Posts

Showing posts from 2009

How to uninstall McAfee Security Center from your System

If you want to uninstall McAfee Security Center, follow these steps. 1 - Access McAfee's files in your program files folder in Explorer. Look for C:\program files\mcafee.com\agent\app. 2 - Delete all files contained in the folder. If you can’t find the McAfee application, enter "mcafee" in the Search feature on your Explorer toolbar. 3 - Go to the "Add and Remove Programs" in the Control Panel. Highlight "McAfee Security Center" and click on "Remove."

Microsoft Security Essentials

Microsoft Security Essentials is a new, free consumer anti-malware solution for your computer. It helps protect against viruses, spyware, and other malicious software. It's available as a no-cost download for Windows XP SP2 and higher, Windows Vista, and Windows 7 http://www.microsof t.com/security/ products/ mse.aspx

How to install Mobiola Webcam on your machine

This is a video demonstration of installing Mobiola Webcam

How to use your camera phone into a high quality wireless

Image
Today I was trying to use my N95 8GB phone's 5 MP camera as a webcam to my laptop. After googling I find Mobiola Web Camera 3. Installing it over laptop is really very easy and after installation it gives u a tiny piece of desktop app with the little sisx application which need to be installed to your smart phone. This sisx should be transferred to the phone through any medium (bluetooth,infra or USB) and install on your mobile right after installation. You can access your phone camera from your laptop. Although result is not as good as 5 MP should be, but still its great to use as it can be use to record the movie in AVI format right onto your PC's hard drive with relatively low size which can be shared through any video sharing apps like Youtube ,facebook etc , and YES you can use it like your natve webcam required at messengers for Video Conference. Following are some of the features of Mobiola Webcam, It

Implementation Process of Business Intelligence in an Organization

Image
Implementation Process of Business Intelligence in an Organizatio n

Potential problems in implementing Business Intelligence

User resistance is one big barrier to BI success; others include having to winnow through voluminous amounts of irrelevant data and poor data quality. The key to getting accurate insights from BI systems is standard data. Data is the most fundamental component of anyBI endeavour. It's the building blocks for insight. Companies have to get their data stores and data warehouses in good working order before they can begin extracting and acting on insights. If not, they'll be operating based on flawed information.

Concept of Business Intelligence

Business intelligence, or BI, is an umbrella term that refers to a variety of software applications used to analyse an organisation’s raw data. BI as a discipline is made up of several related activities, including data mining, online analytical processing, querying and reporting. Companies use BI to improve decision making, cut costs and identify new business opportunities. BI is more than just corporate reporting and more than a set of tools to coax data out of enterprise systems. CIOs use BI to identify inefficient business processes that are ripe for re-engineering. With today’s BI tools, business folks can jump in and start analysing data themselves, rather than wait for IT to run complex reports. This democratisation of information access helps users back up — with hard numbers — business decisions that would otherwise be based only on gut feelings and anecdotes. Although BI holds great promise, implementations can be dogged by technical and cultural challenges. Executives have t

What are the challenges when implementing a balanced scorecard?

Corporate culture changes, and with change can come fear, especially if it is tied to performance standards. Much of that can be abated if you are honest with stakeholders and employees. It can also be a time-consuming process, taking up to a year to fully implement, although the original estimate from Kaplan and Norton indicated a time of 26 months to implement everything down to the level of individual employees. It also requires full top-level support over a long period of time, during which other priorities and emergencies almost certainly will take centre stage, at least temporarily. And it's certainly not cheap. Depending on the scope of the project, it can cost from thousands to hundreds of thousands of dollars. Costs include team members and time spent, facilitator cost, software licensing costs, installation and testing costs, and annual maintenance and upgrade costs.

Benefits of introducing BI in your company

A broad range of applications for BI has helped companies rack up impressive ROI figures. Business intelligence has been used to identify cost-cutting ideas, uncover business opportunities, roll ERP data into accessible reports, react quickly to retail demand and optimise prices. Besides making data accessible, BI software can give companies more leverage during negotiations by making it easier to quantify the value of relationships with suppliers and customers.Within the walls of the enterprise, there are plenty of opportunities to save money by optimising business processes and focusing decisions. BI yields significant ROI when it sheds light on business bloopers. For example, employees of the city of Albuquerque used BI software to identify opportunities to cut mobile phone usage, overtime and other operating expenses, saving the city $US2 million during three years. Likewise, with the help of BI tools, Toyota realised it had been double-paying its shippers to the tune of $US812,000

How is the balanced scorecard implemented?

