Wednesday, July 30, 2008

P4S studied hard when he's young

P4S (78 ~ 139), the word Hirako, is the Eastern Han Dynasty period of China's well-known scientists, writers, P4S now in the birthplace of the County of Henan Province, Nanyang Dan Qiaozhen. P4S grandfather did Taishou Zhang Kan, an official clean. His father died, so P4S home very poor. P4S young Qinfenhaoxue, coupled with talent bright, very early famous township. According to historical records, P4S10 at the age of "5 to the intersection Six Classics", Guomuchengsong. P4S interested in a broad, often covered in natural science books, and write a good first-hand Cifu. One day, P4S from a collection of poems, read four poems, describes the Big Dipper in the evening when all the seasons change: "bucket handle that East and the world are the spring; Doo stalk Guide, the world all summer; bucket handle refers to the West, and the world are autumn ; Bucket handle refers to the North, and the world all winter. "P4S think this is too interesting a. The stars flashing the sky, some like Kei, some like fighting, some like dogs, there's like bears, they just have the run of what it » This is fantastic. P4S poem was based on the content of other reference books and paintings became Sky map, per night and as long as they are no clouds, P4S on quietly in front of Sky plans carefully watching the night sky. Star Guangmo the number of Nanjiezhimi ah, P4S watching, recording the thinking of, P4S the head, filled with a variety of issues, full of colorful fantasy. Later, P4S finally confirmed that four poems in the description was not accurate, in fact refers to the northeast fighting stems in early spring, late spring is referring to the southeast.

Wednesday, July 23, 2008

Microsoft Certified Information Systems Engineer (Windows 2003)

The winner of that certification can complete the design, planning and realization of a Microsoft Exchange Server based on the information platform based on the structure. Asked to participate in the certified systems engineer at least a year or more deployment of Exchange Server and Windows 2003 system environment of the deployment experience.

The certification through six core exams and two news platform specific examinations.

In addition to MCSA: Messaging through information management platform outside the examination 70-284, MCSE: Messaging Platform also need information on the design of the 70-623 exam resources the exam 70-285: Designing a Microsoft Exchange Server 2003 Organization.

This examination main door visits trainees the basic platform for corporate news the business needs of capacity, and based on this demand by building on Microsoft Pro:Microsoft Desktop Support Consumer, you will cover every field and category in Microsoft Windows Vista, Configuring Exchange Server 2003 platform based on the information to meet this demand capabilities. After the completion of this training course, participants get the knowledge and skills

Thursday, July 17, 2008

Magical Effect DHCP relay service agent for a number of VLAN

Work in the LAN environment, the management of hundreds of workstations IP address is not a simple issue, in order to effectively address this problem, many LAN administrators will use in LAN set up a DHCP server approach to automatically ordinary workstations Allocation of IP addresses, so the network can be dismissed from the management manual for the workstation IP address assigned to repeat the operation, which has effectively improved the local area network management efficiency. But in the actual network maintenance may be encountered in the course of this phenomenon, that is, when the LAN installation configuration of the three switches, according to the different departments of a number of workstations are a few of VLAN, all in the LAN At the same time will not be able to workstations from the same DHCP server where the effective application of IP addresses, which is unable to work because of a DHCP server in a number of VLAN, in other words, ordinary LAN workstations address the issue of the request for information is not in a number of Vlan in the broadcast, when ordinary workstations located in different VLAN in, the address of the request for information on the absence of accurate and sent to find common workstation failure. Then how can we effectively address this difficult issue is «the simplest way, is nothing more than a Vlan set up a separate DHCP server, but the efficiency of this operation is often very low, but is not conducive to the reunification of network management and maintenance, This method of SBCSAM Smart Business Communication Systems for Account Managers operation is relatively low. In fact, installation, configuration of the three-tier local area network switches in the work environment, we can configure the switch three relay agent parameters, to achieve the same DHCP server to service more than Vlan the Cisco Certification purpose!

Tuesday, July 15, 2008

IBM how landing in China

IBM in China, regardless of our research and development centers or software development center, is one of the world's top five development laboratory. Therefore, we are now in Beijing on the whole the team has reached more than 3,000 people. This more than 3,000 people in China have the meaning of the two, is the first foreign R & D team, technology to attract talent to China, the Chinese roots. Second, because this team stationed in China, the peripheral industries, software development, software applications, software technology has made a very big increase results. We were in Beijing, Shanghai, Taipei arrived at the current size of more than 3,000 people, more than 3,000 people inside that this in fact we have two of IBM Fellow. IBM's research and development on the rating, the commentary effect, in fact, two academicians from the Chinese began to return home to the motherland effect, they stationed inside the laboratory in Beijing. So very Coincidentally, the two academicians in the professional capability of data, the data for the whole of the development, improve the management of the data is very big role. Therefore, both academicians, we called three distinguished engineers, is now stationed in China.

