Sunday, December 20, 2009

Life Insurance Vacancy

This is an excellent opportunity with a leading Insurer based in London. You will assist with the assessment of group and individual healthcare business utilising medical information, previous claims history and guidelines set out by the firm along with analysis of profitability and provision of management information. You will ideally have 2 years plus group life or healthcare experience combined with statistical and analytical
skills. Excellent opportunity to move towards an Underwriting role with exposure to the International Healthcare market specifically Europe. Please apply for further details.

Industry Sector: Employee Benefits
Job Type: Permanent
Region: London
Area: City of London
Specific Location: London
Salary: £35000 to £45000 per annum
Salary Description: £35000 - £45000 per annum + To £45k plus benefits
Posted: 14/12/2009

to read more here
Continue Reading...

Mobile Development

Mobile PCs refer to all mobile computers, including laptops, notebooks, Tablet PCs, ultra mobile PCs (UMPCs), and other form factors that are developed running Microsoft Windows XP or a later version of the full Windows operating system. Mobile development is the process of creating applications to run in the most optimized way on mobile PCs.

Mobile PCs vs. Mobile Devices

Mobile PCs are defined as computers that run the full Microsoft Windows XP or later operating system. More specifically, mobile PC development refers to creating applications for laptops, notebooks, sub-notebooks, ultra-mobile PCs or the premier
mobile PC, the Tablet PC.

This means that we are not talking about mobile devices such as Pocket PCs or Smartphones running the Windows Mobile operating system. These are usually referred to as mobile devices as opposed to mobile PCs.

Mobile PC Considerations

Applications for mobile PCs need to be aware of the often constrained resources available and the changing states that occur as a result of not being in a static location. In order to give the user an optimal experience on a mobile PC, software must be aware of these changing conditions and react in the most appropriate way for the user.

Power Management

One of the main resource restrictions on a mobile PC is the limited power provided when running on a battery. In addition to being aware of the amount of power left and warning the user to save their work when it gets low, a great mobile PC application should be aware of when the machine is running on the battery and limit unnecessary activity. For instance, limit the use of animations or unnecessarily accessing network connections. to read more here

source MSDN
Continue Reading...

Sunday, December 6, 2009

JScript 8.0

What Is JScript 8.0 ? JScript 8.0 is the next generation of an implementation by Microsoft of the ECMA 262 language. Combining the feature set of previous versions of JScript with the best features of class-based languages, JScript 8.0 includes the best of both worlds. Improvements in JScript 8.0 — which is being developed in conjunction with ECMAScript Edition 4 — include true compiled code, typed and typeless variables, late- and early-binding, classes (with inheritance, function overloading, property accessors, and more), packages, cross-language support, and full access to the .NET Framework.

New Features

JScript 8.0 is a true object-oriented scripting language. Although JScript 8.0 can now use classes, types, and other advanced language features for writing robust applications, it retains its "scripting" feel, with support for typeless programming, expando functions and classes, dynamic code execution (using eval), and more.
In addition to being a typeless language, JScript 8.0 can now be a strongly typed language. In previous versions, the loosely typed structure of JScript meant that variables assumed the type of the value assigned to them. In fact, you could not declare the data types of variables in previous versions. JScript 8.0 provides more flexibility than previous versions of JScript by allowing variables to be type annotated. This binds a variable to a particular data type, and the variable can store only data of that type.
There are many advantages of strong typing in a programming language. In addition to the benefit that occurs when you use a data type that properly fits the data you are using, you get several other benefits:

• Improved execution speed
• Run-time/compile-time type-checking
• Self-documenting code

Finally, it is important to remember that JScript 8.0 is not a condensed version of another programming language, nor is it a simplification of anything. It is a modern scripting language with a wide variety of applications.

source and read more here
Continue Reading...

Extreme Quad-Core processor


Intel® Core™2 Extreme quad-core processor
When more is better—with four processing cores the Intel Core 2 Extreme processor delivers unrivaled¹ performance for the latest, greatest generation of multi-threaded games and multimedia apps. source and read more here
Continue Reading...

Sunday, November 15, 2009

Information Internet Explorer for Windows CE

Microsoft Internet Explorer for Microsoft Windows CE is the most compatible, feature-rich browser control for the Windows CE operating system. Developers, OEMs, independent software vendors (ISVs), and independent hardware vendors (IHVs) can use the technologies provided by Internet Explorer for Windows CE to build a custom browser for a specific device or market.

Feature Differences
Supported Technologies

Feature Differences

Internet Explorer for Windows CE supports the same features that were included in the Microsoft Win32 version of Internet Explorer 4.0, except for the following:

Data binding
Microsoft Visual Basic Scripting Edition (VBScript)
XML
Downloadable Microsoft ActiveX Controls
PNG
Microsoft virtual machine
Gopher
Recreation Software Advisory Council on the Internet (RSACi) rating system
Filters and transitions

Microsoft JScript (compatible with the ECMA 262 language specification) supports the same features that were included in the Win32 version of JScript, except for the following:

RegExp support
SAFEARRAY support (used for coexistence with VBScript and other languages)
Scrrun.dll support (dictionary object, file object, and so on)
Automatic loading of type libraries (IActiveScript::AddTypeLib is not supported)

Referencing cross window objects (for example, opener.top.location)
Internet Explorer for Windows CE is not intended to be an upgrade of Pocket Internet Explorer, so Internet Explorer for Windows CE does not attempt to provide backwards compatibility with Pocket Internet Explorer or its custom interfaces.

reference and to read more here. Live Bookmarks here
Continue Reading...

How To Upgrading Applications Created in Visual Basic 6.0

Visual Basic 2008 provides the ability to upgrade applications created in Visual Basic 6.0 so that you can continue development, taking advantage of the benefits of the .NET Framework. When you first open a Visual Basic 6.0 project file (.vbp), the Upgrade Wizard appears. A command-line tool is also provided for upgrading projects outside the development environment.
With Visual Basic 2008, you can upgrade applications created in Visual Basic 6.0 so that you can continue development, taking advantage of the benefits of the .NET Framework. When you first open a Visual Basic 6.0 project file (.vbp), the Upgrade Wizard appears. You can also upgrade projects outside the development environment with the provided command-line tool.
The upgrading tools modify code in your project to comply with Visual Basic 2008 syntax and replace any forms and controls with Visual Basic 2008 equivalents. Because of the differences between Visual Basic 6.0 and Visual Basic 2008, some parts of your project may not upgrade correctly. In these cases, you receive an upgrade report to guide you through the process of modifying the application.

If you are not ready to upgrade your Visual Basic 6.0 application, you can still take advantage of the benefits of the .NET Framework by using Interop Forms Toolkit 2.0. Interop Forms Toolkit 2.0 enables you to create new forms or UserControls in Visual Basic 2008 and use them in your Visual Basic 6.0 application.
Interop Toolkit 2.0 can be downloaded for free from the page on the MSDN Web site

reference and to read more here
Continue Reading...

Monday, November 2, 2009

Build an Email Server

Setting up an email server is remarkably straightforward, but there are a couple of things to be very careful of so it doesn't end up being a haven for spammers.
An email server consists of several components: an SMTP (Simple Mail Transport Protocol) server to handle mail transfer between hosts, POP and IMAP servers to give users access to mailboxes from their desktop mail clients, and often some kind of mail-filtering system for reducing spam and viruses passing through the system.

