Loading

Thursday, January 28, 2010

The Minimum Hardware Requirements for Office 2010

Do you intend to use Office 2010? Check if you have hardware that meets the requirements requested Office 2010. Logically, should all be smooth only if Office 2007 can you run so far. But according to Microsoft, for Office 2010 should you have a GPU. Alex Dubec, a program manager in Microsoft Office, says that Office 2010 can even run on a netbook. In his blog, Debec admitted that nothing is more frustrating than having to buy new hardware every time. Microsoft released a new version of Office. In the last two Office releases, Microsoft is almost double the RAM and CPU requirements. The minimum system requirements for Office 2010 is an Intel Pentium III 500MHz, 256MB SDRAM PC100 and Windows XP Professional Service Pack 3. Compare with, Office 2003 is only a 233MHz processor and requires 128MB RAM.

You also need to devote more space on your hard disk. Compared to Office 2007 and Office 2003, Office 2010 consuming more disk space. This suite occupies 1GB - 1.5 GB of more space. This mark is because due to the code requirements of the Office 64-bit, the inclusion of OneNote and some free trial version of Office Professional 2010. Perhaps most disturbing is the demand for Office 2010 will be the processor Microsoft DirectX 9.0c-compliant graphics with 64MB video memory. This is needed to run the graphics in Excel and video integration feature in PowerPoint. Dubec said, computers with multicore processors will be faster to run Office 2010.

32-bit version of Office 2010 will be the way to the various operating systems 32-bit Microsoft, including Windows 7, Windows Vista Service Pack 1, Windows XP SP3, Windows Server 2008 and Windows Server 2003 R2 with MSXML 6.0. 64-bit version of Office 2010 will be the road to all 64-bit version of Windows 7, Windows Vista SP1, Windows Server 2008 R2 and Windows Server 2008. But will not work on Windows Server 2003 R2 with MSXML 6.0 or Windows XP SP3.

Achievement of LTE Data Rates for NSN and LG

The first data call speed data downlink LTE 100 MB / s for USB wireless modem has been reached grade 3. Numbers 100 MB / s is the maximum speed for the terminal LTE (Long Term Evolution) grade 3. This speed is a new achievement, after Nokia Siemens Networks (NSN) and LG Electronics completed the full LTE interoperability testing first 2100MHz frequency band.

In test LTE 100 MB / s, the call is made with NSN LTE radio equipment. This includes Multiradio Base Station, elements Evolved Packet Core network and software in accordance with the standard USB modem pre-LTE commercial from LG Electronics (LG). These data calls are also part of the Advanced NSN interoperability testing and Motorola in the frequency band 2100 MHz and 2600 MHz in the center of R & D LTE NSN in Oulu, Finland, and Ulm, Germany.

Terminal 3 class itself is expected to become the first commercial LTE terminal which is used widely by the end of 2010. In LTE, the user devices are grouped based on the potential speed uplink and downlink data.

Only 15 Million Active Users Twitter

Data from the company's online analysis and monitoring of performance, RJ Metrics, showed that Microblogging service Twitter is used by 75 million users. Just not all of them active. According to Roger Moore, founder and CEO of Twitter, the number of Twitter users jumped dramatically. Every month approximately 6.2 million new users register the service.

However, not all of their tweets that enliven the Internet. According to Moore, about 25 percent of that account did not have any followers, and about 40 percent have never tweets once. Four-fifths of users to tweet less than 10 times and only 17 percent of Twitter users who sent a message last December. Most of the passive Twitter user this is a new person who registered after the year 2008. However, according to Moore, lamalah users most often use Twitter.

"From the new account registration shows that Twitter is growing like a rocket and it's good. However, when examined further, the new user registration rate has been declining and many of these new users have never done anything with his account and this is bad. In addition, the percentage tweet sending account continued to decline during the last six months and was even worse, "Moore said. He added that with 75 million account, the number of active tweeters about 15 million.

Friday, January 15, 2010

Atomic Bomb Radiation Causes Stroke and Heart Disease

Research on atomic bomb survivors in Japan who carried out during 53 years show evidence that they have a high risk of stroke and heart disease due to radiation. British Medical Journal published a study that involves 86,611 survivors of the bombing of Hiroshima and Nagasaki in 1945, which forced Japan's surrender to the Allies, and marked the end of World War II.

The researchers note, every atom bomb victims exposed to radiation doses between 0 and 4 Gy (Gray) at the time of the disaster occurs. Gray is a unit for calculating the absorbed radiation using special equipment called a dosimeter, and the amounts vary in each person, depending on the location and protection at the time of the bombing occurred.