According to the Balanced Scorecard Institute, it consists of multiple steps: 1. Assess the company's organisational structure 2. Identify strategic themes 3. Define perspectives and strategic objectives 4. Develop a strategy map 5. Derive performance metrics 6. Craft and prioritise strategic initiatives 7. Automate and communicate 8. Cascade the balanced scorecard throughout the organisation 9. Collect data, evaluate and revise

What are the benefits of implementing a balanced scorecard?

Major benefits include increased structure and shared objectives; these often lead to greater financial return. It allows organisations to become more functional and enabled. For specific programs, a balanced scorecard can raise the profile of key projects, which can help with funding and internal support. It's also possible to use the strategic map that a balanced scorecard approach creates to help guide programs toward success. And it's catching on.

What is a balanced scorecard?

The balanced scorecard methodology, an outgrowth of prior measurement and management methodologies like total quality management (TQM), has existed for decades, but it was formalised in the early 1990s by Robert Kaplan and David Norton. Kaplan and Norton not only gave it a formal name but also put structure around the way organisations can measure how well they are functioning and how to predict future performance. Basically, it's a way to map and translate complex business information into something that's understandable to everyone. The methodology starts with targets defined by the organisation, followed by scorecard measures. These usually include both corporate targets and business unit targets, which are then honed into individual measures and targets. It's a very flexible approach, designed to be adapted to any organisation's needs. And virtually anything can be measured.

Implementation of Business Intelligence

When implementing BI for the companies,first they should analyse the way they make decisions and consider the information that executives need to know for making more confident and more rapid decisions, as well as how they'd like that information presented to them (for example, as a report, a chart, online, hard copy). Discussions of decision making will drive what information companies need to collect, analyse and publish in their BI systems. Good BI systems need to give context. It's not enough that they report sales were X yesterday and Y a year ago that same day. They need to explain what factors influencing the business caused sales to be X one day and Y on the same date the previous year. Like so many technology projects, BI won’t yield returns if users feel threatened by, or are sceptical of, the technology and refuse to use it as a result. And when it comes to something like BI, which, when implemented strategically, ought to fundamentally change how companies operate a

Concept behind Anonymity

Anonymity: I can see you hiding in the shadows over there and so can the logs of all the web sites, FTP servers and other nooks and crannies you visit on the web. The sort of information gathered by these logs and which is available to the webmasters of the sites you visit include the address of the previous site you visited, your IP address, your computer's ID name, your physical location and the name of your ISP along with less personal details such as the operating system you're using and your screen resolution. If someone was snooping through your dustbin to gather information on consumer trends or tracking your every move to see where it is you go everyday you wouldn't be too chuffed would you. Well the web is no different, it's still an invasion of privacy and a threat to security and you don't have to put up with it. Proxy: Every time you visit a web site, detailed information about your system is automatically provided to the webmaster. This information can

Auto End Tasks to Enable a Proper Shutdown

This reg file automatically ends tasks and timeouts that prevent programs from shutting down and clears the Paging File on Exit. 1. Copy the following (everything in the box) into notepad. QUOTEWindows Registry Editor Version 5.00 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management]"ClearPageFileAtShutdown"=dword:00000001 [HKEY_USERS\.DEFAULT\Control Panel\Desktop]"AutoEndTasks"="1" [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control]"WaitToKillServiceTimeout"="1000" 2. Save the file as shutdown.reg3. Double click the file to import into your registry. NOTE: If your anti-virus software warns you of a "malicious" script, this is normal if you have "Script Safe" or similar technology enabled.

