Thursday, November 06, 2008

Nokia 500 Review

Navigate on course and in touch with a great traveling companion offering a clear view, turn-by-turn instructions, handsfree calls, and in-car entertainment. Stay on course with turn-by-turn voice guidance combining Nokia Maps and an internal SiRF Star III GPS receiver. Get a clear view with the intuitive Nokia interface, large 4.3" touch screen, 2D/3D maps, plus visual exit numbers and sign posts.

Communicate with excellent Bluetooth handsfree functionality, and digital signal processing (DSP) for echo cancellation and noise reduction. Download your own phonebook, voice dial, and manage your calls from a compatible device.

Take time out from your travel to enjoy music, movies, and photos with memory cards up to 16 GB. Or, listen to your tunes through your car stereo with the integrated FM transmitter. 2D / 3D Map view Split Screen with additional information also visible in other menus - next maneuver, current speed, estimated arrival time and remaining distance Visual signposts Voice instructions including street names Bluetooth 2.0 with Handsfree Profile v. 1.5 Phonebook Download in background (Phonebook Access Profile 1.0 plus additional methods to support wide range of cellular phones) / Up to 2000 Phonebook entries, 5 numbers each Store and play videos from the memory card in MP4 Store and view photos from the memory card JPEG, BMP, PNG, GIF Store and play music from the memory card in MP3, AAC, eAAC+, WMA Navigate on course with turn-by-turn voice guidance - combining Nokia Maps, and an internal SiRF Star III GPS receiver Unit.

Saturday, November 01, 2008

Flip Cam

what's all the buzz surrounding the flip cam? Well here's a few reviews from Amazon.com.

"1. It couldn't be easier to take videos. You insert the batteries and press a button and you're filming.

2. You connect it to the computer by plugging it into the USB port. Software downloads to your computer, all very smoothly. The connection to the USB port is problematic. A USB connector pops out of the side of the camera, which is very elegant but doesn't work well in practice. I had to unplug another device to fit it into the available slot next door. It's kind of like having one of those big plugs taking up so much room on a power strip. I've already ordered an extension for it.

3. The editing software is very basic. This is to be expected. This is supposed to be a quick, point-and-shoot device that takes basic video that can quickly be shared on the web. Which is a great idea. But here's the thing: you can edit a video from either end, ending it earlier or starting it later. But you can't crop out a part in the center. Is that insane? Now, you can make copies of a movie and then take the beginning part of one and the ending part of another. It's inelegant but possible, right? And there is a "movie-making" feature that allows you to mesh these two movies together...except that you can only save the product if you're in Windows. With Mac you can't save it, so it's useless for posting the amalgam on the web. As far as I can see, at least.

4. Quality seems okay for the purpose. Looks good on my computer, at least.

So in short if you're going to take very short videos that you don't intend to edit and post them on YouTube, this works well. Though I have to say, it isn't super speedy. While I've been writing this my computer has been processinga three-minute video for posting online, and it's only gotten through about 5% of it so far."

So, apparently this device is ideal for youtube users.Sounds like fun!


Wednesday, June 11, 2008

Forensic Computer Analyst

What does a forensic computer analyst do? This is one of the hottest jobs in demand right now. Check out this article for an in depth look at this career.

Computer Forensics Examiners
By:Alison Cole

Computer forensics examiners are professionals who use analytical and investigative techniques to provide digital evidence for a specific or general activity.

The International Society of Forensic Computer Examiners provides the Certified Computer Examiner (CCE) certification for individuals who are interested in making a career in the field of Computer forensics.

The CCE certification is provided with an intention to professionalize and further the field and science of computer forensics. The CCE certification provides a fair, uncompromised process for certifying the capability of forensic computer examiners. This certification is universally recognized, which helps in setting high and ethical forensic standards for forensic computer examiners.

CCE certification is only given to individuals with no criminal record. Examiners are certified only after they pass online exams and successfully perform actual forensic examinations on three test medias. The certified examiner must adhere to the ISFCE code of ethical standards and professional responsibilities.

Before trying for certification, it is recommended that one has a proper understanding of basic rules of evidence, as they are related to the seizure or acquisition of magnetic media, handling, marking and storage of electronic evidence, the ?chain of custody? and the ?right to privacy.?

Computer examiners are trained in proper evidence handling and documentation. With a logical thought process and investigative instincts, these individuals are able to operate at a totally professional level.

People with a military background, government or former law enforcement officers have a chance to be successful computer forensic examiners, as they already have developed a fine investigative instinct.

Certified Computer forensic examiners are held in high regard. This is because an increasing number of companies and government agencies need them.

CCE certification is becoming a valuable credential for computer forensic examiners. Unfortunately a number of computer forensic examiners have false certification, so it is advisable to beware of examiners whose credibility can always be challenged. Computer Forensics provides detailed information on Computer Forensics, Computer Forensics Software, Computer Forensics Consulting, Computer Forensics Jobs and more. Computer Forensics is affiliated with Industrial Robots.

