Loading


Add to Google

Tuesday, July 31, 2012

IBM PC vs. iPhone 4



The success of the IBM computer led other companies to develop IBM Compatibles, which in turn led to branding like diskettes being advertised as "IBM format". An IBM PC clone could be built with off-the-shelf parts, but the BIOS required some reverse-engineering. Companies like Phoenix Software Associates, American Megatrends, Award, and others achieved workable versions of the BIOS, allowing companies like DELL, Compaq, and HP to manufacture PCs that worked like IBM's product. The IBM PC became the industry standard.

While the iPhone 4 is a touchscreen slate 3G smartphone developed by Apple Inc. It is the fourth generation iPhone, and successor to the iPhone 3GS. It is particularly marketed for video calling (marketed by Apple as FaceTime), consumption of media such as books and periodicals, movies, music, and games, and for general web and e-mail access. It was announced on June 7, 2010, at the WWDC 2010 held at the Moscone Center, San Francisco, and was released on June 24, 2010, in the United States, the United Kingdom, France, Germany and Japan. The iPhone 4 runs Apple's iOS operating system, the same operating system as used on prior iPhones, the iPad, and the iPod Touch. It is mainly controlled by a user's fingertips on the multi-touch display, which is sensitive to fingertip contact.




Enhanced by Zemanta

Monday, July 23, 2012

Computer Invaders: 25 Infamous Viruses Over the Last 25 Years



A computer virus is a computer program that can replicate itself and spread from one computer to another. The term "virus" is also commonly, but erroneously, used to refer to other types of malware, including but not limited to adware and spyware programs that do not have a reproductive ability.

Malware includes computer viruses, computer worms, Trojan horses, most rootkits, spyware, dishonest adware and other malicious or unwanted software, including true viruses. Viruses are sometimes confused with worms and Trojan horses, which are technically different. A worm can exploit security vulnerabilities to spread itself automatically to other computers through networks, while a Trojan horse is a program that appears harmless but hides malicious functions. Worms and Trojan horses, like viruses, may harm a computer system's data or performance. Some viruses and other malware have symptoms noticeable to the computer user, but many are surreptitious or simply do nothing to call attention to themselves. Some viruses do nothing beyond reproducing themselves.

Computer Invaders: 25 Infamous Viruses Over the Last 25 Years
Infographic originally published on Mashable.com.Browse more Computer infographics.



Enhanced by Zemanta

Tuesday, July 10, 2012

iPad app transforms boring into entertaining



The iPad comes with several applications, including Safari, Mail, Photos, Video, YouTube, iPod, iTunes, App Store, iBooks, Maps, Notes, Calendar, and Contacts. Several are improved versions of applications developed for the iPhone or Mac. 

The iPad syncs with iTunes on a Mac or Windows PC. Apple ported its iWork suite from the Mac to the iPad, and sells pared down versions of Pages, Numbers, and Keynote apps in the App Store. Although the iPad is not designed to replace a mobile phone, a user can use a wired headset or the built-in speaker and microphone and place phone calls over Wi-Fi or 3G using a VoIP application. As of June, 2011, there were about 90,000 iPad specific apps on the App Store. The iPad cannot run the Xcode development suite since it uses iOS.





Enhanced by Zemanta

HTML 5 vs Flash



HTML5 is a markup language for structuring and presenting content for the World Wide Web, and is a core technology of the Internet originally proposed by Opera Software. It is the fifth revision of the HTML standard (created in 1990 and standardized as HTML4 as of 1997) and, as of July 2012, is still under development. Its core aims have been to improve the language with support for the latest multimedia while keeping it easily readable by humans and consistently understood by computers and devices (web browsers, parsers, etc.). HTML5 is intended to subsume not only HTML 4, but XHTML 1 and DOM Level 2 HTML as well.


While Flash manipulates vector and raster graphics to provide animation of text, drawings, and still images. It supports bidirectional streaming of audio and video, and it can capture user input via mouse, keyboard, microphone, and camera. Flash contains an object-oriented language called ActionScript and supports automation via the JavaScript Flash language (JSFL).

Flash content may be displayed on various computer systems and devices, using Adobe Flash Player, which is available free of charge for common web browsers, some mobile phones, and a few other electronic devices (using Flash Lite). 



by Wix. Browse more data visualizations.