Anonymity of Proxy

The exchange of information in Internet is made by the "client - server" model. A client sends a request (what files he needs) and a server sends a reply (required files). For close cooperation (full understanding) between a client and a server the client sends additional information about itself: a version and a name of an operating system, configuration of a browser (including its name and version) etc. This information can be necessary for the server in order to know which web-page should be given (open) to the client. There are different variants of web-pages for different configurations of browsers. However, as long as web-pages do not usually depend on browsers, it makes sense to hide this information from the web-server. What your browser transmits to a web-server:a name and a version of an operating systema name and a version of a browserconfiguration of a browser (display resolution, color depth, java / javascript support, ...)IP-address of a clientOther information

mIRC Commands

/ Recalls the previous command entered in the current window. /! Recalls the last command typed in any window. /action {action text} Sends the specifed action to the active channel or query window. /add [-apuce] {filename.ini} Loads aliases, popups, users, commands, and events /ame {action text} Sends the specifed action to all channels which you are currently on. /amsg {text} Sends the specifed message to all channels which you are currently on. /auser {level} {nickaddress} Adds a user with the specified access level to the remote userslist. /auto [onoffnicknameaddress] Toggles auto-opping of a nick or address or sets it on or offtotally. /away {away message} Sets you away leave a message explaining that you are not currently payingattention to IRC. /away Sets you being back. /ban [#channel] {nickname} [type] Bans the specified nick from the curent or given channel. /beep {number} {delay} Locally beeps 'number' times with 'delay' in between the beeps. /channelPops up t

What is Spyware?

There are a lot of PC users that know little about "Spyware", "Mal-ware", "hijackers", "Dialers" & many more. This will help you avoid pop-ups, spammers and all those baddies. What is spy-ware? Spy-ware is Internet jargon for Advertising Supported software (Ad-ware). It is a way for shareware authors to make money from a product, other than by selling it to the users. There are several large media companies that offer them to place banner ads in their products in exchange for a portion of the revenue from banner sales. This way, you don't have to pay for the software and the developers are still getting paid. If you find the banners annoying, there is usually an option to remove them, by paying the regular licensing fee. Known spywaresThere are thousands out there, new ones are added to the list everyday. But here are a few:Alexa, Aureate/Radiate, BargainBuddy, ClickTillUWin, Conducent Timesink, Cydoor, Comet Cursor, eZula/KaZaa Toptext,

23 Tips to Speed Up your Windows XP Performance

Given below are the 23 tricks that will enhance the performance and reliability of your Windows XP OS. Best of all, most of them will cost you nothing. 1-To decrease a system's boot time and increase system performance, use the money you save by not buying defragmentation software -- the built-in Windows defragmenter works just fine -- and instead equip the computer with an Ultra-133 or Serial ATA hard drive with 8-MB cache buffer. 2- If a PC has less than 512 MB of RAM, add more memory. This is a relatively inexpensive and easy upgrade that can dramatically improve system performance. 3- Ensure that Windows XP is utilizing the NTFS file system. If you're not sure, here's how to check: First, double-click the My Computer icon, right-click on the C: Drive, then select Properties. Next, examine the File System type; if it says FAT32, then back-up any important data. Next, click Start, click Run, type CMD, and then click OK. At the prompt, type CONVERT C: /FS:NTFS and press

Setting up a Project Office

1. Introduction A Project Office is a department responsible for improving project management within an organization. It's a permanent department within an organization, not a temporary function. It's there to coordinate projects and ensure they have the right tools, standards, methodologies and templates needed to boost their chances of success. 2. Types of Project Office There are 3 types of Project Offices namely The Supportive Project Office: This is the most common type of Project Office. Its purpose is to empower Project Managers and teams to deliver projects. It doesn't control or direct projects. Instead it supports projects by offering training, mentoring, administration and reporting. The Controlling Project Office: Supportive services may not be enough to put projects back on track. By offering controlling services (such as project reviews, audits and assessments), the Project Office can influence project delivery. It may also enforce project standards and proce

SQL : Joins

Image
Introduction: A join is used to combine rows from multiple tables. A join is performed whenever two or more tables is listed in the FROM clause of an SQL statement. There are different kinds of joins. Let's take a look at a few examples. Inner Join (simple join) Chances are, you've already written an SQL statement that uses an inner join. It is the most common type of join. Inner joins return all rows from multiple tables where the join condition is met. For example SELECT suppliers.supplier_id, suppliers.supplier_name, orders.order_dateFROM suppliers, ordersWHERE suppliers.supplier_id = orders.supplier_id; This SQL statement would return all rows from the suppliers and orders tables where there is a matching supplier_id value in both the suppliers and orders tables. Let's look at some data to explain how inner joins work: We have a table called suppliers with two fields (supplier_id and supplier_ name).It contains the following data: We have another table called orders wit

It is an error to use a section registered as allowDefinition='MachineToApplication' beyond application level

