpose is to translate the different syntax of systems to the actual syntax of the user system. when the communicating system establish a connection at presentation layer, they exchange message containing information about the syntaxes they have in common, and together they choose the syntax they will use during the session. the sender system send the data in its own syntax and the presentation layer of the sender system translate it to the communication syntax that are chosen before and the receiver system presentation layer receive the data and translate it to its own system syntax and gives it to upper layer(application). another functions of this layer is Compression & Decompression, Encryption & Decryption.
5-The Session Layer
Protocols:
Session Layer
Telnet, FTP, TFTP,NFS, SNMP, SMTP
The session layer allows users on different machines to establish sessions between them One of the services of the session layer is to manage dialoguue control. Sessions can allow traffic to go in both directions at the same time, or in only one direction at a time. If traffic can only go one way at a time, the session layer can help keep track of whose turn it is. Another session service is synchronization. Consider the problems that might occur when trying to do a two-hour file transfer between two machines on a network with a 1 hour mean time between crashes. After each transfer was aborted, the whole transfer would have to start over again, and would probably fail again with the next network crash. To eliminate this problem, the session layer provides a way to insert checkpoints into the data stream, so that after a crash, only the data after the last checkpoint has to be repeated. the session layer provide 22 services but i described some important of that. there are no separate session layer protocols as there are at the lower layer. Session layer functions are instead integrated into other protocols that also included presentation and application layer functions.
4-The Transport Layer
Protocols:
Transport Layer
SPX, TCP, UDP,NetBEUI
The transport layer protocols provide services that compliment those provided by network layer.the difference between the protocols provided at the transport layer within a particular protocol suite(like TCP/IP, IPX/SPX) is that some are connection oriented and some are connectionless. A connection-oriented protocol is one in which the two communicating system exchange message to establish a connection before they transmit any application data. This ensure that the systems are both active and ready to exchange message. TCP; for example, is a connection-oriented protocol wen you use a web browser to to connect to an internet server, the browser and the server first perform what is known as three-way handshake to establish the connection. Only then dose the browser transmit the address of the desired web page to the server. when the data transmission is completed, the systems perform a similar handshake to break down connection. Connection-Oriented Protocols also provide additional services such as packet acknowledgment, data segmentation, flow control, and end-to-end error detection and correction.
Packet Acknowledgment:when a packet from a system sent to another system , the sender wait of the a acknowledgment packet from recipient that are says to sender system the packet are truly transmitted or the packet are damaged. if the packet damaged the sender system must to send the damaged packet again.
Data Segmentation:in the digital technology the main data is split to very smaller pieces that are called packet to transmit in any way.
Flow Control:this is the generation by a receiving of message that instruct the sending system to speed up or slow down its rate of transmission.
3-The Network Layer
Protocols:
Network Layer
IPX, IP, ICMP, RIP,OSPF, EGP, IGMP,NetBEUI, DLC,DECNet
the network layer protocol responsible to end-to-end communications, whereas data-link layer protocols function only on the local lan. the main function of the network layer is Routing. Routing is the process of directing a datagram from its source, through an internetwork, and to its ultimate destination using the most efficient path possible. The network layer determines how messages are routed within the network. It provides transport entities independence from routing and relay considerations, including the case where subnetworks (relay-only) nodes are used. All relay functions are operated within or below this layer. the other function of the network layer is to add a header that are contain the source and destination ip address. another function of network layer is fragmentation. for example, Token Ring frames can be as large as 4500 bytes, but Ethernet frames are limited to 1500 bytes. when a large datagram that originated on a Toke Ring network is routed to an Ethernet network, the network layer protocols must split it into pieces no larger than 1500 bytes each. This process is called fragmentation.
