Information Lifecycle Management (ILM) is a process for maintaining information storage at the least possible cost, while concurrently maintaining appropriate levels of availability. The first phase in the Information Lifecycle Management process is to determine what information is being stored and how it is being accessed. The two steps in this phase are the Data Classification Audit and the Information Usage Audit. The first phase of the Information Lifecycle Management process should deliver a clear picture of the information storage requirements of the organization. The second phase of the Information Read More
How the Worldwide Web Works
The World Wide Web (commonly known as ‘The Web’ and abbreviated as WWW or W3) is a way of accessing information over the internet. Typically these two terms are used interchangeably, but there is a very real and significant difference between them. The Internet is a medium which consists of a network of computers connected on a global level. Any computer can communicate with any other as long as they are both connected to the network. The World Wide Web, however, is an information centric model built on top of Read More
How to Defeat Caller-ID Blocking
One trick to defeat Caller-ID blocking is to forward your phone line to a friend who lives in another LATA. When your friend receives the anonymous phone call, have him use *69 Call Return to dial to offending party back. As he is now placing a long distance phone call, the telephone number of the anonymous caller will show up on your friend's phone bill at the end of the month. A variation of this trick is available in areas where the local phone company offers per-call billing (as opposed Read More
What Are Ionic Compounds?
An ionic compound is any compound in which an electrostatic force holds the ions together. Ionic compounds are made of positively charged particles that rest against negatively charged particles in order to balance out the two particles’ magnetic imbalance. They can be found in both solid and liquid states, although solid ionic compounds are poor conductors. Ionic compounds can be used in a number of applications, most of which involve electrical conductivity. How Ionic Compounds Work All ionic compounds are made of microscopic crystalline structures composed of positively charged particles Read More
How a Television Antenna Works
"Low Tech" is the best way to describe a basic television antenna. Television antennas feature a series of elements cut to exact lengths which are designed to receive a compatible frequency from a transmitted television signal. Each element has a pair of metal rods (primarily aluminum based) extending from a boom. The key difference between various brands of television antenna is based on the quality of construction and how well anodized the metal is. As the metal oxidizes and the rivets rust, the active elements tend to lose contact. When Read More
How to Solve a Buffer Overrun Detected Problem
Buffer overrun detected problems may occur when software that is coded in C or C++ permits unsafe data. This problem happens with all operating systems, but it is particularly common on Windows operating systems. The unsafe data that is introduced externally can exploit vulnerabilities in software or cause program crashes. This can permit malicious software to enter and harm the computer. Buffer overrun detected error messages should be corrected as soon as possible to ensure that greater security issues do not arise. Follow the instructions below to solve the buffer Read More
How to Use the Grep Command
The grep command is a search command built into a variety of Unix based operating systems. This command line utility, whose name stems from the original Unix term which means “search globally for lines matching the regular expression, and print them,” can be accessed using the command line or terminal from anywhere in the Unix operating system. When given a particular list of files to search through, the grep command becomes especially useful, as it can search through any amount of text to find exactly what you are looking for. Read More
DTMF (Dual-Tone Multi-Frequency)
DTMF tones, or Dual-Tone Multi-Frequency signaling, are audible tones that are used by touch-tone telephones to identify which number key was pushed by the operator. DTMF tones have been used since 1963 and are used by all standard touch-tone telephones in the United States as well as in many other countries around the world. DTMF tones can be heard while the operator enters each digit, but must be decoded by a DTMF decoder at the telephone company’s switching center before a call can be completed. How DTMF Tones Work Read More
Fingerprint Scanners
Fingerprint scanners are biometric security systems designed to use the distinct features of an individual's fingerprints to provide security. Fingerprint scanners are now being used in police stations, security-intensive industries and, most recently, on computer shops as a peripheral device for computers. Biology of a Fingerprint Every person has marks on his fingers. These marks on the fingers are mainly for gripping things as they provide frictional resistance. These marks have a pattern and this pattern is called the fingerprint. The person's fingerprint is determined by his or her genetic Read More
How to Change the Font Color in Windows Explorer
While Windows Explorer is generally easy on the eyes, many computer users like to customize certain aesthetic features on their computer's operating system. One way to do this is to the change the font color in Windows Explorer. Here are some tips. Changing the font colors and even the font in Windows Explorer is extremely easy to do and takes less than a minute. It should be noted however that not every font in Windows Explorer can be changed, but the items that can be changed will definitely alter the Read More
Share on: