Friday, November 28, 2008

Password Profiler 2 Automate Log-Ons and Fill Forms Faster

Utilities

Firefox and Internet Explorer both offer to save passwords for your favorite sites, but neither offer a comprehensive way to manage those passwords, nor a method to easily change the saved data. In addition, neither browser pre-fills your registration and checkout forms.

Password Profiler 2 is a complete rewrite of our automated password filler. This new version allows you to:
• Log into Web sites automatically
• Fill long registration and checkout forms quickly and easily
• Save logins to your favorite sites
• Share logins between IE and Firefox
• Maintain multiple profiles allowing you to fill forms based on your needs, like whether you want to use personal or business information

Password Profiler 2 features:
• An advanced artificial intelligence to properly fill forms
• Encryption to protect your passwords and data (if you choose)
• Non-intrusive password saving and filling (if you choose)
• Low resource use
• Support for IE 6, IE 7, and Firefox

Installing Password Profiler 2

When you install Password Profiler 2 (PP2), it will ask if you'd like to install the Firefox and IE add-ons. If you use both browsers make sure to select both. After the initial install, a wizard will appear to walk you through information about PP2. At the end of the wizard, it will let you choose if you'd like PP2 to automatically save forms with passwords and if you'd like to automatically fill forms that have been previously saved. Whatever you decide to choose now, you can always change your preferences from the Edit | Options menu in the program.

If you install the Firefox extension, Firefox will launch and ask if you would like to install the PasswordProfilerFF.xpi. Select Install Now and the Firefox Add-ons manager will appear with a button prompting you to Restart Now. Once you push the button, Firefox will be restarted and you will see the Password Profiler program icon in the bottom right corner of the browser. Clicking (left click) on the icon will display the Password Profiler popup menu.


If you install the IE add-on, the Password Profiler icon will appear in the toolbar of IE 6 when you restart it. In IE 7, Password Profiler will appear in the chevron ">>" menu in the toolbar.

Form Filling
Now that the program is installed, you can configure PP2 to fill in Web site registration, banking, and checkout forms. From within IE, click on the PP2 toolbar button; in Firefox, click on the PP2 icon in the status bar. A menu will appear providing five options:
• Fill form using profile… – this is used to fill a registration, bank, or checkout form with saved profile data you create
• Fill form using saved… – this is used to fill a login form with data saved from the last time you logged in to the site and saved the data
• Save form – this saves the login information and other data that you've enter into the form on the current Web page
• Launch Password Profiler – this opens the PP2 program window
• Lock Database – this locks the PP2 database preventing unauthorized access

Select Launch Password Profiler and the main window will appear. On the left side (labeled 1 in the picture below) is a tree showing a folder that contains a default profile called "Internet." This profile contains several items related to the profile. These items are:

• User – this item contains information about you or the alternate user you want to create. Fields include first and last name, date of birth, birth place, and gender
• Address – this item lets you enter the address, city, state, ZIP, and country for the profile
• Contact – this item contains all your phone numbers, e-mail address, and associated Web sites
• Credit Card – this item lets you enter card information like type, number, CVS, name on card, and expiration date
• Banking – this item enables you to enter information about your checking accounts
• Login – this item lets you enter the username and password that you commonly use when you register at a new site











You can create additional data items in each profile. For example, if you occasionally register at sites with your work address, you can create a new address item by clicking on the current Address item and selecting the New Address button that appears at the top of the profile tree. You could also right click on the profile or any of the data items and select Insert Address. You can then enter the information about the item (see 2 in the picture above). Each data item can be renamed for easy identification. For example, you might have a Home address and a Work address. You can also select which data item should be set as default by right clicking on the name and selecting the Set as default menu option. Default items are displayed in bold text and are listed first when filling a form.

Now that you've filled in profile data, you can quickly and easily register at sites, enter banking info, or check out quickly from online stores.

When you're done filling in your profile information, close PP2's main window and go to a site that you'd like to register at. Once there, click IE's PP2 toolbar or Firefox's PP2 status bar icon and select Fill form using profile… A dialog will appear allowing you to select a profile to use for filling the form. Select the profile and click OK. If you'd like to use a different set of data from the profile rather than the default data, for example your work address, just make sure to select the appropriate profile data before hitting OK.


Passwords
PP2 offers a lot of flexibility in how to fill and save passwords. In developing this utility, we found that everyone seems to like to have passwords handled differently. Some people like a window to pop up announcing that PP2 has a saved password for the page. Others, like me, prefer to take an action in order to save and retrieve the password.

In the Options dialog there is a tab that contains the settings for auto-saving and auto-filling. If you'd like to have PP2 automatically save forms that contain passwords, select the checkbox next to this option and then select whether you want PP2 to prompt you before saving or not. If you choose to have PP2 prompt you, a dialog box will appear whenever you submit a password to a new site.

Similarly, you can choose to have PP2 automatically fill pages with saved form data. If you select this option, you can also select whether it should do so with a prompt or without.

If you don't want to have PP2 do any auto-form filling or auto-form saving, you can perform these actions in two different ways. To save a form, select the Save Form menu item from PP2's menu or use a hotkey that you've assigned. To fill a form, you simply select the menu choice Fill form using saved… which allows you to select a pre-existing saved form, or you can use a hotkey

Password Profiler's Database
PP2 uses a database to store your profiles and logins. Occasionally you may want to perform maintenance on this database. In the File menu are four database-related options:
• Restore Database… – this opens a dialog to select an existing backup to replace the current one
• Backup Database… – this item allows you to select a location to back up the current database
• Database Info… – this lists information about the database, such as how many records are in the database and the last time it was backed up.
• Compact Database… – this allows you to shrink the size of a database that has gotten large over time and has had many records deleted. It is important to not interrupt the compaction process once started or else you risk corrupting the database

Additional Features

Master Password
If you use PP2 in an office or on a laptop, or perhaps if you're concerned about security at home, you can lock down PP2 so that it requires a password to use. From the Edit menu, select Edit Master Password… This opens a dialog that allows you to create a master password. It asks for the password, a confirmation of the password, and a reminder phrase to help you remember the password.

PP2 does not store your password anywhere on your system, or even in the program's memory, so it is imperative that you do not forget it. Lost passwords cannot be recovered. Because the password is not retained, you will need to enter the password whenever you launch the PP2 Editor, or a new browser session.

Reporting/Printing
You can print out all of your profiles and saved site forms. You can also create an HTML file to view them outside of the program. Simply hit the Print button in the toolbar and select if you'd like to include profiles and/or sites and if you'd like to hide passwords. Then hit the Print or Print to file button.











Window Style

PP2 also features a method to change the look of the program. From the View menu, select Application Look. The default look is Office 2007 Blue Style. However, you can select an appearance from eight other styles like Window 2000, Windows XP, Office 2003, and more.