2-The Data Link Layer
Protocols:
Data Link Layer
HDLC, ARP, RARP,NDIS, ODI, LLC, SAP, PPP, SLIP
The protocol at the data-link layer is the conduit between the computer's networking hardware and its networking software. Network layer protocols pass their outgoing data down to the data-link layer protocol, which packages it for transmission over the network. When the other systems on the network receive the transmitted data, their data-link layer protocols process it and pass it up to the network layer. When it comes to designing and building a LAN, the data-link layer protocol you choose is the single most important factor in determining what hardware you buy and how you install it. To implement a data-link layer protocol, you need the following hardware and software: -Network interface adapters (When an adapter is a discrete card plugged into a bus slot, it is referred to as a network interface card or NIC.) -Network adapter drivers -Network cables (or other media) and ancillary connecting hardware -Network hubs (in some cases) Network interface adapters and hubs are both designed for specific data-link layer protocols, and are not interchangeable with products for other protocols. Some network cables are protocol-specific, while others can be used with various protocols. By far the most popular data-link layer LAN protocol in use today (and throughout the history of the LAN) is Ethernet. Token Ring is a distant second, followed by other protocols such as the Fiber Distributed Data Interface (FDDI). Data-link layer protocol specifications typically include the following three basic elements: -A format for the frame (that is, the header and footer applied to the network layer data before transmission) -A mechanism for controlling access to the network medium One or more physical layer specifications for use with the protocol These three components are discussed in the following sections. Media Access Control The computers on a LAN usually share a common half-duplex network medium, which means that it is possible for two computers to transmit data at the same time. When this happens, a packet collision is said to occur, and the data in both packets is lost. One of the main functions of the data-link layer protocol on this type of network is to provide a mechanism that regulates access to the network medium. This mechanism, called a media access control (MAC) mechanism, provides each computer with an equal opportunity to transmit its data while minimizing the occurrence of packet collisions. The MAC mechanism is one of the primary defining characteristics of a data-link layer protocol. Ethernet uses a MAC mechanism called Carrier Sense Multiple Access with Collision Detection (CSMA/CD). Several other protocols, including Token Ring, use a scheme called token passing.
1-The Physical Layer
Protocol:
Physical Layer
CSMA/CD & TokenPassing
The physical layer, at the bottom of the OSI model, is, as the name implies, the layer that defines the nature of the network's hardware elements, such as what medium the network uses, how the network is installed, and the nature of the signals used to transmit binary data over the network. The physical layer also defines what kind of network interface adapter must be installed in each computer and what kind of hubs (if any) to use. Physical layer options include various types of copper or fiber optic cable, as well as many different wireless solutions. In the case of a LAN, the physical layer specifications are directly related to the data-link layer protocol used by the network. When you select a data-link layer protocol, you must use one of the physical layer specifications supported by that protocol. For example, Ethernet is a data-link layer protocol that supports several different physical layer options. You can use one of two types of coaxial cable with Ethernet, any one of several types of twisted pair cable, or fiber optic cable. The specifications for each of these options include a great deal of detailed information about the physical layer requirements, such as the exact type of cable and connectors to use, how long the cables can be, how many hubs you can have, and many other factors. These specific conditions are required for the protocol to function properly. A cable segment that is too long, for example, can prevent an Ethernet system from detecting packet collisions. When the system can't detect errors, it can't correct them, and data is lost. While some aspects of the physical layer are defined in the data-link layer protocol standard, others are defined in separate specifications. One of the most commonly used physical layer specifications is the "Commercial Building Telecommunications Cabling Standard," published jointly by the American National Standards Institute (ANSI), the Electronics Industry Association (EIA), and the Telecommunications Industry Association (TIA) as EIA/TIA 568A. This document includes detailed specifications for installing cables for data networks in a commercial environment, including the required distances from sources of electromagnetic interference and other general cabling policies. Nowadays, in most cases, large network cabling jobs are outsourced to specialized contractors, and any such contractor you hire for a LAN cabling job should be intimately familiar with EIA/TIA 568A and other such documents, including your city's building codes. The other communications element found at the physical layer is the particular type of signaling that is used to transmit data over the network medium. For copper-based cables, these signals are electrical charges. For fiber optic cables, the signals are pulses of light. Other types of network media can use radio frequencies, infrared pulses, and other types of signals. In addition to the physical nature of the signals, the physical layer dictates the signaling scheme that the computers use. The signaling scheme is the pattern of electrical charges or light pulses used to encode the binary data generated by the upper layers. Ethernet systems use a signaling scheme called Manchester encoding, and Token Ring systems use a scheme called Differential Manchester.
Reference credit:
The computer guy at
http://home.earthlink.net/~tt4titans/id13.html
Saturday, April 25, 2009
Wednesday, March 11, 2009
VMWare
Get more out of your existing computer hardware. Use the free VMware Player application to run multiple operating systems simultaneously on a single PC.
With VMware Player, you can use any virtual machine created by VMware Workstation, VMware Fusion, VMware Server or VMware ESX, as well as Microsoft Virtual Server virtual machines and Microsoft Virtual PC virtual machines. Import third party images including Symantec Backup Exec System Recovery (formerly called Live State Recovery) images, Norton Ghost 10 images, Norton Save & Restore images, StorageCraft ShadowProtect images, and Acronis True Image images to VMware Player compatible virtual machines. Use 32- and 64-bit Windows, Linux, NetWare, or Solaris x86 operating systems side-by-side, without rebooting or partitioning your hard drive.
http://vmware.com/products/player/SAN

Hugely Scalable Dell EqualLogic virtualized iSCSI
Seamless scalability, up to 576 TB in a single SAN
High density storage: 24 or 48 TB in 4U of rack space
Low TCO with excellent cost-per-GB and comprehensive SAN management and protection software
Sunday, February 8, 2009
Saturday, January 31, 2009
Terminal Emulators
This post is about video terminals produced by Digital Equipment Corporation (DEC) from 1970 to 1995. The most famous of these is the VT100, a name which is recognized most often today as a setting in terminal emulation programs.
