Thursday, November 30, 2006

Repairing a damaged CD

Why compact discs get damaged. Compact discs are all plastic. Compact discs are even not sensitive to magnetic fields as in case floppy disks, which never used to retain data when even a slight magnetic field is crossed with floppies. Then what is the reason why CDs get corrupted?

CDs work on the principle of reflection of light. CD drives have a built in laser that is used to read data. When laser is focused on to the CD the beam get reflected to a point when there is some data on that are i.e. 0 or 1 the points where light beam lands back is different which symbolizes the bit value.

When something on the CD breaks the path of the laser light, something like dust particle or something else like a FINGER PRINT!!!. Finger prints are nothing but natural oil from skin that sticks to the surface in contact with the skin in a pattern of skin cells. This oil or say fingerprint helps in refraction of light and loss of data to the reading source i.e. laser.

When CDs don't run the reason is because something is interrupting the laser to read the shinny side of the CD. But I have important data what should I do now?

Most of the times it is because of dust or fingerprints, you need to clean the CD.
You can clean your CDs with plain water or a bit soapy water. And it is better to clean the CDs after some time. But this doesn't mean you should start putting your CDs in dishwasher or washing machine every week.

All you need to do is to wipe the shinny side of the CD with a clean moist cloth and try running it again make sure the CD is dry before you run it.

People say about using all different sorts of things to clean CDs like toothpastes, wax polish etc. but I would recommend you to buy some CD cleaning kit. But if you still want to go try, do let me know the results.

And one thing I must add is that DVD work on the same principle and are bit more sensitive to dust and fingerprints. You can also use the above mentioned procedure for DVDs. But you need to be careful with DVDs.


Technorati Profile

Sunday, November 26, 2006

Remote Backup

Preservation of computer files is essential for the proper functioning of businesses, and therefore, remote backup is becoming a more popular option for many businesses and individuals. One crash can destroy essential files, which, if not recovered, can damage your company's reputation and its ability to function. Remote backup is a relatively inexpensive and easy way to make sure that your files never get lost. Although the best remote backup programs require an investment, in the long run, it is much cheaper and more efficient than hiring an individual to back up your files regularly. Unlike computers, individuals can forget.

The best remote backup programs are internet based, have a high level of security and a good support service. Remote backup usually works on the internet, LAN or ICP/IP network. The remote backup program sends the data to your offsite server. These files can be sent according to a schedule you set, or can be backed up automatically. If you have automatic remote backup, the job is done when the computer is not in use, perhaps in the evenings when there is no one in the office.

Your remote backup program should have version control system, which will make sure your list of file is being continually updated. If you have different versions of a file, you can select which one you want to keep or choose to backup all of them, since a good remote backup program has a lot of memory.

Security is an important concern when considering which remote backup system to chose. The highest quality systems have up to 8 cryptographic methods to conceal your information from hackers. This feature is essential if you have valuable financial information about your customers. In spite of the codes used to disguise your data, you will be able to access the information easily without confusion.

Remote backup works in two parts called the client and the server. The client chooses files to be backed up and compresses them so they can be stored more easily. The server delivers the information to the client through the internet and can use several modems at the same time while handling myriad internet connections. The client marks selected files and stores them in the proper places. These transfers occur quite quickly and the clients are mapped to certain drives, meaning that they know exactly where to send the information. It is possible to exclude some files from remote backup that are not needed, and the user can always pick and choose which files to save.

Many remote backup programs provide bigger backup for little extra cost, if needed. As you company grows, so should your backup, so it is good to know that expansion will not mean a larger priced tag. Disaster recovery systems are also commonly available with remote backup programs, and they will help your computer get up and running again after a crash.

It is a good idea to research on remote backup to decide which program is the right one for you. Perhaps you and your spouse run a small travel agency from your home; you will need smaller backup, but as your company grows, you will need to expand the amount of backup you use. The highest level of security is recommended for small businesses and banks alike, because the average computer user might be more vulnerable to hackers than larger organizations which hire technical staff who are well versed in this area.

Many remote backup programs offer free trials and demos, and it is a good idea to take full advantage of these offers before investing in the right remote backup for your home or office.

Saturday, November 25, 2006

The PS3 Games Mystery

The news is out: the PS3 games console is to be launched simultaneously around the globe in November 2006. But despite the grand global launch plan for the PS3 games console, there are doubts about its impact on the market. Even more, game analysts doubt if this global launch can help Sony regain lost market because of the earlier release of Microsoft's Xbox 360. There are also many speculations why the new PS3's launch keeps getting delayed.

Though Sony claims that the delays were due to digital rights management or DRM troubles, many analysts believe otherwise. Analysts pose more pressing issues as reasons for the PS3 games console's launch delays. Eiichi Katayama, an analyst from Tokyo-based Nomura Securities' Financial & Economic Research, suggests that the delays are probably caused by the slow progress of graphics chip development. Others offer reasons such as insufficiency of appropriate software titles. However, Sony is quick to dismiss these rumors and again reiterated the problem of DRM for their Blu-ray optical drive.

Blu-ray chips provide the new console with removable PS3 storage capacity that is five times bigger than the storage provided by DVDs of older consoles. Reports that PS3's Blu-ray and DRM feature are almost finished make them unlikely causes of delays. According to Katayama, ROM mark and BD+ licensing have already started which make copy protection technology an implausible reason. Analysts believe that if DRM technology really cause the delay, the profit from PS3 games console would not suffer too much. However, if the reasons are as they believe -- graphics chip development -- the sales impact would probably be the worst in Sony's history.

Sony contradicts the analysts' measure of the situation and denies that the delays set the PS3 games console and the company at a disadvantage behind Microsoft and Xbox 360. Xbox 360 hit the stores last year and is still the top gaming console according to market trends. Jennie Kong, Sony's European branch's PR manager, defends the company's strategy and claims that the company doesn't allow itself to be dictated by their competitors' moves. However, history supports the analysts' views of the matter. It can be recalled that Microsoft and Sony had once faced the same situation, only this time, Sony has the advantage with the early release of their PS2 over the first Xbox. Current Analysis' Steve Kovsky reminds that at that time, Microsoft suffered huge losses; clearly, Sony is slated for the same fate with PS3.

