All the Reasons to Use a Pen Drive

Pen drives or USB flash players are one of the latest storage devices which are both removable and insert able. All USB flash players are portable and very smaller in their size and it is available in the market with different styles and models. Why are they known as USB flash players? The answer is that it has flash memory capacity that is used in it. Normally it connects to the computer motherboard through the pen drive slot. The original name of this gadget is USB flash memory, but to catch the customer’s attention the manufacturers have given this particular name as pen drive.

A pen drive is a sleek and a compact computer gadget which is used as a memory flash for transferring data from one to other. It is a plug and play device. It as simply plugging into any USB port and the computer automatically detects it as another removable drive. It is possible to read, write, copy, delete and move data from hard disk to it and vice versa. It is also possible to play MP3 files, run any applications view videos or even take high quality digital photos directly from it.

There is variety of pen drives in the market. Professional models which has a high performance flash memory and performs up to read and write 20 MB- the fastest in the world. This flash memory stick comes with an LED indicator, boot function, and write and delete protection. It has got maximum weight of 22 grams. Mini USB pen-drive is another variety of it which has got same technical specifications of professional models but it comes with key ring. Because of how small it is, one can easily fit it into their pockets and are designed to imitate a small pen or pencil, hence being named “pen” drive.

Why pen drives are used more now days? What is the advantage of using this jump drive? The advantage is easily accessible and common for all. The main benefit of using it is that its scratch and dust proof. It can be easily carried from one place to another manages every day carrying and abuse. It helps to take some important data from one place to another easily, it is very much portable. The working of it is also very simple and easy. You should only connect it the USB plot. Professional models are costly comparing to the normal mini pen drives. The types of pen drives are pen drive professional, USB micro, USB mini, USNB compact, USB HDD-2GO, USB business drive. The last two of them are ultra fast data transfer and compact.

USB pen-drives are the best when it comes to removable storage device because of its portability and features that are easy to use. It is highly durable sleek and compact to the consumers. They are quiet suitable for casual users and are resistant to damage or other problems. They are versatile because of its ability to be used for many different things and can be easily used by students, employees, and network administrators.

How to Retrieve Deleted Text Messages From a Samsung CDMA Cellular Device

Have you noticed some changes in your relationship or marriage that make you feel uneasy? You may have even caught your husband deleting text messages from his cell phone when he realized you seen him texting. These are just a very few of the many signs that usually occur when an innocent individual is involved with a cheating spouse of partner. Unfortunately, far too many people eventually just resolve to the fact that they will never be able to catch their cheating partners that are engaging in infidelity. The good news is there is another option available, when you rely on an expert to retrieve deleted text messages from your partners Samsung CDMA cellular device.

Consulting with a professional in cell phone forensic investigations is a service that can provide you with a variety of helpful information when you would like to confront a spouse that is having an affair. They have the ability to retrieve deleted text messages and other information such as the data that is listed below:

– File system

– NV memory dump

– EEPROM/ROM/Flash memory dump

– Device properties

– Calendar

– History of erased calls that were made and received

– Detailed phone book information

– NAND memory dump

– SMS text history

– Other erased data

Before you think about trying SIM card readers that you can purchase over-the-counter, it would be advisable to speak with a professional first. These readers are well known for the damage that they can cause to the data that is on cellular devices. To make matters worse, you will generally never be able to retrieve deleted text or data after it has become damaged. It is much better to let an expert perform a cell phone forensic investigation. They have the specialized equipment and the knowledge to perform investigations on Samsung CDMA cellular devices in as little as 48 hours.

There are many different reasons why there are more individuals than ever before that are depending on investigators that know how to retrieve deleted text messages and other forms of important data, and a few of the most common reasons would include the following:

– Employers trying to catch employees who have engaged in theft

– Innocent individuals that are faced with the need to catch cheating partners

– Parents that suspect their teenager is partaking in various actions that include the use of illegal drug substances, bullying teenagers or other children, and sending or receiving sext messages (sexting)

Copyright (c) 2010 Ed Opperman

Acer Aspire One BIOS Recovery

The Acer Aspire One has its own built-in BIOS recovery routine, allowing it possible to flash the BIOS even when the system doesn’t boot anymore. It’s feature meant only for emergencies it may void your warranty, so use at your own risk.

