Saturday, 28 September 2013

The first 200 words of this essay...

A report about Internet/intranet and server requirements


The internet server

An Internet server delivers WebPages to computers via a telephone or broadband connection called a dial up connection. This can be done to computers anywhere in the world as long as they are connected to the internet. An internet server has something called DNS enabling. This allows a website to be found from that websites own server e.g. when someone types www.microsoft.com, the website is associated to Microsoft server so the website is delivered to your computer screen.

The Intranet Server

The intranet server is similar to the internet server as it delivers WebPages to computers however it is for LAN (local area networks). This means the pages are private and run through localised cabling. The WebPages are not available to computers outside the LAN and dial up connections are not enabled.

Organisation the internet and intranet

Internets are organised by numerous internet servers connected through a permanent broadband connection. For protection the servers are protected from other computers putting viruses and harmful materials by firewalls.

Intranets are local so other computers outside the Local............

REF: PROJECT PROPOSAL FOR THE PLANNING, DESIGNING AND IMPLEMENTATION OF A FILE SERVER


Introduction:


A private entrepreneur Prof . Mukiibi Lawrence established St, Lawrence University in 2006, after critically observing what the existing universities in Uganda were not offering. One of his agenda was to establish a university that gives the skills to the students which enables the to create jobs instead of looking for Jobs. This is reason why he chose university motto as “light your candle”, His main emphasis is on the ICT technology and Entrepreneurship.

It started its operations in 2007 and right now, the pioneer students are in the final year. A lot of success has been achieved since its inception, however, it has met many challenges as well since the inception of St .Lawrence University, there has been a gap in centralised system for file database, where the lecturers could post the lecture notes, and students download them at the convenient time. 

Problem;
As it has been highlighted in the introductory part, although there many problems facing the university, The lack of the centralised file database is very critical in that it lead to the failure of the university objective and goals, In such way the when students don’t get enough study material it can degrade their performance . 

The current system on Lecture note distribution doesn’t inconvenience the students only but it also increases the cost as well to the university , Besides there could be a tendency when the attendant of the copier machine where notes are currently left, He may not be available , this leads to time delay which of course retards the lecture period.

The Benefits of file-server

A filer server is a high speed computer configured to receive requests , process and give service the other computers on the network. Basically a file server will able to store files of different faculties o the university, having a file server have several advantages

Background: How Proprietary Software Takes Away Your Freedom

Digital technology can give you freedom; it can also take your freedom away. The first threat to our control over our computing came from proprietary software: software that the users cannot control because the owner (a company such as Apple or Microsoft) controls it. The owner often takes advantage of this unjust power by inserting malicious features such as spyware, back doors, and Digital Restrictions Management (DRM) (referred to as “Digital Rights Management” in their propaganda).
Our solution to this problem is developing free software and rejecting proprietary software. Free software means that you, as a user, have four essential freedoms: (0) to run the program as you wish, (1) to study and change the source code so it does what you wish, (2) to redistribute exact copies, and (3) to redistribute copies of your modified versions. (See the free software definition.)
With free software, we, the users, take back control of our computing. Proprietary software still exists, but we can exclude it from our lives and many of us have done so. However, we now face a new threat to our control over our computing: Service as a Software Substitute (SaaSS). For our freedom's sake, we have to reject that too.