Release Notes
PP2 is a complete rewrite of the original Password Profiler (PP). As such, it was not possible to extract the dataset from the original PP and import it into PP2. If you previously used PP, you will need to recreate your logins.

In order to provide more flexibility in matching passwords with sites, URLs stored in the database are not encrypted. This may be a concern to some people who choose to use a master password to lock down PP2. Please note that this does not affect stored passwords. They are still encrypted.

Password Profiler 2 does not support Authentication Dialogs. These are Windows dialog boxes that are displayed by your browser to prompt for user credentials. Password Profiler 2 only supports Web Forms at the current time.

PP2 has not been thoroughly tested with the beta version of IE 8. PP2 will probably need to be updated to function with IE 8 when IE 8 is officially released.

read more...

Thursday, November 27, 2008

Spyware Strike removal


spyware
This adware pretends to be a spyware removal tool, while in reality it fakes a spyware scan and tries to lure computer owner into buying it, to remove fake spyware entries it "finds". This software is a successor of the infamous fake anti-spyware tool SpyAxe. Keeping this adware on your computer is unsafe, because it continuously updates itself by downloading additional components that may expose the security of your computer even further.
This Adware is also known as:
SpywareStrike
Spyware Striker
Spyware Spyware Strike Information
Name: Spyware Strike
Category: Adware
Date: 2006-01-24
Dangerous: Yes

Below listed processes registry entries files directories are part of this spyware. To manually get rid of it, follow these instructions (at your own risk).

Spyware Strike Removal Instructions

Kill the following processes
spywarestrike.exe

Delete these registry entries
HKEY_LOCAL_MACHINE\SOFTWARE\SpywareStrike
HKEY_CLASSES_ROOT\AppID\SpywareStrike.exe
HKEY_CLASSES_ROOT\Interface\{66F0AC1C-DED5-4965-9E31-39788DF1B264}
HKEY_CLASSES_ROOT\Interface\{849E056A-D67A-431E-9370-2275F26D39B5}
HKEY_CLASSES_ROOT\Interface\{8B7AFBFD-631C-45BA-9145-F059EB58DD73}
HKEY_CLASSES_ROOT\Interface\{AFEB8519-0B8B-4023-8C15-FFB17D5225F9}
HKEY_CLASSES_ROOT\Interface\{BA9CC151-4581-438E-94AF-4C703201B7CA}
HKEY_CLASSES_ROOT\Interface\{BC74C336-FF2C-40C9-AD4E-3772C208406B}
HKEY_CLASSES_ROOT\Interface\{BDF00F24-A571-4392-95EC-04FDFF82A82C}
HKEY_CLASSES_ROOT\Interface\{C4E953E6-770E-4F59-A5E3-43E9F0D682E2}
HKEY_CLASSES_ROOT\Interface\{E0105E7C-D0C4-4DEA-AA21-B02F2960ECAF}
HKEY_CLASSES_ROOT\Interface\{ED39CB7C-1BF6-429B-A275-F183B4A3EFCB}
HKEY_CLASSES_ROOT\Interface\{F23AA637-31D5-4526-B5C6-9FF89E16202C}
Remove the following files
spywarestrike 2.5.lnk in Documents and Settings\User\Application Data\Microsoft\Internet Explorer\quick launch\
spywarestrike.lnk in Documents and Settings\User\Desktop\
spywarestrike 2.5.lnk in Documents and Settings\User\Start Menu\
spywarestrike 2.5 website.lnk , spywarestrike 2.5.lnk , uninstall spywarestrike 2.5.lnk in Documents and Settings\User\Start Menu\programs\spywarestrike\
signatures.ref , spywarestrike.exe , spywarestrike.url , uninst.exe in Program Files\spywarestrike\
english.ini in Program Files\spywarestrike\lang\
Remove the following directories
Program Files\spywarestrike\lang\
Program Files\spywarestrike\quarantine\
Program Files\spywarestrike\
read more...

Aze Search Toolbar removal

This summary is not available. Please click here to view the post.
read more...

Wednesday, November 26, 2008

FriendMobilizer for Windows Mobile Phone Users to Enjoy Full Access to Facebook

Mobile-DeviceMacrospecs Inc has brought good news to Windows Mobile phone users by unveiling a new software application, FriendMobilizer, which allows users to enjoy full access to their Facebook account while they are on the move. Keeping track with friends via the social networking website, Facebook, has become a new trend in this latest technological era.For avid travelers, they can access their Facebook via mobile phone to know their friends’ status, update information, etc. However, there seems to be a lack of good applications for Windows Mobile Phone users to enjoy this social networking website via their mobile phones. Thus, FriendMobilizer is introduced just in time.

FriendMobilizer allows Windows Mobile phone users to enjoy full access to their Facebook account. They can upload photos and information, view friends’ information and profiles, approve/deny friends’ requests, read messages, write on friends’ walls, get notifications sent directly to their home screen, etc. Unlike other Windows Mobile Facebook software applications such as Snap2Face, the features and functions available in FriendMobilizer are more comprehensive.

FriendMobilizer is a free application currently available for both Windows Mobile devices and Pocket PCs. Users can register their mobile phone numbers in the FaceofMobile website and download the free application. Stay tune with FriendMobilizer and enjoy your Facebook activities via your mobile phone.
read more...

Tuesday, November 25, 2008

LG Renoir (LG-KC910) Full Touchscreen 8 Megapixel Camera Phone


technologyThe well-known South Korean multinational corporation, LG Electronics has officially announced the availability of its new LG Renoir (LG-KC910). It’s the full touchscreen 8 megapixel camera phone which LG claims as the first handset created for the worldwide market to include Dolby Mobile, aiming to deliver full multimedia experience that stimulates the senses.

LG Renoir“Renoir is much more than a camera phone. It truly puts everything at your fingertips and provides a multi-sensorial experience through sight, sound and touch," said Dr. Skott Ahn, President and CEO of LG Electronics Mobile Communications Company. “The 8 megapixel camera is only one aspect of the phone. Its unique combination of features, including a full touchscreen interface, Dolby Mobile for Music and built in support for Wi-Fi and A-GPS, allow Renoir to be used in equally unique ways."


Impressive Features Of LG Renoir (LG KC910):

* Dolby Mobile audio processing technologies from Dolby Laboratories brings depth and richness as well as clean, powerful bass to deliver a more immersing and engaging listening experience for music
* High-resolution 8-megapixel camera with Schneider-Kreuznach certified optics, Xenon flash, auto and manual focus, sensitivity up to ISO 1600 as well as Touch Shot feature, which allows photographers to focus on any object by touching it on screen
* A-GPS enabled navigation and embedded GPS receiver for geo-tagging
* 3-inch WQVGA full touchscreen LCD screen
* Onscreen QWERTY keyboard
* Compatibility with latest 3G HSDPA networks and Wi-Fi

The new slim LG Renoir 8 megapixel camera phone which measures just 13.95mm thin and weighs only 110 grams is expected to hit European market by this month, followed by Asia, Latin America and CIS in coming November, but the price has yet to be announced.
read more...

