Cloud Computing Going Forward to the Past

June 16, 2009

image0When is the last time you were in the clouds? ¬†No, I’m not talking being in love ūüôā

You know, when you did the “take off the shoes” and¬†“walk through the scanner” thing? No, I’m not talking about being arrested, I’m talking about when you got a flight¬†at the airport. Remember just before that, when you got your tickets? Remember the person behind the counter? What was she typing on? A computer terminal. (bear with me I’m not being facetious ūüôā )

gettingtickets¬†Well the program on the terminal screen isn’t in the terminal, the program is on a server which may not be in the same state!

I know what you thinking ” this technology is over 40 years old!”¬† You are right! Millions of terminals could connect to a few servers at the same time and it was called Master -Slave but since then for Political Correctness sake it was changed to Client-Server. Well what if you repackaged it and the terminal did some real cool stuff and could run multiple programs on several distant servers, what would you call it?

It already has a name; it’s called Cloud Computing!

The story of civilization is taking the individual from Independence to dependence from privacy to being¬†fully exposed.¬†An example would be water. Before, everyone had their own well for water, now it’s a utility, everyone shares and you have to use ONLY what they want you to have and how they want you to have it. So you pay for that utility of receiving water¬†and still buy bottled water! It is the same with food! Now the last bastion of independence and privacy; what interests us, what we write and how we run our business; will be totally naked and accessible by anyone with perceived reasonable authority.

Why would anyone want to lose their Independence? The answer is one word COST!  The average person is after enjoyment, fun and communication. If they bought a computer it was for that purpose. If not, it was because it was too expensive and usually the cell phone, though limited, would suffice. But now that is about to change. Two years ago a computer notebook cost around $2500 with software. Now a net-book (the net part of the word for interNET) costs you $400, using the Intel Atom Processor (a midget Pentium 4 on steroids) and you can use applications such as wordprocessing, spreadsheets, databases and acounting from off a distant server (Really big computer). Next year Intel will cut the cost of the processor almost in half ! While Arm, who makes the processor for the cellphones, is coming out with their own prosessor called snapdragon for the NET book (slave side of Master-Slave, oops I mean Client-Server). The snapdragon configured computer (NETbook) is taunted to be $100 or free with signup, like with a cellphone. What about the really cool stuff part? Well since you are not running any programs on the unit itself but on a distant server, you can have full communication with someone right on the netbook. What I mean is full audio and VISUAL! IF you wanted to show him/her something on your netbook you could show your screen image to them, wherever they are. Or they could just see and hear you. Each one is scheduled to have a video camera with microphone focused on you when you open the lid. Where?  Right above the screen.

The battle for your privacy has already begun. Just like in chess. The board is set and the pieces are in motion. Who are the pieces? The king for the white is Intel Corp. for the black is ARM. The queen for the white is AT&T the queen for the black is Verizon. The bishops are Intel’s communication branch while on the black side Qualcom.The knights are the technologies of voice over¬†the internet (voice over IP) or internet over voice lines which encompasses the router companies like Cisco and Juniper. The¬†¬†rooks (castles) these are the applications that are to be run from servers. This is still in progress as to which side they are to take. Those who are positioning themselves are Amazon, Ebay, Microsoft, Google, Oracle¬†and Apple, just to name a few.¬†¬†

¬†Who are the naked and¬†vulnerable pawns? Why,¬† those who use the netbook,¬† of course. ¬†Except we are not naked and vulnerable we do have a little experiance in computers ūüôā

Need help choosing and setting up your NETbook give us a call.

With our help you will be like the Cheshire cat,

talking and writing and crusing the NET
with the only thing seen in the cloud is your  smile!

 cheshirecatwithsmile

 We are here for you !

Advertisements

The Worlds Most Powerful Midget!

June 10, 2009

FuzzyCupid

Imagine¬†¬†¬†if¬†¬†you will the image of two words powerful and midget, it makes your head turn sideways and your eyebrows mesh together. Why? Because POWERFUL and MIDGET appears to be an oxymoron, but it’s not!

The worlds most powerful midget is not a person but a processor!
Which processor?

Processor with a grain of rice !

Processor with a grain of rice !

