Log in

The 5 best damned text editors for Windows

March 27th, 2016 by

To develop a Firefox extension, you need certain tools. One of these essential tools is a text editor. You need something that should feel intuitive, be powerful, adaptable, load quickly, and be a pleasure to use. Which programs are the most suitable for developing web applications with?

It’s a fine line to walk. Text editors are a programmer’s bread and butter, and they need to have everything you want, and not anything you don’t need. If an editor is lacking features, then it is considered not complete, and if it has too many features, people call them bloated. People are so damn picky. This is why I’ve done the leg work for you and definitively decided the best damned text editors for Windows. Why Windows? My answer is “because, that’s why.”

If you have a Mac, then buy TextMate. …

Another immediate extension installation – Tab Mix Plus

March 20th, 2016 by

Okay, okay, before you say, wait a minute- there’s no reason to install a tab extension on Firefox. It can do everything right out of the box, and all of those are way too bulky and they mess up my other extensions.

I say, “Nay.” This beauty adds features that are simply not available in the default Firefox setup. There are some things it can take care of that are a short tweak away in your about:config page, but there are many, many options it adds. I only use a few, but the few I use are indispensable.

My favorite thing that I love to do is inadvertently close tabs. Well, let me re-state that. I inadvertently close tabs from time to time, and I cry if I can’t remember where I was or if I am unable …

Good Ol’ Token Ring

March 10th, 2016 by

trngLarge numbers of network administrators are confronting the fact that their tried-and-true technology may no longer meet their needs

Not long ago, Token-Ring technology was ferociously battling Ethernet for network domination. But now Token-Ring is fading into oblivion, done in by its high price and lack of a high-speed migration path. Because millions of Token-Ring connections are now in place, the change will be gradual, but more and more corporations are seeking ways to dump their Token-Ring networks. For companies moving into new offices or opening branch offices, the time may be right to make a complete switch.

For others, the technology represents such a large investment that the transition will take years. But studies show that few companies now consider Token-Ring strategic and many believe it is just a matter of time before they swap it out.

Token-Ring’s bleak prospects illustrate that a technology can fail despite superior

Layer 3 Switches: Still The Gold Standard

March 4th, 2016 by

l2swLayer 3 switches can slash router latency, but the current lack of unified industry standards necessitates cautious deployment of the technology

Reducing router latency is one of the top priorities of many network managers, so the industry’s crazed rush to deliver Layer 3 switching technology is not surprising. Unfortunately, little agreement has been reached on a unified Layer 3 switch design, and it doesn’t appear that standards are looming in the wings.

Because of this lack of uniformity, we urge network administrators to take only cautious steps toward implementing this new technology. Those desperate to deploy Layer 3 switches should start from the outer edges of the network, rather than overhauling the backbone with products that might not fully interoperate with installed infrastructures or future standards.

Desktop Videoconferencing: Once Huge, Now Skype’d Away

February 28th, 2016 by

dskvNetwork managers, fearful that videoconferencing would consume excessive amounts of network bandwidth, have relegated this function to specialized-room systems with ISDN connections. But now, thanks to faster networks and the new H.323 videoconferencing interoperability standard, videoconferencing is coming to the desktop.

Although desktop ISDN systems have been available for a while, IS managers have been reluctant to spend money to bring in additional ISDN lines. But things are changing: LANs are much faster, and LAN switching systems allow administrators to segment traffic, isolating videoconferencing data so that it has less impact on the network.

In addition, the international videoconferencing standard H.323, which recently became available, is designed for use over packet networks such as LANs and the Internet. With H.323, packet-based backbones, such as the Internet or a private corporate intranet, can accommodate videoconferencing, eliminating the need for a specialized ISDN network.

The Top Hard Drive Recovery Services In 2016

February 24th, 2016 by

hdrsThere is no denying of the fact that keeping the back up of your data is the safest and most reliable way to avoid the frustration of data loss especially when it means everything to you. However, if you unfortunately happen to lose your precious data due to out of order hard drive, there still is no need to panic. There are a number of professional companies, which render highest degree of services to complete the delicate task of data recovery for you successfully. If you are wondering which hard drive recovery service is most reliable, here is a brief description of the top 2 services available right now in the market.

Hard Drive Recovery Associates with its 95% success rate has created great good will in the market and is leading the pack due to its unmatched customer support services and state of the art recovery mechanisms. They offer variety of service methods including mail, free shipping, remote recovery, recovery software and even the onsite recovery service. When it comes to the most reliable hard drive recovery service, Hard Drive Recovery Group is another great option. It has the highest data recovery rate at 98% and it excels in the technology it uses for complex data recovery. Their average turnaround time is 3 to 5 days but they also offer emergency services and help recover data within 24 to 36 hours. If your data is precious to you, we highly recommend using a professional hard drive recovery service instead of trying to fix it yourself and ending up aggravating the problem.

Sometimes, Avoiding The Popular Product Works

February 23rd, 2016 by

tgypWhen Paul Morgan began evaluating push technology products last January, he had one top priority: anything but PointCast. Like many a corporate Webmaster, Morgan had experienced firsthand the pitfalls of the wildly popular screen-saver-cum-automatic-newsfeed, including high bandwidth consumption, interference with user productivity applications and the distraction of ads. There had to be a better way.