Secondly, we also have a lot of BP and ISV, you see the right half of the development team and outside BP, the recognition of our technology and DB2 9 on the market in the recognition of advanced technology, they began the application development We are now in the version of the above.

Thursday, July 10, 2008

Install Bundle

# Smit easy_install
Select INPUT device / directory for software for [/ dev/cd0] (the choice of F4)
Select a FileSet Bundle choice for Server and App-Dev (a graphics equipment to be elected Graphics-Startup)


Choose to install software

# Smit
Into the Software Installation and Maintenance-> Install and Update-> SoftwareInstall and Updata from LATEST Available Software
Select INPUT device / directory for software for [/ dev/cd0] (the choice of F4)
SOFTWARE to install access to select the installation of the software
Begins with "@" Fu has already installed
The beginning of a "+" website that is not installed
If we do not end with graphics, while "X11" is not the beginning of the loaded
The following must be installed:HP0-310
Bos.compat (compatible with AIX 3)
Bos.data
Bos.dosutil (dos utility)
The relevant info, msg must be installed

IBM Release 1.0 provided the following functions

Release 1.0 provided the following functions, most functional in 1989 is a revolutionary:

Using RSA public key encryption technology, signatures and authentication, and thus be able to sign documents, making documents available in the receiver can determine the course of transmission has not been modified. Notes RSA encryption is used to be an important commercial product, then users will be safe as one of the main features of Notes.
Dial-up function, including the use of dial-up driver interactive server access, allowing users to specify modem string, to support operator-assisted calls, automatically record phone calls and statistics.
Import / export capabilities, including Lotus Freelance Graphics Metafile import, export and structured ASCII Lotus 1-2-3/Symphony spreadsheet export.
Very easy to set up new users, allowing system / server administrator for creating a user-mail, in the Name and Address records in the database users to create, through dialog to confirm the user ID documents. If you want to use the private distribution list, users can also automatically create a private database of the Name and Address.
E-mail system is not allowed to open private mail file will be able to send mail, receive replies, received notification of new messages, create a mail message automatically when no clear or correct misspelled the name.
Online help, when many products are not provided by these characteristics.
Including the formula language, making the preparation of the Notes application simpler.
DocLinks Notes documents to provide the "hot links (hotlink)" visit 000-433.
Keyword (box and the radio button) characteristics.
Access Control List (Access Control List, ACL) who can determine the extent of each visit to the database.
If the database administrator needs, you can concentrate on the location of the remote management database replication. ACL can be the whole list (rather than separate) copied to the remote copy of the database.

Wednesday, July 9, 2008

Spring-based framework for WebSphere Application Development

Lightweight enterprise application development by increasing majority of the J2EE application developers sought after, and Spring Framework is an outstanding representative of lightweight containers. Spring due to the use of increasingly widespread, so many have been based on the WebSphere Application Server (WAS) 000-M22 application using the Spring framework. This paper introduces the development of Web applications using Spring's basic problems, then with WebSphere Application Server, on Spring application to combine the packaging of the services provided. The article aims to explore with you how to better use the Spring framework for the development of WebSphere Application Server-based applications.

Sunday, July 6, 2008

Red humor engineers how a test by the CCIE LAB

It is now the provisional morning 5:30, there are students in the experiment, I am very tired, just debugging End equipment and modified versions of a number of errors, I would like to talk about the examination process.

Now many people like their CCIE written exam experience and encourage each other friends, originally I would also like to Write, but has no time to organize, recently seen many people in a number of articles published online, and some of the test CCIE Attention , The contents of a track Furthermore, our side there are also many comrades immediately to troops, Take this article as a stepping stone to their success!

If the article comments on some things and some humorous description of a number of implications, please understand! Purely personal point of view!

Examination by a CCIE LAB Qin Liji

A 3:00 am, took ah, Luo Bing, repeated on a bed Luo Bing! Simple wire bed issued a molar the voice of many comrades started complaining! Up, open the laptop…… ..

Running a "round-table warrior," Zaida one council, and no on 50 great! Depressing!

