Thursday 29 November 2012

Steaming iTunes Music Server on Cloud Platform

Steaming iTunes Music Server on Cloud Platform can be setup without paying for the dedicated hardware. Here is the detailed ways of the possible solution. We wrote about the theoretical...Steaming iTunes Music Server on Cloud Platform

USB 3.0 or SuperSpeed

USB 3.0 or SuperSpeed is a major revision of USB with a 5 Gbit/s transfer rate, which is much higher than currently widely used USB 2.0 standard. Mac OS X Lion...USB 3.0 or SuperSpeed

Cloud IaaS aka Cloud Hosting : The Question is Scalability

Cloud IaaS which is, in most cases synonymous to Cloud Hosting, has differences, regardless of the pricing, which are important to run site or for business. Practically the cPanel or Plesk like...Cloud IaaS aka Cloud Hosting : The Question is Scalability

Which Camera Lens Are Must to Buy For Your DSLR and Which Are Crap

Which Camera Lens are must to buy, is quite important to understand for your need otherwise a top notch lens which you will rarely use, will become a crap. This article, which...Which Camera Lens Are Must to Buy For Your DSLR and Which Are Crap

Monday 12 November 2012

Cloud Computing is More About Business Than Technology

Cloud Computing is More About Business Than Technology. The adoption of Cloud Computing Services and the related technologies is often mistakenly considered to be a purely tactical choice, when in fact linked to the long-term strategic choice. Cloud Computing is not like some more powerful engine that can be automatically started in place of the previous technologies but it should be accompanied by a new planning by an organization or individual for the adoption of cloud services.

Sunday 11 November 2012

In Cloud Computing Platform, Not Using the Features Means Wastage

In Cloud Computing Platform, Not Using the Features Means Wastage of Money.It is estimated that over 40% users of cloud wastes money by not using all features. When you need to work in Cloud Computing Platform like from Rackspace, Amazon Web Services, HP Cloud ; it can happen that the IT administrators of your company often buy more than they really need or use less expensive add ons. This phenomenon exclusively happens in Cloud Computing Platform as most thinks that Cloud Computing is like some more powerful engine that can be automatically started in place of the previous technologies. Read more- Cloud Computing Platform
Original source: The Customize Windows

Promo Videos and Guide Videos That Works : 3D Softwares and Video Editors

Promo Videos and Videos can be created using 3D Softwares to add realistic human talking, performing and a Editor is must for editing for Pro feel. Promo Videos and Guide Videos can also attract traffic, increase your revenue if you post them on Youtube. There was a day when for creating Promo Videos and Guide Videos of Professional quality, a studio setup was needed, a huge investment, lots of human, lots of fuss were needed. Today with excellent softwares, creating Promo Videos and Guide Videos are just like playing a 3D game. You can invest that money now behind promoting it through Google AdWords. Read more- 3D Softwares and Video Editors
Original source: The Customize Windows

Superintelligence : Hypothesis and Practical Aspects

Superintelligence is an established name in transhumanism and refers to machines or human of superior intelligence. Superintelligence is hypothesis only. A really superior being that meets these criteria which is defined in Superintelligence, according to current knowledge, not still not known. Read more- Hypothesis and Practical Aspects

Original source: The Customize Windows

Thursday 8 November 2012

Permalinks and WordPress : a basic primer

Arrived in 1999 in the world of blog, the permalinks are permanent URLs that are used to refer a blog (among other reasons). The term permalink is derived from the words “permanent” and “link”.
For a blog that can be cited continually in forums, emails, diggs, social networks, or be part of the bookmarks of users, it is advisable to ensure the permanence of these URLs (long term factor) .
Permalinks are frequently used by sites and mainly by content management software (CMS): WordPress, DotClear, Blogger, Movable Type. Some of them use URL rewriting, and more specifically the Apache module mod_rewrite to implement the rewrite system (we will go in detail later).
According to the possibilities they offer, permalinks can present several types of URL structure explicit. They generally consist of a domain name, category, date (day / month / year), and the title of the blog. The order of the elements that make up the structure of the URL may vary.
Using permalinks in WordPress: http://codex.wordpress.org/Using_Permalinks
Defining the permalink in WordPress:  http://codex.wordpress.org/Glossary # Permalink
Read more: Permalinks and Wordpress : a basic primer
Original Source : http://thecustomizewindows.com/
Under Creative Commons License: Attribution Non-Commercial No Derivatives
Original source: The Customize Windows

Wednesday 7 November 2012

How does a modem work?