"This study provides the strongest evidence that radiation can increase stroke and heart disease dose sufficient (particularly 0.5-2 Gy), although the results below 0.5 Gy was not statistically significant," say researchers in Japan. He also argued, "Further research should provide precise estimates of risk at low doses." According to researchers, it is a public health problem is important, because the increasing use of various types of scanners Computed Tomography (CT) scan and high dose treatment procedures.

Treatment that uses radiation is usually measured in milligray (mgy). The average radiation dose of x-ray abdomen was 1.4 mgy (0.0014 Gy), whereas the abdominal CT scan was 8.0 mgy (0008 Gy), and pelvic CT scans of the 25 mgy (0025 Gy). Research led by Yukiko Shimizu Research of Radiation Effects Research Foundation in Japan, researchers monitored the victim survived from 1950 to 2003 and found that 9,600 people died from stroke and 8,400 people die from heart disease. Researchers found a high risk of stroke and heart disease at a dose of about 0.5 Gy, and the condition will appear at higher doses.

Increased Airport Security in the United States

The United States said it would increase security measures to respond to the airport threatened by Al Qaeda in Yemen, due to the failure of the bomb attack on Christmas Day. The passengers who visit the United States will face security checks more strict and police will be more air on the planes, said Interior Minister Janet Napolitano.

"We must remain vigilant about the threat that we face continue from Al Qaeda," said Napolitano. "We are increasing security measures to protect U.S. citizens. Some of these actions include increased checks at random, adding a federal air police on certain routes and increase the number of people suspected of terrorist surveillance system of our list."

The announcement follows extensive safety review of President Barack Obama, who conducted business in connection with the bombing of a trans-Atlantic jet on Christmas Day. Government officials, who did not mention their names said the move was announced Thursday is part of a broad awareness in the face of the threats that continue to be Al Qaeda who came from Yemen.

Government Obama faced harsh criticism for the failure of intelligence that allows a young man boarded the plane Nigeria Detroit goals, which are armed with explosives hidden in his underwear. Umar Farouk Abdulmutallab (Ufa), 23 years accused of trying to kill and use weapons of mass destruction; in Northwest airlines plane carrying 290 people from Amsterdam.

The attack was allegedly designed in Yemen, which makes the operations of Al Qaeda in the Arabian Gulf countries was the focus of attention. "I'm sure there will be no announcement of security measures in the future because we are still reviewing all the information we receive."

Canada earlier this week put the airplanes and the airports in the high alert after receiving "specific information" about the new threats. In the meantime, Napolitano warned the travelers who visited the United States that they must be prepared for delays.

"The traveler must provide additional time, especially if flying to the U.S. from abroad," he said. Although annoying airport security checks a lot of visitors to the United States, the actions of a more stringent common for U.S. citizens, said the polls recently.

Ring Solar Eclipse Seen in Indonesia

Although previously characterized overcast and drizzle, the visitors finally Bosscha Observatory, West Bandung-Indonesia, could see the ring solar eclipse, Friday. "Since the morning was overcast as if an eclipse will not be visible from Bosscha. But the natural scenario provides an opportunity for us to be able to witness the natural phenomenon that clearly," said a visitor Bosscha.



In an atmosphere of continued rain mists, suddenly at about 15:05 PM the sky over Lembang, Bandung, Indonesia was suddenly bright and allows a clear view of the sun. Such opportunity, visitors who previously sheltered at the Auditorium Bosscha and a few other places, flying directly into the open. Some buy glasses Mylar filter provided at the souvenirs on sale there. With subdistrict filters, residents can freely see the natural phenomenon of the park around Bosscha Observatory.

Some take advantage of some sun glasses provided by Bosscha that once held "open house" for visitors. Solar eclipse seen from Bandung and its surroundings is only 8.3 percent of the course. Although an eclipse can not tell in detail, visitors admitted satisfied. Eclipse occurred since at 14:35 PM until 18:55 PM.

Meanwhile, the sky overcast Bandung cause not all residents in the region could see a solar eclipse. However, residents gave an interpretation of a number of mosques in their neighborhood since at 14:30 PM until 16:00 PM. But natural phenomena was not until the activities disturb residents who continue to run normally. Residents and pedestrians occasionally look at the sun, but they admit that they could not see the eclipse due to clouds.

Friday, January 1, 2010

New Year's Celebration 2010

New Year's Eve celebration alive with a fireworks display around the world, with security tight done to prevent riots and security bullies., and New Year's Celebration 2010 in some countries so lively.