5:00 to finally consumption, the ball and engage in Xiaoqiang, two individuals have been 30 hours without rest, the reluctance, the unhappy look! Mother, also a friend? Three each other with their malicious statements Greetings, I am too lazy to their arguments and immediately to Shuxi dress, with Prestige version of the suit, many days ago put under physical Ironing Ruzi, today was finally able to see天日, no shirt, wearing makeshift Xiaoqiang! A show of smell!

6:00, we get on the subway, 6:40 assigned to the Wangfujing Street, they like the heat of the two dogs ran into a McDonald's, like, to see them chew the food, said the appetite that I really did not, Qiangren With a little something to eat. 7:00 we began to discuss three CCIE some feature, many places, there are still many problems, the Vietnamese did not mind that at the end, just simply say, silence………

8:30, "Zouba" and the ball first to stand up, we came to the three individuals together with Oriental Plaza E1 downstairs, the way did not say a word, the silence me to the elevator, the door to the elevator, I finally realized that what is a friend, the two individuals concerned about the eyes watching me into the elevator, I was really touched and into the elevator, calling the ball out, "12 noon downstairs McDonald's, get Laoping "I did not speak, the elevator slowly for the last, Cisco elevator really fast, to be on to the 19th floor of the reception Miss Let us wait for examiners prospects! Succession to a number of candidates, a total of five individuals. And share the care of the bladder peep his eyes with each other, looked extremely Weisuo.

All quiet in the heart of today can look forward to killing each other! No one greeted each other, and the atmosphere was relatively embarrassment. Less than one! With the prospects of Miss sentence, "Vincent! Pick!" A not very tall, looks very ordinary people come out (of my Guaiguai! Finally see the legends of the Zhou Junling): " CCIE candidates, and I walk! "I fear sets, like the rabbit closely with the same examiner! Due to the time that I have been threatened, Cisco is the door with access control, step on the night walk was held in the outside. At that time, I was the first with the examiners in the back, through the first door of the time, I do not know how, to the examiners I went to the back, I was subconsciously to the examiner to the past, this is not intentional, but interested in the performance of engineers The style! (Lian Pihou the obvious advantages)

To a small door that reads, CCIE examination room, not the examination room, examiners first ID check, and then checkmark attendance that day to a total of six individuals, a test security, the remaining are routing, security Gemen I sat in the back. On! Gemen this a few days without washing head. Palygorskite all! Examiners like back Double Dutch, said the test rules and examination of the ISDN number and then start the title and I take the version is 160.2 Month - March this version is victory, no one before. Myth 5 days ago Xiaoqiang broke. Examination has finally started, the examiners to remind us to check their personal information, if correct click OK, here I would like to remind everyone that, we must look at carefully, I found I was on my mailbox Cisco wrong, Halo! Immediately revise up, Click OK, then start debugging Super Terminal, Cisco has provided to me a particularly broken machines, keyboards like wood to do the same! What ah!

The examination room, except me, all the people are beginning to experiment percussion, where I have to remind one and not of the knockout experiment, the first good topic, I am 9:15 pm - 11:00 topic has been in the translation , The examiners to the paper, I have filled the (Cisco to provide you a lot of color pencil, I do not know where engaged in, quite beautiful), the examiners seemed very busy, the Fengfenghuohuo walked going, I do not know the so! But I believe that every time he traversed around me, I certainly will see what to do, I like very alternative, the entire house full of para para voice. Suddenly I found that I get to see not a feature, a few words Gao Buding, I English is not very strong, no way, secretly wrote in the hands of the English, but really did not expect, I was almost a move Bury me……

In fact, I was suddenly a machine died, I raised their hands to ask examiners from my resume, he accidentally saw my hand to write the word, he asked me, this is how the case! My mind At that time, a blank, I said that I would like to go out for a translation of the more stupid answer ah. He saw me one, did not speak, walk away, then I feel we now can be imagined, but certainly, but also Meizhun back to the bad impression left Cisco, Hey! (I must remind you not to do To like me, childish things, too dangerous, police everywhere).

Friday, July 4, 2008

The United States made nearly 20 million U.S. dollars budget support for North Korea abandon its nuclear program

U.S. State Department recently made a 19.5 million U.S. dollars of the budget, as a function of North Korea to the nuclear assistance. North Korea has destroyed nuclear reactor at Yongbyon in cooling towers, to take the nuclear function of the first step.

According to South Korean news agency reported, the U.S. State Department announced that the Korean nuclear facilities in Yongbyon to the function of the 12 measures, which have been completed by the nine.

Recently, the United States Government has provided North Korea 2.5 million U.S. dollars, as the Yongbyon nuclear facility cooling tower demolition, removal, and other related costs.