Monday, November 24, 2008

Asus Offically Launched Worlds Faster PDA Business Phone - ASUS P565


technologyAsus has officially launched its new business PDA Phone, ASUS P565 that boasts an 800 MHz processor and claimed as the fastest business PDA phone in the world, posting Vsbenchmark scores almost two times of completing products in its class. It features Asus latest touch-driven user interface Glide. The stylish, leather-accented P565 is running on Windows Mobile 6.1 Professional.asus p565 pdaTo suite the business need, it comes with useful business application such as Push Email, Windows Live, MSN, Voice Commander and Microsoft Office Mobile and other useful application including Anytime Launcher, ASUS Today, ExiMusic, EZiPhoto, Business Card Recognition and PDF Viewer.

The Specification of ASUS P565 as below:

* Operating System: Microsoft Windows Mobile 6.1 Professional.
* Networks: HSDPA 3.6Mbps, UMTS 2100, EDGE/GPRS/GSM 900/1800/1900, Class 10.
* Display: 2.8″ TFT, 65K-color Touchscreen, VGA (480 x 640 pixels).
* Processor: Marvell TavorP 800 MHz.
* Memory: 256 MB Flash + 128 MB DDR SDRAM, microSDHC card slot.
* Connectivity: WLAN 802.11b+g , USB v1.1(FS), Bluetooth 2.0+EDR.
* Video Recording/Playback: MPEG4 (QVGA) 24fps recording/MPEG4 video at QVGA 30fps (or H.263 at QCIF 30fps) playback.
* Cameras: 3MP with Auto Focus (Main)/300 K Pixel for Video Telephony (sub).
* WAP Browser: HTTP / WAP 1.2.1/2.0.
* Standby Time: 250-300 hrs with 3G (around 200-250 hrs with 2G).
* Talk Time: 3 hrs with 3G (around 4 hrs with 2G).
* Dimensions: 102 mm x 60.5 mm x 16 mm.
* Weight: 120 g (with battery).

read more...

Sunday, November 23, 2008

Consolidate and Streamline Messaging Activities Using Mozilla’s Snowl

internetwork
Website has developed from a pre-defined information presentation platform in those early days to a more dynamic and communicative place. It has become a trend in this techno era whereby users are enjoying conversing or messaging facilities available online such as leaving comment threads, RSS feeds, forum, Twitter, etc. With an increasing variety of protocols and providers on this conversing activity, monitoring or keeping track of individual’s own conversations is harder. To make life easier, Mozilla labs have brought to Firefox users a new messaging experience via its newly released plugin, Snowl.
As highlighted by Mozilla Labs, Snowl is a prototype Firefox extension that integrates messaging into the browser based on a few key ideas:
1. It doesn’t matter where messages originate. They’re alike, whether they come from traditional email servers, RSS/Atom feeds, web discussion forums, social networks, or other sources.

2. Some messages are more important than others, and the best interface for actively reading important messages is different from the best one for casually browsing unimportant ones.

3. A search-based interface for message retrieval is more powerful and easier to use than one that makes you organize your messages first to find them later.

4. Browser functionality for navigating web content, like tabs, bookmarks, and history, also works well for navigating messages.

The overall idea of Snowl is quite creative and interesting. Mozilla has studied users’ need and it is of the opinion the marriage between messaging and feed reading will help users to streamline their conversing activities and make it more efficient. At this current experimental stage, the latest version of Snowl can only allow users to view their Twitter messages and RSS feeds. If you have downloaded and installed Snowl, you will notice Snowl allows users to view and read their messages in two ways: a traditional three-pane view which looks quite similar to most email clients format; and a River of news style view. See the photo below. Users can download this add-on via the link here.

Since this product is in its inception stage (version 0.1), problems are inevitable. Users should not be surprised if they have compatibility or other technical problems while using Snowl. There are bugs to be fixed and defects to be rectified.

read more...

Saturday, November 22, 2008

UserProfilesView v1.00

UtilitiesDescriptionUserProfilesView displays the list of all user profiles that you currently have in your system. For each user profile, the following information is displayed: Domain\User Name, Profile Path, Last Load Time, Registry File Size, User SID, and more. You can save the profiles list into text/xml/html/csv file.

System Requirements
This utility works with any version of Windows, starting from Windows 2000, and up to Windows Server 2008
Using UserProfilesView
UserProfilesView doesn't require any installation process or additional dll files. In order to start using it, simply run the executable file - UserProfilesView.exe
After running it, the main window will display the all of all user profiles. You can select one or more items, and then save the list into xml/html/csv/xml file.

Command-Line Options
/stext (Filename) Save the list of all profiles into a regular text file.
/stab (Filename) Save the list of all profiles into a tab-delimited text file.
/scomma (Filename) Save the list of all profiles into a comma-delimited text file.
/stabular (Filename) Save the list of all profiles into a tabular text file.
/shtml (Filename) Save the list of all profiles into HTML file (Horizontal).
/sverhtml (Filename) Save the list of all profiles into HTML file (Vertical).
/sxml (Filename) Save the list of all profiles to XML file.

Translating UserProfilesView to other languages
In order to translate UserProfilesView to other language, follow the instructions below:
1. Run UserProfilesView with /savelangfile parameter:
UserProfilesView.exe /savelangfile
A file named UserProfilesView_lng.ini will be created in the folder of UserProfilesView utility.
2. Open the created language file in Notepad or in any other text editor.
3. Translate all string entries to the desired language. Optionally, you can also add your name and/or a link to your Web site. (TranslatorName and TranslatorURL values) If you add this information, it'll be used in the 'About' window.
4. After you finish the translation, Run UserProfilesView, and all translated strings will be loaded from the language file.
If you want to run UserProfilesView without the translation, simply rename the language file, or move it to another folder.

License
This utility is released as freeware. You are allowed to freely distribute this utility via floppy disk, CD-ROM, Internet, or in any other way, as long as you don't charge anything for this. If you distribute this utility, you must include all files in the distribution package, without any modification !

Disclaimer
The software is provided "AS IS" without any warranty, either expressed or implied, including, but not limited to, the implied warranties of merchantability and fitness for a particular purpose. The author will not be liable for any special, incidental, consequential or indirect damages due to loss of data or any other reason.

Download UserProfilesView
read more...