Postfix SMTP Server

There are many SMTP servers available in Ubuntu, and many administrators have their own personal preference, but the Postfix SMTP server is a good general-purpose choice that is fast, secure, and extensible:

$ sudo apt-get install postfix


The installation process will ask some questions about how the system will operate. Select Internet Site as the operation mode and set Mail Name to your domain.
Once the package has been installed, open /etc/postfix/main.cf in an editor and find a line like:

mynetworks = 127.0.0.0/8

To allow computers on your network to send outgoing email through the server, you need to add your network range to the mynetworks value. For example, if your network is the 192.168.0.0 class-C range, you would edit the line to read:
mynetworks = 127.0.0.0/8 192.168.0.0/24

This setting is critical to preventing your mail server being used as a relay by spammers, so only add network ranges that you trust.
When mail is delivered to a local user, it can be stored in several different ways. The older and most common approach is the mbox format, which stores all mail in a single file for each user, but the performance of the mbox format falls off dramatically with large mail volumes. Most newer mail systems use the maildir format, which stores messages in individual files nested inside directories. Postfix can handle either format equally well. Add this line to main.cf to use the maildir format:

home_mailbox = Maildir/

The Maildir/ value is appended to the home directory path of the recipient, and the trailing slash indicates to use the maildir format for storage.
Finally, look for a line that starts with mydestination =. Mail for all domains listed in this line will be accepted by your mail server, and local delivery will be attempted, so if you will host mail for multiple domains, add them here.
Restart Postfix to make your changes take effect:

$ sudo /etc/init.d/postfix restart

If you will be using your mail server only as an outbound mail gateway, that's all you need to do. Configure your email client to use your mail server for outbound mail and try sending a message to an external email account.
If the message doesn't come through, try "putting a tail" on the Postfix logfile to see what went wrong, and adjust your configuration as necessary:

$ sudo tail -f /var/log/mail.log

Reduce Spam with Greylisting

There are a variety of methods to protect your users from spam, but unfortunately there is no magic solution that causes absolutely no false positives or negatives. Greylisting is one approach that requires very little ongoing maintenance but has a very high success rate with very few false positives in which valid email is mistakenly rejected.

Greylisting works on the premise that valid mail servers will attempt redelivery of mail if they receive a "temporarily unavailable" error from the destination server, while spam hosts and viruses will typically attempt delivery only once and then move on to the next target. This means legitimate mail from a remote system will be delayed, but afterwards your mail server will remember that the sender is valid and let the mail straight through. The delay on the first message can be inconvenient, but on the whole, greylisting is one of the most successful spam-mitigation techniques currently available. To take advantage of greylisting, install Postgrey:

$ sudo apt-get install postgrey


Postgrey runs as a daemon on your mail server on port 60000, so configure Postfix to use it as a delivery policy service. Open /etc/postfix/main.cf and add an entry for the service:

smtpd_recipient_restrictions =
reject_unauth_destination,
check_policy_service inet:127.0.0.1:60000

Then restart Postfix and put a tail on the Postfix logfile before sending a test message to the system from an external mail server. On the first delivery attempt, you will see the message rejected with a nonfatal error, and then after five minutes your mail server will allow the message to be delivered. Subsequent messages from the same remote system will be delivered immediately.
Activity Reporting
To see how much traffic your mail server is handling, install the mailgraph package and start it up:

$ sudo apt-get install mailgraph
$ sudo /etc/init.d/mailgraph start


Mailgraph watches mail-server activity and logs it in an extremely efficient database, and then builds graphs that you can access through a web browser at http:// yourhost /cgi-bin/mailgraph.cgi. By default, the graphs are accessible from anywhere, so if you prefer to keep them secret, you may wish to restrict access to them using an Apache .htaccess file or with explicit access control in the Apache configuration.
POP and IMAP Services
To allow users to collect mail from the server, you need to run IMAP and/or POP services. Once again, there is a variety of alternatives, each of which have advantages and disadvantages, but the Courier suite provides very simple setup and natively supports maildir format:

$ sudo apt-get install courier-imap courier-imap-ssl \\
courier-pop courier-pop-ssl


If you configured Postfix to use maildirs, as described above, you don't need to make any changes to the Courier configuration: it will automatically detect the maildirs, and everything should just work.

source tutorial-hemlet.blogspot.com
Continue Reading...

Microsoft Data Access Components

The Microsoft® Data Access Components (MDAC) SDK documents the key technologies that are part of Microsoft's strategy for providing access to information across the enterprise.

Microsoft Data Access Components include ActiveX® Data Objects (ADO), OLE DB, and Open Database Connectivity (ODBC). Data-driven client/server applications deployed over the Web or a LAN can use these components to easily integrate information from a variety of sources, both relational (SQL) and non-relational.
If you have questions or need detailed information about properly redistributing MDAC, see Redistributing MDAC for a description of the distribution requirements for MDAC.

ActiveX Data Objects (ADO)

Microsoft ActiveX Data Objects (ADO) provides consistent, high-performance access to data and supports a variety of development needs, including the creation of front-end database clients and middle-tier business objects that use applications, tools, languages, or Internet browsers. The primary benefits of ADO are ease of use, high speed, low memory overhead, and a small disk footprint.
ADO provides an easy-to-use interface to OLE DB, which provides the underlying access to data. It uses a familiar metaphor — the COM Automation interface — available from all leading Rapid Application Development (RAD) tools, database tools, and languages.

OLE DB

Microsoft OLE DB is a set of interfaces that expose data from a variety of relational and nonrelational sources by using the Component Object Model (COM). OLE DB interfaces provide applications with uniform access to data stored in diverse information sources. These interfaces support the amount of DBMS functionality appropriate to the data store, enabling the data store to share its data.
OLE DB comprises a programmatic model consisting of data providers, which contain and expose data; data consumers, which use data; and service components, which process and transport data (such as query processors and cursor engines). In addition, OLE DB includes a bridge to ODBC to enable continued support for the broad range of ODBC relational database drivers.

Open Database Connectivity (ODBC)

The Microsoft Open Database Connectivity (ODBC) interface makes it possible for applications to access data from a variety of DBMSs. ODBC permits maximum interoperability — an application can access data in diverse DBMSs through a single interface. Furthermore, that application will be independent of any DBMS from which it accesses data. Users of the application can add software components called drivers, which create an interface between an application and a specific DBMS.
Components of the MDAC SDK

Microsoft ActiveX Data Objects (ADO)

This section contains Programmer's References for ADO, ADOX, ADO MD, and RDS, as well as samples documentation.

Microsoft OLE DB

This section documents the OLE DB and OLE DB for OLAP interfaces, including a Programmer's Reference, documentation for various OLE DB providers, and samples.
Microsoft Open Database Connectivity (ODBC)
This section documents the ODBC interface, including a Programmer's Reference, documentation for various ODBC drivers, and samples.

source sources-code-hemlet.blogspot.com
Continue Reading...

Friday, September 25, 2009

Programmer Vacancy

... URGENTLY REQUIRED ...
Job Responsibility :

* To develop program based on the technical specification.
* To perform analysis in order to understand user requirement or problem and to propose solution if needed.

Specification :

* Knowledge of package and in-house developed application.
* Technical knowledge of SDLC, relational database management system and programming concept.
* Intermediate/ Knowledge of ASP, VB & VB.NET.
* Advanced Knowledge of DELPHI, PHP, SQL.
* Experience in Developing Applications.
* Able to Work Under Tight Schedule.
* Knowledge of Photoshop, Graphic Designing is a plus.

and for eLearning photoshop, click here

General Requirement :
* Bachelor degree majoring in Information Systems, Computer Science or equivalent.
* Must have minimum 2 years programming experience.

Applications are treated with the strictest of confidence an only short listed candidates will be called for interview.
Submit your complete resume, together with your contact number, copy of relevant documents and recent photograph to : melwani@mindlabindonesia.com

with Subject Heading : Application for Programmer

source. jobsdb.com
Continue Reading...

Mozilla FireFox

Things move quickly online, and we’ve beefed up the engine that runs Firefox to make sure you can keep up: Firefox 3.5 is more than twice as fast as Firefox 3, and ten times as fast as Firefox 2.* As a result, Web applications like email, photo sites and your favorite social networks will feel snappier and more responsive.
learn more about Firefox 3.5 click here

For another eLearning likely photoshop,click here
Continue Reading...

Install Ubuntu on an External Drive

You can, in fact, install, boot, and run Ubuntu completely from a FireWire, USB, or other external drive, but it does require some special steps. This hack walks you through the process from start to finish.
In the process of working on this book, we realized one disadvantage to using a laptop as a primary computer: it is much more difficult to swap out hard drives for test systems. We wanted to set up an Ubuntu system so that we could test various hacks on a vanilla install, but we didn't necessarily want to repartition and install on the main laptop hard drive if we didn't have to. The solution was to install and run Ubuntu from an external USB drive we had; that way, the regular system stayed intact but we could boot Ubuntu whenever we wanted.