If Sony pushes for the November 2006 launch, it gives the Xbox 360 a full year sales advantage. However, the PS3 games franchise's problem does not end with the launch's delays. Rumors and news are circulating that even before its game console's launch, Sony is planning to outlaw its resale. Different sources claim that Sony plans to sell the new consoles with their own individual licenses. This effectively prohibits second-hand sales in person or in online shops like http://Amazon.com and http://eBay.com. In essence, buyers are only purchasing the license to use the consoles; Sony still holds the proprietorship of the product. Game analysts comment that this is a logical move, if proven true. Sony would need all the push it can have to increase the sales of individual PS3 units.

The company refrains from making comments about the allegations no licensing. They maintain that all important announcements have been made during the E3 trade show and all other announcements would be made on the PS3 games console launch. This announcement, instead of putting a stop to the rumor mill only fuel the fire. But as it is, there is nothing gamers can do but just play their PS3 games and wait.

Wholesale Video Games Distributor - Warning

You need to be prepared for the saturation of wholesale video games distributor phenomena that is going to take place and start appearing on the Internet in the following weeks when the Playstation 3 hits the stores in the first weeks of November of this year. Right now there are many buyers taking advantage of the eBay craze of selling Playstation 3 consoles at almost three times the current retail price that is due in launch day. The price of the Playstation 3 will be $600 for the premium package- can you believe what will happen when those PS3 consoles hit the market the hungriness that it will leave for many small based business online?

What I am trying to warn you about is that there will be hundreds if not thousands possible fake wholesale video games distributors that will try to start selling PS3 on the Internet at supposed wholesale prices and even below wholesale prices for such new consoles. While their will be many wholesale games distributors for the purchase of video games and even PS3 related material, as a power seller myself- I will not recommend touching sites that say that you can get Playstation 3 consoles and games at 50-80% in wholesale prices for numerous reasons.

While you can certainly buy wholesale games at 40-95% below the market retail value- you should not be able to purchase legit wholesale PS3 items below wholesale for at least the first 2 years. If you have study this wholesale market- you can compare what happened with PS3 biggest competitor. If you understand what happened here you should know that such giant corporations are not launching a huge stock of consoles in launching dates for numerous marketing reasons. If you remember what happened a year ago with such PS2 and now PS3 competitor, you will know what I am talking about.

You will certainly know that you cannot buy at 50-95% Playstation 3 in any way with direct online distributors or offline distributors or wholesalers. Why? Ask yourself why a company like Sony will allow the sell of wholesale items on their upcoming best-seller at wholesale prices? It is virtually unreasonable to give a seller permit to distribute and sell PS3 at way below retail prices. How do you think that the fortune 500 retail companies will profit from this boom? How do you think that all the companies and CEO owners that hold major stocks at their distribution line will feel if they do not receive a clear cut commission out of the sell of in-demand new market consoles if their were wholesale video games distributors selling below retail prices?

Again, in the sell of wholesale items both online and offline I can honestly say to you not to look for this wholesale hype prices that are not true for at least the next 2 years. It is of my sole experience and in my opinion to give you- the no, no when it comes to buying PS3 at real wholesale prices for at least the first year. A Power seller who earns thousands selling wholesale in combined business on the Internet and offline can confirm this for you. Use this article as reference and never as wholesale video games distributor legal advice or as a buying guide for online or offline business.

AntiVirus Software - Why Your PC Needs It

If your PC is connected to the internet for browsing the web or sending and receiving email, you need antivirus protection. This applies whether you have a dial-up connection or a high-speed connection such as DSL or cable.

The very fact that you are connected to a public network along with millions of others means that your PC is vulnerable. It is open to receiving thousands of little software programs that are specifically designed to either harm, disrupt, or exploit your computer.

Protecting your computer against malicious intruders

Any time you receive a file from some other source on the web, there is a chance that file will be "infected" with a virus, or will contain an attached bit of adware or spyware. That applies to viewing web pages, and receiving email messages. It also applies to downloading image, audio, and video files.

Email attachments are especially notorious for harboring viruses and malware. You receive a message that has an attachment beckoning you to double-click on it. When you do so, it installs a little program that resides somewhere deep within your PC, ready to do whatever it has been programmed to do -- whether that is spying and reporting on your computer habits, hijacking your home page and redirecting you to some other site, or popping up aggravating ads for gambling or pornography sites.

Viruses go well beyond that. They are intentionally designed to run programs that damage important operating system files, and usually have some way of exploiting your email program to send the infected message to hundreds of others in your contact list. That is why they are called "viruses" -- because they can spread like wildfire to thousands and even millions of computers.

Antivirus programs

Antivirus programs like Norton Antivirus 2006 were designed to do just what their name implies -- to guard against viruses. They do this by using a four part process. First when the anti-virus program is installed it "cleans" the system. Every file on your hard drive is scanned to see if it is infected. When an infected file is found it is either "quarantined" or deleted.

Second, the antivirus program stands guard and automatically scans any new files, email messages or web page files that are downloaded or copied to your computer's memory. If any of these files are found to be infected, the antivirus program blocks them from being copied.

Third, the antivirus program runs periodic scans -- usually every few days -- of your entire file system to make sure no infected files have made it past the automatic scan.

And fourth, the antivirus program has a system for being automatically updated. Since new viruses are being created every day, it is important to update your system of protection every day. Usually this is done by automatically downloading and installing updates to the virus descriptions.

Guarding against spyware

Spyware is a relatively new problem confronted by the PC owner. The point of spyware is to monitor your keystroke patterns and use this information for some commercial or advertising purpose. The spyware program is usually installed along with some freeware such as a music or video sharing program. The user does not consent to the installation and is often not even aware of it.

Some spyware programs are relatively harmless, but others can have a dramatic impact on your computer's performance -- even bogging it down completely.

Newer versions of an antivirus program such as Norton Antivirus 2006 detect and remove spyware, keystroke loggers and other unwanted monitoring software. They also come with regular updates to stop new spyware from infecting your computer.

Friday, November 24, 2006

How Do Wireless Networks Work?

Wireless networks work using radio waves instead of wires to transmit data between computers. That's the simple version. If you're curious to know what's going on in more detail, then it's all explained in this article.

I'm sure you know that computers transmit data digitally, using binary: ones and zeros. This is a way of communicating that translates very well to radio waves, since the computer can transmit ones and zeros as different kinds of beep. These beeps are so fast that they're outside a human's hearing range -- radio waves that you can't hear are, in fact, all around you all the time.

