Wednesday, November 23, 2011

Shopping for Office and Home Supplies in a Breeze

https://onlinemobileshopping2019.blogspot.com/2019/03/mivi-collar-wireless-neck-band.html
Have you ever experienced being in the middle of a printing job using your HP printer and then suddenly you run out of toner? No experience can be as annoying, right? Most probably, you try the print command again, hoping against hope that the prompt telling you to replace your HP Q7553X cartridge is just some sort of malfunction. Still the prompt appears; and by this time, you resort to restarting your PC but still to no avail.
You run to the nearest home and office supply depot, but unfortunately it has already closed five minutes ago. Your next option is the nearest 24-hour convenience, but the store clerk informs you with a smirk that they do not sell the HP Q7553X toner you are desperately looking for. So you are left with no option but to wait the next day for the depot to open, which can already be too late. These are not scenes from the movie A Series of Unfortunate Events because countless people have experienced the same situation in real life.
By shopping online for your home and office needs, you omit the above drama from printing. The following are advantages when you buy your supplies online:
1) Everything you need right in the palm of your hands. You will find all the supplies you are looking for when you go online. There are shops that also sell home and office furniture and appliance along with inks and toner.
2) Competitive pricing that enables you to save more. Basing on the law of supply and demand, you would expect that with all the online shops that sell home and office supplies, pricing becomes competitive. It is easy to compare which shops allow you to save more through special discounts and price mark downs they give.
3) Best customer service 24 hours a day, 7 days a week. You can contact the online shop anytime you have a problem. Want to return a toner because of ordering the wrong one? You can do so any time of the day. Do you need to ask how to install the toner as it is your first time to replace it? Then ask away and have your question answered instantly.
4) Only the latest technology in home and office supplies. Unlike stores that run physical establishments, online shops have a fast move out of products with customers all over the globe. You can then expect new and upgraded products to be released every time.
Best of all, you can shop right in the comforts of your own home. This will also allow you to save on your travel expenses as well as time and efforts spent in physically shopping for your supplies. So the next time you run out of HP Q7553X toner, let online shops like Q Supplies take care of your needs. You can even opt to order the two cartridges in one part number, which saves you money compared to buying them per piece. This will also give you a spare when you run out of toner.

Battle to the Death: Cheap Bargain Ink Versus Expensive Original Toners

The economic recession has brought in a generation more concerned with quantity more than quality. However, many are unaware that by focusing more on quantity, you also sacrifice quantity in the long run. Yes, you read it correctly. Giving more importance to quantity also sacrifices quantity.
The age-old debate about whether to choose cheap bargain inks over expensive original toner cartridges still has not been settled. So to end the agony of the printer-buying populace, who even until now do not know whether to choose printers that run on ink or those on toner (such as the HP Q7551A), the below arguments will lead to resolving the matter once and for all. Thus, this will allow you to make a sound choice the next time you buy a printer.
But before laying the arguments on the table, there is a need to differentiate between inks and toner. Ink cartridges have fluid or liquid in them and make prints by spraying the ink onto the paper. Toner cartridges like the HP Q7551A, on the other hand, are filled with fine powder and create an image through the burning of the powder onto the paper. So back to the arguments, the following are the information you need to soundly choose between cheap bargain inks and expensive original toner:
1) Crisper and shinier images. This makes the toner suited for printing for business aside from personal use. You would not expect to bring in more customers and/or clients with brochures printed using ink and look as if they were made by amateurs. In contrast, no matter what design you have for your toner printed brochure, it will always look professionally done.
2) Prints that last and do not easily smudge. Because ink cartridges are filled with liquid with impressions created through spraying, they can smudge easily when they get wet. Prints using toner cartridges, on the other hand, are more resistant to wetting because of being burned. You would also notice that ink printed outputs fade with time whereas toner outputs look good as new.
3) Malfunctioning of the printer after long time use. Those that manufacture cheap inks are not as trained to handle cartridges as those that make expensive toner cartridges. The latter are accredited and have to obtain certification for them to work with toner cartridges.
There are also those that sell re-manufactured or reused toner cartridges. These are less expensive than the original toner cartridges but still produce prints with considerable quality. However, you will notice that with long time use, your printer tends to show prompts that you are out of toner and you need to replace the cartridge despite using a new re-manufactured toner cartridge.