The   ATOM   Processor

 
Two years ago Intel Corporation introduced to the world this tiny powerhouse and everyone has built an architecture around it. Now it’s ready for prime time!
In your mind picture the old Pentium 4 processor.
Pentium4Now shrink it down to the size of a piece of rice but enhance its speed and architecture. In other words put it on steroids! THEN add the Dual Core processor’s I/O chip set (a computer’s equivalent to a¬†musle car’s transmission ūüôā ) What do you have?¬†A miniature version of the “governator” of California in computer form.
 The ATOM Processor!
With its small size it consumes only a fraction of the power of the original .45 watts to .75 watts!
How about the price?
Between $45 and $75  compared to the old $350 price.
So now its in a miniature notebook called a net-book.
What is the operating system? Windows XP Home.
Memory? 1 gigabyte.
How long does the battery last? 10.5 Hours!
How much does it weight? 2.2 to 3.2 pounds depending on configuration.
How big is the screen? Corner to corner, 10.1 inches.
Here is a review of one net-book from Asus.


What is the cost? Around $400

Next year the ATOM goes into cell phones!

Imagine a miniature Govenator in your Cellphone!

What will happen to our present cell phones?

Hasta la Vista, BABY!


Linux or Windows, Which is the Top Selling OS?

June 3, 2009

Linux-Vs_Windows
The¬†¬†other day I stood with the refrigerator door open yelling at my wonderful wife that “There is no mayonnaise in the refrigerator!”,

but she constantly affirmed that there was mayonnaise and that it was right in the front of my face! I was getting angry, because I know what mayonnaise looks like and there was no mayonnaise in the refrigerator! Finally she came up beside me and smiled while she reached into the refrigerator and pulled from the the top shelve ,right in front of my face, a white plastic form fitting container with the label “Mayonnaise”!
I declared “that’s not mayonnaise!” Tilting her head with a gentile smile she asked “then what is it?” She knew what I meant. I meant that the container was not what I was expecting for mayonnaise. “My reaction wasn’t my fault”, I explained to her “cognitive dissonance is a common flaw in human nature”.

I hate it when she smiles at me like that!

Now brace yourself because I am about to do to you what my lovely wife Patricia did to me!
You all know that the major competetor of Windows, Apple computer, left the IBM and Motorola Processor chips and changed over to the Intel processor chip which uses a special flavor of a Linux OS (Operating System) called Lepard, right? So everyone is asking which is better now Linux or Windows with the assumtion that it is either of them because those are the only operating systems that work on an Intel processor.

¬†Now that you are standing with the refrigerator door open yelling “there is no other operating systems” now I am going to do a Patricia!

On the shelf in front of everyones face is the top selling Processor this past year  the ARM processor!

¬†CAMBRIDGE, UK ‚Äď Jan 22, 2008 ‚ÄďARM [(LSE:ARM); (Nasdaq: ARMHY)] today announced that the total number of processors shipped by its Partners has exceeded ten billion. The company developed its first embeddable RISC core, the ARM6‚ĄĘ processor, in 1991, and its semiconductor Partners currently ship almost three billion ARM Powered¬ģ processors each year.‚ÄúARM Partners have now shipped more than one processor for every single person on the planet‚ÄĚ said Warren East, CEO, ARM. ‚ÄúTen billion ARM processors in use mark an enormous milestone for ARM, but also demonstrate the growth in adoption of the ARM¬ģ processor architecture by the vast majority of major electronics companies and across the broadest range of applications.‚ÄĚ

 

What operating system does the ARM Processor chip use? Symbian OS !

Never hear of ARM processors or Symbian OS?

Well today everyone uses them all day long!
cellphones 

The ARM processors with the Symbian Operating system is in 98% of all cellphones sold!

Repeat after me “cognitive dissonance is a common flaw in human nature”.
Am I smiling?
What do you think? ūüôā


Why Do We Need Passwords?

May 13, 2009

The same question could be phrased “why do we need locks on the doors of our house?” or “Why do we need locks on our cars?”
If some one fails to see the need for locks then have them remove the locks from their home and car.
Quickly the need will be self evident, all though costly.
In this computer age we need security and passwords are that lock to keep the outsiders out side!

Weak or substandard locks are worthless. Would you lock the front door of your house with a luggage lock?

luggagelock
The best they can do to a malicious person is be a nuisance. They will not hinder or stop him.

They are better than nothing right?

