articles for the customize windows

Upload: tc-windo

Post on 05-Apr-2018

220 views

Category:

Documents


0 download

TRANSCRIPT

  • 7/31/2019 Articles for The Customize Windows

    1/24

  • 7/31/2019 Articles for The Customize Windows

    2/24

    Virtualization software can be used for several purposes, e g to simulate an operating system orjust an application. Classification of approaches to virtualization to create virtual environmentsin the overall context of virtualization. More on Virtualization Software.Operating System OS virtualization using container

    Approach of OS containers for the creation of virtual environments : With virtualization run at

    the OS level, virtually within a closed container provided, no additional operating system is used,which means that it is not possible another OS to run as the host system. The OS containersrepresent a subset of the host operating system. The advantage of this approach is the goodintegration of the containers in the guest operating system. The disadvantage of this approachlies in the containers. From the containers, no other driver is loaded and the kernel is loaded.When the OS virtualization contains only one host kernel there is a special user-mode kernelunder the control of the host kernel.System Virtualization using Virtual Machine Monitor (VMM)

    Approach of a virtual machine monitor (VMM) to create virtual operating environments: Withvirtualization using a virtual machine monitor (hypervisor), the waiting native (= real physicallyavailable) system is distributed intelligently. This can be done by hardware emulation, hardware

    virtualization or par virtualization. Each guest systems in each case has its own completecomputer with all the hardware components (processor, disk drives, memory, etc.) made up asystem. The advantage is that in the operating systems themselves (almost) no changes arenecessary and the guest operating systems all have their own kernel, which entails a degree offlexibility.Examples: VMware Workstation, Microsoft Virtual PC, Virtual Box, Parallels Workstation.Hardware emulation (misleadingly called full virtualization)The virtual machine simulates the complete hardware and allows an unmodified operatingsystem that is designed for a different CPU, operation.Examples: Bochs (in this simulation instead of emulation), PPC version of Microsoft VirtualPC, QEMU.Hardware virtualization (native virtualization, full virtualization)The virtual machine guest operating system provides the only parts of the physical hardware inthe form of virtual hardware. This is sufficient, however, to run an unmodified operating systemon it in an isolated environment. The host system must be on the same CPU type to be designed.Examples: VMware , x86-based version of Microsoft Virtual PC , KVM , Xen 3.0 on processorswith hardware virtualization technology Intel VT-x or AMD Pacifica.Paravirtualization

    In paravirtualization, while an additional operating system is started virtually as new, but nohardware virtualized or emulated, but the virtually started operating systems use an abstractmanagement layer in order to shared resources (network connections, disk space, User or usedin) access. The operating system needs to be able to be ported to run on the virtual machine(VM), which can reject the owners of proprietary operating systems for strategic reasons. Theport, however, simplifies the structure of the VM and allows their virtual machines to improveperformance. VMware or XEN also used the VMI interface that acts as a mouthpiece between

    the virtualization layer and host operating system.

    Examples: Red Hat Fedora 5 with Xen 3.0, SUSE Linux Enterprise Server with Xen or VMwareESX 3.5 Update 1 as, Citrix XenServer, KVM , PikeOS real-time operating system forembedded systems.

  • 7/31/2019 Articles for The Customize Windows

    3/24

    Application Virtualization

    Application virtualization (application virtualization) is the local performing desktop and serverapplications, without requiring them to be installed. The virtualized application to a virtual

    environment is generated that contains all the registry entries, files and other components neededto run the program. This virtual environment acts as a buffer layer between the application andthe operating system and avoids conflicts with other applications or the operating system.

    Examples: Microsoft Application Virtualization (formerly SoftGrid), Citrix ApplicationStreaming , VMware ThinApp , Novell ZENworks Application Virtualization, Altiris SVS,Thinstall VS , Sandboxie , Evalaze, Cameyo, Ceedo.

    In case of Hardware Virtualization, either the whole system (partitioning with LPAR ,Domaining) or individual components such as CPU ( Intels Vanderpool or AMDs Pacifica ) arevirtualized.

    Processor Virtualization

    When the system or operating system virtualization, the virtual machine monitor receivedcommands from host systems (virtual machines) to be executed on the native hardware. Beforethe introduction of processor virtualization had to be modified in certain (possibly safety-critical)instructions, which were from the host system via the Virtual Machine Monitor sent to thehardware.

    Through virtualization, the processor from AMD and Intel can usecommands without modifyingthe virtual machine monitor to be sent directly to the processor. The processor takes care of itselffor the distinction between the guest system processes and VMM processes. By eliminating themodifications of the VMM, a higher performance is achieved.

    Virtualization,Computer and Internet

    3.

    Components of a motherboard

    The motherboard is the main element of the computer is on it that connects all the computercomponents.There are 15 important items on a motherboard:

    Support for processorPCI slotsThe AGPThe ISA slotsThe parallel portThe serial portThe PS2 port

    http://thecustomizewindows.com/category/computer-and-internet/virtualization/http://thecustomizewindows.com/category/computer-and-internet/virtualization/http://thecustomizewindows.com/category/computer-and-internet/http://thecustomizewindows.com/category/computer-and-internet/http://thecustomizewindows.com/category/computer-and-internet/http://thecustomizewindows.com/category/computer-and-internet/http://thecustomizewindows.com/category/computer-and-internet/virtualization/
  • 7/31/2019 Articles for The Customize Windows

    4/24

    USB portThe chipsetThe power connectorThe memory slotsThe floppy drive connector (FLOPPY)

    IDE connectorsCMOS batteryBIOS

    The role of these components in a Motherboard

    Each element is important on a motherboard, some more than others. Here are their uses:

    PCI slot: used to connect cards that require few resources as the network adapter or sound card.