As Web site engineer for GTE Corp.’s Information Services Division, Morgan was looking for a way to push out project-management information to GTE’s staff in a real-time, noninvasive way. Project-management data is crucial for systems integrator GTE, which services government and private industry. Morgan wanted critical information such as a certain financial threshold being reached (for example, a project about to go over budget) or changes in project deliverables

IBM’s Support Tools Made The Brand

February 18th, 2016 by

ibmstIBM is readying a new suite of knowledge-based support tools for its corporate and retail customers that diagnose system problems, recommend solutions and provide troubleshooting via the Web.

The Web-based tools, which will be announced within the next four to six weeks, are part of a broad plan to enhance IBM’s worldwide customer support and service infrastructure. The ultimate goal is to enable customers to more easily access support resources and resolve problems with IBM hardware, officials said last week during a briefing at the company’s HelpCenter technical support operations here.

The tools, which will be bundled on the company’s notebooks, desktops and servers and offered via its Web site, use logic to identify a customer’s system problem and recommend appropriate solutions. If the fixes involve software, such as BIOS updates, drivers or patches, they can be automatically downloaded to the customer’s system.

Government Gains Efficiency With Strong Intranet Design

February 14th, 2016 by

sdeinnWith the PC explosion in the late ’80s and early ’90s, the California Department of Education encountered a problem faced by many companies and organizations: Although PCs empowered end users, the spread of information resources to the desktop hindered the department from getting an enterprisewide view of its data.

As a result, state legislators had trouble finding the financial, demographic and performance data about students that is necessary for making informed policy decisions. That situation didn’t change until the department adopted an Internet/intranet solution to easily access this complex mass of information.

“Certainly, companies want to set a single standard [for handling data], and intranets are a practical method,” said Matt Nerney, an analyst at Aberdeen Group, a consultancy in Boston. “It’s not as difficult to get people to move in that direction, because they see the benefits of an …

Airlines Took Too Long To Give Power To Passengers

February 9th, 2016 by

altslWith vendors of notebook PCs unable to deliver systems with enough battery life for long flights, airlines are getting set to launch a system that provides power to passengers in their seats.

The new power distribution system, which will be rolled out in airline fleets later this year, will tap power from generators in a plane’s engines and distribute 15 volts of DC power to outlets located in seat armrests. This should be a boon to travelers with notebook PCs who would like to make flying time more productive.

However, the initial deployment will only be in first-class and business-class seats on aircraft making international and long-range flights, and those who want to use the outlets will need to buy a special power adapter for their notebooks.

For the airlines, safety is the primary consideration, so the system is …

SAP Is Too Big? A Debate

January 30th, 2016 by

sapitbWhile serving as a standard business platform, SAP designed R/3 to be adaptable to customers’ changing business needs. Two good examples of this are the hundreds of complementary software solutions created by SAP’s partners, and the creation of R/3 3.1–SAP’s Internet-enabled version of R/3–in less than nine months.

Taschek’s statement about SAP sales cycles assumes that selecting R/3 is as easy as selecting a spreadsheet at a local computer store. In fact, SAP sales cycles often require a significant length of time. Because R/3 is a business-critical application, all of our customers rely on its stability and data integrity.

The process of selecting and implementing R/3 varies widely. Dozens of companies have brought R/3 “live” in as little as four months using SAP’s rapid-implementation methodology. In January 1997, 60 percent of the 750 companies that went live with …

Keep On Pushin’

January 15th, 2016 by

gpfiGregg Petch’s first implementation of push technology was a real pushover. As CIO of the Metropolitan Regional Information System, one of the nation’s largest multiple listing services for the real estate industry, he needed a simple application to send IS updates to the help desk. Petch figured he’d need about two weeks to install and work out any kinks in Lanacom Inc.’s Headliner product. Surprisingly, the rollout took just two days.

Now, the head of IT is tackling a more formidable challenge–tying together BackWeb Technologies Inc.’s push technology with an Oracle Corp. Web server and a custom browser to deliver real estate information to MRIS’ 30,000 member agents. Among Petch’s many tasks: using Visual Basic to write custom SQL statements to an Oracle database from BackWeb’s search engine. You’ll forgive Petch if he begs off providing an exact …

Encryption Law Is A Tough Area

January 1st, 2016 by

Peter Browne is a casualty in the encryption wars.

entecFor the past year, Browne, senior vice president of information security for First Union Corp., has been unable to move aggressively on plans to implement an ambitious brokerage application on the bank’s Internet site. Why? Because, despite a red-hot battle between the White House on one side and encryption vendors and many Congress members on another, current law prohibits U.S. companies from “exporting” any product containing strong encryption. This means it would be illegal for $103 billion First Union, the nation’s sixth largest bank, to use strong (greater than 40-bit) encryption to encode financial transactions originating with customers outside the United States.

“Strong encryption technology is absolutely critical for all the product and system plans we have,” says Browne, in Charlotte, N.C. “These restrictions have hampered us from expanding our higher-risk …