Friday, November 21, 2008

Sony's Latest Laptop, Specially made laptop for women's

technologyThe main impact of technology on business, consumer buying cycle starts with a focus on women. Volvo, car design in mind, especially women, and women of all design team, in my wallet and a place to store a laptop, and better visibility on the type of climate have been reemployed in the car.

Audi TT Roadster based on the purchase day, I Audi's innovative development of the concept, I was drawn to me. Audi, the emblem was a good job in terms of rivets reflect the cycle, as well as integrated into the design of the car dashboard, may have little control.

Recently, a new Sony (NYSE: NAB) is another shop in Palo Alto in all rooms at home go to the opening of the latest news, I am all for clean design, integration includes an interesting layout ate impressed.

Sony Vaio
How can we have her husband's house, I have a big plasma TV, Vaio notebook computers, saw the most sexy - x505, discreet and stylish black matt silver mirror, a small bio-I is complete, the cover logo on the life of the battery 4 touch time, and start with sense of nickel and carbon tubes, the return of a small battery provides.

Procurement of all, the space between the core of the keyboard layout, albeit a small one for young women is very easy to work correctly, you should. 1,8 - pound weight and simply lists a large bag is ideal for Notes from the trip. I am to them, as well as the duty of a beautiful pair of shoes, and I felt the same way.
read more...

Thursday, November 20, 2008

Watch Video Via iPod

technologyThe iPod is already pretty versatile from audio books to recipes and photos; you can now watch movies and television shows. And of course, you can purchase and download them through iTunes! The 80 GB iPod is capable of holding 20,000 songs, 25,000 photos and now 100 hours of video or any combination thereof. Even television shows and iPod games can also be synchronized when you plug into iTunes.
Watching television and movies will drain your battery power, but you will get six hours of watching time on your iPod. Your regular laptop computer with a DVD drive might be lucky to get through the whole movie, but chances are your battery is going to die at the end of the movie. Video iPod will allow you to watch movies and TV shows while on the go and not have to worry about your iPod dying on you. The battery power makes the iPod great for flying, car rides or just sitting around bored at the office.

The new iPod interface makes finding a song out of 20,000 or a movie out of 100 hours easy. Synchronizing your video and television is easy through iTunes and you can always have the latest episodes or the newest movies. Search by name or genre and your iPod will bring the files to you.

The USB Power Adapter is handy and gives you the flexibility of charging your iPod when you're not connected to a computer. This is great if you are in a restaurant or airport and need to plug in for a little while and get some juice for your trip.

RoadTrip makes car rides easy as well. Say you are driving for twelve hours and your iPod is only going to last half of that time while you are watching movies and television shows. Combine your iPod with the RoadTrip and you can charge, listen to FM radio and your music. Everyone will love being able to watch movies and television shows while traveling by air or ground. RoadTrip works with all docking iPods except the 1st and 2nd generations.

The iPod Video Shield is also great for your video iPod. The shield is practically invisible and it will keep your screen clean without adding bulk to your iPod. It snaps on and off easily and allows all of your connectors to remain in place. This is really helpful if you are traveling with your iPod and to

read more...

Wednesday, November 19, 2008

What Makes Laptop Computers Better Than Desktop Computers?

tips-and-trickAlmost all of us would prefer using laptop computers rather than regular desktop computers. Why? Simple, because of the mobility it offers. There are actually more advantages that anyone can think of. Every user has a different experience with laptop computers and one can simply add an advantage while using it. But all of us share the same story that we are blessed with the invention of such machines.


Laptop computers offer mobility. Designed to work on batteries and direct electricity from wall outlets these are truly advantageous for someone who is always on the go. Who would want to bring a desktop on a plane? Without laptops monitoring businesses miles away would be difficult. This feature of a laptop gives us the freedom and ability to use computers anywhere. Be it in a restaurant, in a car or places we feel comfortable, we can use laptops as long as we do not disturb others and go beyond rules.

Unlike desktop computers, laptop computers are compact and may contain features that an ordinary computer set may not have. Built-in camera, speakers, Bluetooth, WiFi device, and infrared are among the features you would not normally see on desktop computers. All these features when added to a desktop computer require individual purchases and manually installation for both hardware and software.

What makes it more exciting is the processing power that laptop computers offer. Do you think laptops can give you the computing power you see while using desktop computer, considering the size and weight of a laptop? I tell! You will definitely get the same computing power. Though built in smaller sizes, architecture and components in laptops are similar to what desktop computers are made of. If Intel Core Duo can be used to run desktop computers, then it can also be used to run laptop computers. Size does actually matter, but this does not affect the performance it provides.

There may be differences with some features such as the display, but both offer good qualities. Laptop computers also save a lot of energy. Display for a laptop does not require that much electricity compared to CRT or LCD monitors for desktops. Since it's designed to work with batteries, one can still have the convenience of working even without the presence of electricity coming from the wall outlet.

Newest addition to the family of mobile computing is the ultra portable laptop or tablet. These super small and powerful computers have emerged to revolutionize computing. Providing extra convenience in mobility because of its size, this type of laptop is ideal for individuals who are also on the go. Aside from its tiny feature this comes into affordable prices that anyone can afford. Teachers wanting to use a different medium in teaching can use these devices. Buying these ultra portable laptops does not hurt someone's budget.

If you want to know more about laptops or printer then please feel free to visit http://www.Superwarehouse.com


read more...

Tuesday, November 18, 2008

RegistrySmart Registration

tips-and-trickI was online the other day and happened to come across something amazing, RegistrySmart registration. Now I really have nothing to do with this other than to let everyone know how excited I am because it worked and saved me hundreds of dollars. That's right I finally found a product on the internet that did exactly as it claimed it would.


If you are wondering what I am talking about then sit back and listen for a couple minutes. My computer has been so sluggish the last couple of weeks that I was worried about what I was going to do. I knew I couldn't afford a new computer and I was really having a tough time justifying the 300$ especially when they told me that would be the minimum and there was no guarantee that would fix the problem. I also knew I couldn't be without my computer but by now on an hourly basis the thing was getting harder and harder to use. Then I came across RegistrySmart registration.

RegistrySmart registration claimed that it would do a free analysis on my computer and then I could decide if I wanted it fixed. The cost was so minimal that I was having trouble believing something like this would work. Well I decided to go ahead with the free scan and was in awe at what I was being told. No wonder my computer was running so slow. The scan was claiming that I had over 400 errors that needed to be fixed. It also guaranteed that it would fix every error that was making my computer so sluggish. I had a decision to make but for less than 20 bucks I thought I really had nothing to lose and I was at my wits end anyways.

It turned out that RegistrySmart registration was completely legit. It took a total of less than 30 minutes and it told me my computer was cleaned. It then told me to reboot my computer and I should notice a difference immediately. Guess what? It was amazing. I couldn't believe how quickly my computer booted up. Then I went to a few of the sites that were painfully slow in loading and was surprised to see them pop up immediately.