    AGP connector: Used to connect fast cards such as graphics card.

    ISA slot: not found on newer PCs, it is used to connect slower cards.

    Parallel port: used to connect the printer to the motherboard.

    Serial Port: Used to connect serial mouse to the motherboard.

    PS2 ports: used to connect the mouse and keyboard to the motherboard.

    USB port: used to connect devices such as the latest digital cameras, webcam, etc. What isimportant about this port is that you can connect devices when the pc is on.

    Chipset: This is an electronic circuit that is responsible for coordinating the exchange of databetween PC components. It is in 2 parts: one located to the processor called NorthBridge (northbridge) does the processor, memory and the AGP bus, and one located toward the PCI slots iscalled Southbridge (south bridge) is responsible for PCI bus (and on the old PCs ISA bus), IDE

    connector, the floppy connector, BIOS, USB port.Power connector: it serves to connect the power supply to the motherboard. It provides theelectricity needed for proper functioning of the PC.

    Memory connector: it can either be a connector SIMM (no longer on newer PCs) or DIMMslot. Memory is placed vertically on these connectors. The DIMMs fit easily with a lever.

    FLOPPY connector: Used to connect a floppy disk drive ribbon connecting a floppy drive tothe motherboard.

    IDE connector: Used to connect an IDE cable that connects a drive (CD or DVD) or hard diskto the motherboard.

  • 7/31/2019 Articles for The Customize Windows

    5/24

    CMOS battery: a small battery (flat) that does not consume much electricity is used to keeptrack of the initialization settings of the computer. It is also used to operate the PCs internalclock so if you see that the time is that the malfunctioning battery is not good is it to be changed.

    Support for processor

    Support for processor is the most important component. It serves to connect the processor to themotherboard. It comes in two forms.

    Theres the slot that resembles an expandable AGP. It has a rectangularshape; the processorconnects vertically on this type of connector.

    The other support is the socket that is square with many small holes (sockets) on it. The twomajor manufacturers of processors have different sockets.

    If for example you buy an Intel processor and two years later you decide to change it to an AMD

    processor, you could not do that because the sockets are different and therefore you have toclench replacing the motherboard and buy one with a socket for AMD.

    But what makes the choice of a motherboard even harder is that each manufacturer processor(we are speaking only processors of Intel and AMD) there are different sockets.

    To summarize

    The motherboard is the most important because it is the base that will connect all thecomponents of the PC like the processor or memory.

    This motherboard is not cross-compatible with one processor manufacturer to other : Intel orAMD.

    Make sure there are all important connectors present on the motherboard before you buy.

    4.

    Benefits of Desktop Virtualization for Business

    Virtualization is becoming an indispensable technology. We already have pointed out that CloudComputing is just a product of Virtualization Technology. And now think the number of VirtualPrivate Servers used today. This article will give an overview on the topic Benefits of Desktop

    Virtualization for Business. What are the benefits of desktop virtualization for an Enterprise? Dothe companies have significant advantages by using desktop virtualization or should wait beforechanging their IT infrastructure as part of virtualization?The aim of this article is precisely to these questions and helps you to take the decision for oragainst Benefits of Desktop Virtualization for Business.

    Basics on Benefits of Desktop Virtualization

  • 7/31/2019 Articles for The Customize Windows

    6/24

    Previously, we posted an article on Cloud Computing and Desktop Virtualization. The objectivesof desktop virtualization are: a consolidation of the clients in the enterprise, minimizing the costsand thus to minimize the administrative burden. That means, Benefits of Desktop Virtualizationcan simply and logically divided into two wingsone is Administrative and another is a goodreturn of investment.

    Benefits of Desktop Virtualization from Management point

    Desktop virtualization can bring companies an enormous advantage with respect to themanagement. By implementing a centralized desktop model, many administrative problems canbe circumvented. For a local PC support costs are very high, since an individual assistance beprovided for each individual user and his job must be personalized. Benefits of DesktopVirtualization from Administrative point of view does not encompass only the this part, but alsoit is a fact that, from a centralized data center, the activities can be monitored.

    Benefits of Desktop Virtualization includes Resource Optimization

    We crudely stated above, among the benefits of Desktop Virtualization, return of investment isanother point. But the fact is that among the benefits of Desktop Virtualization, it is the optimalusage of resources that brings a good ROI.Resources mean Money, Materials and man Power. Benefits of Desktop Virtualization, frommonetary point of view can be summarized as -Resource Optimization: We are whipping a horse to work at the level best. Whipping a horsesounds inhuman, but without virtualization, a even 50% of a processors power is not used.

    Benefits of Desktop Virtualization begins with efficient system resource usage.Energy Efficiency : 5 individual computer will require more than 4 times electricity than onecomputer running Desktop Virtualization.

    Computer and Internet,Virtualization

    5.

    Windows 7 Theme Smoothie

    Windows 7 Theme Smoothie is shiny Visual Style has a clean frosted glass appearance. Thetheme comes in two versionsdark and light versions.Windows 7 Theme Smoothie is created by cold004. We published other great works by thedeveloper before.License: Some rights reserved. It is licensed under a Creative Commons Attribution-

    Noncommercial-No Derivative Works 3.0 License.Details about Windows 7 Theme Smoothie download:This Visual Style is for Windows 7. Windows 7 Theme Smoothie works on both 32 and 64-bit.Included system files are for Service Pack 1. Please note that, you have toreplace ExplorerFrame.dll, Caption buttons, start orb etc for the full look.