Execute every step carefully!

Step 1 :

Format an USB stick with FAT file system.

Step 2 :

Download the latest Aspire one BIOS, then put both Bios and the FLASHIT.EXE software file in the root directory of the USB stick.

Step 3 :

Important, rename the BIOS file to ZG5IA32.FD and do not remove the USB stick.

Step 4 :

Turn off the A1 and make sure both battery and AC adapter are connected.

Press the Fn+Esc key, keep it pressed and push the power button to turn the Aspire 1 on.

Release the Fn+Esc key you will see after a few seconds, the power button blinking.

Push the power button once at this time the acer One will now initiate the BIOS flash, do not interrupt it under any circumstances.

Wait until the power button stop blinking, the AA1 will reboot shortly after. Wait patiently.

Now the BIOS has been flashed so all settings reset to default.

If for any reason you made a mistake during the procedure let it unable to reboot by itself wait 5 minutes before turning it off( just to be safe that it isn’t still flashing the BIOS).

Bonus :

I would really recommend u to disconnect !!all!! USB devices, especially storage class, from your netbook before doing a reboot.

You can find more solutions  at http://www.laptop-support.net

Pen Drive – History and Facts

Often referred to as a jumpdrive, the pen drive is a portable flash memory solution, designed to transport data files from one computer to another. The product can carry audio, video and data files, and is brilliantly simple; all the user has to do is plug the pen drive into a computer`s USB port, drag and drop the necessary files from the hard drive, remove it and plug it into another machine.

Durable, portable and scratch-resistant, the pen drive is a marked improvement on previous data transportation devices, such as the CD and floppy disk, and a source of constant relief and graduate for millions of people the world over.

The history

At the dawn of the new Millennium, it became clear that traditional storage solutions were no longer up to the job. People now needed to move large files between computers in the blink of eye, using intermediary technology which was quick to set up, easy to carry and hard to damage. A clutch of software companies, including SanDisk (then known as M-Systems), Lexar, Trek and IBM began working on a solution that would meet these needs.

Their solution was the revolutionary USB flash drive, which was gradually developed in the last years of the 20th century. In 2000 Trek rolled out the first-ever flash drive, named Thumb Drive, in Singapore, with IBM introducing a similar model to the North American market. Just a few months later Lexar introduced a Compact Flash (CF) card with a USB connection, and a companion card read/writer and USB cable; this eliminated the need for a USB hub, and allowed the pen/flash drive to enjoy meteoric growth over the next decade.

How it works

Each pen drive comprises a tiny Printed Circuit Board (or PCB) to store data, a USB connector, and a NAND flash memory chip using multicell level technology; this groundbreaking solution was first developed by SanDisk and Toshiba in 2005. The constituent technologies are encased within a tough outer shell, manufactured in metal, rubber or plastic, and the USB connector may be sheathed in an outer cap or protected by a retractable strip, which allows the user to withdraw the connector when not in use.

The name pen drive is actually an anachronism; drives typically rely on mechanical systems, but this little gem does not. The term drive remains as a vestigial nod to the past because computers read and write flash-drive data using the same system commands as for a mechanical disk drive, with the storage appearing to the computer operating system and user interface as just another drive.

Meteoric growth

In less than 10 years the pen drive has evolved from an optional extra for the technologically savvy into an indispensable staple for all computer users. People have found more and more reasons to use a pen drive, and they have been encouraged by rapid increases in storage capacity; the early pen drives had room for just 8MB, but this soon increased as the technology improved – today you can pick up a pen drive with capacity of 128GB, provided you are willing to pay top dollar for the privilege.