New Year celebrations in New York, United States centered on Times Square last festive. Promptly at 00:00 on Friday, the crystal ball glowing brightly colored spout with a shot that confetti streamers into the hundreds of thousands of visitors who thronged the area.

In Edinburgh, as many as 80,000 people celebrate it by following the Hogmanay, the annual street party. The festival is quite lively, though it must be against the cold. Colorful fireworks conducted in Edinburgh Tower.

In London, more than 200,000 people crowded the banks of the River Thames. They want to watch the fireworks from the London Eye, the Ferris wheel, opposite the British Houses of Parliament and Big Ben, the icons of London.

In Australia, approximately 1.5 million people crowded into Sydney Harbor, a beach area, to watch the fireworks launched from the iconic bridge, the Sydney Harbor Bridge, and four barge that was docked.

In Hong Kong, New Year's celebrations toned up with fireworks. Around 9000 fireworks released from the tallest skyscraper in the country and other buildings. Gleam of light emanating from the thousands of fireworks broadcast and aired on a giant screen and lasts for 5 minutes.

In Russia, more than 120,000 people gathered in Moscow's Red Square to celebrate the New Year toast. Russian President Dmitry Medvedev to thank the people who survive in the midst of economic crisis. "The year 2009 is not so easy for our country, and I want to thank you all together face this situation," Medvedev.

In Paris, about 70,000 people gathered near the Eiffel Tower for the fireworks of different colors. To secure the New Year's celebrations in this region, the local police mobilized 8000 personnel.

In Berlin, Germany, at least one million people gathered at the boulevard toward the Brandenburg Gate, a symbol of German unity. New Year's party scene enlivened by the music and DJ performances that make the party more festive.

As in Thailand, the fireworks are prohibited in the country after New Year's celebrations in 2009 to take its toll. Last year, as many as 69 people died after a fire caused by fireworks in a night club in Bangkok. New Year's Celebration 2010 reception was festive almost throughout the world.

Monday, December 21, 2009

Protect Mobile Devices from Malicious Attacks

What you have a mobile device? and use it to access the network at your office? If so, be careful. Did you know if the mobile device can become the entrance malware, spyware and so forth? This does not just harm the user, but also can steal important company data. This occurs when the tool you use to access corporate networks, which may not be protected.

"The device moves and the number of users who continue to grow creating a larger target for the software and may be dangerous, including worms, viruses, and spyware," said Sean Ryan, Research Analyst of Mobile Enterprise Software, IDC. "Along with the continued rise in the number of mobile devices and the increasing need for information technology, the company needs to secure and manage these devices and the information in it increased significantly."

According to IDC research institutions, the number of convergent mobile devices, including notebooks, the world continues to grow. This year, the number predicted exceeded 167 million units. This number will continue to increase, with estimates of more than 291 million units in 2013, and grew 14 percent per year in combined (CAGR).

The amount of potential damage has triggered Symantec announces security strategy and management of mobile services. The focus is the integration of security and management solutions to reduce downtime, increase user productivity, improve response time and provide protection and management throughout the life cycle of mobile devices, including while on standby.

"Organizations need the control and management of larger companies to protect information and ensure user productivity - with less cost," said Art Gilliland, Vice President of Enterprise Security Group, Symantec. "Our mobile service strategy designed to protect and manage data wherever and automate procurement and supply, providing care and protection continuously, and non-activate mobile device immediately when the device is lost, damaged, stolen, or replaced."

What kind of management and security strategy to move Symantec services? There are three products, namely:
• Symantec Endpoint Protection Mobile Edition 6.0. Provide protection through advanced antivirus, firewall, and SMS anti-spam protection.
• Network Access Control Symantec Mobile Edition 6.0. Keeping the network access policy enforcement and e-mail in MS Exchange with Symantec Endpoint Protection Mobile Edition. Equipped logging, reporting, and centralized alert.
• Symantec Mobile Management 7.0. Improve efficiency with the implementation of IT applications and updates wirelessly.

Security solutions and mobile device management are made based Symantec Symantec Management Platform, and provides integrated management capabilities for enterprise-class desktops, laptops, servers, and mobile devices. This allows administrators to set and distribute the centralized security policies to mobile devices wirelessly. Timely content updates can be done through integration with Symantec LiveUpdate.