Robots! They're Not Just for the Movies Anymore

Growing up I always thought of robots as the creations of evil villains, all dead set on the destruction of the world. Where would I get such an idea? That big, mysterious metal thing in The Day the Earth Stood Still kept me awake nights. Dr. Smith's silly robot on Lost in Space wanted to be good in spite of his creator's evil intentions. In the 1921 play R.U.R. (short for Rosum's Universal Robots) by Karl Capek, humanoid robots -- again, evil -- take over the world. Incidentally, playwright Kapek coined the word "robot," which in Czech means "forced labor."
You'll want to come back to that one.
Those were characters, the products of creative minds -- fictional robots. Today's non-fiction, real life robots are mostly not trying to take over the world, nor have they been created by Dr. Evils. Most recent developments in robotics have totally benevolent purposes. (I have taken the liberty of diverting you to sites of specific robotic information that I find interesting.
Coming up, Robbie, Rosie, Klaato, R2D2 and C3PO!
Real robots do simple household chores. Working alone or together with humans, they also build intricate machines like cars and computers. And you can sleep easier knowing that new robots keep a constant lookout for danger, while others venture into dangerous or hard to get to places where humans can't or shouldn't risk going. Today's robots are all intended for good works. Saving lives, improving quality of life, saving time, saving money, fighting our wars, cleaning our floors and having our coffee ready when we wake up.
Although pretty much all of the grainy black-and-white pot boilers of the 50s portrayed robots as humanoid and vicious, a popular TV show from that era - and a blockbuster movie that came along a few years later - changed how we think of robots. The movie was of course Star Wars, with R2D2 and C3PO leading the parade of metallic movie creatures designed to do good for mankind.
Although The Jetsons was born in the 50s, when it comes to seeing the future of robots, The Jetsons is the hands down winner. Since it's fiction, and a cartoon, the Jetson family robots have individual personalities and quirks, but they were still there to make life simpler - cleaning, cooking, clothing care, office work - like a dream that seems to be coming true.
You may ask: What exactly is a robot? The Merriam Webster Dictionary offers three basic definitions:
1. a. A machine that looks like a human being and performs various complex acts (such as walking or talking) of a human being; also. a similar but fictional machine whose lack of capacity for human emotions is often emphasized; b. an efficient insensitive person who functions automatically; (we all know at least one)
2. A device that automatically performs complicated and often repetitive tasks;
3. A mechanism guided by automatic controls.
However you choose to define a robot, you know they're here to stay when respected universities offer robotics as a field of study.
Each year, there are more robotics design and engineering programs opening at colleges, universities and even junior colleges.
The list of the top programs is impressive, with Cal Tech, Carnegie Mellon and Colombia leading the list.
So, with all these creative robot nerds emerging with big ideas, just exactly what does the future hold?
Inventor Ted Chavalas has a good track record for having his finger on the pulse of the technological present and a crystal ball into its future. His original Panoscan MK-1 digital panoramic camera was designed with an image size capacity too large to be opened by any but the largest computers that were around in 1997; and dial-up Internet cowered at the prospect of transporting those 500 megapixel images across the web (fortunately Broadband caught up with Chavalas). Now he is introducing The Ferret, through Panoscan's General Robotics division. This is from the company's 100-word publicity blurb:
The Ferret is a remotely controlled camera robot, designed specifically for under vehicle inspection. Low profile, circular design, and movable lights and camera, allow The Ferret to move under any vehicle - sports cars to big rigs, night or day, to "ferret" out explosives, contraband, critical damage or leaks. With an offset range of 300 meters, The Ferret is the ideal "first robot in" for a wide range of security and preventative maintenance inspections.