The growth of the pen drive has rendered the good-old floppy disk almost obsolete. Until 2005 most PCs were fitted with floppy disk drives as standard. Now, faced with the ubiquity of the pen drive, designers are leaving out the old drives and fitting USB ports instead. The revolution is nearly complete!

The Major Components That Make Up a Computer

In this article I give a high level overview of all the major components of a computer – the computer hardware. This information is useful for anyone who wants to be able to repair or upgrade their computer, or just wants to have a basic understanding of how a computer works.

Case

The computer is housed inside of what’s called the computer case. The computer case is the metallic box that surrounds the computer. It’s there to protect the computer and to hold the components in place.

Power Supply

The power supply is the box with lots of wires coming out of it. It takes the electricity that comes out of the wall outlet and converts it into electricity that each of the internal components can use.

Motherboard

The motherboard is a big circuit board that connects all the internal components together. It gives the internal components a way to communicate with each other. It also provides some common functionality that is basic to all computers – audio, network, modem, sometimes video, and a few other things. These additional devices that come as part of the motherboard are called integrated devices.

The motherboard also has slots that other device cards can plug into and provide extended functionality to the computer. Some of the more common cards are wireless cards, USB extension cards (provide additional USB ports), and even video cards – which I talk about below.

CPU/Processor

The CPU (Core Processing Unit), also known as the processor, is the main logic component of the computer. It decides what to do, what to load, which other device to activate, etc. It’s kind of like the center of the brain.

The processor tends to get extremely hot, so it’s always covered by a heat sink (metal thing with fins) and a fan. The processor itself looks like a standard chip.

Hard Drive

The hard drive is the long-term memory of the computer. The long-term memory is slower and much bigger than the short-term memory, specifically made for storage of data. Read the section on main memory for information on short-term vs. long-term memory.

Main Memory

Also known as primary memory, RAM, or just memory, is the short-term memory component of the computer. Short-term memory is much, much faster than long term memory, but is also much, much smaller in size.

Main memory is not used for storage of data over the long term. Unlike the hard drive, main memory has to have power to keep information. Once the computer is turned off, the main memory is cleared out. Instead main memory is used for fast data access. Once the computer knows what data you’ll be working with, it loads it up in one big chunk into main memory, and works with it there. For example, when you run application xyz, your computer loads up lots of the common data that the application needs into memory, from then on it works with it in the much faster main memory. Then once you want to save your changes, the computer writes that data out to the hard drive for long term storage.

Video Card

The video card handles the display of images and 2D/3D graphics calculations. Often the video card comes integrated into the motherboard. But integrated video cards are somewhat weak. The powerful video cards, needed to run modern games and other graphically intensive applications, come as standalone cards. They are big circuit boards with their own processor (GPU) and memory. They even have fans and heat sinks. They are kind of like separate computers inside of the computer.

CD/DVD Drives

These are standard devices that read and sometimes write CDs and DVDs.

Data Mining and Its Impact on Business

Today, businesses are collecting more information that is available in a variety of formats. This includes: operational data, sales reports, customer data, inventory lists, forecast data, etc. In order to effectively manage and grow the business, all of the data gathered requires effective management and analysis. One such way of controlling the vast amount of information flow is a process called Data Mining.

Data mining is the process of taking a large amount of data and analyzing it from a variety of angles and putting into a format that makes it useful information to help a business improve operations, reduce costs, boost revenue, and make better business decisions. Today, effective data mining software has developed to help a business to collect and analyze useful information.

This process allows a business to collect data from a variety of sources, analyze the data using software, load the information into a database, store the information, and provide analyzed data in a useful format such as a report, table, or graph. As it relates to business analysis and business forecasting, the information analyzed is classified to determine important patterns and relationships. The idea is to identify relationships, patterns, and correlations from a broad number of different angles from a large database. These kinds of software and techniques allow a business easy access to a much simpler process which makes it more lucrative.