Predicted Malware Attacks Increased in 2010

Security solutions developer Kaspersky Lab has warned the risk of malware attacks increasingly nasty next year. Several types of attacks is expected to rise to attack the middle platorm popular today such as Google Wave, iPhone, Android, and Windows 7.  "Malware is much more sophisticated in 2010 and many antivirus programs will slow in the treatment of the infected computer because the file infection method and rootkit technology is increasingly sophisticated," said Alex Gostev, Director of Kaspersky Lab's Global Research and Analysis Team in the press release. He said the IT security firm will respond by developing tools to more complex protection. But a malicious program is able to pass these measures may be more or less immune to antivirus programs for some time.

According to the company's experts, in the coming years we will see a shift in the kinds of attacks against users from attacks through web sites and applications to attacks originating from file sharing networks. Since 2009 a series of mass epidemic of malware has been supported by the spread malicious files via torrent portals. This method has been used to spread threats such as the famous and TDSS and Virut first backdoor for Mac OS X. In the year 2010, predicted a significant increase in the incidence of this type of P2P networks (peer to peer).  Cyberspace criminals will continue to compete in the Internet traffic. Modern cyberspace crimes generate more and more efforts to legalize themselves, and there are many ways to earn money online with traffic in larger amounts that can be generated by a botnet that disusupkan applications to multiple computers and is ready commanded from a distance. Currently, most of the black-market services to take advantage of competing botnet traffic.

In the future, Kaspersky predicts the emergence of more transactions botnet scheme, called "partners program" where possible botnet owners to generate profits from such activities, send spam, DoS attacks or spreading malware without an explicit crime. Parties who want to stay memanaatkan pay the amount equivalent conducted infiltration.  However, predict a decline Kaspersky Trojan variants that occurred in the year 2009 through fake antivirus programs. The latter appears first in 2007 and in 2009 and seen increased activity of their involvement in a number of major epidemics. For example, worms Kido, install rogue antivirus program in the infected computer. The reason, fake antivirus market is now saturated and profits for cyber crimes decreased. In addition, these activities are monitored by the IT security companies and agencies of law enforcement. It is difficult to manufacture and distribution of fake antivirus programs.

In addition, attacks on Web services happen, Google would seem Wave headlines in 2010. The attack on Google's new service is no doubt going to use the usual pattern: first, followed by spamming phishing attacks, and then mengeskploitasi vulnerability and spread of malware. Planned launch of Chrome OS-based network is a noteworthy event, but the experts at Kaspersky Lab does not anticipate the emergence of interest in excess of the platform of this virtual world of evil.  Year 2010 will also certainly more difficult for the iPhone and Android. The first malicious programs for mobile platforms emerged in the year 2009, which is a sure sign that they have aroused interest cyberspace criminals. The only iPhone users at risk are those who have compromised devices, but the same can not apply for Android users are all vulnerable to attacks. Increasing popularity of mobile Android OS in China combined with the absence of effective checks to ensure the security application software will cause a third party a number of malware outbreaks with a high profile.

Detection of new vulnerabilities will remain a major cause of the epidemic. This vulnerability will be detected in the software developed by third parties (such as Adobe, Apple, etc..) And on Windows 7, the new operating system just memasukki market. If no serious vulnerability is detected, the year 2010 may prove to be one of the quietest year for some time.  In the year 2008, analysts estimate the company's increase in the global epidemic. Prediction was proven true since the year 2009 appears malicious programs by function sophisticated rootkits, worms Kido also known as Conficker, web attacks, botnet, SMS fraud and attacks on social networks.

Wednesday, December 9, 2009

Business Cooperation Microsoft and Yahoo Finally Signed

Yahoo-Bing

The business search engine and online advertising between Microsoft and Yahoo finally signed. Both sides claimed to have completed all parts of the cooperation agreement and hope to implement it starting next year.

"Microsoft and Yahoo believe this agreement will create an alternative search engine services more sustainable and more attractive, providing real choices, better benefits, and innovation for consumers, advertisers, and publishers," the joint statement released last Friday.

Memorandum of understanding between the two sides earlier agreed in July between CEO Steve Microsot Yahoo Ballamer and CEO Carol Bartz. In cooperation, they agreed to work together for ten years to compete with Google which currently dominate the market search engine and online advertising.

One of the main agreement is the Yahoo search engines will use artificial Bing Microsoft on their site. Yahoo also will get a share of advertising revenue earned from the Microsoft business search engine and ad network. The agreement is a form of compromise from Yahoo acquisition bid by Microsoft, but it was rejected several times.

podcast directoryTopOfBlogsblog search directory Bloggers & Blogging Blogs - BlogCatalog Blog Directory

Strength of The Heroes of The City © 2008-2011, Template Source by template1st

TOP