There are main two types of modems

The modem is a device used to connect the Internet using a telephone or dedicated line. There are two types of modems, one that is most widespread is the internal modem. It is located inside the casing and is located on a PCI slot.
The second is the external modem that is located outside the computer. It is connected to the PC via a cable. The advantage is that it is portable, it can be moved.

Functions of a modem

The modem is used to translate information, it can modulate and demodulate (hence its name).

Modulation is to convert data sent and received by a computer on the telephone line (which are not directly understandable) into information that is compatible with the computer.

Demodulation is the reverse, it converts the data coming from the telephone line and received by the computer into information understandable by the latter.

Modulator: Computer -> Modem -> Phone Line

Demodulator: Phone line -> Modem -> Computer

Speed of a Modem

We obtain the speed modems by calculating the amount of information it can send and receive on the telephone line in a second. It is expressed in bits per second (bps). Very fast speed is expressed in kilobits per second (Kbps). So: 56000 bps = 56 Kbps.  Voiceband modems generally remained at 300 and 1,200 bit/s (V.21 and V.22) into the mid 1980s. A V.22bis 2,400-bit/s system similar in concept to the 1,200-bit/s Bell 212 signalling was introduced in the U.S., and a slightly different one in Europe. By the late 1980s, most modems could support all of these standards and 2,400-bit/s operation was becoming common.

The speed is usually expressed in Kbps or Mbps. There are standards designed for modems manufactured by different companies can communicate with each other without any problem.

There are high-end modems with extra features (voicemail, fax etc. …) but the price is high.

Radio modems

Direct broadcast satellite, WiFi, and mobile phones all use modems to communicate, as do most other wireless services today. Modern telecommunications and data networks also make extensive use of radio modems where long distance data links are required. Such systems are an important part of the PSTN, and are also in common use for high-speed computer network links to outlying areas where fibre is not economical.

Mobile modems and routers

Modems which use a mobile telephone system (GPRS, UMTS, HSPA, EVDO, WiMax, etc.), are known as wireless modems (sometimes also called cellular modems). Wireless modems can be embedded inside a laptop or appliance or external to it. External wireless modems are connect cards, usb modems for mobile broadband and cellular routers. A connect card is a PC card or ExpressCard which slides into a PCMCIA/PC card/ExpressCard slot on a computer. USB wireless modems use a USB port on the laptop instead of a PC card or ExpressCard slot. A cellular router may have an external datacard (AirCard) that slides into it. Most cellular routers do allow such datacards or USB modems. Cellular Routers may not be modems per se, but they contain modems or allow modems to be slid into them. The difference between a cellular router and a wireless modem is that a cellular router normally allows multiple people to connect to it (since it can route, or support multipoint to multipoint connections), while the modem is made for one connection.

Broadband

ADSL modems, a more recent development, are not limited to the telephone’s voiceband audio frequencies. Some ADSL modems use coded orthogonal frequency division modulation (DMT, for Discrete MultiTone; also called COFDM, for digital TV in much of the world).

Cable modems use a range of frequencies originally intended to carry RF television channels. Multiple cable modems attached to a single cable can use the same frequency band, using a low-level media access protocol to allow them to work together within the same channel. Typically, ‘up’ and ‘down’ signals are kept separate using frequency division multiple access.

New types of broadband modems are beginning to appear, such as doubleway satellite and power line modems.
To know more, please visit our website: http://thecustomizewindows.com/

SIM Card or Subscriber Identity Module

SIM card is a smart card in a mobile phone which plugged in and used to identify the user within the network. This makes phone connections and data connections. SIM card has a small processor with memory. Previously we wrote about USB Modem, like Mobile phones, these also uses a SIM card. SIM stands for Subscriber Identity Module.
Technology behind SIM Card or Subscriber Identity Module
By using a variable PIN, SIM card can protect against unauthorized use. Using the SIM card the Mobile Equipment (ie usually the mobile phone) is assigned to a network and is authenticated. For these purposes are on the SIM card there are secret numbers and algorithms which are stored on ROM. These are also used to encrypt voice and signaling data. The SIM card is also used to store temporary, network-related data as well as preferred and blocked networks. In addition, telephone and short message service messages (SMS) and the memory of the last called telephone numbers can be stored on SIM card.
SIM card is often used in large ID-1 format (85.6 mm × 54 mm). The smaller ID-000 -part (25 mm × 15 mm) can be broken out from it. Due to the even smaller mobile devices the small ID-000 format is used. Meanwhile, there are also devices that uses even smaller micro-SIM.
A SIM card contains eight contact surfaces. They are named as C1 to C8. There are SIM cards with an operating voltage of 1.8 volts, 3 volts and 5 volts.
More on SIM Card
SIMware is the software running on a SIM card. SIM cards can not last forever. With every write to the card (eg for a authentication in the network), the process “ages” the card. Most manufacturers specify a life of 100,000 authentication. Older cards are sometimes not recognized in modern mobile phones. Current UMTS devices definitely need a map of the latest generation of its storage service features. Some SIM cards have a lifetime internal counter. The micro-SIM (3FF) Third Form Factor card is a smaller version of the SIM card. When the technical specifications of the chips are concerned, there are no significant differences with a normal SIM Card.
To read more, please visit our website: http://thecustomizewindows.com/