Low hanging fruit are always the first fruit taken from a tree. But once they are all gone then more effort is required to get the rest of the fruit. So it is with those with with no passwords at all and those with weak passwords. Those with weak passwords aren’t the first to be taken but they are definitely next!

Your computer has about 256 entry points called ports which are like doors¬†¬†and it takes less than three seconds to knock on all the doors looking for a response from the computer of¬† “user name and password”.
Once there is a response then what is used is a dictionary attack where every word in the dictionary is used. This can be done in minutes. Next is the hackers list of most commonly used passwords. Comments on this list can be found at http://tech.yahoo.com/blogs/null/120554 
 

while the list itself can be found at

 

What is a strong password?
It should be at least 8 characters long with a mixture of numbers and letters with one or two special characters.
No, swordfish will not do. ūüôā

So how do you remember a password that has number and letters with special characters?

For me special characters mean either at home or at work or at some other location. For instance the special character “$” would be for my computer at work. Then if I am opening a Windows OS then I¬†just use the first four characters of Windows and it would be $Wind. Now interweave the last four digits of your personal phone number at work or your employee ID into it or any other familiar numeric string. Like this $W4i2n4d9. What if you were logging into your Quick books at work?¬†What should the password be? $Q4u2i4c9k. When I am at home the stars are out. Guess what special symbol I use at home? Right, the “*” special character. So logging on to my home computer which has Windows it would be merged with a numeric string at home, perhaps the last four of the home phone *W9i7n5d5.¬†

This method makes for¬† stonewall passwords! What is even better they are easy to remember! (well almost ūüôā )

Remember it is not a person that¬†is attacking your computer but a program that is written so that one program can be at thousands of places at one time, knocking on your or other’s¬†computer’s or router’s doors.

Should you share your passwords with anyone? Maybe one; Groucho Marx! ūüôā

We are here for you, if you need help give us a call at IBEX 619-464-4249


The Wrong Place At The Right Time

April 8, 2009

andromeda_moo

There always seems to be tremendous laughter over the ancient concept that the earth does not move and the heaven planets and stars orbit around the earth.

image001

Yet postulations and scientific projection based on that ancient misconception continue to prevail in our dreams and science fiction. What is more than amusing is that everyone takes it so seriously throwing out the scientific discoveries of the last 400 years and returning to the belief that the earth does not move and the heaven, stars and planets revolve around the earth!

What am I talking about?  TIME TRAVEL.

Remember the first mention of a “time¬†machine” was H.G.Wells’ novel “Time Machine” written in 1895. Then came the movie in 1960.timemachine¬†Then¬†more movies and¬†television shows like Terminator and Sarah Connor Chronicles keep coming.

timebubleWhere clothes are not an option for time travel but tooth fillings, tattoo’s and makeup¬†are. ūüôā

Remember Back to the Future? Remember the speed the DeLorean had to go to jump time? 

future460¬†But the best of all was the Star Trek episodes where generally it was a very advanced civilization that could do it¬†or a freak occurrence in the¬†“space time continuum”.

tos_city-on-the-edgest_tng_1x124_001st-tng_timescape 

¬†¬†I¬†¬† have no real problem with bending, warping, or punching a hole in the fabric of time BUT the resulting location¬†can be detrimental to the¬†time traveler’s¬†health!

Why do I say that? Because the earth is rotating, IT IS NOT STANDING STILL!¬† How fast is it rotating? At 1,070 miles per hour! What that means is every second you are approximately 1569.2 feet from where you were¬†the second before! Now for more complication; how fast are we orbiting the sun? Ready? Depending on the year anywhere between 66,000 and 67,000 mile an hour! Is there more? Yes! Our wonderful solar system rotates around the center of an average spiral Galaxy called the Milky Way at a speed of , are you ready for this? ; 45,000 miles an hour!¬† Soooo in that direction¬†after 1 second you are 12 miles away from where you were the second before. But the Galaxy isn’t moving is it? Yes it is! Our galaxy is traveling as¬†our solar system¬†orbits around it’s black hole¬†at a speed of¬† 684, 000¬†mile per hour! That means in the direction of the galaxies speed in one second you are 190 miles from where you were! So you see¬† Time Travel has nothing to do with where you are¬†on earth but where you are in the UNIVERSE ! Going back in time could put you in the middle of a¬†star or bury you in a planet. Even going back one second in time would¬†have a mountain or building slamming into you at 1,070 mph. How do you match the¬†velocity and course¬†of a target location¬†going¬† 1,070 mph¬†one way and 67,000 mph another way and 45,000 mph a different way and 684,000¬†mph another different direction?