Friday, December 17, 2010

CLR

Compilers and tools expose the runtime's functionality and enable you to write code that benefits from this managed execution environment. Code that you develop with a language compiler that targets the runtime is called managed code; it benefits from features such as cross-language integration, cross-language exception handling, enhanced security, versioning and deployment support, a simplified model for component interaction, and debugging and profiling services.
To enable the runtime to provide services to managed code, language compilers must emit metadata that describes the types, members, and references in your code. Metadata is stored with the code; every loadable common language runtime portable executable (PE) file contains metadata. The runtime uses metadata to locate and load classes, lay out instances in memory, resolve method invocations, generate native code, enforce security, and set run-time context boundaries.
The runtime automatically handles object layout and manages references to objects, releasing them when they are no longer being used. Objects whose lifetimes are managed in this way are called managed data. Garbage collection eliminates memory leaks as well as some other common programming errors. If your code is managed, you can use managed data, unmanaged data, or both managed and unmanaged data in your .NET Framework application. Because language compilers supply their own types, such as primitive types, you might not always know (or need to know) whether your data is being managed.
The common language runtime makes it easy to design components and applications whose objects interact across languages. Objects written in different languages can communicate with each other, and their behaviors can be tightly integrated. For example, you can define a class and then use a different language to derive a class from your original class or call a method on the original class. You can also pass an instance of a class to a method of a class written in a different language. This cross-language integration is possible because language compilers and tools that target the runtime use a common type system defined by the runtime, and they follow the runtime's rules for defining new types, as well as for creating, using, persisting, and binding to types.
As part of their metadata, all managed components carry information about the components and resources they were built against. The runtime uses this information to ensure that your component or application has the specified versions of everything it needs, which makes your code less likely to break because of some unmet dependency. Registration information and state data are no longer stored in the registry where they can be difficult to establish and maintain. Rather, information about the types you define (and their dependencies) is stored with the code as metadata, making the tasks of component replication and removal much less complicated.
Language compilers and tools expose the runtime's functionality in ways that are intended to be useful and intuitive to developers. This means that some features of the runtime might be more noticeable in one environment than in another. How you experience the runtime depends on which language compilers or tools you use. For example, if you are a Visual Basic developer, you might notice that with the common language runtime, the Visual Basic language has more object-oriented features than before. Following are some benefits of the runtime:
  • Performance improvements.
  • The ability to easily use components developed in other languages.
  • Extensible types provided by a class library.
  • New language features such as inheritance, interfaces, and overloading for object-oriented programming; support for explicit free threading that allows creation of multithreaded, scalable applications; support for structured exception handling and custom attributes.
If you use Microsoft® Visual C++® .NET, you can write managed code using the Managed Extensions for C++, which provide the benefits of a managed execution environment as well as access to powerful capabilities and expressive data types that you are familiar with. Additional runtime features include:
  • Cross-language integration, especially cross-language inheritance.
  • Garbage collection, which manages object lifetime so that reference counting is unnecessary.
  • Self-describing objects, which make using Interface Definition Language (IDL) unnecessary.
  • The ability to compile once and run on any CPU and operating system that supports the runtime.
You can also write managed code using the C# language, which provides the following benefits:
  • Complete object-oriented design.
  • Very strong type safety.
  • A good blend of Visual Basic simplicity and C++ power.
  • Garbage collection.
  • Syntax and keywords similar to C and C++.
  • Use of delegates rather than function pointers for increased type safety and security. Function pointers are available through the use of the unsafe C# keyword and the /unsafe option of the C# compiler (Csc.exe) for unmanaged code and data.

