Thursday, March 5, 2009

CompEd2009xl:Computers in Business world




Computers in Business World




Improving Your Links in Business





One of the most difficult areas to improve your site is getting more incoming links.
You need to make link exchanges, with other blogs and traditional websites, to help yourself. Trades are good for everyone!
Those incoming links, or backlinks as they are often called, are important for several reasons.
First of all, links to your blog will get you more traffic. The more visitors to your site, the better. As with anything else, unless people know your great blog exists, they can't read it. Incoming links enable you to share readers with another blogger. They in turn enjoy visits from your readers who benefit from enjoying another great blog experience.
Google's PageRank is based on the number and the quality of your incoming links. For those unaware of their blog's PageRank, it can be seen as a green line on the Google Toolbar. Download one and check your blog's PageRank.
Google considers a link to your site to be a vote in its favour. The more votes the better, is one way to look at it. Another aspect of Google PageRank is it weights the links by importance of the linking page. For example, Google will give your blog much more PageRank credit, from a link from a PageRank 7 site, than from a PageRank 2 site.
More high PageRank incoming links raise your blog's PageRank considerably. Even if your current PageRank is fairly low, it will still assist your link trading partner to some degree, regardless of their ranking.



PC maker banks on untapped computer market


Gateway, a wholly owned subsidiary of Acer, Inc., is banking on the budding local Internet market to drive demand for its products amid the global slump. The country’s Internet penetration rate is only 14.6%.
"The Internet penetration in the country is not yet that mature, which presents opportunities for us. Also, there are still many untapped markets outside Metro Manila," Dio S. Vasquez, product manager of Acer Philippines, said.
He said they expect to sell 70% of Gateway computers in Metro Manila and the rest in the provinces.
The Gateway ZX2300 desktop computer has side-mounted speakers and a keyboard that can be stowed under the monitor. The model is powered by an AMD Athlon 2650e processor and AMD’s RS690+SB600 chipset. It has up a gigabyte of random access memory (RAM) and a 160-gigabyte hard drive.
Gateway also launched two notebooks — the MD260i and MD7802i. The first is powered by an AMD Turion X2 Ultra Dual-Core ZM-82 processor, while the second sports an Intel Core 2 Duo processor. Both notebooks come with three gigabytes of RAM and 500 gigabytes of storage.
Gateway also launched its netbook line — the UC7308i, UC7811i and the LT1001i. The UC7308i is powered by an Intel Dual Core T3400, while the UC7811i comes with an Intel Core 2 Duo T6400. The LT1001i boasts of an Intel Atom N270. Mr. Diaz said Gateway is targeting "trendy, stylish, visual-heavy" youths and professionals



Comped2009xl:Computer in Business Competetion




GCompetition can be a very healthy thing. Seeing someone doing something better than me does not have to make me envious, but it should provoke me to improve. Sharpening skills and improving products is a good thing. Who wouldn't want a car with better gas mileage, or a computer with a faster processor and larger hard drive? Competition forces improvements that benefit everybody. Understanding that the "jealousy" I feel when I see someone do something better does not have to be "bad jealousy." Instead, it frees me to admire a competitor's business success and spurs me on to improve my own. I've been encouraged not to fear competition, but to value its influence on my business

Tuesday, March 3, 2009

CompEd2009xl:Computer technology in Health








Computer Technology in Health


Monitoring health trough computer

A NEW device for patients to carry out their own health checks and send the information to a doctor has been developed in a bid to cut hospital admissions.
The Telehealth system allows sufferers of long-term conditions to have their health monitored daily without needing to visit their GP surgery.
Now, health chiefs are aiming to roll the service out to more patients in an effort to prevent unplanned hospital visits.
The personal healthcare system works by installing a small computer in the patient’s home with high-speed broadband internet connection.
The patient takes readings of their blood pressure, oxygen levels and weight before entering the data into the computer and sending to their doctor.
The computer is also fitted with a webcam– enabling the patient to have a video consultation with their GP.
It was piloted in 30 homes across West Lothian, Midlothian and Edinburgh and is now being rolled out to 400 more patients.


CompEd2009Xl: Solving Public Health

The widening economic gap between countries is paralleled by disparities in health outcomes. Computer technology has the potential to play an important role in the efforts to improve healthcare in poor settings. The useful application areas includes electronic medical record systems, decision support, healthcare education, telemedicine, data gathering, and a wide range of communication systems. In this talk, research scientist Neal Lesh provides an overview of international health issues and outlines several potential computer technology applications for communities with severe resource limitations.