How Service as a Software Substitute Takes Away Your Freedom

Service as a Software Substitute (SaaSS) means using a service as a substitute for running your copy of a program. Concretely, it means that someone sets up a network server that does certain computing tasks—for instance, modifying a photo, translating text into another language, etc.—then invites users to do computing via that server. A user of the server would send her data to the server, which does her own computing on the data thus provided, then sends the results back to her or acts directly on her behalf.
The computing is her own because, by assumption, she could, in principle, have done it by running a program on her own computer (whether or not that program is available to her at present). When this assumption is not so, it isn't SaaSS.
These servers wrest control from the users even more inexorably than proprietary software. With proprietary software, users typically get an executable file but not the source code. That makes it hard to study the code that is running, so it's hard to determine what the program really does, and hard to change it.
With SaaSS, the users do not have even the executable file that does their computing: it is on someone else's server, where the users can't see or touch it. Thus it is impossible for them to ascertain what it really does, and impossible to change it.
Furthermore, SaaSS automatically leads to consequences equivalent to the malicious features of certain proprietary software.
For instance, some proprietary programs are “spyware”: the program sends out data about users' computing activities. Microsoft Windows sends information about users' activities to Microsoft. Windows Media Player reports what each user watches or listens to. The Amazon Kindle reports which pages of which books the user looks at, and when. Angry Birds reports the user's geolocation history.
Unlike proprietary software, SaaSS does not require covert code to obtain the user's data. Instead, users must send their data to the server in order to use it. This has the same effect as spyware: the server operator gets the data—with no special effort, by the nature of SaaSS.
Some proprietary operating systems have a universal back door, permitting someone to remotely install software changes. For instance, Windows has a universal back door with which Microsoft can forcibly change any software on the machine. Nearly all portable phones have them, too. Some proprietary applications also have universal back doors; for instance, the Steam client for GNU/Linux allows the developer to remotely install modified versions.
With SaaSS, the server operator can change the software in use on the server. He ought to be able to do this, since it's his computer; but the result is the same as using a proprietary application program with a universal back door: someone has the power to silently impose changes in how the user's computing gets done.
Thus, SaaSS is equivalent to running proprietary software with spyware and a universal back door. It gives the server operator unjust power over the user, and that power is something we must resist.

SaaSS and SaaS

Originally we referred to this problematical practice as “SaaS”, which stands for “Software as a Service”. It's a commonly used term for setting up software on a server rather than offering copies of it to users, and we thought it described precisely the cases where this problem occurs.
Subsequently we became aware that the term SaaS is sometimes used for communication services—activities for which this issue is not applicable. In addition, the term “Software as a Service” doesn't explain why the practice is bad. So we coined the term “Service as a Software Substitute”, which defines the bad practice more clearly and says what is bad about it.

Untangling the SaaSS Issue from the Proprietary Software Issue

SaaSS and proprietary software lead to similar harmful results, but the mechanisms are different. With proprietary software, the mechanism is that you have and use a copy which is difficult and/or illegal to change. With SaaSS, the mechanism is that you don't have the copy that's doing your computing.
These two issues are often confused, and not only by accident. Web developers use the vague term “web application” to lump the server software together with programs run on your machine in your browser. Some web pages install nontrivial, even large JavaScript programs into your browser without informing you. When these JavaScript programs are nonfree, they are the same sort of problem as any other nonfree software. Here, however, we are concerned with the problem of the server software itself.
Many free software supporters assume that the problem of SaaSS will be solved by developing free software for servers. For the server operator's sake, the programs on the server had better be free; if they are proprietary, their owners have power over the server. That's unfair to the operator, and doesn't help the users at all. But if the programs on the server are free, that doesn't protect the server's users from the effects of SaaSS. These programs liberate the server operator, but not the server's users.
Releasing the server software source code does benefit the community: it enables suitably skilled users to set up similar servers, perhaps changing the software.We recommend using the GNU Affero GPL as the license for programs often used on servers.
But none of these servers would give you control over computing you do on it, unless it's your server. It may be OK to trust your friend's server for some jobs, just as you might let your friend maintain the software on your own computer. Outside of that, all these servers would be SaaSS for you. SaaSS always subjects you to the power of the server operator, and the only remedy is, Don't use SaaSS! Don't use someone else's server to do your own computing on data provided by you.