You see the concept of Time Travel is quite unrealistic. But in the operation of your computer it is not.

If you are in Windows and you make an error, no matter what program, hold down the¬†CTRL key and press the letter “z”¬† press it again and you go further back in time, to go forward, hold down the CTRL key and press the letter “y”¬†.¬†¬†What if you just want to change the conditions or undo the consequences of a decision or action? In a computer that is very do-able for the operating system with restore points. What is a restore point? Well in theory if you were to go back in time, the future would no longer exist as you know it because your very presence changed the course of the time line thus all your memories from the future would no longer exist. Which would make no sense going back in time if you didn’t know why you were there when you got there. BUT in the computer, using the restore points, you keep all your personal stuff, only the operating system (the world inside your computer) would go back in time. ONLY in the computer world do you have perfect time travel !

If you go to Start then Programs then Accessories then System Tools,¬†there you will find System Restore. It is in this program that you can set a restore point to get back to “in the future” or take your computer back in time to¬†any restore point listed and not loose your personal things that you remember you have.¬†

So is time travel possible? Yes but only in the perfect world of computers!

Isn’t that moving? ūüôā


Raising your Computer’s IQ

March 26, 2009

computer_glowMany have given names to their computers.

Speaking of them as if Computer was their last name. For example, have you ever heard some one address their computer as that Stupid Computer or that Damn Computer or that Dumb Computer?  Most people never really consider giving their computer a real name because there is no intelligence to the computer. Would you give a name to a typewriter or filing cabinet or radio or television or cell phone?  Of course not, names are give to something possessing intelligence. For example like your bird, pet fish, your dog or cat but never a computer because it does not have intelligence, or does it?

What is¬†Intelligence?¬†Isn’t it a ¬†term used to describe a property of the mind that encompasses many related abilities, such as the capacities to reason, to plan, to solve problems, to think abstractly, to comprehend ideas, to use language, and to learn?

When it comes to simple addition of multiple numbers who do you trust for the answer your bird,your dog, your fish, your self or your computer? How about multiplication, division or square root?

Who can schedule¬† appointments years in advance, remind you and tell you the date and time anytime they are asked? ¬†¬†It’s not your fish, cat, dog or bird; the best they can tell you is when it is time to feed them! ¬†That just leaves you or your computer and who do you trust to plan the date and remember it?

OK, now how about your taxes?  You would never trust the guidance of your pets for that one, the consequences are too dire so you only trust your self to do them right?  No way, you trust your computer to do your taxes. Do you check the results to see if the computer did them right?

Now for the pièce de résistance,when you write a letter to an important official, who is the one who checks your spelling and grammar?

NO I AM NOT TALKING ABOUT WHETHER A COMPUTER IS ALIVE OR NOT!

I am talking about intelligence!

tlb_0079268_largeWhen it comes to the need to dig and move earth what would you prefer a shovel or a tractor with backhoe and bucket?  

The tractor multiplies our arms and strength.

I can see !

I can see !

 

 When you have to see a great distance what do binoculars or a telescope do for you?

They multiply your eyes ability and vision.

What if you had to address 300 people in a room could you speak loud enough for them to hear you?

micnspeakers

I think not.

But I do not think there would be any problem if you had a microphone and speakers; that is unless you forgot to plug them in. ūüôā What does a microphone and speakers do? They multiply your voice !

When we come to the computer what is being multiplied?  YOUR BRAIN!

Intelligence is to reason, to plan, to solve problems, to think abstractly, to comprehend ideas, to use language, and to learn.

Which of these is¬†missing from your computer?¬† The use of language and to learn.¬† You just need to give the computer ears and start teaching it.¬† What do the ears look like?¬† The ears for the computer goes on your head not on the computer. ūüôā¬†¬†

headset_micCan a tractor do it’s job for you with a missing tire?¬† Sure but not as good as it could.

What greater things could your computer do if it¬†could understand your words and learn what you wanted it to do?¬† Which is faster for you to talk what you want or to type it?¬† Wouldn’t it be easier for you just to talk and have the computer do what you ask, even do your typing?¬† How about having the computer read it back¬†to you in a voice that you choose.¬† EVERY THING YOU CAN DO WITH THE MOUSE AND KEYBOARD CAN BE DONE WITH YOUR SPEECH!