Tuesday 6 November 2012

Personal Computer Hardware

The term Personal Computer Hardware refers to all tangible parts of a PC, the components are: electric, electronic, electromechanical and mechanical. These cables, cabinets or boxes, peripherals of all kinds and any other physical element involved; software is intangible and is called software. The history of Personal Computer Hardware can be classified into four generations, each characterized by a change of technological importance. A first delineation could be made between basic hardware, the minimum required for normal operation and complementary which performs specific functions. A computer system consists of a central processing unit (CPU / CPU) responsible for processing the data, one or more peripheral input, allowing the entry of information and one or more output devices, which enables to give output (usually as visual or auditory ) to the data processed.…

Publish Windows Movie Maker Video to YouTube with 2 Step Verification

Publish Windows Movie Maker Video to YouTube with 2 Step Verification with very easy steps quite quickly than saving on hard disk and then uploading to YouTube. Many users do not know the actual steps to Publish Windows Movie Maker Video to YouTube with 2 Step Verification and save the Edited video on computer and then upload via browser to YouTube. It takes a huge time as the video needs to be converted twice.…

Tips for Journey to Cloud Computing Platform

Tips for Journey to Cloud Computing Platform is a comparison of enterprise sector and public cloud computing which highlights the benefits of moving to cloud. The normally accepted facts like the time of application deployment can be reduced greatly, from weeks of on a traditional data center to the few minutes it takes in the cloud, accelerated application development, the cost per virtual machine collapsing from dollars to cents are not highlighted in this article on Tips for Journey to Cloud Computing Platform.


Friday 11 May 2012

Why blog is losing traffic: steps to diagnose decrease in visitor count

How to prevent loss of traffic and how to prevent loss to hair: These two questions are probably among most frequently asked questions in last ten years! We will give points: make a note yourself to correct and get back your traffic. This kind of exercise is interesting; this amounts to solving a puzzle. It is not always possible to determine the exact cause of a loss of traffic, but we can speculate with a good statistical tool as Google Analytics. Here are 10 steps to diagnose the cause of a loss of traffic from search engines.

The first step is to make the usual checks:

See if there was a change in a reference source. We mean to say, Google previously took your site's writing as reference, but now has decided to lean towards someone more solid. This apparently has no solution other than using Google Adwords, offline marketing...but, is assured; your domain is lost from the search engine market share you got ago. Like buying hair growing tonics, you can invest money to regain the lost market, but we can say by 99% probability, it will fail. Check if the site was offline due to server failure or due to an update. Major changes to the Web site before the loss?

Determine the type of traffic loss

Many people look at Google's stats page, saw a loss of traffic on their site, and assume they must have lost their rankings in Google and the targeted traffic that goes with it. This is one solution entirely plausible. Remember to check for the source of traffic from search engines, and even more specifically traffic from Google and not the traffic "bought" somehow. 