Distinguishing SaaSS from Other Network Services

Which online services are SaaSS? The clearest example is a translation service, which translates (say) English text into Spanish text. Translating a text for you is computing that is purely yours. You could do it by running a program on your own computer, if only you had the right program. (To be ethical, that program should be free.) The translation service substitutes for that program, so it is Service as a Software Substitute, or SaaSS. Since it denies you control over your computing, it does you wrong.
Another clear example is using a service such as Flickr or Instagram to modify a photo. Modifying photos is an activity that people have done in their own computers for decades; doing it in a server instead of your own computer is SaaSS.
Rejecting SaaSS does not mean refusing to use any network servers run by anyone other than you. Most servers are not SaaSS because the jobs they do are not the user's own computing.
The original idea of web servers wasn't to do computing for you, it was to publish information for you to access. Even today this is what most web sites do, and it doesn't pose the SaaSS problem, because accessing someone's published information isn't doing your own computing. Neither is publishing your own materials via a blog site or a microblogging service such as Twitter or StatusNet. (These services may have other problems, of course.) The same goes for other communication not meant to be private, such as chat groups.
In its essence, social networking is a form of communication and publication, not SaaSS. However, a service whose main facility is social networking can have features or extensions which are SaaSS.
If a service is not SaaSS, that does not mean it is OK. There are other ethical issues about services. For instance, Facebook distributes video in Flash, which pressures users to run nonfree software; it requires running nonfree JavaScript code; and it gives users a misleading impression of privacy while luring them into baring their lives to Facebook. Those are important issues, different from the SaaSS issue.
Services such as search engines collect data from around the web and let you examine it. Looking through their collection of data isn't your own computing in the usual sense—you didn't provide that collection—so using such a service to search the web is not SaaSS. However, using someone else's server to implement a search facility for your own site is SaaSS.
Purchasing online is not SaaSS, because the computing isn't your own; rather, it is done jointly by and for you and the store. The real issue in online shopping is whether you trust the other party with your money and other personal information (starting with your name).
Repository sites such as as Savannah and SourceForge are not inherently SaaSS, because a repository's job is publication of data supplied to it.
Using a joint project's servers isn't SaaSS because the computing you do in this way isn't your own. For instance, if you edit pages on Wikipedia, you are not doing your own computing; rather, you are collaborating in Wikipedia's computing. Wikipedia controls its own servers, but organizations as well as individuals encounter the problem of SaaSS if they do their computing in someone else's server.
Some sites offer multiple services, and if one is not SaaSS, another may be SaaSS. For instance, the main service of Facebook is social networking, and that is not SaaSS; however, it supports third-party applications, some of which are SaaSS. Flickr's main service is distributing photos, which is not SaaSS, but it also has features for editing photos, which is SaaSS. Likewise, using Instagram to post a photo is not SaaSS, but using it to transform the photo is SaaSS.
Google Docs shows how complex the evaluation of a single service can become. It invites people to edit a document by running a large nonfree JavaScript program, clearly wrong. However, it offers an API for uploading and downloading documents in standard formats. A free software editor can do so through this API. This usage scenario is not SaaSS, because it uses Google Docs as a mere repository. Showing all your data to a company is bad, but that is a matter of privacy, not SaaSS; depending on a service for access to your data is bad, but that is a matter of risk, not SaaSS. On the other hand, using the service for converting document formats is SaaSS, because it's something you could have done by running a suitable program (free, one hopes) in your own computer.
Using Google Docs through a free editor is rare, of course. Most often, people use it through the nonfree JavaScript program, which is bad like any nonfree program. This scenario might involve SaaSS, too; that depends on what part of the editing is done in the JavaScript program and what part in the server. We don't know, but since SaaSS and proprietary software do similar wrong to the user, it is not crucial to know.
Publishing via someone else's repository does not raise privacy issues, but publishing through Google Docs has a special problem: it is impossible even to view the text of a Google Docs document in a browser without running the nonfree JavaScript code. Thus, you should not use Google Docs to publish anything—but the reason is not a matter of SaaSS.
The IT industry discourages users from making these distinctions. That's what the buzzword “cloud computing” is for. This term is so nebulous that it could refer to almost any use of the Internet. It includes SaaSS as well as many other network usage practices. In any given context, an author who writes “cloud” (if a technical person) probably has a specific meaning in mind, but usually does not explain that in other articles the term has other specific meanings. The term leads people to generalize about practices they ought to consider individually.
If “cloud computing” has a meaning, it is not a way of doing computing, but rather a way of thinking about computing: a devil-may-care approach which says, “Don't ask questions. Don't worry about who controls your computing or who holds your data. Don't check for a hook hidden inside our service before you swallow it. Trust companies without hesitation.” In other words, “Be a sucker.” A cloud in the mind is an obstacle to clear thinking. For the sake of clear thinking about computing, let's avoid the term “cloud.”