    Preview Windows 7 Theme Smoothie

    http://thecustomizewindows.com/category/computer-and-internet/http://thecustomizewindows.com/category/computer-and-internet/http://thecustomizewindows.com/category/computer-and-internet/virtualization/http://thecustomizewindows.com/category/computer-and-internet/virtualization/http://thecustomizewindows.com/category/computer-and-internet/virtualization/http://thecustomizewindows.com/category/computer-and-internet/virtualization/http://thecustomizewindows.com/category/computer-and-internet/
  • 7/31/2019 Articles for The Customize Windows

    7/24

    Download Windows 7 Theme Smoothie

    It is a 7 MB RAR download, download and install according to your version (32 bit or 64 bit) ofWindows 7.Computer and Internet,Windows 7 themes

    5.

    Best Crosswords Apps for Android

    Best Crosswords Apps for Android features some old good crossword puzzle applications forAndroid tablets and smart phones. As Crosswords is a bit more than simple games, we havenamed our article as Best Crosswords Apps for Android.How we have selected these Best Crosswords Apps?

    While writing and choosing Apps for this post on Best Crosswords Apps for Android, we have

    taken the following factors in to our consideration:Innovative ideasUsage of default Android hardware featuresSystem resource consumptionAbilities and FeaturesPopularityYou can type or copy any name of the Apps listed in this list of Best Crosswords Apps forAndroid and search it in Play using the Search function.List of Best Crosswords Apps for Android

    Shortyz Crosswords: Shortyz is a crossword puzzle application that downloads a number offree puzzles, and with a paid subscription, the NYT.

    Crossword Light: Crossword Light for Android lets you solve crosswords from around theworld, right on your hand held! Over 30 puzzles available, plus hints, clue listings, and tonsmore.Crossword Cryptic Lite: These are cryptic level puzzles, suitable for seasoned crosswordenthusiasts.Crosswords: Premium version of Crosswords Light.Guardian Crosswords: Download the Guardian crosswords when you have an internetconnection, play them offline on your phone or tablet, in portrait or landscape.NYTimes Crosswords: With The New York Times Crosswords, you can play the same puzzlesthat are published daily in the print newspaper!

    We hope you can enjoy some of these Best Crosswords Apps for Android.

    http://thecustomizewindows.com/category/downloads/windows-7-themes/http://thecustomizewindows.com/category/downloads/windows-7-themes/http://thecustomizewindows.com/category/downloads/windows-7-themes/http://thecustomizewindows.com/category/downloads/windows-7-themes/
  • 7/31/2019 Articles for The Customize Windows

    8/24

    6.

    Cloud Computing in Healthcare

    Cloud Computing in Healthcare is a topic where my opinion has more value than anyone else.Probably I am the only doctor who has grasp on both fields. So in this article Cloud Computingin Healthcare, I will provide the information of current situation on this aspect and what I orperson exactly like me can predict or do in future Cloud Computing in Healthcare.

    Cloud Computing in Healthcare in current state

    Most doctors do not understand Cloud Computing. In order to integrate two disciplinesHealthand Technology, there are doctors needed who has excellent grasp on technology as well.Otherwise Cloud Computing in Healthcare will always remain in an otherwise underutilizedcondition, which it is been now.Cloud Computing in Healthcare holds a lot of possibilities and opportunities, which is right nowused only to host medical websites or to process some data. That is rather a clerical part of Cloud

    Computing in Healthcare and I am not really interested to discuss about this part of CloudComputing in Healthcare as simply its very rudimentary thought.

    Cloud Computing in Healthcare which can be materialized

    Cloud Computing in Healthcare can offer a big promise Healthcare as a Service (HaaS). It isnot me who has coined the term Healthcare as a Service (HaaS) in context of Cloud Computingin Healthcare. Another person (I cannot find the person right now) said about it one year back onthe relatively same topic - Cloud Computing in Healthcare. HaaS is my dream and can bediscussed later in another article, now just think about Cloud Computing in Healthcare in a broadview.

    da Vinci Surgery is a Minimally Invasive Robotic Surgical system where the surgeon worksfrom a console separated from the real operating field. The major barrier is the cost of disposableunits. It has itself little to do with Cloud Computing in Healthcare in current state. The reason Imentioned da Vinci is to show the state of surgical art.Most of you already know Telerobotics, Artificial Intelligence and about some humanoidresearch which were to build better orthosis and prosthesis for human beings.

    Cloud Computing in Healthcare does not mean only file transfer like primitive works, CloudComputing in Healthcare means faster processing of the MRI images like now used HPsDICOM format (Adobe Photoshop CS5 supports DICOM by default), utilizing Cloud

    Computing in Healthcare and AI can predict the possible differential diagnosis, otherwise notpossible for a human (read surgeon) to notice or read.

    Using Cloud Computing in Healthcare can reduce the cost of da Vinci system like prototype MISunits by using Telerobotics. The challenge in implementation of Cloud Computing in Healthcareare varied. First, intelligent surgeons who can help coding and robotics are needed, second,probably no private health service provider will love the idea of HaaS nullifying real applicationof Cloud Computing in Healthcare with hundreds of odd reasons.

  • 7/31/2019 Articles for The Customize Windows

    9/24

  • 7/31/2019 Articles for The Customize Windows

    10/24

    Google Cloud Storageicloud Apple

    7.

    How to change the smilies / emoticons in WordPress

    WordPress offers a variety of native smilies automatically generated when you enter the shortcutto which they refer. For example, typing ":)" WordPress will convert the text into an image whenthe publication of an article for a smileyHow to change the smilies-emoticons in WordPress likethis . Here is a simple trick that will allow you to replace default emoticons with your own whatis sure to give a more personal character to your site or blog.

    We have replaced WordPress custom smilies with some others (actually to deviantArt style):

    :) :2cents: Is not these cool to have own set of emoticons? :cool:

    (Notice the same emoticons below comment to use)Step one: Install the required plugin

    Download a small plugin to make the things easier. Under Settings, you will get the Smiliesoption after activating the plugin.

