Here you can get the detailed information on Computers and Technology . Know the complete reviews and tips on Computers and Technology our articles are very clearly written posts that any one can understand. So learn more about Computers and Technology . read all blogs for get complete details......

Wednesday, October 21, 2009

2038 - The Next Computer Time Bug

Remember the turn of the millennium? Whilst many of us were counting down the seconds until midnight, there were network administrators across the globe with their fingers crossed hoping their computer systems will still be working after the new millennium kicked in.

The millennium bug was the result of early computer pioneers designing systems with only two digits to represent the time as computer memory was very scarce at the time. The problem didn't arise because of the turn of the millennium, it arose because it was the end of the century and two digit year flicked around to 00 (which the machines assume was 1900)

Fortunately by the turn of the millennium most computers were updated and enough precautions were taken that meant that the Y2K bug, as it became known, didn't cause the widespread havoc it was first feared.

However, the Y2K bug is not the only time related problem that computer systems can be expected to face, another problem with the way computers tell the time has been realised and many more machines will be affected in 2038.

The Unix Millennium Bug (or Y2K38) is similar to the original bug in that it is a problem connected with the way computers tell the time. The 2038 problem will occur because most machines use a 32 bit integer to calculate the time. This 32 bit number is set from the number of seconds from 1 January 1970, but because the number is limited to 32 digits by 2038 there will be no more digits left to deal with the advance of time.

To solve this problem, many systems and languages have switched to a 64-bit version, or supplied alternatives which are 64-bit and as the problem will not occur for nearly three decades there is plenty of time to ensure all computer systems can be protected.

However, these problems with timestamps are not the only time related errors that can occur on a computer network. One of the most common causes of computer network errors is lack of time synchronization. Failing to ensure each machine is running at an identical time using a NTP time server can result in data being lost, the network being vulnerable to attack from malicious users and can cause all sorts of errors such as emails arriving before they have been sent.



Article Source: http://EzineArticles.com/?expert=Richard_N_Williams

Digital Gram Scales - Electronic Weighing Scales With Clinical Precision

When excited people describe you how clinically precise someone had to be to achieve something great, you say a wow in your mind. Seriously, nothing in the world can be an optimized achievement unless the system is tuned to perfection. When it comes to measurement of weight for any purpose, a digital gram scale is the device that can get you accuracy at the extreme level.

A digital gram scale is an electronic scale. It is driven by the line power, and can also be driven by a battery. It has a weighing platform, on which you can keep the substance to be weighed. And it has a digital display on which the weight of the object is shown. The display will have a good contrast and a backlight. You would have an option of measuring the weight in terms of grams as well as ounces.

The accuracy of this class of devices is the greatest power they have. These scales are accurate to the decigram - that is one-tenths of a gram. So if you care about every gram of weight then this is exactly what you are looking for. No wonder the digital gram scales have become popular among food buffs, cooks who love to be precise, scientists who need to be accurate in weight measurement in their experiments, dealers of valuable metals such as gold and people form other walks of life with a need of being accurate about weights.

If you desire to get your own digital gram scale, then make sure that you buy one with a good warranty period. Buy a branded one - the scales are not expensive and it makes sense to go for a good one given the price tags. A digital gram scale can actually do wonders to your state of mind if the accuracy of weight matters to you and you are relying on guess, on non-digital weighing systems or on weighing systems owned by others.



Article Source: http://EzineArticles.com/?expert=David_Staats

How Can You Make the Best Use of Technology With Digital Weighing Scales?

As technology has evolved, newer and better devices have emerged and have made noteworthy impacts upon the human society. Some of these devices are simple in nature and some are more complicated than the others. A digital weighing scale is one of the simpler devices that have played a distinct role in many corners of our lives.

Digital weighing scales are used everywhere nowadays. The older analog mechanical scales are quickly getting replaced by these scales. People prefer digital scales due to their clarity and accuracy. The scales operate electronically. They use electrical display boards that provide an accurate reading of the object's weight immediately. One can simply read the numbers from the board rather than trying to understand what the needle is pointing to. Obviously the scope of error is very limited here.

How can you benefit from such a scale? There are a number of ways.

* Merchants: If you are a merchant then you get to weigh your sell item perfectly. You don't try to interpret needle pointers and get accurate measurements. This ensures that over a period of time, you save a high amount of wealth that would be given away for free to your customer otherwise. For more valuable objects such as jewelry this is simply invaluable.
* Customers: You get the best value for your money, and can control the amount of your purchase to your precise requirements.
* Doctors: You get to measure the details of the patient's weight as you desire.
* Scientists: Your experimental inputs are perfectly weighted and given, and the results are perfectly measured. You get more perfect insights.
* Goods carriers: You get the right money for the goods your company is carrying on behalf of your client.
* Cooks and bakers: You mix your ingredients perfectly and produce the best of foods and bakery items. You control the dietary issues and are consistent in your cooking quality.

And if you are from another walk of life, you can probably relate how such accurate weighing capabilities may affect you going by the above examples.




Article Source: http://EzineArticles.com/?expert=David_Staats

Essential Computer Network Security Best Practices

Network security should encompass all aspects of a network from the desktop to the perimeter. A multifaceted and multilayered approach to network security for any organization or business provides the ideal protection coverage against internal and external threats. For small networks or even a single computer, a router with integrated firewall is usually sufficient. For larger networks a dedicated firewall at the network perimeter may be more appropriate. A good number of dedicated firewall appliances can also provide secure Virtual Private Network (VPN) connectivity. The most common feature provided by dedicated firewalls is their ability to inspect, block and report malicious network activity usually initiated from the internet. Firewalls that provide this functionality are often designated as an Intrusion Prevention System (IPS).

A content filtering device is a good complement to a dedicated firewall. These types of devices usually include the ability to monitor, filter, regulate and report on all web related traffic. They are usually installed transparently in line between an internal switch and router or firewall. All internet inbound and outbound traffic is then forced to pass through it. This type of installation is often referred to as "bridged mode." Some content filtering devices can also be integrated with a network directory for individual, detailed monitoring of end user web related traffic. Microsoft Active Directory and Novell eDirectory are examples of directory services that can integrate with a good number of content filtering devices.

Desktops and servers should be protected by antivirus and anti spyware applications. There is a wide variety of enterprise level threat protection software available in today's current marketplace from numerous vendors. The ideal threat protection software should include at a minimum, frequent if not daily virus definition updates, centralized management and reporting, active protection and the ability to guard against unknown threats.

Another aspect of the network that needs security related consideration is what the users are allowed to do on desktops and laptops. Management may want to evaluate and implement access and rights appropriate for their environment and the nature of the organization. Should users be allowed to install software on their own or should the use of removable devices be disabled company wide are examples of issues that should be addressed when defining security policies and procedures.

Lastly, physical security is also important when considering all security related aspects of the network. Servers should be secured and access regulated and documented. It is also best to make sure that backup media is secured whether stored on-site or off-site. In conclusion, a proactive effort in utilizing these network security best practices coupled with consistent monitoring, constant re-assessments and adaptive reconfiguration are all essential in ensuring the safety and protection of an organizations data, intellectual properties and physical assets.




Article Source: http://EzineArticles.com/?expert=Anthony_C.