Data mining works allows a company to use the information to maintain competitiveness in a highly competitive business world. For instance, a company may be collecting a large volume of information from various regions of the country such as a consumer national survey. The software can compile the mined data, categorize it, and analyze it, to reveal a host of useful information that a marketer can use for marketing strategies. The outcome of the process should be an effective business analysis that allows a company to fully understand the information in order to make accurate business decisions that contributes to the success of the business. An example of a very effective use of data mining is acquiring a large amount of grocery store scanner data and analyzing it for market research. Data mining software allows for statistical analysis, data processing, and categorization, which all helps achieve accurate results.

It is mostly used by businesses with a strong emphasis on consumer information such shopping habits, financial analysis, marketing assessments…etc. It allows a business to determine key factors such as demographics, product positioning, competition, pricing, customer satisfaction, sales, and business expenditures. The result is the business is able to streamline its operations, develop effective marketing plans, and generate more sales. The overall impact is an increase in revenue and increased profitability.

For retailers, this process allows them to use of sales transactions to develop targeted marketing campaigns based on their customers shopping habits. Today, mining applications and software are available on all system sizes and platforms. For instance, the more information that has to be gathered and processed, the bigger the database. As well, the type of software a business will use depends on how complicated the data mining project. The more multifaceted the queries and the more queries performed, the more powerful system will be needed.

When a business harnesses the power of this system, they are able to gain important knowledge that will help them not only develop effective marketing strategies leading to better business decisions, but it will help identify future trends in their particular industry. Data mining has become an essential tool to help businesses gain a competitive edge.

25002 Installation Error Fix – How To Resolve Error 25002 Errors On Your PC

The 25002 error is a typical problem that rears its head when you attempt to install / uninstall Norton or Alcohol on your computer. This error mostly occurs when your PC does not have the adequate permissions, or drivers to carry out the operations you are asking of it.

This error is mainly driven by the way in which Windows cannot process files and settings needed to run the system properly. The usual format of this error will show itself as:

  • “Error 25002: Failed to load navinst.dll.”

The causes of this problem can be attributed to the way in which your computer cannot read the files or settings required for the installation/un-installation to take place. Typical examples of this problem will be when your user account does not have the correct permissions to run the file, or when you are experiencing file corruption issues with the “registry” of your system.

How To Fix The 25002 Error

Fixing the 25002 error is simple. The first step is to ensure you have the correct permissions on your system. Most software can only be installed and uninstalled by the user account that has the required rights to do so, e.g. the administrator. If you’re not logged in as the administrative user, log out and then log in again with the correct user account that has permission to install in your system.

The next step is to check if your Navinst95.dll or Navinstnt.dll file is damaged or corrupted in any way. If so, you have to repair any of the problems which are causing the errors by clicking “Start” and then selecting “Search”. After this you have to locate Navins95.dll and Navinst.dll and rename them both as “navinst.dll”. The third step is to fix any corrupted and unreliable settings inside your computer that are stored within the “registry” data house. These stored settings can establish how your computer is capable of installing a program correctly onto the hard drive. These registry errors can be resolved by clicking “Start” and then selecting “Run”. When a box shows up, type “regedit” and then press OK. Now, locate the following registry key when the Registry Editor window appears:

HKEY_LOCAL_MACHINESystem CurrentControlSetControlFileSystem.

The next thing to do is to double-click NtfsDisable8Dot3NameCreation in the right pane and then change the data in the Value data field from 1 to0. After, exit RegEdit and restart your PC. After that, install Symantec AntiVirus Corporate Edition client on your hard drive. When installation process is finished, change the value of NtfsDisable8Dot3NameCreation file back to 1.

The final step for resolving 25002 errors is to use a registry cleaner device. The registry is a major reasons for the 25002 error appearing, as it is the central database which stores all the vital settings and options that is required by Windows each time you use a program like Norton or Alcohol. It is responsible for storing your recent emails and files, including desktop wallpapers and the like. If you want to completely fix the errors appearing in your computer, you should clean through the registry by using a registry cleaner. There are quite a few programs available, but not all are equally effective. Therefore, only download one that has been recommended by professionals.