    Step two: Procedure of installation / replacement

    Using your favorite FTP client, open the following directory: / wp-includes/images/smilies /

    Here are stored the default smilies. It remains for us to replace them with ones of your choice.

    Above all, do a full backup of the file on your PC case to avoid any inconvenience unexpected.

    Two solutions now available to you:

    Either you create emoticons one by one by hand or you need to download from the Internet.

    8.WordPress Cloud Hosting Versus Traditional VPS or Dedicated

    Server

    Before we start about saying WordPress Cloud Hosting, a small intro is here. Those who livesoutside India, probably have not heard of Maruti Suzuki Swift DZire. I love this car because it isa semi-luxury car with insane mileage17 KMPL on average. Basic fact is maintenance andrecurring costs. This car has changed the scenario of this segment because of major key pointsmileage, comfort, low maintenance cost and excellent after sales support. Basically most of usneed the same requirement from a Server. It should be steady, have good uptime and haveexcellent support. Days has been changed. All cars has automatic fuel injection system now. No

  • 7/31/2019 Articles for The Customize Windows

    11/24

    car has dynamo to recharge the battery. Yes, vintage car is a collectible, but does it fit youreveryday usage? So today we started with facts with a particular model of car and we willdiscuss on WordPress Cloud Hosting. What the advantage a WordPress Cloud Hosting has, whatmakes WordPress Cloud Hosting more suitable and when WordPress Cloud Hosting is notsuitablethese will be discussed in simple language.

    WordPress Cloud Hosting AdvantageFlexibility of resources

    You have seen in various guides like How to Install WordPress on Rackspace Cloud Server, Ihave created a server instance and wrote the tutorial. End of the tutorial, I have deleted itmycost is hardly 10 cents. Yes, you will think that I do not need such feature for my WordPress

    Cloud Hosting, I write about toothache and why the hell I will need such features. True. But

    more truth iswhen you started your blog on any WordPress Cloud Hosting solution, you canopt for lowest configuration, a VPS will cost you $12 / month. When your visitors withtoothache begin to increase, you can change it to next level, more trafficmore resource. Youcan not get a traditional VPS at $12 month. I or you are consumers. We need flexibility. Can any

    traditional VPS offer 30720 MB RAM ? We are saying about simple WordPress Cloud Hostingon Cloud VPS, not any optimized platform.

    WordPress Cloud Hosting AdvantageAlmost No downtime

    Practically downtime happens due to various reasons. First is serverside failure. Most of theWordPress Cloud Hosting providers uses very advanced servers (basically multiple serversnodes). If one server fails, others will continue to keep your website on if you are usingWordPress Cloud Hosting. Second reason of downtime is the complex DNS system. No one cangive warranty on this one. Third is due to misconfiguration of some pluginsusually yields 500server error. This can be corrected easily.

    9.

    Why blog is losing traffic: steps to diagnose decrease in visitor count

    How to prevent loss of traffic and how to prevent loss to hair: These two questions are probablyamong most frequently asked questions in last ten years! We will give points: make a noteyourself to correct and get back your traffic. This kind of exercise is interesting; this amounts tosolving a puzzle. It is not always possible to determine the exact cause of a loss of traffic, but wecan speculate with a good statistical tool as Google Analytics. Here are 10 steps to diagnose the

    cause of a loss of traffic from search engines.

    The first step is to make the usual checks:

    See if there was a change in a reference source. We mean to say, Google previously took yoursite's writing as reference, but now has decided to lean towards someone more solid. Thisapparently has no solution other than using Google Adwords, offline marketing...but, is assured;your domain is lost from the search engine market share you got ago. Like buying hair growing

  • 7/31/2019 Articles for The Customize Windows

    12/24

    tonics, you can invest money to regain the lost market, but we can say by 99% probability, it willfail.

    Check if the site was offline due to server failure or due to an update.Major changes to the Web site before the loss?

    Determine the type of traffic loss

    Many people look at Google's stats page, saw a loss of traffic on their site, and assume they musthave lost their rankings in Google and the targeted traffic that goes with it. This is one solutionentirely plausible. Remember to check for the source of traffic from search engines, and evenmore specifically traffic from Google and not the traffic "bought" somehow.Look at the extent of the loss of trafficYour search will be very different if there was a gradual decline, or a drastic fall visits. Lately wehave seen sites lose all of their traffic overnight! This loss is usually a technical problem (arobots.txt, nofollow a redirection, something others). Sometimes it is not a real loss of traffic, butsimply as the Google Analytics code was accidentally deleted, and what appears as a loss of

    traffic. It can also be a blacklisting of the site (but it is still rare.). It is marked by a decline at 30degree or more for a time period of 3 months.

    Compare what is comparable

    Many businesses are cyclical or seasonal. A site can have huge spikes of traffic a month beforeChristmas or the week before the summer holidays. This means that the comparison from onemonth to another may not be relevant. A decline in traffic in January is probably pretty normalfor a site for gifts. If you have more than one year of data, you should compare the traffic of thismonth for the same month in previous years. Ideally, you should see a growth in traffic. And ifyou do not notice, you may have a problem on the back, or to put his finger on a problem. AWindows XP forum will not get traffic today as it got once. We pointed it, think deeply.Filter "brands" of traffic

    Most Web sites get much traffic on Google thanks to their brand or brands they distribute. Withthis filter you will have the opportunity to note that these visitors have substantially increased ordecreased. If you receive fewer visitors to "your" brand, it could be caused by a decrease inmarketing and advertising. Once you take note of the movement of the mark, you can filterthrough all sorts of expression or keyword, and then see what actually made traffic SEO site.Analyze keywords and phrases that had a significant decrease in number of visitors