Enhanced by Zemanta

Monday, July 9, 2012

How much can you store in the cloud?



Cloud storage is a model of networked online storage where data is stored in virtualized pools of storage which are generally hosted by third parties. Hosting companies operate large data centers, and people who require their data to be hosted buy or lease storage capacity from them. The data center operators, in the background, virtualize the resources according to the requirements of the customer and expose them as storage pools, which the customers can themselves use to store files or data objects. Physically, the resource may span across multiple servers.




Enhanced by Zemanta

The 5 W's of Tablet Users



A tablet computer, or a tablet, is a mobile computer, larger than a mobile phone or personal digital assistant, integrated into a flat touch screen and primarily operated by touching the screen rather than using a physical keyboard. It often uses an onscreen virtual keyboard, a passive stylus pen, or a digital pen. The term may also apply to a variety of form factors that differ in position of the screen with respect to a keyboard. The standard form is called slate, which does not have an integrated keyboard but may be connected to one with a wireless link or a USB port. Convertible notebook computers have an integrated keyboard that can be hidden by a swivel joint or slide joint, exposing only the screen for touch operation. Hybrids have a detachable keyboard so that the touch screen can be used as a stand-alone tablet. Booklets include two touch screens, and can be used as a notebook by displaying a virtual keyboard in one of them.



Browse more infographics.



Enhanced by Zemanta

Sunday, July 8, 2012

The Great App-splosion



Application software, also known as an application or an app, is computer software designed to help the user to perform specific tasks. Examples include enterprise software, accounting software, office suites, graphics software and media players. Many application programs deal principally with documents. Apps may be bundled with the computer and its system software, or may be published separately. Some users are satisfied with the bundled apps and need never install one. 

Application software is contrasted with system software and middle-ware, which manage and integrate a computer's capabilities, but typically do not directly apply in the performance of tasks that benefit the user. The system software serves the application, which in turn serves the user.




Enhanced by Zemanta

SSL vs. The Universe



Transport Layer Security (TLS) and its predecessor, Secure Sockets Layer (SSL), are cryptographic protocols that provide communication security over the Internet. TLS and SSL encrypt the segments of network connections at the Application Layer for the Transport Layer, using asymmetric cryptography for key exchange, symmetric encryption for privacy, and message authentication codes for message integrity.




Enhanced by Zemanta

Tuesday, July 3, 2012

Summertime & The Reading Is Easy



What, where and how are digital magazines making summer even more fun? Zinio shares some of the latest insights and reading trends.


by visually. Browse more data visualizations.



Enhanced by Zemanta

App Mobile vs Website Mobile



A mobile application (or mobile app) is a software application designed to run on smartphones, tablet computers and other mobile devices. They are available through application distribution platforms, which are typically operated by the owner of the mobile operating system, such as the Apple App Store, Google Play, Windows Phone Marketplace and BlackBerry App World. Some apps are free, while others have a price. Usually, they are downloaded from the platform to a target device, such as an iPhone, BlackBerry, Android phone or Windows Phone 7, but sometimes they can be downloaded to less mobile computers, such as laptops or desktops. For apps with a price, generally a percentage, 20-30%, goes to the distribution provider (such as iTunes), and the rest goes to the producer of the app. 

The term "app" has become popular, and in 2010 was listed as "Word of the Year" by the American Dialect Society. Technologist Michael Saylor has referred to the newer mobile app enabled smartphones as "app-phones" for their distinction from the earlier smartphone models. He states that these app-phones can support many applications and programming languages and should be considered computers first and phones second.




Enhanced by Zemanta

Sunday, July 1, 2012

How to Cat-Proof Your Computer



Protecting your computer is just one way of keeping your information safe from hackers. Also protect your computer from the things around it like your pet cat or dog. Your pet cat especially like to sleep over on things and one of them is your computer. By properly providing enough protection to your computer you are also protecting you pet cat from electrical shock.


Browse more infographics.


Enhanced by Zemanta

Here Are Some of My Most Popular Posts Since Day One.

If you like my blog Please Subscribes to my RSS Feed for updates and more

Rydertech

↑ Grab this Headline Animator


Subscribe via email

Enter your email address:

Delivered by FeedBurner
Your Email Will never be shared or Made Public

Related Posts Plugin for WordPress, Blogger...