Well it has now been 3 months since I used RegistrySmart registration and I couldn't be happier. My computer is still running like it was brand new. I haven't had any problems since the scan and fix. I have no problem suggesting everyone with slow computer problems give this a try. I know you won't regret it.

I am just a normal person who was experiencing the same sort of problems that thousands of other people experience with their computers. I didn't have the money to buy a new one or the trust to get it fixed at a cost of high bucks so decided to try a product on the recommendation of a friend.

I used RegistrySmart registration and was absolutely pleased with the outcome. If you are having similar problems you must go to this website where it will explain the product in more detail.



read more...

Monday, November 17, 2008

Simple Step to a Faster Computer

tips-and-trickIs your computer painfully slow? Does it take forever to boot up and when it finally finishes booting, does it seem like you can click on something and walk away for a coffee break before it opens up? You are not alone. Luckily, there is a very simple solution that you can implement in about 15 minutes that will do wonders for your computer's speed and performance.


Just a few short years ago, if you wanted to perform maintenance on your computer and clean it up, you had to either take it in to a repair shop or hire expensive technical consulting to come out to our home and do it for you. However, times have changed and people want more control over their computers.

While there a number of things you can do to speed up your computer such as running a defrag on the disk drives or adding more memory, one of the most important things you can do is to get your hands on a registry cleaner.

Registry cleaners are super easy to use, and their benefits are huge.

What is the "Registry?"

Your computer's registry is essentially a central directory in which all of your Windows settings and options are stored. The information contained within the registry includes entries for such things as hardware, software, users, user preferences, policies, etc.

What does a Registry Cleaner do?

Over time, due to the installation of new programs, the removal of old or unused programs and the constant updating and patching we do to our computer's software, your registry will most likely become corrupt. This corruption leads to errors, blue screens, crashes, and a severe decrease in system performance.

What a registry cleaner does is scans your registry for corrupt entries and it fixes them. Whether it is unused entries that are just taking up valuable space , missing entries, or entries that contain incorrect information, a registry cleaner will go through your registry line by line and fix anything that it finds to be corrupted.

Once this occurs, your operating system as well as all the software you have installed will be able to find what it needs in a much more efficient manner, which results in an increase in the speed and performance at which your computer can perform tasks - essentially it will speed up your computer tremendously.

So if you are sick and tired of a painfully slow computer and are wondering what you can do today that will make your computer faster, go out and get your hands on a top of the line registry cleaner - you'll be amazed at the difference once you have a clean and efficient registry again.

Curious to know what the absolute Best Registry Cleaner on the market is? Visit http://www.TheBestRegistryCleaners.com today to find out what one registry cleaner will increase your computer's speed and performance much more than any other cleaner available.


read more...

Sunday, November 16, 2008

Folders 2: Dress Up Your Bland Folder Icons

UtilitiesYellow folder after yellow folder, that's what the typical Windows computer looks like. Open Windows Explorer and you're bathed in a sea of yellow folders. Not only is it boring but it's a waste of visual real estate that could make your life more productive.

Folders 2 lets you quickly and easily change folder icons. You can change a folder's icon to whatever icons you happen to have or use one of the many icons included with the program. We've included music, video, sports, business, money, and other icons that can help you manage your files better.
This update to Folders adds the following:
• An enhanced user interface with icon previewing
• Over 150 different icons to use
• A shell extension so that you can right click on a folder in Explorer and quickly select a custom icon
• The ability to change folder icons that start with, end with, or contain characters that you choose
• The ability to change folder icons that contain a certain percentage of files
• An interface to add your own favorite icons for quick access to the Explorer context menu or within the Folders 2 program

Using Folders 2
There are two different methods to change your folder icons using Folders 2: You can change icons from the program's main window or you can change them by right-clicking on a folder from within Windows Explorer.

Using the main program window allows you to change multiple folders at once and gives you the ability to refine which folders you'd like to change. Using the Explorer context menu can be faster but only allows you to change one folder at a time.

The main program window contains four areas. There's a folder tree to select the folders that you want to change. There's an icon selection area where you can choose from icons included with Folders 2, favorites that you've set aside, or icons from files on your system. There's a preview area to view the icons in their different sizes and there's an area to refine the folder selection using various criteria.


Clicking on the box next to a folder will select the folder and its subfolders. It you don't want to change the icon of the subfolders, expand the folder and select the individual folders that you would like to change. Only those boxes with a check will be changed.

Once you've selected the folders you'd like to change, select an icon. Folders 2 comes with more than 150 icons to choose from, and you can also select one of your own. To do this, click on the Browse tab and then either the Icon file button or Icon folder button to select an icon file, exe, dll, or an entire folder of icons.

Icons that you plan to use over and over again can be dragged to the Favorites tab or you can right click on an icon and Add to favorites.

Now that you've selected the folders to change and the icon you want to use, simply hit the Apply icons button. All the selected folder icons will be changed to the new icon.

Folders 2 can make assigning icons even easier than what I've described above. What if you want all of the folders that contain MP3 files to have an icon of an MP3 player? Folders 2 makes it easy. Select the top folder or drive, select the appropriate icon, and then in the "Refine folder selection" area choose the last option. This option lets you change the icon of folders containing a certain percentage of a specific file type. You simply enter the percentage you want to check for and the extension of the file. In our example, I might want a folder's icon to change if 70% of the files have the MP3 extension. I simply enter "70" in the first input box and "mp3" in the second box.

Next hit Apply icons and Folders 2 will check each folder for MP3 files. If it finds them it checks to see what percentage of all the files the MP3 files make up. As it finds matching folders the icons are changed.

Changing Icons with the Explorer Context Menu
You're not limited to changing icons within the Folders 2 window. While in Windows Explorer you can right click on a folder and select PC Magazine Folders which will pop open a menu. This menu contains some of the default icons that come with the program but you can also add any icons that you'd like to the menu.












Select the More icons menu choice to bring up a window that contains all of the icons included with Folders 2, your favorites, or browse for an icon on your system. It behaves just like the icon selection area of the main program window.













In addition, you can click the Manage menu button to modify the icons that appear in the Folders 2 context menu. Simply click Add and browse for an icon that you'd like to have in the context menu. You can also move icons up or down in the context menu or remove them from the menu.


read more...

Saturday, November 15, 2008

SkypeLogView v1.00

Utilities Description
SkypeLogView reads the log files created by Skype application, and displays the details of incoming/outgoing calls, chat messages, and file transfers made by the specified Skype account. You can select one or more items from the logs list, and then copy them to the clipboard, or export them into text/html/csv/xml file.

System Requirements
This utility works on any version of Windows starting from Windows 2000 and up to Windows 2008. You don't have to install Skype in order to use this utility. You only need the original log files created by skype, even if they are on an external drive.