To learn more about speech recognition in your Windows click start then help and support and type in speech recognition.

What is my computers name?

Well if you ask her she will tell you her name is Ima;

Ima Computer ūüôā

 


Wilted Flowers, Crumpled Giftwrapping and Tempfiles

March 15, 2009

wilted-flower

 

Do people really value and save wilted flowers or used crumpled gift wrapping or their computer temp-files? Yes.

How do I know?; because I am one such person.

The flowers that I have saved are not just any flowers, they¬†are flowers¬†whos’ petals have been moistened by my tears or¬†who carry within their fragrance the echos of a moment of great ¬†joy and laughter.

The same is for the few gift wrappings I keep. The wrappings were handmade to represent the gift from the heart of that little girl who gave the present to me. The wrappings could no more be thrown out then the gift could be.  

No I am not saying I have any emotional attachment to temp-files.

No. Wait a minute.

Is anger an emotion? How about frustration? Exasperation? Well then maybe I do ūüôā

Temp-files or rather temporary files are rather strange creatures lurking on your hard drive. They are not really bad but then again they are not really good either.

What are temp-files and how did they get there?

They are the gift wrapping of your files or like fresh flowers given on and for Valentines day.  

Rather then go into allot of techno-babel I will illustrate temp-files with a familiar simile.

Remember a certain Christmas day in your childhood when you awoke from sleep to run to the front room where the Christmas tree was, and how you  stopped when you entered the room and stared  at the wonder of all the beautifully wrapped presents and decorations? Then with a squeal of joy dove into the pile of presents looking for your name on them.

Then when all the presents had been divided up and you sat amongst the mountain of presents, you got the go ahead to open them and all mayhem broke loose! If you had 7 other brothers and sisters like I had you know it was crazy! Within minutes the floor could not be seen, hiden under the thick carpet of gift wrappings.temporary

Then the worst thing happened!

One of the toys is missing batteries. Remember the old adage of a “needle in a haystack” well here is the another “a toy part amongst the gift wrappings”¬† Every wrapping is lifted up and examined to find the batteries until they are found. THIS TAKES TIME!

Imagine if the the wrappings were never picked up and then the next Christmas came and doubled the amount of wrappings on the floor and now you had to hunt for the batteries.

Temporary files are just like the wrappings, valuable once then no longer.

Well this is what makes temp-files (temporary files) a problem. You see when you or I begin using a program or ¬†install programs or update the operating system or browse the Internet; temporary files are created. The are extremely important at that moment when they are madefor the function of the install or operation or usage but of no real value when that function, installation or operation is completed. Usually once that function, installation or operation is completed the temp-files are deleted, just like¬†the Valentine’s day flowers after 5 days or the gift wrapping after¬†Christmas day,¬†that is why they are called temorary¬†files. Well what happens if there is¬†a small problem or some other operating program interferes during the function, installation or operation? Well then the tempfiles are not erased. Then when you use that program, operation or function then the¬†WHOLE GROUP OF TEMPFILES¬†MUST BE SEARCHED BY YOUR COMPUTER!

THIS CAN TAKE A LOT OF TIME!

To speed up your computer delete the temp-files (temporary files). 

If you want to see the temporary files click start then run then type %temp% then press enter. Click on¬† the column heading “type”, which will place all the files in order of type. All the temp-files will have the extension of TMP. Don’t delete them now but close the window.¬†¬†

Now remember all programs as well as the operating system has temp files and its a bear to search them all out to delete them sooooo to get them all at once go to Start them Programs then Accessories then System Tools then click on Disk Cleanup.

temporary12

 

Here you can see that there are 307 Meg of Internet temporary files and 5 meg of WebClient/Publisher temporary files. Place a check mark in the box by clicking it for all the titles that have the word temporary in it. Then click at the bottom of the window the word OK.

Now all the temporary files from all the installs and updates and downloads will be removed.

Believe me new flowers should not be placed in a vase with wilted nor should new gifts be placed in the pile of used crumpled gift wrapping.

With the temporary files removed your computer will not be spending time going though the trash trying to find a file.

Now your computer is ready for new flowers (updates) and wonderful new gifts (programs)¬†now that the trash (Temporary Files) are dumped. ūüôā