The real video terminals discussed on this web site ( http://vt100.net/ ) were dedicated devices which are connected to a computer (host) with a serial line. They usually consist of a screen and keyboard, with very little processing power and no local storage. Characters typed on the keyboard are transmitted to the host computer, and characters output from programs running on the host are sent to the terminal to be displayed on the screen. Why would we use devices this simple? Well, their simplicity makes them reliable. There is no operating system and no downloaded software, so they are pretty much impervious to user meddling and viruses. Before PCs put computing power on every desk, a central computer would support tens of users. Now that PCs are as powerful as old mainframes and can run capable multi-user operating systems (take a bow, Linux), there is a resurgence of interest in these low bandwidth, low cost and low maintenance devices.
AWESOME !!!
Terminal Emulators 2
http://www.cs.utk.edu/~shuford/terminal_index.html
By ...Richard S. Shuford
Welcome to my Archive of Video-Terminal Information concerning character-cell video-display terminals, serial-line remote-graphics terminals, and software that emulates them. When I say character-cell terminal, I mean some keyboard-possessing device that is connected to a host computer by a serial cable and typically (if not exclusively) is used to display textual information arriving in the form of ASCII (or perhaps EBCDIC) characters. It is the thinnest possible thin client.
A serial-line remote-graphics-protocol terminal is also connected by a serial (usually RS-232-C) cable to a host, and it may display both ASCII text and graphics images sent to it by the remote host. Protocols for transmitting images include Tektronix vector graphics, DEC's ReGIS and Sixel protocols, and NAPLPS (North American Presentation-Level-Protocol Syntax).
X terminals in their own right are beyond the scope of this collection. An X terminal (such as one of these products still sold by NCD and Wyse Technology, or formerly made by Human Designed Systems/Neoware or Tektronix or Hewlett-Packard) speaks the X protocol, displays graphics in a completely bit-mapped fashion, and prefers to communicate over high-speed connections such as Ethernet. (Another variation on a thin-client is the "Network Computer".) I do, however, keep some small amount of X information here, but focusing on how the xterm application emulates a character-cell terminal.
Note that the information here does not include much coverage of the so-called "Terminal Services" functions in Microsoft Windows, which use the proprietary Remote Desktop Protocol (RDP). (As the computer industry has come to expect, adopting a Microsoft protocol forces you to buy Microsoft software and stay in lockstep with the Redmond upgrade cycle.)
This information started as a collection of discussion articles from Usenet newsgroups, especially comp.terminals but including other groups, but with some effort to organize the postings broadly by topic. However, resources from other sources have been added over time. The information in the collection varies in quality, and I personally wrote only a small part of it, but many people, who still have reason to use a terminal, have found it useful. There are no guarantees of applicability or fitness implied.
You should be able to access almost everything via HTTP. If you have trouble, let me know. If you possess information that you'd like to contribute to this collection, send me e-mail. Thanks.
...Richard S. Shuford
What is Gopher?
A type of Internet protocol from the early 1990's. Gopher presents a hierarchy of menus like a tree or graph of links. The links can be to documents, runnable programs, or other gopher menus arbitrarily far across the Internet.
From University of Minnesota March 1993
The Internet Gopher Protocol
(a distributed document search and retrieval protocol)
A simple protocol for burrowing through a TCP/IP internet. The Internet Gopher protocol and software follow a client-server model. This protocol assumes a reliable data stream and TCP is assumed. Gopher servers should listen on port 70 (port 70 is assigned to Internet Gopher by IANA). Documents reside on many autonomous servers on the Internet. Users run client software on their desktop systems, connecting to a server and sending the server a selector (a line of text, which may be empty) via a TCP connection at a well-known port. The server responds with a block of text terminated by a period on a line by itself and closes the connection. No state is retained by the server. Servers return either directory lists or documents. Each item in a directory is identified by a type (the kind of object the item is),user-visible name (used to browse and select from listings), an opaque selector string (typically containing a pathname used by the destination host to locate the desired object), a host name (which host to contact to obtain this item), and an IP port number (the port at which the server process listens for connections). The user only sees the user-visible name. The client software can locate and retrieve any item by the trio of selector, hostname, and port.
Quoted from ftp://ftp.isi.edu/in-notes/rfc1436.txt
More info:
http://www.savetz.com/yic/YIC03FI_20.html
gopher://gopher.floodgap.com/1/new/
http://gopher.floodgap.com/overbite/relevance.html