Unfortunately, this sort of install does not automatically work without some tweaking due to a few different reasons:
• By default, the initrd (initial ram disk) file that Ubuntu uses does not contain all of the drivers you need to boot from a removable drive. Your BIOS will find the drive fine (provided it supports booting from removable drives), but once the kernel loads, Linux won't be able to see or mount the drive to continue the boot process.
• Even if the initrd has the appropriate drivers, it takes a few seconds for the kernel to load these modules and detect your removable drive before it tries to use it. During this time, the system will likely try to boot and will not be able to find the removable drive because it hasn't finished configuring.
• The Ubuntu installer is very handy in that it tries to detect other OSes you might have installed on the system and will provide GRUB menu entries for each OS. Unfortunately, this means that it will set up any OS you have on the internal hard drive as being on the first BIOS drive, with the removable drive being second (or third or fourth if you have other drives on the system). When the BIOS boots from the removable drive, it will configure it as the first drive on the system, which will confuse GRUB.
In this hack, we discuss how to fix each of these problems so that you can install and boot Ubuntu from a removable drive.
Set Up the Partitions
The first step is to start the Ubuntu install process as you would with any other system, so read through until you get to the section about partitioning a drive. When Ubuntu gets to the disk-partitioning tool, note that by default it will probably pick any internal IDE or SCSI drive currently in the system. If your system uses an IDE drive, you can choose your external drive by selecting the SCSI drive the system has detected. The line will probably refer to a disk called "SCSI (0,0,0) (sda)." If you already have a SCSI hard drive in the system, it will be a bit more difficult to locate the USB drive, but chances are it will be the last SCSI drive on the system.
Be absolutely sure you pick the correct drive in this phase, because Ubuntu will format and repartition the drive you choose and wipe out any data that might have been there. If you are uncertain which drive is the appropriate one, boot from the Ubuntu Live CD and confirm which device names (sda, sdb, etc.) it assigns the different drives on your system.
Install GRUB
Once you choose the correct drive to format, continue with the Ubuntu installation process until it gets to the GRUB bootloader stage. Here, you will be asked whether you want to load GRUB to the MBR of the internal hard drive. You don't want to do this because it will overwrite any bootloader you are currently using on the system. Instead, say no and then specify /dev/sda (or whatever Linux device was assigned to your removable drive) in the next screen that appears in order to install GRUB directly on the removable drive.
Use chroot
Next, complete the Ubuntu installation up until when it prompts you to select Continue to reboot the system. Before you reboot, you will need to make some tweaks to the system. The Ubuntu installer actually provides a basic console you can use to run a few limited commands on the system. Hit Alt-F2 to switch to this console, and then hit Enter to activate it.
Now you need to prepare the removable disk so that you can chroot into it and change some files. The removable drive will actually be mounted under the /target directory, and the first step is to mount the special /proc filesystem within that drive:
# mount -t proc /target/proc


Now you can use the chroot tool to turn the /target directory into the effective / partition on the system. This way, you can run commands as though you had booted off of that drive:
# chroot /target



Tweak initrd
Once inside the chroot environment, the first thing to do is to add the modules Linux uses to make your removable drive accessible to the initrd. The /etc/mkinitramfs/modules file lets you configure extra modules to add to an initrd, so use your preferred console text editor to edit this file. If you don't have a preferred console text editor, just use vim (if you are unfamiliar with vim, check out "Edit Configuration Files" (on next blog) for a vim primer:
# vim /etc/mkinitramfs/modules


Once this file is opened, move to the very bottom of the file and add the following lines and then save and close the file:
ehci-hcd
usb-storage
scsi_mod
sd_mod
If your removable drive is connected via IEEE1394, also add the following lines:
ieee1394ohci1394sbp2

and for any other devices, simply add the modules they need to this file.
With the correct modules configured, the next step is to set up a initrd so that it will wait a number of seconds before continuing to boot. That way, Linux has time to detect and configure the removable drive. Open /etc/mkinitramfs/initramfs.conf in a text editor:
# vim /etc/mkinitramfs/initramfs.conf


Now add a new configuration option to the very top of the file so that Linux will wait for a few seconds before finishing the boot process:
WAIT=10

In our experience, 10 seconds is enough time for Linux to load a USB drive, but feel free to change this to a longer or shorter value if you need to. Save your changes and close the file.
Now you are ready to re-create an initrd file that incorporates the new settings using the mkinitramfs tool:
# mkinitramfs -o /boot/initrd.img-

2.6.15-16-386

/lib/modules/

2.6.15-16-386



Change the initrd.img and /lib/modules paths to match the kernel version included in your Ubuntu install CD.
Update GRUB
The final step is to change a few settings in the GRUB configuration file. The Ubuntu installer sets up the external device as (hd1) (or second BIOS drive), but you need to change that to (hd0) because the drive will be the first BIOS drive in the system when the BIOS boots from it. Open the GRUB menu.lst file with a text editor:
# vim /boot/grub/menu.lst


and find the lines that refer to the GRUB root device. They will look something like the following:
## default grub root device
## e.g. groot=(hd0,0)
# groot=(hd1,0)

Change the last line to refer to hd0 instead:
## default grub root device
## e.g. groot=(hd0,0)
# groot=(hd0,0)


Next, find the section in the file that refers to different Ubuntu kernels. It should look something like the following:
title Ubuntu, kernel 2.6.15-16-386
root (hd1,0)
kernel /boot/vmlinuz-2.6.15-16-386 root=/dev/sda1 ro quiet splash
initrd /boot/initrd.img-2.6.15-16-386
boot

title Ubuntu, kernel 2.6.15-16-386 (recovery mode)
root (hd1,0)
kernel /boot/vmlinuz-2.6.15-16-386 root=/dev/sda1 ro single
initrd /boot/initrd.img-2.6.15-16-386
boot

title Ubuntu, memtest86+
root (hd1,0)
kernel /boot/memtest86+.bin
boot

Now change all of the references to hd1 to hd0:
title Ubuntu, kernel 2.6.15-16-386
root (hd0,0)
kernel /boot/vmlinuz-2.6.15-16-386 root=/dev/sda1 ro quiet splash
initrd /boot/initrd.img-2.6.15-16-386
boot

title Ubuntu, kernel 2.6.15-16-386 (recovery mode)
root (hd0,0)
kernel /boot/vmlinuz-2.6.15-16-386 root=/dev/sda1 ro single
initrd /boot/initrd.img-2.6.15-16-386
boot

title Ubuntu, memtest86+
root (hd0,0)
kernel /boot/memtest86+.bin
boot

If Ubuntu has detected and configured other OSes and you want to be able to choose them as well, simply repeat the same changes to the root config option for each OSonly change hd0 to hd1. Then save your changes and close the file.
Now you can leave the chroot environment, so type exit in the console and then hit Alt-F1 to return to the main Ubuntu install console. Now you can select Continue to reboot the machine into your new install.
Keep in mind that most computers won't boot from a removable drive by default if a CD-ROM or other hard drive is present. Some BIOSes let you configure which device to boot from via a special key at boot time (such as F12). In other BIOSes, you may have to hit Esc, F2, or Del to enter the BIOS and configure the boot device order.


Continue Reading...

Tuesday, August 11, 2009

XmlLite Reader Programming Overview

XmlLite is implemented as a DLL. There is a header file and a library that comes with XmlLite, but they are there for compiling and linking purposes only; all of the functionality is implemented in the DLL. To use XmlLite, you call methods as appropriate to parse the XML and access the nodes.
Pull vs. Push Parsers
Both XmlLite and SAX2 are non-caching, forward-only parsers. For this type of parser, there are two varieties of programming models:

• Pull programming model. In a pull model, after your application initiates parsing, it calls methods repeatedly to retrieve, or pull, the next node. After retrieving a node, your application can look at the node, including its name, value, attributes, and more. As appropriate, the parser advances so that the next time the application retrieves a node, it gets the next one. XmlLite follows a pull programming model.

• Push programming model. In a push model, your application registers event handlers to receive nodes and information from the parser. After initiating parsing, the parser calls these event handlers, sending (or pushing) nodes to them. The MSXML SAX2 parser follows this programming model.

There are several advantages to the pull programming model:
• It is significantly easier to program for the pull model. Your application takes the form of a loop, where you get the next node, process it, and repeat, until the entire file is processed, or until your application determines that no more processing is required.

• In contrast, the push model requires your application to keep a significant amount of state. Keeping state means that your application needs to keep variables that contain the context of the current node. The combination of implementing a number of event handlers and keeping state means that much more housekeeping is necessary to implement an application.

• If your application is more suitable for a push parser, it is possible to wrap some classes around a pull parser and implement a push programming model. However, the reverse is not true.