Look at the extent of the loss of traffic

Your search will be very different if there was a gradual decline, or a drastic fall visits. Lately we have seen sites lose all of their traffic overnight! This loss is usually a technical problem (a robots.txt, nofollow a redirection, something others). Sometimes it is not a real loss of traffic, but simply as the Google Analytics code was accidentally deleted, and what appears as a loss of traffic. It can also be a blacklisting of the site (but it is still rare.). It is marked by a decline at 30 degree or more for a time period of 3 months. Compare what is comparable
Many businesses are cyclical or seasonal. A site can have huge spikes of traffic a month before Christmas or the week before the summer holidays. This means that the comparison from one month to another may not be relevant. A decline in traffic in January is probably pretty normal for a site for gifts. If you have more than one year of data, you should compare the traffic of this month for the same month in previous years. Ideally, you should see a growth in traffic. And if you do not notice, you may have a problem on the back, or to put his finger on a problem. A Windows XP forum will not get traffic today as it got once. We pointed it, think deeply. Filter "brands" of traffic
Most Web sites get much traffic on Google thanks to their brand or brands they distribute. With this filter you will have the opportunity to note that these visitors have substantially increased or decreased. If you receive fewer visitors to "your" brand, it could be caused by a decrease in marketing and advertising. Once you take note of the movement of the mark, you can filter through all sorts of expression or keyword, and then see what actually made traffic SEO site. Analyze keywords and phrases that had a significant decrease in number of visitors
Now that you have filtered the requests like "brand", you should be able to see the keywords and phrases that bring you the most traffic. Y does a lot of keywords and phrases that seem to be far fewer visitors in recent months compared to last year at the same time? 

Make a quick Google search with the post headers

If you do not see your site in the first page of Google, there may or may not be a track to widen. If a page of your site is always high in the results list, it could simply that fewer people are doing this research now. In this case we see according to your title and description of the extract. It is also possible that other results for that keyword (or key phrase) have images or embedded videos while you’re is not. Or it could be that there are results of "universal search" showing a local map, a video, or image that makes your score is less attractive. Look at the page "landing" for the keyword that lost traffic
Is there an obvious reason why it does not generate as many visitors as usual? Maybe even that no longer exists? Has it changed much at some point during the year? The content is duplicated from other pages on your site or contained on other sites? Are there any links pointing to that page no longer exists?
Since the early May 2010 and late February 2011, a large number of small sites have lost a significant amount of traffic for key phrases that have a small number of individual visitors, but overall is an important part of overall site traffic. Google changed its algorithm on this point. It is a certainty, and we must adapt accordingly to be always well placed. Slice and decide whether you're dealing with a penalty from the search engine or not.
To decrease drastically in the few cases where it is not a technical problem, you're likely to suffer a penalty. You can check your Google Webmaster Tools to see if there is a notification, but generally they do not bother to tell you. However, the penalties from search engines are much rarer than we think. In fact, most website owners know what they did when they have a search engine penalty. There are cases; however, they may have been duped by "SEO" unscrupulous. Update: Here is an article for finding the causes for losing search engine traffic exclusively. We hope these steps will help you diagnose your own loss of traffic. We imagine they will keep you busy for a while!
===============================================================
Note: Firstly, lot of webmasters tries to improve SEO by adding or removing "dofollow”, "nofollow" links. Which are practically more dangerous? SEO is nothing more than practical application of your diagnostic power and intelligence. Just apply your common senses to analyze. Secondly, do not get paniked. Wait for 2-3 months with the same settings. If you really have good content, visitors will comeback, as a chain reaction; you will regain the lost position in search engines. Note 2: Please do not take seriously the words we used for baldness. Human hair practically is a useless thing by revolution. Five thousand years ago, our ancestors had more hairs than us and we are losing it gradually. That is another topic that will be discussed in our other website in future!


To know more, please visit us at: http://thecustomizewindows.com/

Thursday 10 May 2012

Server Virtualization Technology : Basics of server virtualization

We are observing many visitors are searching with Server Virtualization and landing to the articles on Virtual Private Server (VPS). In this article, we will discuss the basics of Server Virtualization Technology. That this why the article has been named Server Virtualization Technology: Basics of server virtualization.
What is Server Virtualization?
The idea of Server Virtualization is to run multiple servers on one physical machine. This is the basic of running the Virtual Private Servers. Server Virtualization is vast topic and needs super specialized knowledge to deploy them properly. We will keep the topic as easy as possible so that it becomes understandable to any level of interested readers.
Why we need Server Virtualization?
Because this technology provides High Availability, Economy and Flexibility. If one physical Server can run multiple instances of Server, obviously the costs are lowered for each such Virtual Servers: this is the basic why a Dedicated Server costs more than a Virtual Private Server.
Types of Server Virtualization
Software Virtualization The virtualization software can be used either to simulate an operating system or just an application on the Operating System.
Operating System OS virtualization using container: OS level Server Virtualization Technology provides a complete runtime environment virtually inside a closed container. It needs no additional operating system. The advantage of this approach is the good integration. Examples are BSD jails, OpenVZ, Virtuozzo, Linux-VServer, User Mode Linux etc.
System Virtualization using Virtual Machine Monitor (VMM): This type of Server Virtualization can be done by hardware emulation. This type of Server Virtualization virtualization is known as hardware virtualization or paravirtualization. The individual host systems have its own full computer complete with all basic hardware elements like processor, hard disk drives, RAM etc. This emulation is often less efficient than direct access to the hardware, which can then lead to a reduced speed. VMware Workstation, Microsoft Virtual PC, VirtualBox are the examples such VMM Server Virtualization.
VMware or Xen uses the VMI interface that acts as a joining region between the virtualization layer and host operating system.
Screen shot showing Fedora running on VirtualBox. Screen Shot and some part of this article’s information source courtesy WikiPedia Germany.
Application Virtualization is totally different kind of software Server Virtualization from the above two: this is the can be run without requiring them to be installed.  Microsoft Application Virtualization, Thinstall VS are such examples.
Hardware level Server Virtualization Hardware level of Server Virtualization is much more complicated. Hardware level Server Virtualization can be deployed by Partitioning, Domaining, Processor virtualization and Storage virtualization.
More on Server Virtualization
VMware,Virtuozzo, Microsoft Hyper-V, Xen Server are popular Commercial Virtualization Solutions used for Server Virtualization. Whereas Xen, Open VZ are Popular Free Virtualization Solutions used for Server Virtualization.
To know more, please visit us at: http://thecustomizewindows.com/

