Search Results

Search found 4374 results on 175 pages for 'computers'.

Page 55/175 | < Previous Page | 51 52 53 54 55 56 57 58 59 60 61 62  | Next Page >

  • Recruitment Software for a Growing Business

    If you are interested in improving your company?s recruitment process and making it more efficient then follow the example set by some of the world?s largest organizations and utilise the latest tech... [Author: Andrea Watkins - Computers and Internet - June 13, 2010]

    Read the article

  • DBCC CHECKDB Fails Displaying 8914 Error

    MS SQL Server database user might encounter database corruption issues due to improper system shutdown, metadata structure damage, human mistake, and virus infection. In most situations of database c... [Author: Mark Willium - Computers and Internet - May 14, 2010]

    Read the article

  • ISO Format

    One of the most common file types used in the distribution of software over the Internet is the .ISO format; these single files contain within them an exact copy of an entire CD or DVD disc. They are... [Author: Chris Holgate - Computers and Internet - April 05, 2010]

    Read the article

  • Key Features of the Samsung SCX 5835FN

    The SCX 5835FN is just one in a long line of exceptional multifunction printers from Samung. Featuring some of the most advanced technology you';ll find on any modern printer, this all-inclusive devic... [Author: Derek Rogers - Computers and Internet - May 23, 2010]

    Read the article

  • Get a Totally free Apple iPad Mearly For Trying It!

    If you want to get your hands on the cutting edge Apple iPAD, but you don';t necessarily wish to spend the $500 dollars... There is certainly other alternatives out there. For instance obtaining an Ap... [Author: Tim Cooper - Computers and Internet - April 09, 2010]

    Read the article

  • What is SSL Certificates and How Does It Work

    SSL is an acronym for Secure Sockets Layer. The Secure Sockets Layer is a basically a web security protocol that is developed to establish a secure connection between web server and a browser. SSL is... [Author: Jack Melde - Computers and Internet - May 01, 2010]

    Read the article

  • Shared Web Hosting Services India

    Once the website is developed and designed thoroughly, the next best step that ought to be done is having it hosted over the internet. There are many service providers offering various types of hosti... [Author: John Anthony - Computers and Internet - May 18, 2010]

    Read the article

  • Choose Right iPad Apps Based on Your Needs - Part 1

    iPad is an innovative device. It can be used as web browser, e-book reader, movie player, photo album, photo frame, jukebox, gaming machine and so many others. Its functionalities and use-abilities a... [Author: David Aldrich - Computers and Internet - May 04, 2010]

    Read the article

  • Making Your Computer More Energy Efficient

    Whether you have a fully equipped home office or whether you only touch a computer when you?re at work in an office outside the home, there?s no denying that a computer is a wonderful tool ? that use... [Author: Nick Vassilev - Computers and Internet - April 20, 2010]

    Read the article

  • Introduction to Different Casio Tills

    A cash register or till is a mechanical or electronic device for calculating and recording sales transactions. It comes with an attached cash drawer for storing currency. It usually prints a receipt ... [Author: Alan Wisdom - Computers and Internet - April 05, 2010]

    Read the article

  • IT Job Titles ? What Do They Mean?

    Although only a few decades old, the information technology or IT field is as broad and deep as industries that have been around for centuries. IT job categories, titles and specialties abound -- so ... [Author: Allen B. Ury - Computers and Internet - March 27, 2010]

    Read the article

  • Why Internet Predators Love Social Network Sites

    Internet predators have become a fixture of sorts on many social media sites which necessitates the need for users to exercise caution. Since the advent of the internet ';instances'; of cyber crime hav... [Author: TJ Philpott - Computers and Internet - May 26, 2010]

    Read the article

  • Botnet Malware Sleeps Eight Months Activation, Child Concerns

    Daily Safety Check experts used a computer forensic analysis of a significant botnet that consisted of Carberp and SpyEye malware to come up with the details for their report. The analysis found that the botnet profiled the behavior of the slave computers it infected, similar to surveillance techniques used by law enforcement agencies, for an average of eight months. During the eight months, the botnet analyzed each computer's users and assigned ratings to certain activities to form a complete profile for each. Doing so allowed those behind the scheme to determine which were the most favora...

    Read the article

  • Certification Doesn';t Make You a Project Manager

    The Project Management Institute (PMI) and the Association of Project Management Group (APMG) are two of the biggest reasons that projects fail. They have sold the myth to the corporate world and to ... [Author: Richard Morreale - Computers and Internet - April 24, 2010]

    Read the article

  • CloudPlug Wall Wart Backs Up Linux

    <b>Linux Planet:</b> "Tiny wall wart computers are everywhere, providing useful services, ease of use, and using little power. Paul Ferrill reviews the CloudPlug, a cross-platform, expandable backup server for both local and offsite storage"

    Read the article

  • how to set up an cluster server for minecraft hosting?

    - by berrylee32
    i want to know how to make an cluster server to host minecraft i want to use this server for gaming and other ubuntu desktop tasks i want to use vnc for this server to log in anywhere on the world and control the minecraft console please explain to me step for step how to do this because I still have a few old computers lying around, and get some for free from a friend. greetings berrylee32 (minecraft name)

    Read the article

  • Prolific Viruses

    Anti-Virus software gets a great deal of coverage in Click because ultimately it';s a very important component of any computer system and choosing the right program to protect your computer should be ... [Author: Chris Holgate - Computers and Internet - May 16, 2010]

    Read the article

< Previous Page | 51 52 53 54 55 56 57 58 59 60 61 62  | Next Page >