The way it works is a lot like Morse code. You probably already know that Morse code is a way of representing the alphabet so that it can be transmitted over radio using a dot (short beep) and a dash (long dash).More importantly for this example, though; it is a binary system, just like a computer's ones and zeros. You might think of wireless networking, then, as being like Morse code for computers. You plug a combined radio receiver and transmitter in, and the computer is able to send out its equivalent of dots and dashes (bits, in computer-speak) to get your data from one place to another.

You might wonder how the computer could possibly transmit enough bits to send and receive data at the speed it does. After all, there must be a limit on how much can be sent in a second before it just becomes useless nonsense, right? Well, yes, but the key to wireless networking is that it gets around this problem.

First of all, wireless transmissions are sent at very high frequencies, meaning that more data can be sent per second. Most wireless connections use a frequency of 2.4 gigahertz (2.4 billion cycles per second) -- a similar frequency to mobile phones and microwave ovens. As you might know, though, a frequency this high means that the wavelength must be very short, which is why wireless networking only works over a limited area.

In addition, wireless networks make use of a technique known as 'frequency hopping'. They use dozens of frequencies in the range they are given, and constantly switch between them. This makes wireless networks more immune to interference from other radio signals than they would be if they only transmitted on one frequency.

The final step is when it comes to all the computers on a network sharing Internet access. This is done using a special piece of wireless equipment called an access point. Access points are more expensive than wireless cards for one computer, as they contain radios that are capable of talking to around 100 computers at the same time, and sharing out access to the Internet between them. Dedicated access points are only really essential for larger networks, though -- if you only have a few computers, it is possible to use one of them as the access point, or you could just get a wireless router.

That's all well and good, then, but how does wireless equipment made by entirely different companies manage to work together when this is all so complicated? Well, the answer is that there are standards that all wireless devices follow. These standards are technically called the 802.11 standards, and are set by the IEEE (Institute of Electrical and Electronics Engineers). It is thanks to people sticking to their standards that wireless networking is so easy and cheap to use today.

Thursday, November 23, 2006

Apple Tiger vs Windows Vista

Microsoft’s next-generation operating system is coming in early 2007, offering improvements that are both impressive and unprecedented in the Windows world. On Apple’s side of the world, Tiger, the 5th incarnation of Apple’s legendary OS X operating system is still up to challenge as to what Vista has to offer, even if it’s already two years old.

Although Vista and Tiger are almost playing in the same field in terms of features and technology, there’s a major difference in the strategy that the two companies made in delivering their next-generation operating systems. Microsoft wanted to bring everything new and shiny to the table all in one big package, while Apple slowly built and perfected a world-class operating system by frequent, less dramatic, major upgrades. This explains why while Windows XP stayed for 5 years without a major upgrade, OS X had 3 major upgrades to its original incarnation in roughly the same time frame.

User Interface

The most noticeable improvements happen here, and rightfully so, since improvements in the user interface are the ones that affect the users first and foremost. Vista seems to have taken many pages from the Tiger book of slick features but also has some features of its own that’s missing from the Apple operating system. I think it’s fair to say that some similarities are really just inevitable end results of improving the current state of the UI in both platforms.

Vista’s icons are now as slick as its Tiger counterparts, supporting icon sizes of up to 256 by 256 pixels. Tiger on the other hand, currently supports only up to 128 by 128 pixel icons. But Vista takes it even further, using what is called as live icons. A live icon visually resembles the actual contents of the document it represent so that a folder’s live icon is shown as a folder icon padded with the thumbnails of the actual files that you’ll see inside the folder. This is very helpful in skimming through your files and folders without opening them. Tiger can only show previews of graphic files.

In Vista, the “My” way of naming user folders such as My Documents, My Music, etc. has been dropped. Now you will only have user folders named Documents, Music and Pictures. Not unlike what Tiger has.

Aero, the user interface of Vista brings to the Windows world lots of transparencies. Application windows in Vista show a translucent border that lets you see through it. This is a feature that OS X once had, but was taken out in Tiger.

Expose, which is perhaps the most innovative UI feature of Tiger, elegantly addressed the window-management problem most users had, especially those who work with lots of windows open. At the touch of a button or at a flick of the mouse, all your windows are miniaturized and smartly tiled across the screen. Vista offers its own take, with a feature called Flip 3D. In Vista’s version, windows are miniaturized and stacked on top of each other, and angled such that you can see enough of each window’s content distinctively, and you use the scroll wheel to go through all the stacked windows. Tiger’s implementation is more usable and convenient than its Vista counterpart.

Widgets vs Gadgets

In Tiger, the days of opening full-blown applications for simple, specific tasks have long been gone. Thanks to Dashboard. With Dashboard, you can install and run mini-applications called widgets that are specially designed (using a relatively easy language) for certain tasks. Widgets include calculator, stocks, dictionary, yellow pages and many others. At the touch of a button, all these can auto-magically appear when you need them, and as quickly, disappear to let you go back to what you’re doing.

Vista sports the same feature, only the mini-applications are called Gadgets, and the Vista version promises more integration with Microsoft’s online service http://Live.com.

Desktop Search

When Vista was first announced many years ago under the code name Longhorn, one of the most impressive promises that Microsoft made about the new operating system is its desktop search capability. However, Apple beat them to the punch in implementing the much needed search technology (and interface).

Tiger’s spotlight search won the hearts of analysts and reviewers when it debuted in October 2004. Both in the main OS’s shell and in the individual applications, Spotlight brought lightning-fast desktop search to the Apple users. The system-wide Spotlight item on Tiger’s menu bar provided a quick way of opening files and applications. With Spotlight, users didn’t need to know exactly where their files are since they can find and open them using a simple and single user interface – the spotlight search field. Vista’s desktop search also promises all the things that Spotlight has, including its integration with Windows Explorer and Control Panel, in the same way that Spotlight integrates with the Finder and the Preferences. In Vista, the desktop search has been placed in the improved Start Menu. Saved searches (in Vista) or Smart Folders (in Tiger) are different implementation of the same kind of innovative feature that both systems have – a way for creating folders that are defined by a certain search criteria, and the contents of which are files that match that certain criteria. Both are live-z.

Security

This is where Tiger has long beaten Windows, but with Vista, Microsoft want to change that, and perhaps even leapfrog what OS X is offering.