Both the push and pull type parsers are significantly different in semantic behavior and performance from the Document Object Model (DOM) programming interface.
You Must Use a Class that Implements IStream
Both the XmlLite reader and writer use a stream object for reading and writing the XML. Therefore, you must either use or implement a class that extends the IStream interface.
After you have created a reader by calling CreateXmlReader , you attach the IStream object to the reader by calling the SetInput method. After you have created a writer by calling CreateXmlWriter, you attach the IStream object by calling the SetOutput method.

If you implement your own class, and if you want to read or write XML directly from another type of stream, you can change the implementation of your IStream class as appropriate. If you want to use a simple in-memory IStream implementation, you can use the function CreateStreamOnHGlobal. If you want to use an IStream implementation that reads from and to a text file, you can use SHCreateStreamOnFile.
For details about programming with the XmlLite reader, see Reading an XML Document Using XmlLite.

For convenience, you can get a default implementation of a simple IStream class from the default IStream implementation. This implementation is the same as that used in many of the XmlLite samples.

XmlLite Is Not an ActiveX Control

XmlLite is not an ActiveX control. It is simply a DLL. As such, it cannot be used from scripting languages, such as JScript or Visual Basic Scripting Edition (VBScript). Like any DLL, XmlLite can be used from C#; however, C# applications would more typically use the XML parsers in System.XML. XmlLite is primarily meant to be used with C++.
XmlLite Is Not Thread Safe
XmlLite is not thread-safe. If you are writing a multi-threaded application, it is up to you to make sure that you use XmlLite in a thread-safe manner. For example, if one of your threads has called the method to retrieve the next node, and that method has not returned, you must programmatically prevent another thread from attempting to retrieve a node.
XmlLite Does Not Provide Access to Typed Content
Unlike the managed System.Xml.XmlReader, the IXmlReader does not provide APIs to access typed content. You can declare that an element is of a certain type, but you cannot retrieve that element as that specified data type. All values are returned as strings, and it is up to the application to convert to types other than string.
Support for Namespaces
XmlLite implements namespaces in compliance with the W3C Namespaces in XML specification. That specification can be found at http://www.w3.org/TR/REC-xml-names.
Capacity
Due to implementation and security constraints, the IXmlReader imposes bounds on some of the XML constructs. For example, consider the following:
text
• All names are limited to 4GB in size. In the example above, nameOfElement and attrName have this limit.
• Attribute values are limited to 2GB in size. In the example above, attrValue has this limit.
• Text values are limited to 4GB in size without chunking, and are unlimited with chunking. To read values with chunking, you use the ReadValueChunk method. For an example of chunking, see Reading an XML Document Using Chunking.
• The number of attributes on an element is limited to 64K.
If any of these limits are exceeded, then XmlLite returns an error.
Special Handling of Nodes
The DOCTYPE node is handled in a special way. When you read a DOCTYPE node, the NodeType is XmlNodeType_DocumentType. The PUBLIC and/or SYSTEM literals are presented as attributes with the names "PUBLIC" and "SYSTEM", respectively. The internal subset can be accessed by using GetValue, and the subset will be returned as a string.
The Xml declaration is also handled in a special way. When you read it, the NodeType is XmlNodeType_XmlDeclaration. The node has no value and has "xml" as the local name. It has no namespace and has up to three attributes: version, standalone, and encoding.
White Space Normalization
All white space in XmlLite is normalized as per the XML 1.0 specification. For more information, see Section 2.10 of the Extensible Markup Language (XML) 1.0 Specification at http://www.w3.org/TR/1998/REC-xml-19980210#sec-white-space.

Error Handling
There are three classes of errors in XmlLite:
• Argument errors. These errors are recoverable and further processing can continue. An example of an argument error is passing an incorrect or illegal value for an argument.
• Parsing errors. These errors are not recoverable, but the same instance of the reader can be used by resetting the input source.
• All other errors. All other errors are not recoverable, and the instance of the reader can no longer be reused.
Because some errors are not recoverable and may lead to unexpected behavior in further processing, it is crucial that the application user inspect the error code (HRESULT) returned by each method call before proceeding.
For more information about error codes, see XmlLite Error Codes.
Encoding Detection
There are three places that an encoding can be specified while in the process of parsing an encoded Xml document:
• The encoding can be specified in the document via a Byte Order Mark (BOM). The BOM may appear at the beginning of an XML entity. The BOM is used both to indicate the byte order of the input stream and as a specification of the input encoding.
• The encoding can be specified in the document in the Xml declaration.
• The encoding can be specified programmatically when creating the input stream. This specification can either be mandatory, or as a hint.
If the user of XmlLite specifies a mandatory encoding programmatically, XmlLite ignores the encoding specified in the Xml declaration. The encoding specified in the Xml declaration (or as overridden programmatically) is the desired encoding.
If there is a BOM, and it conflicts with the desired encoding, parsing will fail.
If there is no BOM, and if the encoding hint was specified as TRUE, then XmlLite will try to parse with the desired encoding. If that fails, XmlLite will attempt to automatically detect the encoding of the specified document.
If there is no BOM, and if the encoding hint was specified as FALSE, then XmlLite will try to parse with the desired encoding. If there is no match between the desired encoding and the encoding of the document, XmlLite parsing will fail. In this case, XmlLite will not attempt to automatically detect the encoding of the document.
If automatic detection of the encoding of the document fails, then XmlLite reports an error on line 0.
If there is no BOM, and there is no desired encoding, XmlLite will attempt to automatically detect the encoding of the document.
The following encodings are supported natively:
• UTF-8, UTF-16, and UTF-16BE
• UCS-2 and UCS-4
• ASCII
• SO88591, ISO88592, ISO88593, ISO88594, ISO88595, ISO88596, ISO88597, ISO88598, and ISO88599
• Windows1250, Windows1251, Windows1252, Windows1253, Windows1254, Windows 1255, Windows1256, Windows1257, and Windows1258
For additional encoding support, you can co-create an instance of IMultiLanguage2* and set XmlReaderProperty_MultiLanguage. By default, the value of this property is NULL.
DTD Support
Document Type Definition (DTD) support is limited to entity expansion and default attributes.
When a DTD is used, DTD default attributes are returned just as if they were normal attributes; the only difference is that default attributes return TRUE when the IsDefault method is called.
For example with a DTD:

If the myAttr attribute on the myElement element is not defined in the XML stream, it will be given the default value of 123.
Semantics of String Handling
The following IXmlReader methods return a string pointer: GetLocalName, GetNamespaceUri, GetPrefix, GetQualifiedName, and GetValue.
When calling these methods, be aware that the pointer is only valid until you move the reader to another node. When you move the reader to another node, XmlLite may reuse the memory referenced by the pointer. Therefore, you should not use the pointer after calling one of the following methods: Read, MoveToNextAttribute, MoveToFirstAttribute, MoveToAttributeByName and MoveToElement. Although they do not move the reader, the following two methods will also make the pointer invalid: SetInput and IUnknown::Release. If you want to preserve the value that was returned in the string, you should make a deep copy.

Continue Reading...

J2ME Programmer Vacancy

URGENTLY REQUIRED
J2ME PROGRAMMER (SENIOR/JUNIOR)
QUALIFICATION :

1. Understanding of J2ME (MIDP 2.0, CLDC 1.1)
2. Excellent in Java programming, object-oriented analysis, and design
3. Understanding of Java UI development (SWING, AWT)
4. Familiar with mobile development in several platforms (Symbian, J2ME, Flash Lite, Windows Mobile, etc)
5. Experience in software development processes and life cycle of software products
6. Ability to write clear technical design and specification documents
7. Excellent in the design and administration of databases, especially MySql
8. Well familiar with the open source project e.g. Jakarta project, Eclipse, MySql, PHP,Tomcat etc
9. Good understanding of wireless technologies and enthusiastic to learn new things

Please send your application letter with detailed resume / CV, stating details of qualifications and summary of experiences, present / expected salary, and other documents support, current photograph

source jobsdb.com or
id.jobsdb.com
Continue Reading...

Tuesday, July 28, 2009

ASP.NET Developer Vacancry

PT. Intikom Berlian Mustika works in partnerships with the world’s leading companies to provide a comprehensive range of IT services and products for a broad client base. Its main services and products are consultancy, software customization & implementation assistance, education & training, software and hardware, system integration, e-commerce, networking and communication, IT Security and maintenance service.

Intikom integrates people, process and technology to deliver innovative and reliable solutions to both the private and government sector. The company’s special focus is on banking, finance, manufacturing, distribution, hospital, pharmaceutical, chemical, insurance, retail, automotive, and mining industries.