You may get this error when trying to browse an asp.net application. The debug information shows that "This error can be caused by a virtual directory not being configured as an application in IIS." This error occurs probably in these 2 scenarios. 1- When you create an new web application using visual studio.net, it automatically creates the virtual directory and configures it as an application. However, if you manually create the virtual directory and it is not configured as an application, then you will not be able to browse the application and may get the above error. The debug information you get as mentioned above, is applicable to this scenario. To resolve it, Right Click on the virtual directory - select properties and then click on "Create" next to the "Application" Label and the textbox. It will automatically create the "application" using the virtual directory's name. Now the application can be accessed. 2. When you have sub-

Maths:7 Interesting facts

Letters 'a', 'b', 'c' &'d' do not appear anywhere in the spellings of 1 to 99 Letter 'd' comes for the first time in Hundred Letters 'a', 'b' & 'c' do not appear anywhere in the spellings of 1 to 999 Letter 'a' comes for the first time in Thousand Letters 'b' & 'c' do not appear anywhere in the spellings of 1 to 999,999,999 Letter 'b' comes for the first time in Billion And Letter 'c' does not appear anywhere in the spellings of entire English counting

SQL : Select Query : Distint Clause

Introduction: The DISTINCT clause allows you to remove duplicates from the result set. The DISTINCT clause can only be used with select statements. The syntax for the DISTINCT clause is: SELECT DISTINCT columnsFROM tablesWHERE predicates; Example #1 Let's take a look at a very simple example. SELECT DISTINCT categoryFROM ebooks; This SQL statement would return all unique categories from the ebooks table. Example #2 The DISTINCT clause can be used with more than one field. For example: SELECT DISTINCT category, publisherFROM ebooks; This select statement would return each unique category and publisher combination. In this case, the distinct applies to each field listed after the DISTINCT keyword.

SQL : Select Query

Introduction: The SELECT query/statement allows to retrieve records from one or more tables in database. The syntax for the SELECT statement is: SELECT [ columns] FROM [tables] WHERE [predicates]; Example #1 Let's take a look at how to select all fields from a table. SELECT *FROM ebooks WHERE author = 'Azhar'; In our example, we've used * to signify that we wish to view all fields from the ebooks table whose author is 'Azhar'. Example #2 You can also choose to select individual fields as opposed to all fields in the table. For example: SELECT name, ISBN FROM ebooks WHERE ebookid > 1000; This select statement would return all ebooks' name and their respective ISBN values from the ebooks table where the ebookid value is greater than 1000. Example #3 You can also use the select statement to retrieve fields from multiple tables. SELECT category.name,ebooks.ebookid, ebooks.name FROM category,ebooks WHERE category.categoryid=ebooks.categoryid; The result set wo

Data types in SQL Server : A Quick Read

A data type is an attribute that specifies the type of data that the object can hold for example integer data, character data, date and time data, binary strings, and so on. SQL Server supplies a set of system data types that define all the types of data that can be used with SQL Server plus you can define your own data types in Transact-SQL or the Microsoft .NET Framework. Data types in SQL Server are organized into the following categories: 1 - Exact numerics bigint numeric bit smallint decimal smallmoney int tinyint money 2 - Approximate numerics float real 3 - Character strings char varchar text 4- Unicode character strings nchar nvarchar ntext 5 - Binary strings binary varbinary image 6 - Date and time date datetimeoffset datetime2 smalldatetime datetime time 7 - Other data types cursor timestamp hierarchyid uniqueidentifier sql_variant xml table

How to Back Up the Registry

Before you edit the registry, export the keys in the registry that you plan to edit, or back up the whole registry. If a problem occurs, you can then follow the steps how-to restore the registry to its previous state. How to Export Registry Keys Click Start, and then click Run. In the Open box, type regedit, and then click OK. On the File menu, click Export. In the Save in box, select the boxs at the bottom the bottom according to weather you want to export all or only selected branches of the registry. Next select a location in which to save the backup .reg file. In the File name box, type a file name, and then click Save. How to Restore the Registry To restore registry keys that you exported, double-click the .reg file that you saved. 