In Vista, Internet Explorer (the source of many security headaches) will run in a low rights mode to prevent malicious software entering through the browser from illegally writing files or changing the registry. Vista will also support computers with TPM (Trusted Platform Module) Chips which starts a computer in a secure way such that the hardware and applications are protected from being run by unauthorized users. One of Tiger’s security strengths, the feature that asks for the administrator password when changing critical preferences, has also found its way to Vista. When changing important settings or files, Vista now warns the users and asks for the administrator password. Both Tiger and Vista has support encrypting data on users’ hard disk.

Conclusion

This article tried to compare some of the different aspects of Windows Vista and OS X Tiger, wherever it made sense, since each has its own way of doing things. Tiger has been out for almost two years now, but still holds up its own against Vista. It’s no doubt that some of the features that Vista is promising are better than its Tiger counterpart, but Vista won’t be out until 2007, and by the same time Apple probably would no doubt have at least shown its latest weapon, the upcoming Apple OS X Leopard.

Adobe Photoshop

Adobe Photoshop is a graphics editor developed and published by Adobe Systems. It is the market leader for commercial bitmap image manipulation, and probably the most well-known piece of software produced by Adobe Systems. It is considered the industry standard in most, if not all, jobs related to the use of visual elements. It is usually referred to simply as "Photoshop". Photoshop is currently available for Mac OS and Microsoft Windows; versions up to Photoshop 9.0 can also be used with other operating systems such as Linux using software such as CrossOver Office. Past versions of the program were ported to the SGI IRIX platform, but official support for this port was dropped after version 3.

Although primarily designed to edit images for paper-based printing, Photoshop is used increasingly to produce images for the World Wide Web. Recent versions bundle a related application, Adobe ImageReady, to provide a more specialized set of tools for this purpose.

Photoshop also has strong links with other Adobe software for media editing, animation and authoring. Files in Photoshop's native format, .PSD, can be exported to and from Adobe ImageReady, Adobe Illustrator, Adobe Premiere, After Effects and Adobe Encore DVD to make professional standard DVDs, provide non-linear editing and special effects services such as backgrounds, textures and so on for television, film and the Web. For example, Photoshop CS broadly supports making menus and buttons for DVDs. For .PSD files exported as a menu or button, it only needs to have layers, nested in layer sets with a cueing format and Adobe Encore DVD reads them as buttons or menus.

Photoshop can deal with a number of different color models:

RGB color model
Lab color model
CMYK color model
Grayscale
Bitmap
Duotone
The most recent version, as of 2006, is version 9. This iteration of the program is marketed as "Photoshop CS2". "CS" reflects its integration with "Adobe's Creative Suite" and a number "2" because it is the second version released since Adobe rebranded their products under the CS umbrella. Photoshop CS2 features important new additions such as multiple layer selecting and "warp", a curve-friendly version of the transform tool. For the digital photography enthusiasts, the "reduce grain" filter can help to improve pictures taken in low light. In an effort to break away from previous versions of the application and to reinforce its belonging with the new line of products, Photoshop even dropped one classic graphic feature from its packaging: the Photoshop eye, which was present in different manifestations from versions 3 to 7. Photoshop CS versions now use feathers as a form of identification.

The latest version comes with Adobe Camera RAW, a plugin developed by Thomas Knoll which can read several RAW file formats from various digital cameras and import them directly into Photoshop. A preliminary version of the RAW plugin was also available for Photoshop 7.0.1 as a $99 USD optional purchase.

While Photoshop is the industry standard image editing program for professional raster graphics, its relatively high suggested retail price (US $600, approximately) has led to a number of competing graphics tools being made available at lower prices. To compete in this market, and to counter unusually high rates of piracy of their professional products, Adobe has introduced a Photoshop Elements, a version of Photoshop with many professional features removed, for under $100 US; this is aimed firmly at the general consumer market since the feature cuts make it less desirable for prepress work.

File formats
Photoshop has the ability to read and write many common raster and vector image formats. It also has several native file formats:

The PSD (Photoshop Document) format stores an image as a set of layers, including text, masks, opacity, blend modes, color channels, alpha channels, clipping paths, and duotone settings. This is a popular format that is even supported by some of Photoshop's competitors.
The PSB format is a newer version of PSD designed for files over 2 GB.
The PDD format is a version of PSD that only supports the features found in the discontinued PhotoDeluxe software.

Cultural Impact

The term photoshopping is a neologism, meaning "editing an image", regardless of the program used (compare with Google used as a verb). Adobe discourages use of the term [1] out of fear that it will undermine the company's trademark; an alternate term which leaves out the Photoshop reference is "photochop". The term photoshop is also used as a noun referring to the altered image. This is especially popular amongst members of the websites Worth1000, Something Awful, B3ta and where photoshopping is an institution. The goal of altering an image, subtly or blatantly, is to make it humorous or clever, often via the use of obscure in-jokes and pop culture references. Another widespread practice is putting the face of a celebrity onto a nude or pornographic image. Photoshop competitions in all these varieties have become a favorite pastime for many professional and amateur users of the software.

The term is sometimes used with a derogatory intent by artists to refer to images that have been retouched instead of originally produced. A common issue amongst users of all skill levels is the ability to avoid in one's work what is referred to as "the Photoshop look" (although such an issue is intrinsic to many graphics programs).

In recent times, Photoshop has been used for altering and drawing vehicles, usually cars, in a process known as 'photochopping', 'digital-modding', 'photoshopping' or 'virtual-tuning'. About twenty websites of this sort have been established in recent years. The rate of expansion of this 'new' type of art is phenomenal. Although the websites that provide a base for people to 'showoff' their 'chops' are fairly new, 'Photo-manipulated' cars have been in automotive magazines for years.

Even more recent is the so-called "sport" of Photoshop Tennis. A match in this hobby consists of two Photoshop artists passing back and forth (usually via email) a Photoshop image file. Each player will make changes to the file and send it back. After a predetermined number of turns an independent judge will review the edits made and declare a winner. This allows artists to both showcase and hone their Photoshop skills.

In the vein of Photoshop Tennis, artists also engage in collaboration. This hobby consists of two Photoshop artists passing back and forth (usually via email) a Photoshop image file (.psd). Each artist adds elements to the composition, working with the other to create an image. There is not usually an element of competition involved with such an activity.

With the rise of graphics tablets, most notably from Wacom, programs such as Adobe Photoshop and Corel Painter have been used more and more to create original pieces of art. Using the pressure sensitive tablet can greatly improve the effects of the paint brush, eraser, or other tools. Tablets are used worldwide by professional comic book illustrators, architects, studio artists, etc. Even ILM, the special effects company that worked for the Star Wars films, used tablets combined with Photoshop in post-production.