Bug Life Cycle

What is Bug/Defect?
Simple Wikipedia definition of Bug is: “A computer bug is an error, flaw, mistake, failure, or fault in a computer program that prevents it from working correctly or produces an incorrect result. Bugs arise from mistakes and errors, made by people, in either a program’s source code or its design.”
Other definitions can be:
An unwanted and unintended property of a program or piece of hardware, especially one that causes it to malfunction.
or
A fault in a program, which causes the program to perform in an unintended or unanticipated manner.
Lastly the general definition of bug is: “failure to conform to specifications”.
If you want to detect and resolve the defect in early development stage, defect tracking and software development phases should start simultaneously.
We will discuss more on Writing effective bug report in another article. Let’s concentrate here on bug/defect life cycle.
Life cycle of Bug:
1) Log new defect
When tester logs any new bug the mandatory fields are:
Build version, Submit On, Product, Module, Severity, Synopsis and Description to Reproduce
In above list you can add some optional fields if you are using manual Bug submission template:
These Optional Fields are: Customer name, Browser, Operating system, File Attachments or screenshots.
The following fields remain either specified or blank:
If you have authority to add bug Status, Priority and ‘Assigned to’ fields them you can specify these fields. Otherwise Test manager will set status, Bug priority and assign the bug to respective module owner.
Look at the following Bug life cycle:
Bug life cycle
[Click on the image to view full size] Ref: Bugzilla bug life cycle
The figure is quite complicated but when you consider the significant steps in bug life cycle you will get quick idea of bug life.
On successful logging the bug is reviewed by Development or Test manager. Test manager can set the bug status as Open, can Assign the bug to developer or bug may be deferred until next release.
When bug gets assigned to developer and can start working on it. Developer can set bug status as won’t fix, Couldn’t reproduce, Need more information or ‘Fixed’.
If the bug status set by developer is either ‘Need more info’ or Fixed then QA responds with specific action. If bug is fixed then QA verifies the bug and can set the bug status as verified closed or Reopen.
Bug status description:
These are various stages of bug life cycle. The status caption may vary depending on the bug tracking system you are using.
1) New: When QA files new bug.
2) Deferred: If the bug is not related to current build or can not be fixed in this release or bug is not important to fix immediately then the project manager can set the bug status as deferred.
3) Assigned: ‘Assigned to’ field is set by project lead or manager and assigns bug to developer.
4) Resolved/Fixed: When developer makes necessary code changes and verifies the changes then he/she can make bug status as ‘Fixed’ and the bug is passed to testing team.
5) Could not reproduce: If developer is not able to reproduce the bug by the steps given in bug report by QA then developer can mark the bug as ‘CNR’. QA needs action to check if bug is reproduced and can assign to developer with detailed reproducing steps.
6) Need more information: If developer is not clear about the bug reproduce steps provided by QA to reproduce the bug, then he/she can mark it as “Need more information’. In this case QA needs to add detailed reproducing steps and assign bug back to dev for fix.
7) Reopen: If QA is not satisfy with the fix and if bug is still reproducible even after fix then QA can mark it as ‘Reopen’ so that developer can take appropriate action.
8 ) Closed: If bug is verified by the QA team and if the fix is ok and problem is solved then QA can mark bug as ‘Closed’.
9) Rejected/Invalid: Some times developer or team lead can mark the bug as Rejected or invalid if the system is working according to specifications and bug is just due to some misinterpretation.

Difference between STLC and SDLC

STLC is software test life cycle it starts with 
1. preparing the test strategy
2. preparing the test plan
3. creating the test environment
4. writing the test cases
5. creating test scripts
6. executing the test scripts
7. analysing the results and reporting the bugs
8. doing regression testing
9. test exiting


SDLC is software or system development life cycle

phases are...
1. project initiation
2. requirement gathering and documenting
3. designing
4. coding and unit testing
5. integration testing
6. system testing
7. installation and acceptance testing
8. support or maintenance

What is STLC

STLC means it starts from the preparation of test plan, 
test case and ends with product release. Meanwhile we'l b 
involved in some other types of testing. Major tasks will b 
done in STLC are as follows,

1. Test Plan Preparation
2. Test Case Preparation
3. Execution of TC
4. Analyze the Result
5. Defect Report Preparation
6. Regression Testing
 

Thursday, December 16, 2010

What is HTTPS

Definition -

HTTPS (HTTP over SSL or HTTP Secure) is the use of Secure Socket Layer (SSL) or Transport Layer Security (TLS) as a sublayer under regular HTTP application layering. HTTPS encrypts and decrypts user page requests as well as the pages that are returned by the Web server. The use of HTTPS protects against eavesdropping and man-in-the-middle attacks. HTTPS was developed by Netscape.

HTTPS and SSL support the use of X.509 digital certificates from the server so that, if necessary, a user can authenticate the sender. Unless a different port is specified, HTTPS uses port 443 instead of HTTP port 80 in its interactions with the lower layer, TCP/IP.

Suppose you visit a Web site to view their online catalog. When you're ready to order, you will be given a Web page order form with a Uniform Resource Locator (URL) that starts with https://. When you click "Send," to send the page back to the catalog retailer, your browser's HTTPS layer will encrypt it. The acknowledgement you receive from the server will also travel in encrypted form, arrive with an https:// URL, and be decrypted for you by your browser's HTTPS sublayer.

The effectiveness of HTTPS can be limited by poor implementation of browser or server software or a lack of support for some algorithms. Furthermore, although HTTPS secures data as it travels between the server and the client, once the data is decrypted at its destination, it is only as secure as the host computer. According to security expert Gene Spafford, that level of security is analogous to "using an armored truck to transport rolls of pennies between someone on a park bench and someone doing business from a cardboard box."

HTTPS is not to be confused with S-HTTP, a security-enhanced version of HTTP developed and proposed as a standard by EIT.