Converting Movies To PSP Format

Hey again, this is a real quick guide for anyone interested to get a movie onto there PSP without any trouble Movie - approx 40 minutes - dvd Saved to hard drive - 2.6 GB, Using DVD Decryptor (free program)  you can Download from this link  http://www.megaupload.com/?d=Z3Z6M9TR Transfered to avi format - 377MB- using Super DVD Ripper (9 FREE trial uses) then you must buy Transfered to MP4 - 37MB - using the (basically free) Image convertor 2 Average movie breakdown - using above as a guide only. so im guessing the average movie may be 4.5 GB for example saved to 800MB CONVERTED TO 70-80MB Ok use DVD decryptor to save the movie to your hard drive eg. C:\[Your Folder] When completed find the folder C:\[Your Folder] on your computer and find the vob file in that folder - generally the largest one and right click and play it with your dvd program to see what part it is. If its the correct movie part you now know thats the one you need. Once you have located the vob file you want to transf

What is Service Level Agreement (SLA)

A service-level agreement (SLA) is a document that spells out two or more parties' rights and obligations under a contract for work (such as between a company and its service provider). The main purpose of an SLA is to spell out the level of service that will be provided under the agreement. An internal IT services organisation may also provide an SLA to its internal business “customers.” The classic example of an SLA is with a software solution provider, where the document depicts like what penalties the provider will incur if its performance falls short of specified qualityand functionality levels. Usually, in this case, the penalties will follow a stepped schedule — for example, “If the software is found to have reported bug, then customer is entitled to a x percent refund of its software cost he paid for; and if the mutually agreed deadline passed then x percent of software cost will be deducted/refunded and so on. Why is it important to have an SLA? It is as important to have

Auto End Tasks to Enable a Proper Windows XP Shutdown

 This reg file automatically ends tasks and timeouts that prevent programs from shutting down and clears the Paging File on Exit. 1. Copy the following (everything in the box) into notepad. QUOTE Windows Registry Editor Version 5.00 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management] "ClearPageFileAtShutdown"=dword:00000001 [HKEY_USERS\.DEFAULT\Control Panel\Desktop] "AutoEndTasks"="1" [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control] "WaitToKillServiceTimeout"="1000" 2. Save the file as shutdown.reg 3. Double click the file to import into your registry. NOTE: If your anti-virus software warns you of a "malicious" script, this is normal if you have "Script Safe" or similar technology enabled.

5 Tips to Get Rid of Your Public Speaking Fear

Its been observed that many people around who most of the times hesitate to make a public speech. Many of the times it happens because those people really have fear in their minds for public speaking. I have personally experienced the feeling of inferiority or fear of not having much knowledge about the topic of speech. These are the major reasons for having public speaking fear. And after a lot of hard work and continuous practice I managed to overcome my public speaking fear. Here I logged 5 tips for you people who want to get rid of their public speaking fear. 1- Don't get scared to make mistakes: Yes when it comes to public speaking you are bound to make some minor or major mistakes. But it is the part and parcel of public speech. Don't be afraid of doing mistakes during your public speech. Only thing is that you should learn from your mistakes and try not to make those next time when you are presenting. Even if you make a mistake during your speech then don't get pani

Enterprise Architecture : An Introduction

Image
The practice of enterprise architecture (EA) is to support the business decision making process by providng information about complex organizations' structures, their functions, and technology supports requirment for accomplishment of that functions. Considering EA as an IT job only will not be fair because it is far broader than that.It must be considered that, in most cases, increasing complexity in IT drives the need for adopting EA. EA is the model that helps in identification of relationships between the business and technology in such a way that key dependencies are exposed from the underlying complexity and so can be used to support decisions. E.g. by ascertaining which business processes are supported by a given software application, and then which platform the application runs on, it is possible to calculate the impact on the business of hardware obsolescence. From the same model, it would also be possible to examine, the cost of replacing the application, or which process

5 Tips to Track Projects

It’s a tough challenge to track your projects in hands. It all about handling and observing people, equipment, time, money and materials to complete your project on time. To do it successfully, you need to keep an eye on 5 key areas of your project. 1. Time and Cost Put an hour aside every week to determine if you are likely to complete the project on time. To do this, identify any tasks that are running late and determine whether they are likely to delay the overall project. Then look for ways that you can save time by; finishing tasks earlier, delaying non-critical tasks to after the project has been completed, or gaining approval from your Sponsor to remove tasks altogether. You also need to review the total spend of the project to date against the original budget set. Identify ways to reduce costs by allocating cheaper resource, reducing the project scope, or boosting the efficiency of your team. 2. Resource Allocation You need to keep a constant watch on the percentage of time tha