CompEd2009xl:Computer technology in Education

Computers entered the medical arena on a small scale in the 1950s. Computers of this era were primarily employed by research labs to develop more sophisticated medical diagnostic equipment for the processing of signals and images. By the late 1950s, however, computer technology entered the hospital setting: a few progressive hospitals began to apply computer technology to patient information systems which required the digital capture of a large array of disparate information. The systems used for medical research differed dramatically from patient information systems in that they only required the application of well-defined, unchanging data sets. Conversely, patient information systems demanded more complex programming and more sophisticated technology that was not available until the late 1950s and 60s.
By the mid 1960s, the confluence of improved computing and communications technology, an increasing awareness of computer technology in the hospital sector, and congressional approval of federal funding for biomedical applications, made the development of patient information systems feasible for more institutions. While more institutions began to develop patient information systems, they were crude creations supported by monstrous mainframe computers and proprietary programming languages and hardware. Such systems could not manage large numbers of patient records over extended periods of time. By the late 1960s, integrated circuit computers and relational database applications allowed for more robust, flexible "modular" approaches to system design. These systems, while greatly improved, were still crude, ungainly and difficult to use



Thursday, February 26, 2009

CompEd2009Xl:Latest Gadget

CompEd2009Xl:Latest Gadget




SECRET AGENT PEN














You can put this secret agent pen camcorder into your shirt pocket, the pen cup or on the desk, no-one will ever notice as you secretly capture their every move.The built in flash stores the video until it is ready to be downloaded to a computer via USB, and with 2GB of memory you’ll get well over 5 hours of recording time. The colour video is encoded on the fly through a buffer system to MPEG 4 and if the battery runs low during a recording session the pen will ensure it writes the video from the buffer to flash before shutting down.All video with audio that captured from Secret Agent Pen Camcorder make this the perfect tool for recording confessions, secret rendezvous or interviews. You can also use the device as a common flash drive to transport important files around safely. The pen itself is an attractive writing instrument with a gloss black finish on the main body, rubber finger grip and chrome detailing.







Mission Ev Electric Sport Bike:


There have been some fair electric cars are set come out with a bang and there over the past couple of years, but valuable little in the form of bikes, so far.
This curvy looking beauty, which looks extraordinarily like something Batman would ride around on, is the Mission One EV Sports Bike and the ability of arriving at speeds up 150mph.On the other hand, you will also get around 150 miles from the built in battery, even though we doubt you’d be capable of to do this distance at top speed, and best of all it’s equipped recharging in under two hours which is a far cry from the original ‘overnight’ times of the early Teslas.
Quite surprisingly, this is not a concept design either and even though the first 50 will be limited edition models which costs around $68.995 each, a ‘more reasonable’ alternative is going to be declared in the summer. The first lot is ready to be delivered in 2010, though it will in addition be making its race debut at the TTXGP on June 12th.


Worlds Fastest Electronic Car


The world’s fastest electric car that can arrive at speeds of 208mph has been exposed. The Ultimate Aero EV formed by Shelby Supercars consumes a twin motor AESP creating an amazing 1,000 HP and 800 lb-ft of torque facilitating it to rocket to 60 mph in a mere 2.5 seconds and arrive at a top speed of 208 mph.
However, not only does the Ultimate Aero EV have a range of 150-200 miles on a single charge, but SSC’s Charge on the RunTM onboard charging system lets for full battery recharges in a bit 10 minutes. SSC’s 3-speed automatic transmission transfers the Ultimate Aero EV’s power to its wheels and attains electronically controlled shift times of .24 s. On the contrary, the present electric sports car flagbearer that is the Tesla Roadster which was currently tested by Jeremy Clarkson on Top Gear develops 250 horse powers.Once the Ultimate Aero EV’s batteries are charged it will have a series in between 150 and 200 miles. The manufacturer anticipates rolling out pre-production versions of the vehicle, which contain a three-speed automatic gearbox, by June. The petrol-engine SSC Ultimate Aero TT is presently the quickest production car in the world, with a fastest recorded speed of 257 mph. This speed was supposedly attained during tests on September 13, 2007 in West Richland and established by Guinness World Records on October 9, 2007.


this is original i swear...

Thursday, February 19, 2009

CompEd2009XL:Latest Technology of 2009









CompED2009XL: Latest Technology of 2009

























Mobile Memory Initiative
Enabling a new generation of media-rich mobile products
Consumers will come to expect the High Definition (HD) experience of the living room from the mobile devices they carry everyday. In addition, they'll want features including HD resolution video recorders, multi-megapixel digital still cameras, 3D games, and media-rich web applications. These advanced mobile devices will be capable of encoding and transmitting high definition content directly to HDTVs, home PCs and servers. To pack all that functionality in a form factor that's thin, light and delivered with a pleasing aesthetic presents a tremendous challenge for mobile device designers. Chief among these challenges will be the development of a high-performance memory architecture that meets the power efficiency constraints of battery-operated products.
The Rambus Mobile Memory Initiative pioneers high-bandwidth, low-power memory signaling technologies that can meet the needs of future smartphones, netbooks, and mobile gaming and multimedia products. Technologies developed through the Mobile Memory Initiative will enable future mobile memory architectures capable of achieving data rates of 4.3 gigabits per second (Gbps) at best-in-class power efficiency. With this performance, designers can realize more than 17 Gigabytes per second (GB/s) of memory bandwidth from a single mobile DRAM device.
Breakthrough innovations achieve performance and power efficiency
To achieve a high-bandwidth, low-power memory interface solution, Rambus has developed breakthrough innovations that include:



one of the world's premier technology licensing companies specializing in high-speed memory architectures, today announced its Mobile Memory Initiative. This development effort focuses on high-bandwidth, low-power memory technologies targeted at achieving data rates of 4.3Gbps at best-in-class power efficiency. With this performance, designers could realize more than 17Gigabytes per second of memory bandwidth from a single mobile DRAM device. These technologies enable a memory architecture ideal for next-generation smartphones, netbooks, portable gaming, and portable media products. Rambus will demonstrate a silicon test vehicle for its Mobile Memory Initiative at DesignCon 2009.









CompEd2009XL:Computerized Maintenance Management Systems


Computerized Maintenance Management Systems (CMMS) enable the facility manager, subordinates and customers to track the status of maintenance work on their assets and the associated costs of that work. CMMS are utilized by facilities maintenance organizations to record, manage and communicate their day-to-day operations. The system can provide reports to use in managing the organization's resources, preparing facilities key metrics to use in evaluating the effectiveness of the current operations and for making organizational and personnel decisions. In today's maintenance world the CMMS is an essential tool for the modern facilities maintenance organization.


CMMS software package maintains a database of information about an organization’s maintenance operations. This information is intended to help maintenance workers do their jobs more effectively (for example, determining which storerooms contain the spare parts they need) and to help management make informed decisions (for example, calculating the cost of maintenance for each piece of equipment used by the organization, possibly leading to better allocation of resources). The information may also be useful when dealing with third parties; if, for example, an organization is involved in a liability case, the data in a CMMS database can serve as evidence that proper safety maintenance has been performed.

CMMS packages may be used by any organization that must perform maintenance on equipment, assets and property. Some CMMS products focus on particular industry sectors (e.g. the maintenance of vehicle fleets or health care facilities). Other products aim to be more general.





CompEd2009Xl:Samsung cell phone Show W7900


Samsung officially unveiled its Show W7900 cell phone, also known as the i7410, will feature Texas Instruments’ integrated DLP Pico technology. It will come with the built-in chipset and compact projector which is able to throw an image from the handset to a screen or wall at up to 50″ in size.
Features:* OLED touchscreen display* Flick gestures support* 5 megapixel camera* Built-in speakers


wind



this is original i swear..



















Tuesday, February 17, 2009

CompEd2009XL: literacy






CompEd2009XL


A computer is a machine that manipulates data according to a list of instructions. The first devices that resemble modern computers date to the mid-20th century (1940–1945), although the computer concept and various machines similar to computers existed earlier. Early electronic computers were the size of a large room, consuming as much power as several hundred modern personal computers (PC).[1] Modern computers are based on tiny integrated circuits and are millions to billions of times more capable while occupying a fraction of the space





Computer Literacy:
Computer literacy is the knowledge and ability to use computers and technology efficiently. Computer literacy can also refer to the comfort level someone has with using computer programs and other applications that are associated with computers. Another valuable component of computer literacy is knowing how computers work and operate. As of 2005, having basic computer skills is a significant asset in the developed countries. The precise definition of "computer literacy" can vary from group to group. Generally, literate (in the realm of books) connotes one who can read any arbitrary book in their native language[s], looking up new words as they are exposed to them. Likewise, an experienced computer professional may consider the ability to self-teach (i.e. to learn arbitrary new programs or tasks as they are encountered) to be central to computer literacy. In common discourse, however, "computer literate" often connotes little more than the ability to use several very specific applications (usually Microsoft Word, Microsoft Internet Explorer, and Microsoft Outlook) for certain very well-defined simple tasks, largely by rote. (This is analogous to a child claiming that they "can read" because they have rote-memorized several small children's books. Real problems can arise when such a "computer literate" person encounters a new program for the first time, and large degrees of "hand-holding" will likely be required.) Being "literate" and "functional" are generally taken to mean the same thing.




CompEd2009XL:Computerized Voting




the use of computerized voting software has emerged so quickly. With some states and the federal government banning punch card ballots, the explosion of computerized voting will continue at a greater pace than ever. As an experienced software developer, it amazes me that there do not appear to be any laws that consider the ways voting software can be inappropriately manipulated. It is incredibly easy to cheat the system, for one bad apple or rogue programmer to literally steal an election, or a lot of elections. it is the one way protecting are votes against the people who wants to steal or manipulate are vote just to get their wants to be in the position that they running of..!

Private ownership raises more questions about the safety of the integrity of the ballot. But even if companies were publicly held or government owned the risks of corruption are too great. It’s easy to manipulate the underlying algorithms that do the counting and analysis within the software. It’s easy to add switches which can be remotely turned on or off, converting a program from normal functioning to cheating-- to distorting the data. It only takes one person who knows what to do. And the nefarious switches can even be set to disappear after they’ve been used.