Monday, December 13, 2010

Microsoft Dos Shut down Comman


Syntax
Usage: shutdown [-i | -l | -s | -r | -a] [-f] [-m \\computername] [-t xx] [-c "comment"] [-d up:xx:yy]
No args
Display this message (same as -?)
-i
Display GUI interface, must be the first option
-l
Log off (cannot be used with -m option)
-s
Shutdown the computer
-r
Shutdown and restart the computer
-a
Abort a system shutdown
-m \\computername
Remote computer to shutdown/restart/abort
-t xx
Set timeout for shutdown to xx seconds
-c "comment"
Shutdown comment (maximum of 127 characters)
-f
Forces running applications to close without warning
-d [u] [p]:xx:yy
The reason code for the shutdown
u is the user code
p is a planned shutdown code
xx is the major reason code (positive integer less than 256)
yy is the minor reason code (positive integer less than 65536)
Examples
shutdown -r -c "Rebooting for latest updates."
This would display a Windows System Shutdown window for 30 seconds, warning the user that the computer is going to shutdown and then restart the computer.
shutdown -i
Ran from either the command line or from the Windows run line this option would open the remote shutdown dialog Window.
  • If you are running Microsoft Windows 95, 98, NT, or 2000 and/or you wish to find out other methods of restarting or shutting down your computer from the command prompt,

Saturday, December 11, 2010

Windows Xp Short Cut Keys

What are shortcut keys and why are they used ?
Shortcut keys are a way of navigating certain menu's and features by using the keyboard instead of manually searching through various menu's. This can speed up the way you use your computer, all it takes is a little practice and getting used to.

How to use shortcut keys
Lets take the following combination - ctrl & a - this is the shortcut keys for selecting all text on the page.
To utilise this, first press, and hold down the ctrl key, then, while pressing down the ctrl key press the a key
This, if done correctly will now highlight all text on this page

Word of note:

i) Although this document is entitled for windows XP and above - a big majority of these keys will work under other versions of Microsoft Operating systems and are global keys.

ii) In this document I will be referring to the Winkey (Windows Key) to avoid any confusion please note that the winkey on certain keyboards (such as microsoft keyboards) is shown as the start key, on other keyboards it may simply have the windows flag logo imprinted onto it. The Winkey is the key next to the ctrl key on the left hand side of your keyboard

iii) This is not a comprehensive list - just a list of the most commonly used keys

List of shortcut keys and what they do

General Windows Shortcut Keys

F1 - Universal Help key - Works in all Microsoft based programs
F2 - Rename files or Folders
F3 - Opens up the Find dialogue
F5 - Refresh contents in current application

Winkey & D - This will mimimise all windows you have open and take you to the desktop. by pressing it again this can be reversed
Winkey & E - This will open up the Windows Explorer file browser window
Winkey & TAB - This will cycle through open programs through the taskbar.
Winkey & F - This will open up the windows search feature
Winkey & CTRL & F - This will open up the search for computers window.
Winkey & F1 - This will open up the Microsoft Help and Support Centre
Winkey & R - This will bring up the run box dialogue
Winkey & L - This will lock the computer and take you to the sign in screen

General Editing Keys

ALT & F - Opens up the file menu
ALT & E - Opens up the edit menu

Ctrl & A - Highlights all text
Ctrl & C - Copys highlighted selected text
Ctrl & X -Cuts highlighted selected text
Ctrl & V - Pastes text from clipboard into document
Ctrl & Z - Reverses last action
Ctrl & P - Brings up the print dialogue
Ctrl & B - Enbolden Text
Ctrl & I - Place text in italics
Ctrl & U - Underline text

Insert - Toggles between overtype mode and normal mode
Ctrl & Insert - Copys selected text
Shift & Delete - Cuts highlighted selected text
Shift & Insert - Pastes text from clipboard into document

Shift & Home - Selects the text from current cursor position to beggining of line
Shift & End - Selects the text from current cursor position to end of line
Ctrl & Left Arrow - Move the cursor backword one word
Ctrl & Right Arrow - Move the cursor forward one word

Home Key - Goes to beggining of current line
End Key - Goes to end of current line
Ctrl & Home - Goes to top of document
Ctrl & End - Goes to end of document

Other Misc Keys

Alt & Tab - Cycles through current open applications
Alt & F4 - Closes the current open application
Ctrl & Escape - Brings up the start menu
Shift & Del - When deleting a selected highlighted item - this will bypass the recycle bin
Holding Shift Key - While inserting a CD/DVD will bypass the auto play feature
F8 - While pressing this key on boot up will bring you to the boot up options screen - handy for entering safe mode