    Now that you have filtered the requests like "brand", you should be able to see the keywords andphrases that bring you the most traffic. Y does a lot of keywords and phrases that seem to be farfewer visitors in recent months compared to last year at the same time?Make a quick Google search with the post headers

    If you do not see your site in the first page of Google, there may or may not be a track to widen.If a page of your site is always high in the results list, it could simply that fewer people are doingthis research now. In this case we see according to your title and description of the extract. It isalso possible that other results for that keyword (or key phrase) have images or embedded videos

  • 7/31/2019 Articles for The Customize Windows

    13/24

    while youre are not. Or it could be that there are results of "universal search" showing a localmap, a video, or image that makes your score is less attractive.Look at the page "landing" for the keyword that lost traffic

    Is there an obvious reason why it does not generate as many visitors as usual? Maybe even that

    no longer exists? Has it changed much at some point during the year? The content is duplicatedfrom other pages on your site or contained on other sites? Are there any links pointing to thatpage no longer exists?Review your traffic due to the "long tail"

    Since the early May 2010 and late February 2011, a large number of small sites have lost asignificant amount of traffic for key phrases that have a small number of individual visitors, butoverall is an important part of overall site traffic. Google changed its algorithm on this point. It isa certainty, and we must adapt accordingly to be always well placed.Slice and decide whether you're dealing with a penalty from the search engine or not.

    To decrease drastically in the few cases where it is not a technical problem, you're likely to suffera penalty. You can check your Google Webmaster Tools to see if there is a notification, butgenerally they do not bother to tell you. However, the penalties from search engines are muchrarer than we think. In fact, most website owners know what they did when they have a searchengine penalty. There are cases; however, they may have been duped by "SEO" unscrupulous.Update: Here is an article for finding the causes for losing search engine traffic exclusively. Wehope these steps will help you diagnose your own loss of traffic. We imagine they will keep youbusy for a while!

    Note: Firstly, lot of webmasters tries to improve SEO by adding or removing "dofollow,

    "nofollow" links. Which are practically more dangerous? SEO is nothing more than practicalapplication of your diagnostic power and intelligence. Just apply your common senses toanalyze. Secondly, do not get paniked. Wait for 2-3 months with the same settings. If you reallyhave good content, visitors will comeback, as a chain reaction; you will regain the lost positionin search engines. Note 2: Please do not take seriously the words we used for baldness. Humanhair practically is a useless thing by revolution. Five thousand years ago, our ancestors had morehairs than us and we are losing it gradually. That is another topic that will be discussed in ourother website in future!Google Traffic Decrease, Why visits to site have decreased

    10.

    How to have a totally noiseless PC

    The reasons for having a quiet computer are obvious, but you must understand that a silent PCperformance inevitably will be diminished. Indeed, a powerful component heats up early andtherefore need a more consistent cooling.

    We can therefore say that more a PC is more powerful, more noisy it will be. The main cause isnoise generated by the cooling fans.

    http://thecustomizewindows.com/2011/03/why-blog-is-losing-traffic-steps-to-diagnose-decrease-in-visitor-count/http://thecustomizewindows.com/2011/03/why-blog-is-losing-traffic-steps-to-diagnose-decrease-in-visitor-count/http://thecustomizewindows.com/2011/03/why-blog-is-losing-traffic-steps-to-diagnose-decrease-in-visitor-count/http://thecustomizewindows.com/2011/03/why-blog-is-losing-traffic-steps-to-diagnose-decrease-in-visitor-count/http://thecustomizewindows.com/2011/03/why-blog-is-losing-traffic-steps-to-diagnose-decrease-in-visitor-count/http://thecustomizewindows.com/2011/03/why-blog-is-losing-traffic-steps-to-diagnose-decrease-in-visitor-count/
  • 7/31/2019 Articles for The Customize Windows

    14/24

    It is not always true. There is a liquid cooling system which are silent and allow to cool itscomponents optimally. The disadvantage is that this type of installation is very expensive. Wehave written about overheating and its control before, you be interested to read it as well.But if you want a PC for office use, there are totally silent PC. Some netbooks like the Dell Mini

    are silent by default. For this it is necessary to have a configuration like the following:

    Having an SSD that works as a flash memory. So there is no noise because there is no trayrotation. The problem is that space is very limited.

    No fans.An optimum air circulation (the only way to cool the computer).Have good amount of RAM. In case the computer is short by memory, it spins the hard disk

    faster to use the virtual memory. Other than direct sound arising out of it, the hard disk getsoverheated soon and the fans rotates faster to cool it and creates noise.

    Making a quieter PC

    There are various techniques to make a silent computer. Here are a few:

    Use a box that will contain the vibration and noise produced by the hard disk.Use a water cooling system.Clean the fans (dust can create a stacked noise increased).Use silent fans (you can install them).

    Another technique is to open the tower and cover the walls of foam or a material that does not letthe sound. The disadvantage is that your computer may become warm very fast.Another solution is to keep your PC away by buying extension cords.

    To summarize

    There are computers sold in the market that do not emit any noise, but are particularlyinefficient.

    Water cooling is a technique that allows your PC to cool efficiently and in silence (sometimesthe pump can be noisy).

    Clean your fans and set the speed of rotation.

    11.

    High Dynamic Range (HDR) Image and Photography

    High Dynamic Range (HDR) Image and Photography is a digital image that can save thenaturally occurring differences in luminance detail. Conventional digital images that are not in aposition to be referred to as low dynamic range images or LDR images. High Dynamic Rangeimages can be taken by special cameras, some computer graphics software or from an exposureseries reconstructed from LDR photos. So far there are only a few output devices that are capableto display HDR images. On conventional screens and media, High Dynamic Range (images can

  • 7/31/2019 Articles for The Customize Windows

    15/24

    not be represented directly, but must be converted to LDR images. This process is calleddynamic range compression.