Skype Log Files Location
Skype Log files are stored under C:\Documents and Settings\[Profile Name]\Application Data\Skype\[Skype User]. In Windows Vista and 2008, the log files are stored under C:\Documents and Settings\[Profile Name]\AppData\Roaming\Skype\[Skype User].

Using SkypeLogView
SkypeLogView doesn't require any installation process or additional dll files. In order to start using it, simply run the executable file - SkypeLogView.exe
If Skype is installed on your system, SkypeLogView automatically detect the last used account, and loads the logs from it. You can select to view the logs of another account by using the "Select Logs Folder" option.
After you loaded the right logs, you can select one or more items from the list, and then save them to text/csv/html/xml file.

A Few Points To Notice...

* For calls and file transfers, the 'User Name' and 'Display Name' columns always display the user in the other side. As opposed to calls and file transfers, in chat messages these columns always display the the user that sent the message. This means that if you are the one that sent the message, you'll see your own name in these columns.
* For chat messages, the ChatID column is identical for all messages in the same chat session.
* The duration column is only displayed for incoming/outgoing calls. Also, for calls tries that have been failed, the duration column won't display any value.

/stext (Filename) Save the list of all log items into a regular text file.
/stab (Filename) Save the list of all log items into a tab-delimited text file.
/scomma (Filename) Save the list of all log items into a comma-delimited text file.
/stabular (Filename) Save the list of all log items into a tabular text file.
/shtml (Filename) Save the list of all log items into HTML file (Horizontal).
/sverhtml (Filename) Save the list of all log items into HTML file (Vertical).
/sxml (Filename) Save the list of all log items to XML file.
/logsfolder (Logs Folder) Start SkypeLogView with the specified logs folder.

Translating SkypeLogView to other languages
In order to translate SkypeLogView to other language, follow the instructions below:

1. Run SkypeLogView with /savelangfile parameter:
SkypeLogView.exe /savelangfile
A file named SkypeLogView_lng.ini will be created in the folder of SkypeLogView utility.
2. Open the created language file in Notepad or in any other text editor.
3. Translate all string entries to the desired language. Optionally, you can also add your name and/or a link to your Web site. (TranslatorName and TranslatorURL values) If you add this information, it'll be used in the 'About' window.
4. After you finish the translation, Run SkypeLogView, and all translated strings will be loaded from the language file.
If you want to run SkypeLogView without the translation, simply rename the language file, or move it to another folder.

License
This utility is released as freeware. You are allowed to freely distribute this utility via floppy disk, CD-ROM, Internet, or in any other way, as long as you don't charge anything for this. If you distribute this utility, you must include all files in the distribution package, without any modification !

Disclaimer
The software is provided "AS IS" without any warranty, either expressed or implied, including, but not limited to, the implied warranties of merchantability and fitness for a particular purpose. The author will not be liable for any special, incidental, consequential or indirect damages due to loss of data or any other reason.

Download SkypeLogView

read more...

Friday, November 14, 2008

AT&T: iPhones Will Soon Connect Laptops to Web

voipIt will soon be possible for iPhone owners to tether their handsets to their computers, according to carrier AT&T. Tethering involves connecting a computer to a handset and using the phone's wireless data stream to essentially serve as the computer's modem. Last summer an application briefly appearing in Apple's online App Store offered that ability to iPhone owners, but the program was ultimately pulled.

AT&T (NYSE: T) Latest News about AT&T will soon provide an official data tethering solution for iPhone users, the carrier has confirmed. Such a solution will basically let an iPhone owner turn the handset into a modem and then connect to a Mac or PC, allowing the computer to access the Internet via the iPhone's AT&T cellular data service.

"We're working with Apple (Nasdaq: AAPL) Latest News about Apple on a tethering option for iPhone and we hope to offer it soon," Wes Warnock, a spokesperson for AT&T Mobility, told MacNewsWorld. "Can't provide any details beyond that," he added.

AT&T Mobility President and CEO Ralph De La Vega first mentioned the tethering solution in an interview with TechCrunch's Michael Arrington at the Web 2.0 Summit, though he did not elaborate.

The Past and the Future

Owners of jailbroken iPhones have long been able to tether their iPhones to notebooks and the like, but the moderate hacking required tends to run afoul of official carrier agreements and support World Class Managed Hosting from PEER 1, Just $299. Click here.. AT&T, for example, currently prohibits tethering as part of its iPhone services.

This summer, the iTunes App Store offered one application called "NetShare" by NullRiver was temporarily offered in a on-again, off-again romance with fast-acting App Store watchers. Apple put it up for sale, then took it down, posted it again, and then again removed it. While NetShare used built-in WiFi capabilities to create a tether to the Internet, it was a cumbersome solution at best -- and it appears to have been prohibited by AT&T's user agreement.

'Dumb-Proof'

In August, gadget blog Gizmodo reported an e-mail Learn how you can enhance your email marketing program today. Free Trial - Click Here. exchange between a reader and Apple CEO Steve Jobs in which the reader complained that not having a tethering option for the iPhone made little sense -- particularly since AT&T offered a tethering solution for BlackBerry for US$30 per month.

Jobs apparently agreed and noted that Apple was working on a solution.

Actually, AT&T currently supports more than three dozen phones for tethering. Still, tethering remains a solution that's geared only for savvy mobile users.

"From the standpoint of tethering, it's obviously, 'Those people who are technically capable ... do.' I have a Nokia (NYSE: NOK) Latest News about Nokia N95, which is a 3G Latest News about 3G phone. I can tether using Bluetooth Latest News about Bluetooth or tether with a cable, but it's not for the faint of heart -- it's not for your usual user," William Ho, research director of wireless services for Current Analysis Latest News about Current Analysis, told MacNewsWorld.

"So for a slice of the 3G iPhone users, they have to be pretty astute -- unless Apple comes out with some utility that makes it dumb-proof," he added.

The Dollars and Sense

In addition to the complexity, there's at least two other possible reasons the iPhone hasn't had a tethering option since Day 1. The first is that AT&T may have been concerned that its networks would not have been able to handle a rapid influx of Internet data use. The flood of customers that scooped up new iPhone 3Gs when the devices first went on sale taxed the network enough. Adding to the mix laptops using iPhones as modems may have been too much to handle at once.

The second is that AT&T has a more expensive LaptopConnect service offering, which is focused on laptop mobility for professionals. It works with a dedicated card or USB stick.

"To some extent, it cannibalizes the AirCard stuff, for which they get $60 a month," Ho explained. The existing mandatory $30 data plan for the iPhone, plus another $30 for a tethering solution, would come to $60 per month for a dedicated laptop mobility Internet service charge, he said.