Qualifications for ASP . NET Developer is is

* Male/Female max. 28yr old
* Graduated from reputable university
* Strong analytical skill
* Min. 2 yr experience in development project using ASP.NET and/or VB.NET
* Have knowledge in Microsoft SQL Server administration
* Used to work under pressure and committed to deadlines
* Good command in English
* Microsoft Certification will be an advantage

Please sent your CV and recent photo : recruitment@intikom.co.id

source jobsdb.com

For another eLearning likely photosop lern, click here
Continue Reading...

Monday, July 27, 2009

XmlLite Introduction

The XmlLite library allows developers to build high-performance XML-based applications that provide a high degree of interoperability with other applications that adhere to the XML 1.0 standard. The primary goals of XmlLite are ease of use, performance, and standards compliance.
XmlLite works with any Windows language that can use dynamic link libraries (DLLs), but Microsoft recommends C++. XmlLite comes with all necessary support files for use with C++, but if you want to use it with other languages, some additional work may be required.

XmlLite works with various versions of the Microsoft C++ compiler, but the samples in the documentation have been validated only with Visual Studio 2005.
This topic provides an overview of XmlLite and some guidelines for which XML parser to use in various scenarios.

Microsoft XML Parsers
Microsoft delivers several XML parsers:
• XmlLite (native)
• MSXML (SAX2) (native)
• System.XML.XmlReader (managed)
The following Document Object Model (DOM) implementations have built-in parsers:
• MSXML (DOM)
• System.XML (XmlDocument)

XmlLite Usage Scenarios

XML can be used as a format for storing documents, such as Microsoft Office Word documents. It can also be used to encode data for marshalling method calls across machine boundaries (SOAP). Businesses can use XML for sending and receiving purchase orders and invoices. Web technologies can use XML to send data between the Web server and the client's Web browser. Database servers can return the data from queries in XML for further processing by other applications. Because it is such a flexible format, XML can be used in a vast variety of scenarios.
Performance
Usage scenarios can be generally divided into two categories:
• Some scenarios work with XML documents that come from external sources, and it is not known whether the XML documents are valid. In these scenarios, verification of validity is important. Typically, developers use XSD schemas or Document Type Definitions (DTDs) to verify validity. Performance may be a concern, but the overriding concern is that the application reading the XML receives a valid document. Saving and loading documents from and to a variety of applications is a usage scenario that falls in this category.
• Some software systems use XML as a data store or a means for communication. In these scenarios, the developer knows that the XML document is valid, perhaps because another part of the system (which is under the control of the same developer or organization) generated the XML. The question of document validity is not an overriding concern. One example of this approach is where the software system runs on a server farm, and XML is used to communicate between various servers and processes. Another example might be one where a relatively complicated application has to store and retrieve a large amount of information. The developer completely controls the format of the XML document.
The focus of XmlLite is on performance. Therefore, XmlLite is most appropriate in the second of the two scenarios. XmlLite enables developers to write efficient (fast) code to read and write XML documents. In most scenarios, XmlLite parses faster than either the DOM in MSXML or SAX2 in MSXML.
XmlLite vs. System.XML
XmlLite is most appropriate for use with C++. If you are using C#, Visual Basic .NET, or other languages that use the common language runtime (CLR), it is more appropriate to use one of the parsers in System.XML.
Some developers want a deployment scenario where it is not required that the Microsoft .NET Framework be installed on deployment computers. XmlLite does not require the .NET framework to be installed, and may be appropriate for this situation.
No XSD or DTD Validation
Because XmlLite is oriented towards optimum performance, it does not provide for document validation. Validation via XSD schemas or DTDs is not supported. If you require validation, it is recommended that you use either MSXML or System.XML.
If you read a document that refers to an external XSD schema, the XmlLite reader ignores the external schema. Even if the document is invalid per the schema, the XmlLite reader will report no errors.
If you read a document that contains an inline schema, the XmlLite reader returns all of the elements and attributes of the inline schema, just as if they were parts of the XML document.
No Scripting Language Support
XmlLite does not support scripting languages. If you need to use XML from JScript or Visual Basic Scripting Edition (VBScript), it is more appropriate to use the Document Object Model (DOM) in MSXML.
Limited DTD Support
Document Type Definitions (DTDs) are supported, but only for entity expansion and defaults for attributes, not for document validation. If you require DTD validation, it is recommended that you use either MSXML or System.XML.
If you enable DTDs, note the following: If you use XmlLite to read a document that refers to a DTD and the document is not valid per that DTD, no error will be thrown.
Continue Reading...

Wednesday, July 8, 2009

Quality System Auditor Vacancy

PT.Goodrich Pindad Aeronautical Systems Indonesia (the "Company") is a joint venture enterprise, formed between Lucas Industry Public Limited Company, located in Stratford Road, Sollhull B 904 LA England, PT Pindad (Persero) and PT Metinca Dirgantara from Indonesia.

The company was established by the name PT Lucas Pindad Aerospace Indonesia in the framework of Foreign Capital Investment Law No.I/1967 and No. 11/1970, based on public notarial deed No. 10 dated March 5, 1997. The deed of establishment was approved by the Minister of Justice of the Republic of Indonesia in his decision letter No. C2-5.147.HT.01.01.Th97. The Articles of Association was published in State Gazette of the Republic of Indonesia No.75, dated September 19,1997, Supplement No.4203.
Qualification :

* Male/Female, age max 30 Years Old
* Min Diploma degree in Technical Backround
* Experience in Audit activities as Quality System Auditor min 2 Years
* Excellent communication skill in English is a mandatory and other language will be advantage
* Computer literate (word, excel, power point) is a mandatory
* Having knowledge and understand ISO 9000 : 2000, ISO TS or AS 9100 is a mandatory
* Familiar with Quality Tool : Failure Mode Effect Analysis, Statistic, Lean Manufacturing Process, TPM.
* Self motivated, able to work under pressure and strict deadline individually or in a team
* Ability to work independently and willing to improve knowledge
* Meticulous, Persistant, Communicative, Assertive, Conscientious and systematics

If You fell that You meet the qualification above, please send your application letter, CV, other document and recent photograph email to :

hrd.gpasi@goodrich.com

The company and its plants is located on :
Jalan Gatot Subroto No. 517
Bandung, West Java, Indonesia

need small business, click here
Continue Reading...

PCMAV 2.0c Valkyrie Antivirus plus build4

PC Media Edition magazine 07 / 2009 have released PCMAV 2.0c
IMPROVED! Enhanced by identification database and cleaner local virus/ foreign / new variant which reported disseminate in Indonesia including conflicker.
Bug fixed at version of RTP Windows XP and Vista. Download, click here and download build 4, click here

for another antivirus and pc problems solution, click here
Continue Reading...

IT Officer Vacancy

Royal Standard Group started its business in paper converting industry and widely recognized in Indonesia for its “JAYA” brand. Founded in 1978 and currently there are over 700s employees dispersed to its branch office and factories all over Indonesia. As time progress, the group’s business scope expanded to manufacturing all types of cards, hologram, billing and mailing services, total IT Solution and as of recent, becoming a licensed Security Printing Company. Facing the future, Royal Standard Group is committed to face whatever challenges ahead in order to become a global competitive company, while at the same time maintaining its high quality standard of products and services.


Qualification:

* Male/Female age max 27 years old
* University graduate from Information Technology/Computer/Electro
* Min 1 Year experience I similar/related position (fresh graduated are welcome)
* Highly integrity, hard worker, able to work under pressure in a team work

Please send your CV to:

hrd@royalstandard.co.id

source. jobsdb.com

Continue Reading...

Thursday, June 11, 2009

Access Remote Filesystems

Let's face it: sometimes it's difficult to fit all of the files you need on a single computer. Whether they be Windows shares at your office, FTP servers somewhere on the Internet, or even machines on the network running SSH, you can access all of these servers and more from the Ubuntu desktop with a few clicks.
The key to connecting to remote filesystems is the "Connect to Server" dialog window. Click Places “Connect to Server” to see the default window
There are a number of different connection types the dialog supports. shows the options available from the drop-down menu. Apart from a few specific options, each of these connection types shares the same sorts of options. The top of the window requests the location of the server (a hostname or IP address), and then below that is a list of nonessential options you can configure. For instance, you can give each of your connections custom names so that they are easier to tell apart from each other.