    Working principle of High Dynamic Range images and High Dynamic Range photography

    Most digital images uses only 256 levels (8 bits ) each of red, green and blue color channels.This color range is often not sufficient to render the scenes like in real. Higher color depths areusually barely used because screens and print media for their representation are not capable todisplay or print them.The points of a camera from visual environment typically has a dynamic range (ratio ofmaximum and minimum luminance) of 10,000:1. The dynamic range is still significantly largerwhen a light source is directly visible. Unit for specifying the High Dynamic Range is deciBel(dB).

    On the High Dynamic Range Imaging image files are produced with a dynamic range that can

    detect the naturally occurring brightness. In High Dynamic Range images, the pixel values standin a proportional relationship to the actual luminance. Although still almost all screens have lowbrightness range, i.e. they are unable to display High Dynamic Range images.

    Usage of High Dynamic Range images

    Digital PhotographyDigital cinemaVirtual realityMonitoring systemsHealth ScienceArchitecture

    You can download this High Dynamic Range Image Wallpaper from our wallpaper section.

    The most common application of High Dynamic Range photography is in Health Science: In

    endoscopy, the principle is to use smallest possible image sensors to deliver high quality imageseven in low light, that is achieved by using High Dynamic Range Cameras.

    Exposure Blending and High Dynamic Range Image

    The beautiful images we generally see of different so called High Dynamic Range Image, like a

    surreal landscape, is often a pseudo-HDR, not High Dynamic Range Image. A High DynamicRange (HDR) camera can cost around $ 60,000 output the file as JPEG-HDR or other formats.Using the conventional digital cameras High Dynamic Range images are somewhat created byusing an exposure series of photographsthat is normal images from least exposure to highestexposure is taken and then processed to create somewhat High Dynamic Range images.

  • 7/31/2019 Articles for The Customize Windows

    16/24

    12.

    Why Google Penalizes a Website : 5 Reasons and Beyond

    There are many website and blog owners who take care of their own website every day andspend a few hours of time into Search engine optimization, creation of new products, finding outthematically relevant imagesmeasuring all cost a lot of time. In this context it is of coursenothing worse than to observe how ones own website in case of a successful application of thevarious measuresthe search engine rank is getting further sinking.

    Why Google Penalizes a Website is never known to fullest

    But what if the nightmare scenario occurs at all? Our own website is no longer in the searchresults of Google to find, because it was banned! Then it is in most cases too late, becauseusually the smallest number of pages also appear again in the search results.

    Five reasons why Google Penalizes a Website which can lead to banning

    Dirty Links

    Backlinks are an important criterion to rank well in Google. This applies to you as well as for allother operators. n order to obtain self-sufficient links, it is appropriate to link to other pages.Avoid so-called dirty links. Behind links with good texts, bad links leading to other pages ofyour site with the theme gambling, pornography and racism is a reason why Google Penalizes aWebsite.

    Duplicate Content

    While some website operators simply Copy Paste while others employ other professionalcopywriter to create interesting articles providing readers an added value. Google can determineexactly who stole from whom and then punish accordingly. In addition to Google, you can alsoget even more problems with the authors of the texts, since the mere copying is a violation ofcopyright law. Therefore: Steer clear of the other texts!

    Keyword Density

    Keywords play in terms of search engine optimization is a very important role that should beknown everywhere. The following rule applies: The more you integrate a keyword or a specificcombination of keywords in the text on your website, the better. You must never forget that therecommended keyword density should be between 1.5 and 3.5 percent. This value should notexceed under any circumstances, otherwise you can get serious problems with Google. Inaddition, visitors are not the products with safety as a readable, interesting and informative viewand looking back quickly into the distance.

    Link Farming

  • 7/31/2019 Articles for The Customize Windows

    17/24

    Many of you probably heard the term link farming and Content farm. This is a measure withwhich one could build backlinks in a very short time a lot of links to your website. People whooffer you thousands of links should be avoided wherever possible as you get in this case mostlyjust useless spam links.

    Hidden Links

    Although hidden links do not appear more often similar to the link farming in this day and age,there are still a few who use them. Hidden links are as the name suggests at oncelinks thatare not visible to readers. Search engines like Google can find on the other hand already.Cloaked links can be set, for example, by placing a white text on a white background.

    Conclusion

    Those who avoid the pre-mentioned errors and followed the advices are unlikely to get anyproblems with Google. Either you can prove that you have not violated the guidelines of Google

    and you start all over again from scratch. In most cases, the second variant is even simpler. Thatmeans, buy another domain and transfer all contents to the new domain other than to find whyGoogle Penalizes.

    13.

    World Wide Web or WWW

    World Wide Web or WWW or W3 is over the Internet retrievable system of electronic hypertextdocuments, through hyperlinks and about the HTTP or HTTPS protocols. To use the WorldWide Web a Web browser needs ata from the Web server and fetches as screen display. The user

    can follow the links in the document that refer to other documents, whether they are stored on thesame server or another. This results in a global network of websites. Tracking the hyperlink isoften referred to as Internet surfing.

    How World Wide Web or WWW Works

    The WWW is in common usage, often synonymous with the Internet, although it is younger andonly provides one of several possible uses of the Internet. There are other Internet services thatare not integrated into the Web like IRC and telnet. As said by Tim Berners-Lee , the WorldWide Web (W3) is a wide-area hypermedia information retrieval initiative aiming to giveuniversal access to a large universe of documents.