"From the carriers' perspective, they want to make themselves whole" by offering complete services without hurting existing revenue streams, he continued.

In the Enterprise

From the perspective of an IT manager in the enterprise, the potential cost savings may not be particularly attractive. If mobile professionals increase their support calls with a tethering option, a dedicated laptop connection solution would remain the smarter way to go.

"Don't forget, the Bold is the first 3G BlackBerry out there, so even if you tethered, it was on EDGE," Ho said.

Plus, "With tethering, it's not like you're going to get almost equivalent utility from an AirCard, because the newer AirCards are HSPA (High-Speed Packet Access) AirCards, and in the CDMA (Code Division Multiple Access) world, they are mostly EVDO (Evolution-Data Optimized) Rev A AirCards, and the difference is you get better latency characteristics and a better uplink. So HSPA gives you a higher uplink vs the iPhone, which is just HSDPA (High-Speed Downlink Packet Access)," he explained.

Regardless of the speed, blog chatter and the brouhaha over the NullRiver reversals has previously shown there is demand from savvy iPhone owners who aren't already on a dedicated laptop connection plan.

If such a solution doesn't come before the end of 2008, there's a good chance that it would come early next year. Apple CEO Steve Jobs will most certainly appear on stage at the Macworld conference in January, an annual presentation at which he customarily introduces new products
read more...

Thursday, November 13, 2008

Global Security: The Sky's Unblinking Eyes

internetworkThe emergence of high-powered satellite imagery changed national security and military intelligence. Once that sort of technology became available to the masses through the likes of Google Earth, the game was changed again. As the industry's biggest firms get set to launch even more powerful satellites, governments cope with a world where almost anyone can get a bird's-eye view.
The secretive National Geospatial-Intelligence Agency is rushing to get the latest, high-definition satellite photos of Afghanistan into the hands of U.S. ground troops as they ramp up operations in the country's tangled terrain.

The NGA analysts aren't tapping the government's huge network of highly classified spy satellites; they're getting the pictures from commercial vendors. That's the same stuff pretty much anyone can get, either through free, online programs such as Google Earth, or by buying it from the same companies supplying Uncle Sam.

It's a remarkable turn, given the warnings that security experts in the USA and worldwide raised a few years ago about giving the entire planet -- terrorists and rogue states included -- access to high-resolution satellite photos once available only to superpowers.

Last month, the most powerful commercial satellite in history sent its first pictures back to Earth, and another with similar capabilities is set for launch in mid-2009. The imagery provided by those and other commercial satellites has transformed global security in fundamental ways, forcing even the most powerful nations to hide facilities and activities that are visible not only to rival nations, but even to their own citizens.

How Much Better?

Although no one disputes that commercial imagery poses threats, it has been embraced in ways few predicted.

"It's created a lot of opportunities to do things we couldn't do with [classified] imagery," says Jack Hild, a deputy director at NGA, which provides imagery and mapping for defense and homeland security operations.

Pictures from government satellites are better than commercial photos, but how much better is a secret. Only people with security clearances generally are allowed to see them. Using commercial products, intelligence agencies can provide imagery for combat troops, which wasn't possible before because of the risk of it reaching enemy hands and even international coalition partners.

Federal agencies use commercial imagery to guide emergency response and inform the public during natural disasters such as this year's Hurricane Ike. It's also used by government scientists to monitor glacial melting and drought effects in the Farm Belt.

When commercial satellite photos first hit the market, "the gut reaction was, 'We can't allow this imagery to be out there because someone might do us harm with it,'" Hild says. "Are there still bad things that people can do with commercial imagery? Absolutely ... but we think the benefits far outweigh the risks."

Other nations share the sentiment. U.S. and foreign government contracts provide critical income for commercial imagery companies, such as Digital Globe and GeoEye -- both of which supply photos for Google Earth.

"Most of our revenue [is] from governments," says Mark Brender, vice president of GeoEye, which got half its 2007 revenue from the U.S. government and 35 percent from foreign governments. "They have a core competency in understanding how to use this technology -- and a national security imperative to do so."

Mapping Out an Attack


In August 2006, the Islamic Army in Iraq circulated an instructional video on how to aim rockets at U.S. military sites using Google Earth.

Posted on a jihadist Web site, the video showed a computer using the program to zoom in for close-up views of buildings at Iraq's Rasheed Airport, according to an unclassified U.S. intelligence report obtained by USA Today. The segment ended with the caption, "Islamic Army in Iraq/The Military Engineering Unit -- Preparations for Rocket Attack."

The video appeared to fulfill the dire predictions raised by security experts in the USA and across the globe when Google began offering free Internet access to worldwide satellite imagery in 2005. Officials in countries as diverse as Australia, India, Israel and the Netherlands complained publicly that it would be a boon to terrorists and hostile states, especially since the pictures often provide a site's map coordinates.

Indeed, some terrorist attacks have been planned with the help of Google Earth, including an event in 2006 in which terrorists used car bombs in an unsuccessful effort to destroy oil facilities in Yemen, according to Yemeni press reports. Images from Google Earth and other commercial sources have been found in safe houses used by al-Qaeda and other terror groups, according to the Pentagon.

Many security experts say commercial imagery does little to enhance the capabilities of such organizations.

"You can get the same [scouting] information just by walking around" with a map and a GPS Latest News about global positioning system device, says John Pike, director of GlobalSecurity.org, a research organization specializing in defense and intelligence policy. The imagery "may give someone precise coordinates [for a target], but they need precise weapons ... and their ability to target discrete parts of a particular site is pretty limited. People who think this gives you magical powers watch too many Tom Clancy movies."

Some Safeguards

Nonetheless, the world's governments have taken a variety of steps in response to the emergence of Google Earth and other commercial imagery sources, according to a confidential report issued in July by the CIA's Open Source Center and made public by the Federation of American Scientists. Among them:

* Negotiation. Some nations have asked Google and other companies to keep certain images off the market, the report says. For example, Google Earth uses older imagery of parts of Iraq based on British concerns about exposing military sites. Commercial satellite companies often blur images of sensitive U.S. sites, such as the Pentagon.

* Bans. China has barred Web sites selling "unapproved" commercial imagery, according to the report, and Sudan has banned Google Earth. In 2006, Bahrain officials banned Google Earth, but the CIA report notes that the move may have been mainly to "prevent exposure of elaborate residences and land holdings of the country's rich."

* Buying in. Several countries, such as China and Thailand, are getting into the satellite imagery business themselves, and India sells its spy photos commercially, the report says. Many countries that lack their own satellite capability have become enthusiastic purchasers of commercial imagery to meet intelligence and security needs.

* Evasion. Many countries have stepped up efforts to conceal sensitive facilities, either by putting them underground or camouflaging them, the report says. Others, such as India, have improved their ability to discern when satellites pass overhead, which allows them to conduct sensitive military activities when cameras aren't watching.