A online marketing task by Kelvin Scotts, top singapore digital agency that provides complete digital marketing services. More details, visit here.

Entourage Repair to Fix "Not Enough Memory" in Microsoft Entourage

Are you unable to access your Entourage Inbox, Drafts folder, Deleted Items folder, and any of your subfolders of Inbox? You get memory errors while accessing items from your database. This behavior makes all your precious data inaccessible and leads to severe data loss. At this point of time, you need to opt for Entourage repair solutions to get your precious data back.

In a practical instance of this problem with your E-mail client, you may encounter the below error message while accessing data-

“Entourage cannot open the item due to an error. Not enough memory.”

This behavior renders all your precious data inaccessible. In order to recover Entourage database in such cases, you need to find out the cause of this issue and fix it using appropriate solutions.

Root of the problem-

Unfortunately, the above error is not caused by memory problems. This is actually a wrong description on generic error, which can be caused by number of other things, such as-

  • If you get this error while receiving emails, it can be due to a corrupt message.
  • The fonts are faulty or damaged.
  • Your Mac RAM (Read Only Memory) is either low or damaged.
  • Entourage database is either corrupt or unrecognizable.

Resolution-

  • Log into your account using web browser and remove the damaged items.
  • Install new fonts or remove the faulty fonts.
  • Replace or Upgrade your Macintosh RAM.
  • Restore your database from the most recent backup. You are recommended to repair Entourage database from backup only if it is updated.

If you cannot perform Entourage database recovery using any of the above methods, you need to opt for Entourage recovery software to get your data back. Entourage repair software are capable of retrieving inaccessible data in all data loss situations.

A digital marketing task by Kelvin Scotts, best marketing firms in singapore that provides full suite social media marketing services. More details, click here.

Database Recovery Concepts

The process of solve any type of database failures, quickly and without data loss and keep database high available is called database recovery.The main elements of database recovery is the most recent database backup.If you maintains database backup efficiently, then database recovery is very straight forward process.

The components and technologies of database is to configure to minimize or no data loss and keep database for open, includes

* Checkpoints

* Control file

* Online redolog files

* Archived redo log file

* Flash Recovery Area

Recovery Technologies

* Database Flash back technology

* Open database in Archive log mode

* Implement database high availability features like RAC, DATAGUARD,steams etc.

Components of database recovery

Checkpoints:- Checkpoint (CKPT) in oracle database is a mandatory background process. This process works in concert with the database writer process (DBWn) to manage the amount of time required for instance recovery. Checkpoint in oracle occurs when manual or automatic log switch occurs. FIRST_START_MTTR_TARGET parameter can be adjusted to control checkpoints as a result to improve instance recovery.

Control file – Control file is a metadata repository for database. It keeps all information about structure of the database. Control file is a very critical for database operation, so as being a DBA,you should maintain at minimum two copies of control file ( Oracle recommend three ) and save these in a different disk to same the control file disk failures.

Multiplexing control file

* Through Init.ora

* Through SPFILE

Multiplexing control file on init.ora file though CONTROL_FILE initialization parameter

CONTROL_FILES =(‘/u01/app/oracle/oradata/prod/ctlorcl01.ctl’,’/u02/app/oracle/oradata/prod/ctlorcl02.ctl’,’/u03/app/oracle/oradata/prod/ctlorcl03.ctl’)

Storing control file into multiple location,it protect control files from single point of failure. In multiplexing control file configuration, Oracle updates all the control files at a time, but uses only one,first one listed in the CONTROL_FILES parameter.When a single controlfile is corrupt, then DBA can simply copy a good one to that location or other location and make changing in the CONTROl_FILE parameter in init.ora file, resolve the issues.

Through SPFILE

We can dynamically set or change the location of the control file using SPFILE concept using the following command.

SQL> ALTER SYSTEM SET CONTROL_FILES =

‘/u01/app/oracle/oradata/prod/ctlorcl01.ctl’,

‘/u02/app/oracle/oradata/prod/ctlorcl02.ctl’,

‘/u03/app/oracle/oradata/prod/ctlorcl03.ctl’) SCOPE=SPFILE;

The parameter will get effects when restart the oracle instance.