    World Wide Web is different from contemporary hypertext systems. World Wide Web requiresonly unidirectional links rather than bidirectional, making it possible to put a link to a resourcewithout requiring intervention from its owner. Moreover, unlike other protocols, such asHyperCard or Gopher, World Wide Web is built in an way, which made the development ofservers and clients without the restrictions of licenses.

    Operation of World Wide Web

  • 7/31/2019 Articles for The Customize Windows

    18/24

    The World Wide Web is based on three core standards, HTTP as a protocol by which thebrowser information from the web server may ask for, HTML as a document descriptionlanguage that defines how the information is structured and how the documents are linked (hyperlinks ), URLs as a unique identifier of a resource in the links is used.

    Other standards of World Wide Web (W3) were added later, like Cascading Style Sheets (CSS)to create the appearance of the elements of a website.

    The World Wide Web / W3C and other initiatives are to drive the development, therefore, in thedirection of XHTML / XML, and CSS forward to regain the advantages of HTML. The ongoingefforts by the accessibility of Internet sites support this trend.

    14.

    What are the signs you may have when your PC is infected by virus

    Something that we often asked is whether your computer is infected with virus or not, especiallyfor any abnormal behavior.

    In this tutorial we will try to describe some symptoms that can make us suspect that yourcomputer is infected. The main problem is that there are thousands of viruses that are manifestedin very different ways, and that some symptoms that may also occur for other reasons.

    In general, as an operating system begins to show failures overnight for no apparent reason.Before any strange behavior it is best to have a good antivirus, anti spyware and anti malware,but this is something that should make systematically every few minutes, because there are some

    viruses that do not produce visible effects in our system, and especially when it comes to high-performance computers.

    The first thing we must keep in mind is that all operating systems can be infected by a virus. It istrue that systems are safer than others, but there are none that really is immune, especially if weconsider that many of these viruses are installed due to voluntary actions of the user.Although some may seem illogical, is not exceptional that a user force the installation of aprogram even though a virus is telling him that a file is infected or to disable security measures,including antivirus, because the system allows you to download a file.

    We will see below some symptoms that can present our computer, all indicative of the presence

    of a virus:

    Computer is slowing down

    This is a typical symptom, especially spyware. The slowing down of a system may also be due toother causes such as excessive temporary files, too many processes running or excessive load onstartup, but in those cases usually notice a gradual slowing down, not suddenly.

  • 7/31/2019 Articles for The Customize Windows

    19/24

    Unreasonable loss of disk space

    Typical especially worm-type virus (worm), which plays up to lock the system. It should berecognized as unjustified, because Windows creates a series of hidden and system files whichcan be quite heavy (even reaching enough GB). These files are going to occupy space, but

    always within limits and only the drive that contains them (usually the OS is installed), no otherunits.

    Windows functions stop working or become inaccessible

    Here we must differentiate not exist from the facility, which is a symptom of pirated versions ofWindows, that, having been there and running smoothly, suddenly disappear or we will not let usaccess them.The latter is usually due to actions of the virus so as to protect this system, since the functionswhich are often disabled are those that can help us fight the virus, such as System Restore, editregistry and like those.

    Denial of Service

    Is another type of virus attack. What causes the inability to load certain Windows services.

    Unable to run antivirus, anti spyware and anti malware

    This is a defense system of many viruses, disabling the execution of any program that can attackthem. This item includes the inability even to download and / or install.

    Loss of picture and sound properties

    Although obviously a driver or a video or sound card can fail, the truth is that it is very normal tohappen. In many cases the loss of audio and / or display properties are due to virus action.

    Loss of units

    This is another possible symptom of the action of a virus or malware. Sudden inability to accessUSB or optical drives (CD and DVD), especially if simultaneously, may well be due to theaction of a virus. True, it may be due to a fault, but since it was handled differently and fordifferent drivers (drivers), is quite rare that the two systems become inoperative simultaneously.

    Loss of system files

    A system file is not lost (or deleted) like that. In most cases viruses are responsible for this.

    Internet connection speed is not justified

  • 7/31/2019 Articles for The Customize Windows

    20/24

  • 7/31/2019 Articles for The Customize Windows

    21/24

    It is another symptom that can be motivated by an infection. In normal conditions, but ahardware failure or file away for good or a folder or drive are inaccessible.

    Changes in the properties of some files

    For just as the previous case. The properties of a file, folder or drive are not changed by hook, sothat any of these behaviors can be a sign that we have one or more viruses on your computer.

    The system does not allow certain programs

    Unless problems caused by a fault in the hardware, a program is not so easily corrupted. Theinability to run any program that we used regularly without problems can also be a symptom ofan attack. This is more evident if the damage is not limited to a single program.

    Loss of hard disk access

    Although there are many viruses that can cause this situation (and talk about lack of access, notthe system unbootable), yes there are some who do. Fortunately this situation is resolved byrestoring the MBR (Master Boot Record), we can do from the Windows Recovery Console,running fixmbr, starting from the Windows installation DVD.

    Well, so far we have seen some signs of possible infection by viruses or malware of some kind. Iknow that in many cases it is normal to blame Windows, but lets not get carried away by false

    precepts. Windows or corrupted so easily without the intervention of others or is so unstable. In98% of cases in which failure (and I mean, obviously, Windows legal, not pirated copies of moredubious origin), the failure is related to some kind of malware or user intervention, whichsometimes happens in their handling, in many cases lacking the minimal knowledge.

    Lets take a look now to system failures that are attributable to viruses.

    Here are included, for starters, all the computers startup failures (NOTE, not on startup).Normally, a virus has no way to access the BIOS and, therefore, infect. For this, the virus wouldhave to go through an upgrade, for which you need a specific program, not executable fromWindows. Keep in mind that the BIOS works at the hardware level, before the operating systemloads. To this we must add the very few viruses that have evolved to infect (none currentlyactive, including CIH). Another thing is that the BIOS is damaged, as it may damage anycomputer component.