"We actively engage with organizations and governments ... to strike a balance between their security concerns and the needs of the end user," says Chikai Ohazama, Google Earth's product management director. Sensitive sites often are obscured by satellite operators before Google even gets the imagery, he adds. It often doesn't matter "because the imagery already is available from other places."

Newer Satellites

The number of sources for satellite imagery continues to grow, fueled not only by government customers in the USA and worldwide, but by an explosion in public usage.

This month, GeoEye launched the most advanced commercial satellite yet -- able to distinguish home plate on a baseball field -- and the NGA paid half the US$475 million cost. Digital Globe will launch a satellite with similar resolution and other new capabilities next year on its own dime.

The use of commercial imagery relieves some of the burden on the U.S. government's classified satellite network, says Rick Oborn, spokesperson at the National Reconnaissance Office, which runs the system.

"We're oversubscribed," Oborn says, noting that intelligence and security missions get priority and often need the higher resolution and quicker returns offered by the government's own satellites. "Anytime the broader area stuff can be taken commercially, so much the better."

The appetite for commercial imagery from the general public continues to grow as more people realize the technology has uses far beyond picking out your home on Google Earth.

Nongovernmental organizations have used commercial imagery to show devastating attacks on villages in Darfur by the Janjaweed militia. Security experts have used it to show development of new missile bases in North Korea. Environmentalists have used it to document effects of global warming.

"In a way, those sort of things also have a lot to do with national security," says Steven Aftergood, an intelligence expert at the Federation of American Scientists. "It's an extraordinary tool [for] bringing transparency to government. ... And it's here to stay."
read more...

Wednesday, November 12, 2008

Hadoop: Powerful Software. its Funny Name

internetworkBehind Yahoo's (Nasdaq: YHOO) Latest News about Yahoo push to open up Web search and advertising Learn how you can enhance your email marketing program today. Free Trial - Click Here. is software powerful enough to sort through the entire Library of Congress in less than half a minute.

The software, called "Hadoop," is part of Yahoo's massive computing grid and is transforming the way that Yahoo and corporate giants like IBM (NYSE: IBM) Latest News about IBM extract meaning from enormous streams of data. Universities are also using the code -- an open source Rackspace is the expert when it comes to delivering Windows and Linux hosting solutions. Click here to learn more. Latest News about open source version of software Google (Nasdaq: GOOG) Latest News about Google relies on for daily operation -- to train a new generation of computer scientists and engineers.

"It makes it possible to actually take advantage of all the computers that we have hooked together," said Larry Heck, vice president of search and advertising sciences at Yahoo.

Data Sniffer
Hadoop improves the relevance of ads Yahoo shows on the Internet by analyzing the company's endless flow of data -- now well over 10 terabytes a day -- on the fly. As users click from Yahoo Mail to Yahoo Search to Yahoo Finance and back again, Hadoop helps figure out what ad, if any, is likely to catch someone's attention.

The key lies in mining insights from mind-boggling amounts of data. If a woman repeatedly reads reviews of sport-utility vehicles, then clicks on automotive classifieds and then orders a book about helping a child adjust to kindergarten, she might be in the market for a new family-size car, according to a Yahoo sales presentation.

As part of the push for more openness, Yahoo will be using the technology not only to boost ad sales on its own Web sites, but on sites owned by the 796 members of a newspaper consortium that is working with the search giant to sell more advertising at better prices. The San Jose Mercury News and its parent company, MediaNews, are members of the partnership.

"In some ways, perhaps it is even more targeted than search advertising," said Leon Levitt, vice president of digital media for Cox Newspapers, a consortium member.

Search Builder

For Yahoo, the rollout of an innovative approach to Internet advertising is a major accomplishment. When Yahoo launched its Hadoop project in January 2006 it was selling search advertising for half of what Google charged and watching its share of Internet searches dwindle.

Hadoop was first put to work building Yahoo's Web index -- the biggest computing problem inside Yahoo. Since then, a team of engineers tuned the software, and researchers inside and outside of Yahoo began using it to experiment on giant data sets.

"All of a sudden, instead of waiting overnight people could get the results of their experiments in a minute," said Doug Cutting, a work-at-home dad who hacked out the first version of Hadoop in his spare bedroom in Sonoma County, Calif., as part of an open source search project.

Code Legacy
Cutting, a 44-year-old programmer who had helped build search engines at Apple (Nasdaq: AAPL) Latest News about Apple and Excite, had started the search project in 2000 because he wanted his code to live on. He knew that closed-source projects, where software is treated as a corporate secret, had a way of dying. With open source, the code is published and other programmers can contribute suggestions and help fix bugs.

"It was a pretty ambitious goal, destined for failure in the short term but still worth pursuing in the long term," Cutting said. Plugging away with a core group of volunteers and with support World Class Managed Hosting from PEER 1, Just $299. Click here. from the Apache Foundation, Cutting created a library of code he called "Lucene" and a Web crawler he called "Nutch."

Meanwhile, he earned a living as a consultant for organizations like the Internet Archive and companies like Yahoo. Cutting made some progress but was stymied by the sheer size of the Web. He was able to index only several hundred million Web pages, a fraction of the Web that was already billions of pages and expanding quickly.

Light-Bulb Moment
It was Google that inadvertently supplied the solution. In 2004, Google fellows Jeffrey Dean and Sanjay Ghemawat published a paper about MapReduce, the secret software that Google uses to process raw data using thousands of computers. "It pretty much directly addressed the scaling issue we were having," Cutting said.

Using the clues provided by the Google paper, Cutting wrote Hadoop, which was named after his son's toy elephant. Yahoo saw the code and offered Cutting a job.

While a team of engineers adapted Hadoop to run reliably on tens of thousands of computers, researchers embraced the software as a new data mining Latest News about data mining tool. Word about the brawny program spread rapidly. Early this year, developers at Amazon (Nasdaq: AMZN) Latest News about Amazon.com, Facebook Latest News about Facebook and Intel (Nasdaq: INTC) Latest News about Intel were using Hadoop for everything from log analysis to modeling earthquakes.

"Hadoop gave me, an ordinary developer, the ability to do something extraordinary," said Jinesh Varia, a Web services evangelist at Amazon.

Google quickly got on board, launching an initiative with IBM to provide universities like Stanford, UC-Berkeley, MIT and Carnegie Mellon with clusters of several hundred computers so students could learn new techniques for parallel programming. Since Google's MapReduce was a trade secret, Google and IBM announced that the students would be taught on Hadoop.

"We are leveraging not only the contribution that we are giving to the software, but the contributions from the larger community as well, and everybody wins from it," said Heck of Yahoo.
read more...