Article Source:http://EzineArticles.com/?expert=Alison_Cole
http://EzineArticles.com/?Computer-Forensics-Examiners&id=353008

Wednesday, May 21, 2008

Great Plains Installation and Customization on Vista workstation

By: Andrew Karasev

Microsoft Dynamics GP workstation is compatible with Vista,
including Vista 64 bit. However if you try to install it on
Vista as it is, you will be getting error message: â?oAn error
occurred while using the BCP utility -- data was not correctly
copied to the server.� Actually all you need to do it to turn
off User Account Control in control panel User Accounts. Then
just launch GP installation and follow the wizard. We will be
assuming here that you are installing GP version 10.0, which is
the latest one at the time of writing this news ��" May
2008. Letâ?Ts review installation and modification in relation
to Vista and 64 bit Windows server and SQL Server 2005: 1.
eConnect runtime. At this time COM+ side of eConnect is not
compatible with 64 bit platform. So, if you are planning to
install the tool, where eConnect is utilized: Integration
Manager for example, please be sure that COM+ or local objects
of eConnect will reside on 32 bit computer

2. Dexterity custom logic and add-ons. They should be compatible
with Vista, assuming that Dex doesnâ?Tt call COM objects, but
being honest ��" this is very unusual for Dexterity to do
something like that. Such popular Dex add-ons as Posting Server
should work out of the box

3. FRx. When you are planning to deploy FRx, please know that
6.7 version SYSDATA folder must be resided on 32 bit Windows
server. Please, understand that FRx 6.7 was introduced in 2005
at the time when Vista was only in inception stage and AMD was
just releasing its first Athlon 64 processors

4. MS Visual Studio C# or VB programming add-ons. Here you are
typically deploy either ADO.Net or directly eConnect (which is
definitely preferred over ADO, but requires learning curve)

5. SRS versus Crystal Reports. In essence, if you are ready to
launch reports as stand alone application, we donâ?Tt see any
revolutionary advantage of one reports design tool over another.
SRS or Microsoft SQL Server Reporting Services is web
application, maybe this fact gives you some advantage, as SRS
could be deployed on your web server and so exposed to your
worldwide users

6. eCommerce. Here we encourage you to review Posting Server,
allowing you to post GP batches in Sales Order Processing and
other modules automatically



About the author:
Andrew Karasev, Alba Spectrum http://www.albaspectrum.com
help@albaspectrum.com 1-866-528-0577, 1-630-961-5918, serving
Great Plains USA and Canada nationwide. Local service in
Chicago, Houston, Dallas, San Diego. Please visit our
information portal Pegas Planet: http://www.pegasplanet.com

Thursday, January 24, 2008

Networking Home Computers

Have you ever thought about networking your computers at home? If you have a small collection of computers around the house (and a small collection of computer users), you can connect each one of those computers to one another and share data, software, and hardware including a single Internet connection. There are many creative uses for home networking, however it's an ideal situation when upgrading each computer to the same capability is financially out of the question. On a home network, each computer has access to the equipment of the better machine in the group as if that equipment were their own.

Connecting computers with either an Ethernet cable or a Wireless connection can create a home network. The easiest and cheapest method uses an Ethernet connection, which requires a series of network cards, a cable for each computer, and a router. The network card is similar to the old modems we used in the past to connect to the Internet, however in a home network, it's used to communicate with every computer that's connected to it.

You'll want to first, select the computers that will connect to each other and then install the network cards inside each of them. Then you'll connect a cable to each computer that will communicate with the server. These cables won't connect to the server directly. Instead, they'll connect to the router. To enable Internet access for each computer, this router will need to connect with a modem of the host machine.

Once the hardware is set up correctly (you'll need to read the instruction manual of your equipment for details), you can then setup the network from Windows on each machine. Within Windows, you can set up a home network similar to the way that you set up an Internet connection. Only this time, you'll set up a LAN (Local Area Network) connection.

Windows should walk you through setting up a LAN after starting the computer and once complete, you can begin to connect one of your machines to the network. You can do this through Internet Explorer by typing in the address and password required to access the router (the address and password required to access the router will be in the router manual).

Connected to the network, each computer can send files back and forth, open programs on a remote computer, play the sound files and videos located on another computer, and share a single Internet account to browse the web, download files, or chat with someone in an entirely different country. If a single printer is available on only one computer in the network, every connected PC can send documents to it and print them out. Kids will enjoy the ability to play multi-player games and adults will enjoy the ability to blast a single message to everyone at once or maintain a group schedule.

Since we're describing a home network that will connect to the Internet, you're strongly advised to install a protective firewall program to thwart Internet viruses, worms, or other damaging spyware code. Firewalls prevent - but they don't repair. Only anti-virus and anti-spyware programs can reverse damage. So you should install a firewall on the computer that grants access to the computer, and then install an anti-virus and anti-spyware program on each of the remaining computers in the network.

If you have files that shouldn't be shared (bank statements, credit card information, etc.), you can restrict their access in one of several ways. You can put them in a new folder and then remove the "read" permissions for that folder. Or you can specify who can (and who cannot) access specific files with a password from within Windows Control Panel.