Connecting to a Windows share is a good example of how to use the "Connect to Server" dialog. First, select "Windows share" from the drop-down menu. Then, fill in the name of the server you want to connect to and, optionally, the name of the share you want to connect to. If your network requires authentication, you can also configure the username and domain name in this window. Once you have configured the share, click the Connect button. A new icon for this share will then appear on your desktop. Double-click that icon to open the Nautilus file browser to that share.

If you aren't quite sure about the settings for your Windows share, you can also click Browse Network to search the local network for any available Windows shares.

One of the more interesting abilities of the "Connect to Server" dialog is to connect to remote SSH servers and share files over SFTP. Not only does this mean that you don't have to configure any special file sharing on the remote machine, but any machine that runs SSH is now also a file share you can access. What's more, all of the communication is sent over an encrypted channel.
To connect to a remote SSH server, select SSH from the "Service type" drop-down menu. you can see a sample window filled out with information to connect to a server on the network. By default, the SSH connection will open into the / directory, but you can change that to any directory you wish in the Folder field. If you needed to connect to the remote server as a different user, you could also specify that in this window. Finally, you can give this share a custom name that will appear both on its icon in the desktop and in the sidebar of the file browser.
Once you click Connect, a new icon appears on the desktop, and if you double-click it, you can access all of the photos on the remote server.. You can then drag and drop them to and from the local machine as you do with any other directory
If you decide that you no longer want to access a particular share, just right-click on its icon on the desktop and select Unmount Volume. Otherwise, file shares will appear both in the sidebar of your file manager and in the Places Network Servers window.

Continue Reading...

PHP 5.2.6 Vulnerability

PHP 5.2.6 (error_log) safe_mode Bypass Vulnerability
SecurityReason.com PHP 5.2.6 (error_log) safe_mode bypass
Author: Maksymilian Arciemowicz (cXIb8O3)
securityreason.com
Date:
- - Written: 10.11.2008
- - Public: 20.11.2008

SecurityReason Research
SecurityAlert Id: 57

CWE: CWE-264
SecurityRisk: Medium

Affected Software: PHP 5.2.6
Advisory URL: http://securityreason.com/achievement_securityalert/57
Vendor: http://www.php.net

- --- 0.Description ---
PHP is an HTML-embedded scripting language. Much of its syntax is borrowed from C, Java and Perl
with a couple of unique PHP-specific features thrown in. The goal of the language is to allow web
developers to write dynamically generated pages quickly.
Continue Reading...

Visual Basic SP 6

Service Pack 6 for Visual Basic 6.0, Visual C++ 6.0 with Visual Source Safe 6.0d provides the latest updates to these products. It is recommended for all users of Visual Basic 6.0, Visual C++ 6.0 and Visual Source Safe 6.0.

Service Pack 6 for Visual Basic 6.0, Visual C++ 6.0 with Visual Source Safe 6.0d provides the latest updates to these products. It is recommended for all users of Visual Basic 6.0, Visual C++ 6.0 and Visual Source Safe 6.0.
for download Visual Basic SP6, click here
Continue Reading...

PCMAV 2.0b Antivirus

PC Media Edition magazine 06 / 2009 have released PCMAV 2.0b
IMPROVED! Enhanced by identification database and cleaner 60 local virus/ foreign / new variant which reported disseminate in Indonesia including conflicker.
Bug fixed at version of RTP Windows XP and Vista. Download
Continue Reading...

Monday, May 11, 2009

Data Operator

Petrolink is a well established information and communications technology service company specializing in the oil and gas exploration and production sector.
Petrolink has provided IT and communications solutions to oil and gas operators whether super majors, or smaller independent operators for more than 15 years. Petrolink has adapted and evolved its solutions and services to suit the needs of its customers in this technology driven service sector.

Petrolink has a highly skilled and experienced team of people recruited from the oil and gas, software development and information and communications technology industries to provide tailored solutions to the needs of our growing client.

Petrolink has become the market leader in the secure transmission and distribution of geotechnical and associated data throughout the world. Petrolink has strategically placed its personnel and offices across the globe to provide the best possible level of support to our clients.

Find out more about our company by visiting our website at www.petrolink.com
Requirements:

Candidate must possess at least Bachelor's Degree in Computer Science
Having good skill in one of these programming languange: C#, PHP, VB.NET, VB6, ASP/ASP.NET, HTML/DHTML, JavaScript, VBScript, and CSS is an advantage
Good command of English and communication skills are essential
Able to take on responsibility as well as be an active team player
Able to work under stress and deadlines
Willing to work based on shifts (12 hours rotation, from 7.45AM-7.45PM)
Willing to learn about Oil and Gas industry
1 year experience preferred but Fresh Graduates are welcomed to apply
1 year contract with possibility to extend or transferred to permanent employment
Has a valid passport is an advantage

Please state your current + expected salaries and your avaibility in the application letter.

Kindly fill out the e-mail subject with the position that you applied.

Only selected candiates will be contacted.

source. jobsdb

for the purpose of is other possible small business, click here
Continue Reading...

Windows Workflow Foundation Overview

Windows Workflow Foundation is the programming model, engine, and tools for quickly building workflow-enabled applications on Windows. It consists of a namespace, an in-process workflow engine, and designers for Visual Studio 2005. Windows Workflow Foundation is a framework which enables users to create system or human workflows in their applications written for Windows Vista, Windows XP, and the Windows Server 2003 family. Windows Workflow Foundation can be used to solve simple scenarios such as showing UI controls based on user input, or complex scenarios encountered by large enterprises, such as order processing and inventory control.
Scenarios that Windows Workflow Foundation addresses include:
• Enabling workflow within line-of-business applications
• User-interface page flows
• Document-centric workflow
• Human workflows
• Composite workflows for service-oriented applications
• Business rule-driven workflows
• Workflows for systems management
Windows Workflow Foundation provides a consistent and familiar development experience with other .NET Framework 3.0 technologies, such as Windows Communication Foundation and Windows Presentation Foundation. The Windows Workflow Foundation API provides full support for Visual Basic .NET and C#, a specialized workflow compiler, debugging within a workflow, a graphical workflow designer, and developing your workflow completely in code or in markup. Windows Workflow Foundation also provides an extensible model and designer to build custom activities that encapsulate workflow functionality for end users or for reuse across multiple projects.

The concepts in this section are inherent to Windows Workflow Foundation. They are briefly described here to provide a basic understanding. The Programming Guide section of this SDK provides implementation details and a deeper level of knowledge.
A workflow is a set of elemental units called activities that are stored as a model that describes a real-world process. Workflows provide a way of describing the order of execution and dependent relationships between pieces of short- or long-running work. This work passes through the model from start to finish, and activities might be executed by people or by system functions.
Workflow Runtime Engine
Every running workflow instance is created and maintained by an in-process runtime engine that is commonly referred to as the workflow runtime engine. There can be several workflow runtime engines within an application domain, and each instance of the runtime engine can support multiple workflow instances running concurrently.
When a workflow model is compiled, it can be executed inside any Windows process including console applications, forms-based applications, Windows Services, ASP.NET Web sites, and Web services. Because a workflow is hosted in process, a workflow can easily communicate with its host application.
The following illustration shows how workflows, activities, and the workflow runtime engine are all hosted in process with a host application.

for the purpose of is other, click here
Continue Reading...

Free Adobe Reader 9.1

What can you do with Adobe Reader?

Adobe® Reader® is the tool for opening and using Adobe PDFs that are created in Adobe Acrobat®. Although you can't create PDFs in Reader, you can use Reader to view, print, and manage PDFs. After opening a PDF in Reader, you have a variety of tools to help you find information quickly. If you receive a PDF form, you can complete it online and submit it electronically. If you receive an invitation to review a PDF, use the commenting and markup tools to annotate it. Use the Reader multimedia tools to play video and music in a PDF. And if a PDF contains sensitive information, you can sign or certify a document with a digital ID.

Learn how to use Reader for everyday PDF tasks:

* View and search a PDF
* Fill in forms
* Sign a PDF
* Create a PDF on Acrobat.com

Adobe Reader makes it easy to collaborate with others and streamline your work:

* Participate in a review
* Collaborate on a PDF by using Adobe ConnectNow

Find information in a PDF

Use either the Search window (Edit > Search) or the Find toolbar to search page content, including layers, form fields, annotations, bookmarks, and digital signatures.
View and search a PDF Portfolio

A PDF Portfolio is a collection of files that often contains files that are not PDFs, such as Microsoft Office documents. You can use the Reader search tools to find text throughout the PDF Portfolio. Type the text you want to find in the Search box in the PDF Portfolio toolbar. The search results show all files where the text was found.