Development
The brothers Thomas Knoll and John Knoll began development on Photoshop in 1987. Version 1 was released by Adobe in 1990. The program was intended from the start as a tool for manipulating images that were digitized by a scanner, which was a rare and expensive device in those days.

Sunday, November 19, 2006

Should I Buy A Laptop Or A Desktop?

With the advances in computer performance technology moving forward in quantum leaps it has created some difficult questions for us, one is deciding between a laptop or a desktop.

Now, not only do we have the problem of our computers being outdated very rapidly but we also need to decide which route to take.

Let’s look at the pros and cons and identify what we will use our computer for so that we will be able to make an intelligent decision about it.

First let’s look at the laptop. Obviously the greatest benefit to a laptop that is glaringly apparent is the mobility. This allows you to always be able to take your computer with you to work, school, on vacation, etc. At the same time this portability also allows anyone else the ability to walk off with your laptop as well. If this happens, not only are you out a computer but you have also lost all the data you had on it as well so security is a concern.

Another issue is the price difference. While prices have come down, there will still be a good disparity in the price of a laptop to a comparable desktop so you have to weigh that out as well. The difference is usually $400 or $500. Do you need the mobility enough to pay the difference in price?

Another concern with purchasing a laptop is the availability of parts and how upgradeable the unit is. Don’t buy some off brand laptop that you won’t be able to buy parts for and don’t buy one that you can’t upgrade later.

A big issue for me is the size of the screen, yeah size matters. If you get a laptop with a small screen you will be aggravated, trust me. I have a 17” screen on my desktop and a 15” on my laptop and it really makes a difference. You can get a laptop with a 17” screen, it will just set you back a bit more in cash outlay.

So ask yourself these questions:

Do I mainly use my computer at home or do I need it at work or school?

Do I travel a lot?

Will I use the laptop?

Am I willing to pay more for the convenience?

Saturday, November 18, 2006

Preparing For Windows Vista

Windows Vista is the next major operating system release from Microsoft. This highly anticipated release not only has many new and exciting features but Microsoft have also improved the graphical user interface and given it a new visual style. Windows Vista, which is due to be released to the business sector in November this year, sports hundreds of new features, many of which are designed for use within the business environment.

Why should I care?

Windows Vista brings many benefits to small, medium and large organizations. New features such as “Desktop Search” and the “Windows Explorer” improvements make finding and using information easier and quicker than ever before. It is stated that over 30% of an employee’s day is spent trying to find information - these new tools will help to reduce that figure and increase productivity within your company.

As we move into an ever increasing “mobile age” it is becoming more important for employees to be mobile enabled. The “Sync Centre” feature of Windows Vista is at the heart of Microsoft’s desktop / mobile technologies. This application eases the pain of mobile device synchronization and ensures the whole process is completed securely enabling users to have a consistent view whether they are in or out of the office.

Windows Vista also has many new security features that will aid in defending against the vast number of security threats that are present today on the Internet. With improved “Windows Firewall” and “Windows Defender” technologies, defending against spyware and unauthorized access is transparent. “User Account Control”, which protects against admin users inadvertently changing settings, ensures that any malware or virus that get onto your system cannot change any settings without you first agreeing to it. There are many other security features including granular auditing/logging, improved security update tools and full disk drive encryption - all of which combine to create the most secure Windows ever.

What should I do to ensure a smooth transition?

1. Windows Vista requires almost 4 times the processing power as Windows XP so it is important to know that your hardware is up to the task. In order to ascertain this produce an asset report on all of your desktop machines. This should detail processor type and speed, the physical size of memory and hard disk(s), the type of graphics card installed and the amount of graphics memory it has.

2. Microsoft are going to release 6 different versions of the operating system so it is therefore important to decide which version meets your business needs.

3. Understand what machines will be compatible with Windows Vista and what machines will need to be upgraded or replaced.

4. Produce a report detailing all software applications that are used throughout the business. This report should detail the product name and version.

5. Understand any compatibility issues between your installed software and Windows Vista.

6. Ensure that your users know how to use the features in Windows Vista that will improve both productivity and ensure security/reliability.

The next steps

With the launch of Windows Vista only a few months away, it is important that you take action now. If you follow the steps outlined above, you will ensure that your transition to Vista is smooth and ensure that your business remains productive, reliable and secure.

Computer Virus And Internet Worms Explained

Is your computer sluggish? It won't open programs and you can't get into anything? Well, maybe you have a sick computer. Just as people get ill from viruses, so do computers. When this happens, you need to have a computer technician look at the computer to re-format and get rid of the virus. If you know something about computers, you might be able to do this yourself.

What is a Virus?

A virus is a parasitic program written to intentionally enter a computer without the user's permission or knowledge. The word parasitic is used because a virus attaches to files or boot sectors and replicates itself, which allows it to spread. Though some viruses do little more than copy themselves, others can cause serious damage or affect program and system performance. A virus should never be assumed harmless or left on a system.

Types of viruses

Viruses are classified by the ways they infect computer systems:

1) Program: Executable program files such as those ending with the extensions .Com, .Exe, .Ovl, .Drv, .Sys, .Bin
2) Boot: Boot Record, Master Boot, FAT and Partition Table.
3) Multipartite: Both program and boot infector.

What is Trojan Horse?

Besides being a large wooden horse used in the Trojan war 2500 years ago (and more recently by Brad Pitt), a Trojan Horse or Trojan is a computer program that seems innocuous or harmless, but conceals another more nasty function. Generally a Trojan is contained in a part of program brought into your computer from an outside source - (e.g. floppy disk, CD, internet download, infected email). Trojans can be dangerous sometimes. For example a program may appear to be a computer game demo, but while you enjoy the game, it may be happily formatting your hard disk or emailing porn sites to everyone in your email address book.

Trojans are also used as a 'back door' or 'trap door' to sneak into a computer's operating system's information. An example is a program that pretends to be the system log-in program (such as you find in Windows NT/XP or Linux). When an unsuspecting user tries to log-in, the Trojan program captures the user-name & password. Then it may indicate a failed log-in attempt and exit to the real log-in program. The user may successfully log into the system next time, but by that time Trojan has also got enough details to log into the system.

Example Trojans

Notroj. This Trojan horse pretends to be a program that guards against Trojans. It's actually a time bomb that wipes out the hard disk after it's more than 70 percent full.