    However, in the highly unlikely case that a virus were to infect the BIOS, the only existingsolution is to either change or change the motherboard. A reset of the BIOS is not going to serveanything in this case, or reload the original BIOS, which most likely is not going to leave or do.

    Nor is it attributable to lack of virus detection units by the BIOS. In this case it is always aphysical problem (usually a bad connection, damaged hard disk plate or failure of themotherboard).

  • 7/31/2019 Articles for The Customize Windows

    22/24

    CONCLUSION:

    Well, as you can see, the symptoms presented by a virus vary greatly, but unfortunately, and as Isaid, there are some viruses that do not have any symptoms, making them especially dangerous.

    It is for this reason that we should always take a series of measures, since there are free,involving no extra expense to the user. These measures are:

    - Install a good antivirus (Very good free option is Microsoft Security Essentials).- Install a good anti spyware and anti malware (Malwarebytes Antimalware).- Having them always updated correctly.- Windows always have updated correctly, especially Windows Defender (if you have installed,nothing more than recommended).** It is true that some updates, both antivirus and Windows, have caused some problems inspecific settings, not in general terms, but these problems are always much smaller and easier tofix than any virus can cause us PROBLEMS.

    - INTERNET WEBPAGE ALERT OF FAKEANTIVRUS SAYING YOUR SYSTEM ISINFECTED OR YOU HAVE REGISTRY ERRORS: These ads are almost always a gatewayto malware, including Trojans and spyware.

    - WHAT TO DO IF INDICATIONS OF THE VIRUS THAT HAS ALREADY INTRUDED INTO THE WINDOWS OPERATING SYSTEM : Nothing will serve us than to install the bestantivirus program then if we ignore their directions, and the same goes for Windows alertmessages.- At the first signs of a possible virus, conduct a thorough scan of your computer, first with ouranti-virus and other malware, and then a different online antivirus manufacturer. This means that,for example, if we installed Panda antivirus online scanning with Panda not to do so Online,however good.- If you use a wireless router, always encrypt it and change the password to access the routersetup. If it is encrypted immediately change the default key that brings. These keys are eithergenerated automatically, and therefore a predictable pattern, or are as innocent as those used by asupplier, consisting of 26 0 or 26 1 (it is safe?).

    And always remember that our problems usually does not end when we have disinfected thecomputer. Were really one of those cases where prevention is better. We must keep in mind that

    the cost of virus damage amounts to many billions of Dollars a year.?

    15.

    WordPress Mobile Version Subdomain: Full Guide For Creation

    WordPress Mobile Version Subdomain is needed to offload the traffic, to increase readability,professionalism, SEO, Make Money using Specific AdSense units. You can also read SEOGuide for optimizing mobile site in this context. In order to create a subdomain follow the usualspecific rules. For Rackspace Cloud Sites users, this guide will work partially to create asubdomain for our Wordpress Mobile Version Subdomain project. Those who are using our Pilotproject of Full Managed WordPress Cloud Hosting, nothing needed to be done. We already

  • 7/31/2019 Articles for The Customize Windows

    23/24

    included WordPress Mobile Version Subdomain, you can access it usingm.yourdomain.comstructure.

    Advantages of a WordPress Mobile Version Subdomain

    WordPress Mobile Version Subdomain has several plus points with zero disadvantages as youcan easily revert back or delete the WordPress Mobile Version Subdomain at any time. The mainadvantages of having a WordPress Mobile Version Subdomain are :

    Professionalism: It looks good to have a m or mobile version. WordPress Mobile VersionSubdomain is an Industrial standard.

    SEO: You can optimize WordPress Mobile Version Subdomain in the way you wantsubtracting the not needed parts of a regular version website.

    Make Money: If AdSense units are added directly, except Android device, they can appearvery badly. You can use specific Adverts for WordPress Mobile Version Subdomain.

    Better control: Quite obvious WordPress Mobile Version Subdomain is a robust

    configuration than simple plugin usage.Offloading the main domains pressure: There is no meaning to show a 1200 px wide websiteto a 200 px screen mobile user.

    Smooth and speedy page loading for the Wordpress Mobile Version Subdomain.

    Steps to create Wordpress Mobile Version Subdomain

    Step 1: Creating the SubdomainWe have lightly touched this point at the beginning of this article. Return to top of page

    Step 2: Creating content for WordPress Mobile Version Subdomain

    Your basic idea is to deliver the same content as a light version (less images and javascripts).You can either create it manually or create a full mirror copy of the main WordPress website andrender it using a mobile plugin on the Wordpress Mobile Version Subdomain. Manual creationof Content for WordPress Mobile Version Subdomain has various advantages.

    Step 3: Redirecting mobile users to WordPress Mobile Version Subdomain

    For the actual usage, you need to automatically redirect mobile users to WordPress MobileVersion Subdomain. This can be done using WordPress Mobile Pack plugin. The most importantstep is to configure the plugin installed on your main WordPress site :The red circled areas are with typical default settings. You need to change them accordingly sothat the grayed out option field mobile domains will be active and you can add the url of your

    WordPress Mobile Version Subdomain.

    Step 4: Optimizing WordPress Mobile Version Subdomain

    Optimize Image resolution and sizes

  • 7/31/2019 Articles for The Customize Windows

    24/24

    Add link to main website near navigation system to switch to desktop version from WordPressMobile Version Subdomain.

    Submit corresponding mobile sitemap to the search engines.Add appropiate AdSense or other Adverts (if applicable) to the WordPress Mobile Version

    Subdomain.

    Match the color and logo of WordPress Mobile Version Subdomain with your main websitestheme.