* For PDF files, expand the list to see the results in context. Click a search result to go to the location of the text in the PDF.
* For other types of files, click Open, and then search the file.

For more information, see Search a PDF Portfolio in Acrobat Help.
Fill in forms

Fill in, save, and electronically submit forms easily, even on mobile devices. Start by selecting either the Hand tool or the Select tool. When you place the pointer over an interactive form field, the pointer icon changes to one of the following:

* The Pointing Finger Pointing Finger tool or Pointing Hand Plus tool Pointing Hand tool appears when the pointer is over a button, radio button, check box, or item in a list.
* The Select tool Select tool appears when you can select an item in a list.
* The I-beam tool I-beam tool appears when you can type text into a form field.

Move from one form field to the next by pressing the Tab key. To delete an entry, press the Esc key. When you finish the form, click the Submit Form button. If the PDF author has enabled the local save capability on the form, you can also choose File > Save As to rename the file and save the form with your information without submitting it.

Tip: To fill in forms more efficiently, turn on Auto-Complete in the Forms Preferences (choose Forms on the Preferences dialog box).

For more information, see Completing and submitting PDF forms in Acrobat Help.
Sign a PDF

When you sign a PDF, you assure the sender that the PDF reached its intended recipient. In Reader, only PDFs with Reader Usage Rights enabled can be signed. (In Acrobat, Advanced > Extend Features In Adobe Reader.)

1. Click the Sign button Signature button in the Signature Panel, or choose Document > Sign > Sign Document.
2. Follow the instructions to create a place for the signature, and then complete the Sign Document dialog box.

Use the Preview Document feature to view and sign the document in a static and secure state. Dynamic content such as multimedia and JavaScript are blocked. For more information, see Sign in Preview Document mode in Acrobat Help.
Create a PDF on Acrobat.com

Acrobat.com is a new, web-based service that is currently available at no charge. Acrobat.com offers easy online tools to create and share PDFs. To get started, click the Create PDF Using Acrobat.com icon Create PDF on Acrobat.com icon in the toolbar. Or, choose File > Create Adobe PDF Using Acrobat.com. For more information, go to wwww.adobe.com/go/acrobat_com_en.
Participate in a review

When you receive a PDF to review, you can annotate it by using the commenting and markup tools. These features are available only when the PDF author has enabled commenting. Also use the commenting and markup tools to return your comments to the author. For more information and download, click here

Learn Photoshop In Just 2 Hours. Master The Basics Of Adobe Photoshop In Under 2 Hours With Easy To Follow Instantly Accessible Online Video Tutorials. click here
Continue Reading...

Sunday, April 5, 2009

Download PC Wizard 2008

Since 1996 PC WIZARD is among the most advanced system information programs on the market. PC WIZARD 2008 is a powerful utility designed especially for detection of hardware, but also some more analysis. It's able to identify a large scale of system components and supports the latest technologies and standards. This tool is periodically updated (usually once per month) in order to provide most accurate results.

PC WIZARD 2008 is also an utility designed to analyze and benchmark your computer system. It can analyze and benchmark many kinds of hardware, such as CPU performance, Cache performance, RAM performance, Hard Disk performance, CD/DVD-ROM performance, Removable/FLASH Media performance, Video performance, MP3 compression performance.

PC WIZARD 2008 can be distributed freely (ftp, archives, CD-ROMs ...).


Hardware Information



* Mainboard / Bios (Connectors, ID String, MP Support ...)
* Chipset (FSB Frequency, Norhtbridge, Hub, Direct Media Interface, XMB, NSI, ...)
* Main Memory (FPM, EDO, SDRAM, DDR SDRAM, DDR-2 SDRAM, DDR-3 SDRAM, RDRAM, FB_DIMM, Timings ...)
* Memory Profiles : EPP (SLi Ready), Intel XMP.
* Cache Memory (L1, L2, L3, Size, Frequency ...)
* Processors (Type, Speed, Multiplier coeff., Features, Model Number, Vanderpool Technology ...)
* Coprocessor
* APM & ACPI
* Busses : ISA, PCI, AGP (2x, 4x,8x), SMBus/ i2c, CardBus, Firewire, Hyper-Transport ... )
* DMI / SMBIOS
* Mainboard Sensors, Processor, Hard Disk & Battery (Voltage, Temperature, Fans)
* Video (Monitor, Card, Bios, Capabilities, Memory, Integrated Memory, Frequencies ...)
* OpenGL & 3Dfx
* DirectX (DirectDraw, Direct3D, DirectSound (3D), DirectMusic, DirectPlay, DirectInput, DirectX Media)
* Keyboard, Mouse & Joystick
* Drives (Hard Disk, Removable, CD-ROM, CDRW, DVD ...)
* SCSI (Card, Controller, Adapter, Devices ...)
* ATA/ATAPI & S-ATA (Devices, Type, Capabilities, S.M.A.R.T. Features, RAID)
* Ports (Serial, Parallel, USB, IEEE-1394)
* IDE & SCSI Devices
* Twain & WIA Devices
* PCMCIA (PC Card) Devices
* Bluetooth Devices
* Sound Card (wave, midi, aux, mix, AC'97 codec, High Definition Audio)
* Printers (Local & Network)
* Modem (Features, Speed ...)
* Network (Server, Connexion, Firewall ...)
* Security (Scan Ports ...)
* PocketPC & SmartPhone Devices

System Information

* MCI Devices (mpeg, avi, seq, vcr, video-disc, wave) & ACM
* SAPI
* Passwords (Outlook, Internet Explorer, MSN Messenger, Dialup ...)
* DOS Memory (base, HMA, UMB, XMS, EMS, DPMI, VCPI)
* Windows Memory
* Windows (Version, Product Key, Environment, Desktop, XP Themes ...)
* Windows UpTime (Boot, Shutdown, BlueScreen, System Restore Points ...)
* TrueType & OpenType Fonts
* WinSock (Internet), Telephony et Remote Access
* OLE (Objects, Servers ...)
* Microsoft® Applications
* Activity (Process, Tasks, Threads)
* Modules (DLL, DRV, 32 & 16-bits) & NT Services
* Internet Navigator (Microsoft Internet Explorer, Netscape, Mozilla, FireFox)
* ODBC
* CMOS/RTC
* Resources (IRQ, DMA, E/S, Memory)
* System files (.ini, .log, .bat, .nt, .dos ...)

System Benchmarks

* Processor (Dhrystone (MIPS), Whetstone (MFLOPS), Mandelbrot fractal ...)
* L1, L2, L3 Cache, RAM (Bandwidth, Latency ...)
* Main Memory (Bandwidth, Latency ...)
* Hard Drives
* CD/DVD Rom
* DirectX 3D
* Video
* Removable/Flash Support
* MP3 Compression
* VISTA Experience Index


MEMORY and CACHE: These benchmarks measure the maximum achiveable memory bandwidth. The code behind these benchmarks method is written in Assembly (x86, SSE, SSE2, SSE3). Memory benchmarks utilize only one processor core and one thread.

PROCESSOR : These benchmarks measure performance in terms of Integer Millions of Instructions Per Second (Integer MIPS) and Millions of Floating Point Operations Per Second (MFLOPS). The code behind these benchmarks method is written in Assembly (x86, x87, MMX, SSE, SSE2, SSE3, 3DNOW!). Processor benchmarks are HyperThreading, multi-processor (SMP) and multi-core (CMP) aware.

Tools

* Can save, print, e-mail a report
* Can save a TXT, RTF, HTML, PDF or CSV report
* Can export any graphics as BMP file
* Can export text and graphic with the clipboard
* Web update Wizard
* Communicate with Motherboard Monitor
* Dump (Hardware registers, System BIOS, video BIOS ...)

Multi Languages

* Dutch
* English
* French
* German
* Greek
* Italian
* Russian
* Serbian
* Slovak

Use this 100% free software to learn more about your computer and its components, detect/diagnose any problems in your computer, and increase your computer's performance.