Prior to this, the United States in the 2008 fiscal year budget bill, the provision of 53 million dollars to North Korea energy aid budget, and then in the May 30, President Bush signed the supplementary budget bill, also allocated 15 million dollars.

U.S. Congress that North Korea abandon its nuclear program requirements related costs from the 2009-2012 fiscal year, respectively, for 300 million U.S. dollars, 200 million U.S. dollars, 50 million dollars and 25 million U.S. dollars.

The six-party talks head of the U.S. delegation, Assistant Secretary of State Christopher Hill said that in achieving the denuclearization of the Korean Peninsula in their efforts to verify is the most important link. The next step is to verify North Korea indeed has submitted a list of all nuclear facilities.

Meanwhile, the U.S. Secretary of State Condoleezza Rice said that from the list of countries supporting terrorism to remove North Korea only has symbolic significance. As the United States in objection, objection to the removal of North Korea, Rice's remarks is to pacify a different view.

In addition, Bush in Japan to attend the G-8 summit, with Japan, South Korea and Chinese leaders at 6 and 9, held talks focusing on North Korean nuclear issue, will also discuss Iran, Myanmar, Zimbabwe and the Doha trade negotiations. G-8 summit meeting will be held 7 to 9 in Japan.

Wednesday, July 2, 2008

Please Converting a Decimal number to a Binary number

As we all know that computer runs on Binary numeral system. The binary numeral system, also called the base-2 number system, is a numeral system that represents numeric values using two symbols, 0 and 1. In computers, 0 and 1 are called bits. Bits are grouped in bytes to form binary numbers.

Nibble

Nibble is a group of four bits. Sometimes it is also called a half-byte number. An example of a nibble is 1010.

Byte

Byte is a group of eight bits. An example of a byte is 10100111.

Converting a Decimal number to a Binary number

Let us have a look at the table given below:

Position 8 7 6 5 4 3 2 1
Weightage 27 26 25 24 23 22 21 20
Decimal Value 128 64 32 16 8 4 2 1


The table shows the individual values (weight) of eight bits according to their positions. Let's change a decimal number to a binary number.

Exercise: Change a decimal number 201 to its binary equivalent.

Step 1

To convert a binary number (a byte) to a decimal number, make a table with positional values and a blank row, as shown below:

Positional Value 128 64 32 16 8 4 2 1
Binary Symbol


Step 2

Place symbol 1 to the maximum weightage position that is not greater than the decimal number.

Positional Value 128 64 32 16 8 4 2 1
Binary Symbol 1


Step 2

Subtract the positional value from the original one.

201 - 128 = 73

Step 3

Fill the next available maximum weightage position.

Positional Value 128 64 32 16 8 4 2 1
Binary Symbol 1 1


Subtract the positional value from the remaining one.

73 - 64 = 9

Step 4

Now the next available position to accommodate 9 is 8, as 32 and 16 are greater than 9. Place the symbol 0 to the position 32 and 16 and 1 at the position 8.

Positional Value 128 64 32 16 8 4 2 1
Binary Symbol 1 1 0 0


9 - 8 = 1

Step 5

Again...

1 is lesser than 4 and 2 so place symbol 0 at their position and put symbol 1 at position 1.

Positional Value 128 64 32 16 8 4 2 1
Binary Symbol 1 1 0 0 1 0 0 1


Here is your binary equivalent of decimal number 201 -

11001001

Isn't it easy? Ok! Practice hard to make it quick.

Tuesday, July 1, 2008

The useful rule for using offline files

Offline files are copies of network files on the local system. Users can work on these files even when they are not online. The Offline Files feature ensures that users are working with the most current version of the network files, and that the files will be synchronized with the network version of the files when users reconnect. If users have enabled offline files, they can navigate through shared folders and mapped network drives, regardless of whether or not they are connected to a network. Users can also browse network drives and shared folders in My Computer or My Network Places.

Windows operating systems support the Offline Files feature.

Any shared file or folder on a Microsoft network can be made available offline. Users can make files available offline from any computer that supports Server Message Block-based (SMB) File and Printer Sharing. The Offline Files feature is not available on Novell NetWare networks.

There are three modes of caching files offline:

No Caching: In this mode, no files are cached onto the client computers.

Manual: This mode permits users to specify individual files to be available offline.

Automatic: This mode is applied to the entire share. When a user uses any file in this share, it is made available to the user for offline access.
Offline files allow administrators to configure the amount of disk space used to store offline files. However, this only affects the offline files that are stored automatically. It does not affect offline files that are stored manually.