PWSteal.Refest A Trojan Horse that installs itself as a BHO (Browser Helper Object) for Internet Explorer and steals online banking information when it is submitted in web forms.

PWSteal.Likmet.A A Trojan horse that displays a fake MSN Messenger logon window and steals the password provided.

Run.me. This is a graphics program, which plays the Star Spangled Banner and displays the American Flag while it worms its way into the hard disk and erases the data on it.

What is Worm?

A Worm is a self-propagating program that works its way through a system or network (like the Internet), often causing damage. It does not require a host program to activate it. Someone has to insert a worm directly into network of interconnected computers where messages can be sent from one to another and data files and programs exchanged. An example is a local area network where each computer has its own files, programs operating systems and hard discs such as would be found in a university or corporate setting.

Example Worms

Alarm Clock Worm. A worm that reaches out through the network to an outgoing terminal (one equipped with a modem), and places wake-up calls to a list of users.

Worm Watcher. A special program which automatically takes steps to limit the size of a worm, or shut it down, it grows beyond a certain limit. The worm watcher also maintains a running log recording changes in the

Friday, November 17, 2006

Hard Drives Size Does Matter

The hard drive disk of a computer is the primary storage device of the computer. It is a non-removable device that retains all the information when the computer is turned off. A fast hard drive supplies the computer with data as fast as it needs. Hard drives are measured in Gigabytes (GB) and the larger the number, the more storage the computer has. When looking at purchasing a new home computer or laptop, it is important to understand how the hard drive works with your computer and how much storage capacity you will need.

When saving information on your computer, the application is recorded on a magnetic platter inside the hard drive. Most hard drives have several platters that allow them to spin up to 15,000 times per minute. The amount of hard drive space the computer has will affect how much data that can be saved. The data on a hard drive can be deleted or erased from the memory at any time and does not need a constant power supply to save the information.

It used to be that hard drives were small and had a capacity of no more than 5 MB, now most new computers and laptops have no less than 40 GB. Some hard drive capacities can exceed 120 GB. Today, computers with these capabilities can store a massive amount of information, videos and photos without getting bogged down.

Choosing a hard drive can be confusing if you are not familiar with what to look for. Hard drives can have a very high capacity and they can be very small. It is important when looking at hard drive for your computer or laptop to know what you need. Performance in a hard drive can vary dramatically. There is nothing more frustrating than trying to save information and learning your hard drive is full. If you plan on using your hard drive to store a minimum amount of information, you may not need to spend the extra money on a bigger hard drive.

For storing large files, videos, music and pictures, your computer will need to be equipped with a larger amount of hard drive space. You can purchase 160 GB and bigger of hard drive space on most computers. The general rule of thumb for purchasing hard drive space is to purchase the largest amount of space you think you will need and that you can afford.

Price is another factor when choosing the right hard drive size. The most common size of hard drive for the money ranges from 60 to 80 gigabytes. These hard drive sizes are readily available on most operating systems. They are a good economical choice for computer users needing the computer for everyday storage and use.

Besides the size of the hard drive and purchase price consider access times and transfer rates when looking at hard drives. The transfer rate is how much data can be transferred per second. This can vary though, depending on the condition of the computer. A computer that is nearly full may have a much slower transfer rate.

Transfer rates come in either internal or external. The internal transfer rate is how fast the hard drive can read the data. The external transfer rate is how fast the drive can speed data to whatever it is connected to. Usually, the transfer rate will be a little slower than listed, so it is best to get a faster transfer rate. The external rate is link to the type of hard drive that the computer is using.

Be aware that hard drive speed is affect by the computer’s capabilities. If your computer is slow, a bigger and faster hard drive will do you little good. Also, if your computer is operating slowly, a bogged down hard drive may be the problem. If your computer system is running slow, deleting unnecessary files from the hard drive. Defrag is another option used to optimize slow hard drive systems.

Fragmentation of the hard drive occurs when the operating system breaks a saved file into separate pieces and stores them in other places. This usually happens when there is not enough room to store all the date. Defrag takes those stored file fragments and pieces them back together again. The process can be time consuming, but is a good way to optimize hard drive space and the speed of the computer.

Thursday, November 16, 2006

Online Games: How to Play to Win

Learn how to improve your playing quality and even overall understanding of online gaming and how you perform while playing online. Gaming online is a huge business nowadays and that means that there are millions of people worldwide at online game sites all the time. Many are people just like you and me that like to play online and have fun doing it. Some of these people enjoy it so much, that they often do not even care about improving their skill and raising their chances of winning.

So Why Should You Work on Your Game?
Working on skills will not only help you improve your success while playing online games but will also give you higher self-esteem and a sense of achievement. And remember that the faster you master the easy games, you can turn to the more complicated ones and match your brain and skills against the real experts.

How to Improve Your Online Gaming Skills?
Online playing is different than just playing on your personal computer at home. While online, you have to pay attention to many different things that need to be taken into account, and I will detail these here:

1) Internet Connection: Pay attention to your online connection and make sure that the internet connection is strong and without any connection breaks. These can be done easily by trying to play a simple online game before moving on to the more serious ones. For example, play scrabbles or checkers online and then see how your connection works.

2) The Graphics: Check that your PC screen is strong enough to run the specific game you have in mind. Download the trial and play it on your computer. If you can't run or if it does not run smoothly, be aware that though the online version is less of a strain on the resources of your computer, the game might get stuck or stall from time to time. What can you do? Other than spending money on improving the hardware of your computer, the only thing you can do is to pick another game.

3) Limit your game time: One of the most important facts that young players tend to overlook is that they cannot play forever. The body needs sleep and even though it might appear or one might not feel tired, your performance drops as the hours pass by. It is important also to (if the game permits it) try and drink water while playing and not Coca Cola or Pepsi or anything else sweet or alcoholic. These will only make you more sleepy than before even if for the first few minutes it will feel as if they are invigorating you.

4) Game Plans: Have a look at how others are playing before you join the fray. Study the manner how the game moves and how others hide or move. Even if you end up playing against other players, eventually the nooks and corners of the game are similar. Remember that people tend to move in similar fashion so the whole point is to get a whiff of game movement.

5) Strategy: Look up different strategic models and systems offered and posted on the internet. Your players might use some of these and if you are aware of them it will be easier for you to block their moves.