Dealing with the SaaSS Problem

Only a small fraction of all web sites do SaaSS; most don't raise the issue. But what should we do about the ones that raise it?
For the simple case, where you are doing your own computing on data in your own hands, the solution is simple: use your own copy of a free software application. Do your text editing with your copy of a free text editor such as GNU Emacs or a free word processor. Do your photo editing with your copy of free software such as GIMP. What if there is no free program available? A proprietary program or SaaSS would take away your freedom, so you shouldn't use those. You can contribute your time or your money to development of a free replacement.
What about collaborating with other individuals as a group? It may be hard to do this at present without using a server, and your group may not know how to run its own server. If you use someone else's server, at least don't trust a server run by a company. A mere contract as a customer is no protection unless you could detect a breach and could really sue, and the company probably writes its contracts to permit a broad range of abuses. The state can subpoena your data from the company along with everyone else's, as Obama has done to phone companies, supposing the company doesn't volunteer them like the US phone companies that illegally wiretapped their customers for Bush. If you must use a server, use a server whose operators give you a basis for trust beyond a mere commercial relationship.
However, on a longer time scale, we can create alternatives to using servers. For instance, we can create a peer-to-peer program through which collaborators can share data encrypted. The free software community should develop distributed peer-to-peer replacements for important “web applications”. It may be wise to release them under the GNU Affero GPL, since they are likely candidates for being converted into server-based programs by someone else. The GNU project is looking for volunteers to work on such replacements. We also invite other free software projects to consider this issue in their design.
In the meantime, if a company invites you to use its server to do your own computing tasks, don't yield; don't use SaaSS. Don't buy or install “thin clients”, which are simply computers so weak they make you do the real work on a server, unless you're going to use them with your server. Use a real computer and keep your data there. Do your own computing with your own copy of a free program, for your freedom's sake.

Wednesday, 25 September 2013

NEW INTERESTING FACTS ABOUT THE DREAMS :



  • THE DREAMS.
The human brain is responsible for many complex creations, but it can’t invent the image of people. So the “strangers” that you meet in your dreams actually have the faces of people who you have once seen in your real life but forgotten, like your childhood mailman or that guy bumped into on the side walk that one time. 
Chances are that you have  laid their eyes on more than a few individuals, and so the brain as a huge cast of characters to play with when you drift off to sleep. Except for in the case of extreme psychological disorder, every human being dreams. In fact, in a recent study, students who were awakened at the beginning of each dream but still allowed 8 hours of sleep, all experienced difficulty concentrating, irritability, hallucinations, and signs of psychosis in a span of three days. 
When they were allowed their REM sleep, their brains compensated for the lost time by increasing the percentage of the sleep spent in the REM stage. Dreams are a window into the subconscious. Even though most of the time, they’re completely random, disorganized, and we forget 90% of them within 10 minutes of waking up; many people have drawn inspiration from their dreams. Mary Shelly’s Frankenstein was a based on a dream that she had. 

  • THE BRAIN IMAGING.
  • Scientists at UC Berkeley have achieved a major milestone in their quest to create a technology that would let us tap into our brain's imaging systems. They used functional Magnetic Resonance Imaging  and computational models and they succeeded in decoding and reconstructing visual experiences of their test subjects. 
  • The tests they ran had people watching a movie trailer. Then, they reconstructed the images using their new technology. While that's as far as they can do right now, it puts them one step closer to being able to tap into your dreams.
  • The more noble implications for this technology will allow some sort of understanding, and even communication with people who cannot communicate verbally. For example, stroke victims, and people in comas. Check out the source if you wanna learn more about how they achieved this great feat.
  • Most people over the age of 10 have 4 to 6 dreams every night. Those numbers times 365 days in one year makes for between 1,460 and 2,190 dreams every year. We dream during REM periods (which is when we have Rapid Eye Movement in our sleep) which can range anywhere from 5 minutes to half an hour long. In the course of one night this happens multiple times.
  • "Wait a minute!" you might be thinking, "I don't remember having 4 different dreams in one night, and I certainly don't remember having over 1,000 dreams this year." The fact of the matter is, you forget between 95% to 99% of all the dreams you have. That may seem kind of high, but most of your dreams don't really interest you enough to make you want to remember them.

  • Dreams are commonplace and don't require enough concentration to force you to remember them. In that sense, they are similar to other routine actions you do throughout the day like driving or tying your shoes. You don't remember most of the time you do those things either. 
    Read more at 
  • The method is called "lucid dreaming," which means that you're aware of the fact that you're dreaming. That way you have the freedom to choose how your dreams go. In most cases people turn nightmares into good dreams or fly.