Directions for use

Install

* ZIP package : PC Wizard 2008 can be run directly from removable support (CD/DVD, USB Key, ...) Options are not saved.
Don't forget to check "Use Folder Names" into your UNZIP application to create PC Wizard folders.
* Self-installing EXE package : To install PC Wizard 2008 directly on your hard drive.

Commandline Parameters

* Launch PC Wizard in silent mode : no interface appears, the report is automatically created.
* Example : PC Wizard.exe /R T1 C3 c:\reports\report.txt /I
* Result : Save plain text report for Hardware Tab and Processor category only into the c:\reports folder, with detailed information.
* To learn more, see the readme.txt file into the PC Wizard folder.

Special Keys

* The F5 key allows to refresh information.
* The F10 key copies the current page in the clipboard.
* The F11 key allows to save a screenshot as a .bmp file.
* The F12 allows to save current benchmark results to the database.
* The Right Click allows to display a context menu (on graphic benchmark it allows to save graph as a bitmap).

Special Extras

PC Wizard supports the Logitech G-Series keyboard LCD screen. To activate this function go to menu Options (Monitoring Tab )and check it. When you minimize PC Wizard window, CPU information will be displayed into the keyboard LCD screen.

Options

Logitech LCD screen

Security

PC Wizard 2008 shows passwords only for your personal goal. No sensitive data is transmitted. No sensitive data is included with any kind of report.

Remove

Go to Control Panel - Add/remove Programs and choose PC Wizard 2008. Click on Add/Remove button and follow the instructions.

Debug Mode

If PC Wizard freezes or crashs your computer, please try to :

* Launch application with Debug Mode (hold down the ESC key until the SplashScreen appears). A new file will be created (C:\pcwdbg.log).
Please report it by sending an e-mail with this file (see Contact the authors).
* PC Wizard Settings shows and you can disable the detection of some components, which may cause problems.

Some computers may have problems especially during:

* IDE/ATAPI device direct-access scan.
* SMBus scan.
* GPU i2C device direct-access.
* SuperIO/LPC sensor detection.
* ...


Contact the authors

If you encounter problems, bugs or incompatibilities, please report it by sending an e-mail at pcwizard@cpuid.com with a brief description.
Please try to include a Report (use Save as... or Send a message - choose Text Format) AND a Hardware Registers Dump (menu Tools) when you have a problem.

Download, Click Here

Continue Reading...

Search Your Computer

Have Beagle find and fetch your information faster than you thought possible.
One of Linux's weaker points as a desktop OS has been the lack of a search feature. Nautilus has had a "find this file" function for quite some time, but it's really not much more sophisticated than a GUI wrapper around the command-line find command. Both Nautilus and the find command do similar things: they'll look at each and every file in the directory structure, trying to find a match for the criteria you've given them.
There is a better way to search a filesystem. It involves creating an index of all the files on that filesystem, which enables you to search the index much like you would a database. This is what Windows and Mac OS X do for their file-search capabilities, and now Linux has it too in the form of Beagle, a modular search engine that's written in Mono. It's easy to add Beagle to Ubuntu, and the usability benefits are tremendous.
Installing Beagle
In this hack, you'll be installing Beagle and a very cool search frontend known as deskbar-applet. deskbar-applet sits in your GNOME panel and enables all manner of search goodness for you. As with many optional goodies, you'll need to have the universe repository enabled to install both of these packages. Now, open up a terminal and install beagle and deskbar-applet:

:~$ sudo aptitude install beagle deskbar-applet

Starting beagled
Once you've got beagle and deskbar-applet installed, you'll need to start beagled (the main engine and database) manually. From a terminal, you'll simply run beagled. It should start and detach from your terminal, and run in the background:

:~$ beagled

It will then begin the process of indexing your hard disk(s). This will take a while, depending on the amount and type of data you have. We have seen beagled take up to three hours to fully index a disk. If you're running beagled on a laptop, you may want to make sure it's plugged into AC power, because the high I/O from beagled's initial indexing could drain your battery. While beagled is indexing, you can set up your GNOME desktop to automatically start beagled when you log in. Simply click on the System Menu, and select Preferences and then Sessions. Add beagled to your Startup Programs, and it will be ready to fetch stuff for you on your next login.

Using Beagle and deskbar-applet
Now that the Beagle daemon is running, it's time to add deskbar-applet to the mix. The deskbar applet is a GNOME applet, so add it to one of the GNOME panels by right-clicking on the panel and selecting "Add to Panel." Select Deskbar, click Add, and then close the window. You'll see the deskbar in your panel now.
At this point, you can put criteria into the deskbar applet and go ahead and search for something If you put your search criteria in the applet and click the little magnifying glass, you can tell the deskbar applet to search any one of a number of databases, including Beagle, which is not enabled by default. (The default search can be changed in the preferences for deskbar-applet; simply right-click on the applet and select Preferences to adjust it.)
Once you click on "Search for...using Beagle," Beagle takes over, digging through its index and fetching the proper results. By default, Beagle will search the files in your home directory, as well as metadata like email archives, instant messages, and blog posts. It doesn't matter where the data is; Beagle will fetch it for you


Continue Reading...

Tuesday, March 31, 2009

PCMAV 2.0 Valkyrie Final

At the same time by it publishing PCMedia magazine 4/2009, hence PCMAV 2.0 opening launched. New Following in PCMAV 2.0:

. * IMPROVED! new Implementation Module for management operate for memory and seeking of stable and quicker file.

. * NEW! Intelligentscan ( iScan) engine for ClamAV to improve detection when engine ClamAV used. PCMAV generation of 1.x griped many hit tardy what a him PCMAV when joined forces with engine ClamAV. To that we research into circumstantial to develop a engine addition, is expected, can improve performance PCMAV when joined forces with engine ClamAV. Its result, create iScan for ClamAV which as surely can improve performance scan PCMAV+ClamAV 40% quicker. download

. * NEW ! Realtime Protector (RTP) for Vista and Windows 7.7. RTP fluent ambulatory now stable and in Windows Vista. Special to Windows 7,7, although enough go well

. * NEW! Virus Quarantine ( quarantine) for the insulation of suspected by theX files have virus to peaceful place and protected before brought an action against furthermore, be like abolition and repair of file. If actually the file not dangerous ( false alarm), hence returnable to location early where do the file come. Number click at info Quarantined to step into the quarantine menu. Folder and file “\ quarantine\quarantine.dat” automatically will be formed when PCMAV run for the first time its in harddisk. download click here

Continue Reading...

Programming Guide for 64-bit Windows

Microsoft has released 64-bit versions of the Windows operating system, such as 64-bit Windows Vista, Windows XP Professional x64 Edition, and Windows Server 2003 R2 x64 Enterprise Edition. 64-bit Windows was designed with compatibility in mind. Developers can ensure that their existing 32-bit applications run well under 64-bit Windows or take advantage of the benefits of 64-bit Windows by migrating their applications.
Benefits of 64-bit Windows
A 64-bit operating system supports far more physical memory than a 32-bit operating system. For example, most 32-bit Windows systems support a maximum of 4 gigabytes of physical memory, with up to 3 gigabytes of address space for each process, while 64-bit Windows supports up to 2 terabytes of physical memory with 8 terabytes of address space for each process. The increased physical memory includes the following benefits for applications:

Each application can support more users. All or part of each application must be replicated for each user, which requires additional memory.
• Each application has better performance. Increased physical memory allows more applications to run simultaneously and remain completely resident in the system's main memory. This reduces or eliminates the performance penalty of swapping pages to and from disk.
• Each application has more memory for data storage and manipulation. Databases can store more of their data in the physical memory of the system. Data access is faster because disk reads are not necessary.
• Applications can manipulate large amounts of data easily and more reliably. Video composition for motion picture work requires 64-bit Windows for this reason. Modeling for scientific and financial applications benefits greatly from memory-resident data structures that are not possible on 32-bit Windows.

There are also important benefits for businesses:

• Increased productivity. Knowledge workers can spend their time thinking and producing, rather than waiting for the software to finish its tasks.
• Lower cost of ownership. Each server can support larger numbers of users and applications, so your business will require fewer servers. This translates directly into less management overhead—one of the highest costs in any computing environment.
• New application opportunities. New applications can be designed without the barriers imposed by 32-bit Windows. New graphics applications will make work easier and more enjoyable. Data-intensive tasks that are impossible today can be done with 64-bit Windows.
Continue Reading...
 

Gadget Copyright © 2009 WoodMag is Designed by Ipietoon for Free Blogger Template