Conclusion:
By preparing yourself for the online gaming experience you do not lose anything. In fact, it works quite to the contrary. Think of it just like in terms of playing at online casinos and not at game sites. You would not play for money without researching it before, would you?

What You Need to Know About Networking

Because networking is a relatively young science, it borrows language from other disciplines. Many networking terms come from the realm of physical transportation—terms such as bridge, hub, port, routing, and switching. That borrowing is apt. Just as the transportation revolution, and especially the advent of the railroad, was an economic catalyst of the Industrial Age, networks are the economic catalysts of the information age. And just as railroads need a solid infrastructure, so do networks. The foundation technologies of networks are routing and switching.

The Basics

In its most basic form, a network consists of two pieces of electronic equipment that communicate data back and forth, connected by a third piece of equipment that enables that communication. A printer attached directly to a computer via a parallel or USB cable does not comprise a network; it becomes a network if the printer and computer are both attached to a switch or router. The Internet provided the impetus for most companies to adopt a network infrastructure. Even the smallest businesses need network-enabled Internet connections to send and receive e-mail, advertise and sell products and services online, interact with customers, and connect with suppliers. Moving to a networked environment opens new possibilities, including online business applications and collaboration opportunities. Data security also becomes a central consideration with a network. While switches and routers have evolved and the lines between them may seem blurred, one simple distinction remains: Switches reside within a local-area network (LAN), while routers are needed in a wide-area network (WAN) environment. It's analogous to an old-fashioned office phone: Switching is like dialing a four digit extension to reach someone in your building, while routing is like dialing 9 to get an outside line, and then dialing a seven- or ten-digit phone number.

Systems-Based Solutions

Growing companies, especially those opening new offices, can opt for integrated foundation solutions that are secure, solid, and compatible with future technologies. Rather than purchasing separate products for individual functions such as routing, switching, security, and Internet gateways, companies can choose a "systems-based" solution that provides everything a business unit needs to fully and securely connect to the Internet and the company as a whole. A systems-based approach to routing and switching lets all workers, even those at different sites, have the same access to business applications, Internet Protocol (IP) Communications, and videoconferencing as their colleagues at headquarters. Networking solutions for satellite offices tend to be modular in nature, allowing you to install just the features you need for a particular office. Modularity also enables you to upgrade equipment (rather than replace it altogether) when needs change or an office expands. An added benefit of this systems-based approach is that technical staff at headquarters can centrally manage the network, which keeps staffing counts low while providing reliable service to employees in all locations.

What to Watch For

Several trends in routing and switching are of particular interest to SMBs:

• Increasing need for Internet connections: Fully 70 percent of North American SMBs were planning to increase Internet connectivity and bandwidth during the next year, according to an April 2004 Forrester report.

• Improvements in routing and switching gear: For example, switches with in-line power, which allow placement of wireless LAN access points and IP phones anywhere there's a network jack, without external power.

• Managed networking technologies (especially switches): A managed switch allows the user or administrator can access it, usually via the network itself, to adjust or monitor its operation.

Bottom-Line Benefits

Routing and switching technologies can have a positive impact on your company's financial outlook. The Net Impact Study 2003, sponsored by Cisco Systems and conducted by Momentum Research Group found that companies that combined sophisticated network infrastructures with network-based business applications, and were willing to reengineer their business practices to take best advantage of the technology and actively measure the results, reduced their annual operating costs by more than 20 percent. What's more, they measured a 20 to 25 percent increase in customer satisfaction. Making informed purchase decisions about networking technologies can also save money in the long term. For example having a network that can support advanced technologies such as IP communications can deliver savings to SMBs in several areas:

• You can install a single network for both voice and data.

• You need to purchase and maintain only one set of equipment.

• You can reduce or eliminate toll charges between network sites

What To Do Next

Chances are good that you already have some networking technologies in place. The next step, then is to determine whether you have the right foundation for your company’s needs, both today and in the future. What you plan to do with the your network should drive your equipment purchase decisions. For example if you intend to run IP telephony, you need to buy routing and switching equipment that can support it.

A Guide Of Windows XP Optimization

Most likely, the main reason your system is dragging the ground is because of all the junk that runs in the background that you don't see. These are applications you may have installed over time.

To optimize the startup process you should follow the following steps.

You can free up hard drive space by deleting files and applications you don't use often. Running scandisk and Defragment are crucial to pc preformance. And try third party memory management programs.

Running scandisk will find and attempt to correct errors on your hard drive. System Defragment will free up hard drive space by re-arranging files in an orderly manner. This allows the CPU to find files much faster and not have to roam all over the hard drive to load files into memory.

Windows operating system have a utility named Msconfig that can display programs that bootup and instantly run on your computer. To start Msconfig, select Start - Run, and type "msconfig" in the Run dialog box. Msconfig does not show all programs running in the background however.

If you have Windows XP as your operating system, try to delete all files in the prefetch directory. Windows XP Professional monitors files that are used when the computer starts and when you start programs.

When Windows XP Professional monitors these files, it prefetches them. Prefetching data is the process whereby data that is expected to be requested is read ahead into the cache. Prefetching boot files and applications decreases the time needed to start Windows XP Professional and start applications.

Try to check to see if your computer and the CPU Chip are not overheating. Excessive heat will cause your system to perform much closer. Make sure your computer is well ventilated

A free evaluation copy of RAM Booster Expert can be found at: http://www.bodrag.com/ram-booster.html

What You Need To Know About Data Recovery

At some point in time, everyone who owns a computer will experience the trials and tribulations of hard drive failure. The reasons behind it vary, and could include everything from a human error to damages resulting from flood or water. Viruses can play a role as well, along with many other factors. For many years, the need to recover data that has been lost or destroyed has made data recovery such a very valuable asset.

Almost all hard drives can be recovered. Normally, if the drive is making a ticking or a scratching noise, you can use certain software programs to recover the data. Sometimes, due to age or bad parts, the aperture arm in the hard drive can fail, or the platters can become damaged and lose the data that they hold. If you can’t recover the information with software, you’ll need to send the hard drive off and have it either rebuilt or have technicians recover your data.

Data recovery is always an option, from hard drives that are 2 GB in size to the largest of over 300 GB or more of data. No matter what size hard drive you have, the data can generally be recovered. Keep in mind that if you’ve had a computer crash, you’ll need to send the hard drive off to have the data recovered by technicians.