Wednesday 9 May 2012

How to change the smilies / emoticons in WordPress


WordPress offers a variety of native smilies automatically generated when you enter the shortcut to which they refer. For example, typing “:)” WordPress will convert the text into an image when the publication of an article for a smileyHow to change the smilies-emoticons in WordPress like this . Here is a simple trick that will allow you to replace default emoticons with your own what is sure to give a more personal character to your site or blog.

We have replaced WordPress custom smilies with some others (actually to deviantArt style):

:2cents:    Is not these cool to have own set of emoticons?

(Notice the same emoticons below comment to use)

Step one: Install the required plugin

Download a small plugin to make the things easier. Under Settings, you will get the Smilies option after activating the plugin.

Step two: Procedure of installation / replacement

Using your favorite FTP client, open the following directory: / wp-includes/images/smilies /
Here are stored the default smilies. It remains for us to replace them with ones of your choice. Above all, do a full backup of the file on your PC case to avoid any inconvenience unexpected.

Two solutions now available to you:

Either you create emoticons one by one by hand or you need to download from the Internet.


To know more information as on our website: http://thecustomizewindows.com/

Tuesday 8 May 2012

Cloud Storage: Architecture and Technology


Cloud Storage is a storage model based on networks, designed in the 1960s, where data is hosted on virtualized storage spaces and are generally hosted by third parties. The hosting companies and users, who require their data to be hosted on Cloud Storage, rent the Cloud storage space as they require. The operators of data centers, the service level, virtualized the resources according to customer requirements and environments exhibit only the required resources, while clients themselves manage the storage and operation of files, data or applications. Resources may be physically distributed across multiple physical servers.
Cloud storage services can be accessed by API; Web User Interface is usually given to the customer.
Architecture of cloud storage:
Cloud storage has similarity with cloud computing in terms of agility, scalability, elasticity etc. It is considered that the term Cloud Storage was coined in the early 1960s. Since the ’60s, the cloud computing was developed in several areas, newer implementations came due to Web 2.0, this was due to the high speeds of bandwidth and the low cost of storage and processing, Cloud Storage was not extended until the late ’90s and this delayed the implementation and massive development of solutions is based on cloud computing. Only some have the infrastructure to develop these concepts within the entities.
One of the first achievements of cloud computing came in 1999 with salesforce.com, the pioneer in delivering enterprise applications via a web interface. The company demonstrated to specialists and companies for software development the advantage of using web portals for delivery of their products. FilesAnywhere also provided the scheme-based cloud storage service that allowed users to share their files securely by Internet.
There is difficulty in defining clear terms the architecture of cloud storage, but is clearly analogous to the concept of object storage. Cloud storage services are provided by Amazon S3, cloud storage products from EMC Atmos – these are clears examples and offer guidance on the storage of objects.
Cloud storage is defined as an environment:
Cloud Storage composed of many distributed resources, but acts as a single storage with high fault tolerance because it implements redundancy and data distribution that enables improving the eventual consequences by data replication.
Examples of Cloud Storage:
    Amazon S3
    Windows Azure Storage
    CSE of Symantec
    EMC Atmos
    FilesAnywhere
    Google Cloud Storage
    icloud Apple
To know more, please visit our website: http://thecustomizewindows.com/