WHAT IS MEAN BY EARTH QUAKE?

An earthquake (also known as a quaketremor or temblor) is the result of a sudden release of energy in the Earth's crust that creates seismic waves. The seismicityseismism or seismic activity of an area refers to the frequency, type and size of earthquakes experienced over a period of time.
Earthquakes are measured using observations seismometers The MOMENTS magnitude is the most common scale on which earthquakes larger than approximately 5 are reported for the entire globe. The more numerous earthquakes smaller than magnitude 5 reported by national seismological observatories are measured mostly on the local magnitude scale, also referred to as the Richter scale. These two scales are numerically similar over their range of validity. Magnitude 3 or lower earthquakes are mostly almost imperceptible or weak and magnitude 7 and over potentially cause serious damage over larger areas, depending on their depth. The largest earthquakes in historic times have been of magnitude slightly over 9, although there is no limit to the possible magnitude. The most recent large earthquake of magnitude 9.0 or larger was a 9.0 magnitude earthquake in Japan in 2011 (as of October 2012), and it was the largest Japanese earthquake since records began. Intensity of shaking is measured on the modified Mercalli scale. The shallower an earthquake, the more damage to structures it causes, all else being equal.[1]
At the Earth's surface, earthquakes manifest themselves by shaking and sometimes displacement of the ground. When the epicenter of a large earthquake is located offshore, the seabed may be displaced sufficiently to cause a tsunami. Earthquakes can also trigger landslides, and occasionally volcanic activity.
In its most general sense, the word earthquake is used to describe any seismic event — whether natural or caused by humans — that generates seismic waves. Earthquakes are caused mostly by rupture of geological faults, but also by other events such as volcanic activity, landslides, mine blasts, and nuclear tests. An earthquake's point of initial rupture is called its focus orhypocenter. The epicenter is the point at ground level directly above the hypocenter.

Monday, 23 September 2013

HOW WE EARN THROUGH ADSENSE




THIS IS FOR EVERY ONE

WHAT IS USE OF COMPUTER.

WHAT IS MOBILE

THIS IS CALLED MOBILE BUT WE WANT TO KNOW NOT MEANING OR IMAGES OF MOBILE BUT WE WANT TO KNOW MOBILE FUNCTIONS AND FOR WHAT PURPOSE IT MADE FOR IT.
WHY PEOPLE NEED MOBILE SO MUCH AND WHAT REASON BEHIND THIS ?
IS MOBILE PHONE IS EVERYTHING OR NOT ?
THE PEOPLE USE MOBILE FOR WHAT PURPOSE.

ALL PEOPLE READY FOR MAKE THIS TOPIC HUGE COMMENTS BY YOU AND MAKE THIS TOPIC HIGH AND HANDSOME  LIKES AND COMMENTS FOR HELP THE BLOG TO FIND THE WAY..
                   THANKS TO ALL 

WHAT IS LIFE?

PLEASE COMMENT ON THIS TOPIC ...

Thursday, 19 September 2013

WHAT IS SOCIAL MEDIA.

  • TELL THE ADVANTAGE OF SOCIAL MEDIA OR DIS ADVANTAGE .

  • THE SOCIAL MEDIA IS PART OF LIFE OR NOT .

  • THE SOCIAL MEDIA FUN OR REAL .

  • IT HELP OR DESTROYED PEOPLE .


    PLEASE COMMENT ON THIS FOR EVERY ONE HELP...

HELP TO EVERY SINGLE PERSON....

  1. THIS IS THE MISSION OF THIS BLOG..
  2. IF YOU HAVE ANY PROBLEM JOIN THIS BLOG AND GET HELP.
  3. IN THIS BLOG WE HAVE TOPIC TOO.
  4. PLEASE HELP ME FOR TOPIC,SUGGESTION AND WE WILL SOLVED ALL PROBLEM .
  5. PLEASE DISCUSS ANY TOPIC.
  6. NOTHING IS IMPOSSIBLE SO TRY TO SOLVED ANY PROBLEM


  THIS IS THE MISSION AND GUIDE OF THIS PAGE 
          PLEASE LIKE THIS PAGE...