One of the key benefits of data recovery is the fact that information can also be retrieved from the recycle bin as well. Partition recovery, and even information that has been lost somewhere on the disk can be retrieved as well. Even though it may seem like your data is gone forever - the technicians that specialize in data recovery can retrieve it.

From Windows to Mac, everything can be recovered. There are different filing structures and formats, including NTFS and FAT32. These are common Windows filing structures, and hold all of the information for your hard.

Those of you who have multiple hard drives in your computer, can rest assured that RAID configurations can also be recovered. If a single hard drive on the RAID configuration fails, the RAID setup will absorb the blow and there won’t be a loss of data. On the other hand, if the entire RAID configuration crashes, it will crash big time. Whenever this happens, you’ll need to send it off and have technicians restore both the RAID hardware and software.

Anytime your hard drive happens to crash or malfunction, data recovery is there to help you get back your files. Whether they are personally files or very important files that are need for business - you can put your trust in data recovery and know that you’ll get everything the back the way it was.

Buying A New Computer

Purchasing a home computer can be one of the most nerve-wracking experiences if you don’t do your homework first. Since most of us are non-technical, wading through all of the specifications and deciding what is right can be overwhelming.

While price is important, there are many other factors that should be considered when purchasing a computer. Doing research before entering your local office supply or computer store will help you from spending more than you wanted to and also get you the best deal on the quality that you need.

Spend some time thinking about how your computer will be used. Make a list of what needs that this computer will need to fill.

What software is an absolute necessity?

Will you need non-standard hardware like a scanner or fax in addition to your computer?

Are you more interested in word processing or gaming or both?

Thinking about what function your computer serves for all the members of your family will help you narrow down your choices.

After you’ve determined what function your computer serves in your life and the life of your family you will want to consider the speed of your new computer.

The Central Processing Unit or CPU is the brain of your computer. The CPU is the largest contributor to the overall speed of your computer. It controls all of the functions and capabilities that your computer will have.

The newest computers come with CPUs that range from 1.6 GHz to 3.2 GHz. If you are involved in graphics or want to play high-resolution computer games, you need the highest GHz that you can afford.

Another consideration is the memory or virtual storage space of your new computer. While computers are available with 128 MB of memory, you’ll want to have at least 256 MB on your machine. Memory is essential to achieving maximum speed and performance from your computer. It is recommended that you purchase your new computer with as much memory as you can get for the best price.

Memory upgrades can cost as little as $30, so if you need to build your system slowly over time it is certainly a viable option. You can always add more memory, but you can’t replace the CPU and increase your processing speed. If you have to choose between the two, go with a higher GHz processor and add more memory as you can.

The monitor can make a big difference in your enjoyment of your new computer. Although most people just accept whatever monitor comes with a computer package. However, it really does deserve more consideration.

Size is the most important factor. If you go any smaller than 17 inches, you may end up spending most of your time squinting and causing yourself unnecessary eyestrain. If you can upgrade your monitor to something larger, go for at least a 19-inch monitor.

Another option you may want to consider is getting a wireless mouse and keyboard. Going wireless with these necessary pieces of equipment will help to pare down the cords beneath your computer desk.

There are a ton of other options you need to consider when purchasing a new computer. It’s a good idea to ask people you know what types of options have worked well for them. Also, you do not need to purchase the very latest in computers. The best value is usually found with a computer that was brand new and the fastest thing going 6 months to one year ago. That is where you are likely to get the most bang for the buck. I hope this little guide has been helpful to you for buying your next computer.

How to Stop Computer Hackers In Their Tracks

You’ve heard the term hacker, you know they can cause damage and create havoc, but do you know what a hacker is? A hacker is a programmer able to get into a system or gain unauthorized access by skillful strategy. Hackers can be useful for maintaining a system and is constantly searching for security deficiencies. They can be the guardians of the security system. They also can turn that around and do more harm then good. A hacker is a skilled programmer who can write software expertly and swiftly. They can crack nearly any code and get into any computer system. Some of the more famous computer systems that have been hacked are corporations such as McDonalds, and federal websites that have extremely sensitive information. Highly skilled hackers have hacked into Griffith Air Force Base, NASA, the US Department of Justice, and the US Air Force. Hackers have their own underground network where they exchange triumphs and share techniques to hack into new programs or skirt any protective software.

How can you protect yourself and your computer against hackers? Your computer may not be NASA quality or have sensitive and confidential information like the Department of Justice, but it can cause you some problems. A good hacker can get into your computer, steal passwords, pin numbers or codes to your financial sites.

How do you stop this attack on your system? One of the most important guards you can have in place is a fire wall. A fire wall will help keep hackers from getting into your system and sending out your personal information. Antivirus software will scan incoming files and e-mails but a fire wall stands guard outside the system to block any communications or information exchanges from sources that don’t have your permission. If you use a high-speed Internet connection, you may have the same security concerns that any big organization or corporation has. It filters the information coming through the Internet connection. It can flag a packet of information that could potentially be harmful to your computer system.

Some systems come with a fire wall already installed; it just needs to be turned on once your get your computer set up. You can get separate software that will run in the background while you work, or you can get an external hardware fire wall that includes fire wall software. There are several fire wall software programs on the Internet that can be downloaded free. Be sure the sites you are using are trustworthy and have a good reputation.

How do fire walls work? A fire wall filters incoming data and lets only the ones considered safe to come through. Information is checked and is matched to specific defining characteristics. If these characteristics are not matched, the fire wall will not allow the information to go into your system.

Hackers also use Web browsers such as Netscape and Internet Explorer to get into your computer system. You can make your system more secure by increasing your online security. You can find the security feature by going to “Tools” or “Options” on your task bar.

A good fire wall can protect you from the creative ways that people use and misuse unprotected computers. It protects from remote login so a person can’t view or access your files or run any of your computer programs. It keeps hackers from hijacking your e-mail. Once a hacker gains access to an e-mail address, it can then use that address to send unsolicited junk e-mail to thousands of users.

E-mail bombs can be used as a personal attack on your personal computer. Someone sends you the same e-mail thousands of times until your e-mail system can’t accept any more messages. For someone who works from home this could be a catastrophe.

Spam is junk mail, usually harmless but it also often contains links to Web sites that may install a “cookie” on your system that creates a backdoor for a hacker to enter through.

Your newer system might also have free software that closes holes in the system that hackers can use. These patches can be found on the website for your system’s manufacturer and can even be set to be installed automatically whenever a new patch is issued for a newly found problem.