Multiplexing redo log files

The information in the online redolog files are very important for database recovery. For safe guard these files against any kind of damage you can configure multiple copies of online redolog files in different disk location. All multiplex copies of redolog files are same in size and keep in a group. Each redolog file in a group is called members. LGWR background process, writes redo information to all identical members of a group,It is a best practice to protect redolog file from single point of failure. When multiplexing redolog files, members of a group should keep in different disks so that one disk failure will not affect the normal database operation.For normal database operation at least two redo log groups is required.

Creating new logfile group

We can create new redolog groups using the following command.

SQL > ALTER DATABASE ADD LOGFILE

GROUP 4 (‘/u01/app/oracle/oradata/prod/redo0401.log’,

‘/u01/app/oracle/oradata/prod/redo0402.log’

‘/u01/app/oracle/oradata/prod/redo0403.log’ ) SIZE 10M;

We can add new member to an existing group using the following command.

SQL> ALTER DATABASE ADD LOGFILE MEMBER

‘/u01/app/oracle/oradata/prod/redo0401.log’ TO GROUP 3;

Renaming Log members

Following steps to be follow to rename log members

1. Shutdown database.

2. Copy/rename redolog file to new location with operating system command

3. startup database with STARTUP MOUNT command

4. Execute SQL> ALTER DATABSE RENAME FILE ‘oldfilename’ TO ‘newfilename’

5. ALTER DATABASE OPEN

Dropping redolog groups

SQL> ALTER DATABSE DROP LOGFILE GROUP 3

What Is the Difference Between Hot, Warm and Cold Disaster Recovery?

When it comes to implementing your business continuity plan what strategy do you adopt for the disaster recovery element? (for a description on the difference between Disaster Recovery and Business Continuity please see my article on Disaster Recovery or Business Continuity?).

You may have heard the terms hot, cold and warm recovery, but what do they mean, and what are the advantages and disadvantages of each service?

Hot Standby

Hot standby is normally available to the users within minutes of a disaster situation. This level of service is achieved by total duplication of the computer systems covered (hardware, software and data). There will also be a requirement for a resilient network connection into the Hot Site.

Benefits – Available immediately; dedicated to (customer).

Disadvantages – Cost; Complexity, management.

Warm Standby

Warm standby is normally available to the users within hours of a disaster situation. This is by far the most common type of service utilised by for I.T. disaster recovery, and typical recovery times range from 8 hours to 24 hours (dependent on complexity, location and data volumes).

The service can be delivered from a remote recovery centre, or alternatively, delivered to site in the event of a disaster. Depending on the equipment involved the configuration may be installed within an existing facility or a mobile recovery unit.

It should be noted that whilst the Hot standby option is normally dedicated to one customer, Warm standby is delivered on a subscription basis. Industry standards are between ten and twenty five subscribers per configuration. Availability is therefore not guaranteed in the event of a disaster. Testing is also normally to a predefined number of days P.A.

Benefits – Lower cost; reasonable availability.

Disadvantages – Availability; recovery timescales are longer; limited testing available; only available for a limited period following a disaster.

Cold Standby

Cold standby is the provision of computer and people facilities that are made available to the client within a few hours of the incident. Unless the service is backed up by a contract to supply the necessary computer equipment, the recovery period is likely to be several days. It is not unusual for Warm and Cold standby services to be combined, giving a very flexible approach to recovery.

Fully serviced office space is also available on a subscription basis. These are usually equipped with PCs, servers, printing facility and a network infrastructure. These would be described as Business Recovery Centres, and could also incorporate Cold space for central systems.

Benefits – Lower cost; large amount of available space (can accommodate large systems). Business recovery Centres can accommodate several hundred people.

Disadvantages – Availability; recovery timescales are longer; limited testing available; only available for a limited period following a disaster; additional recovery services needed.

EMA Continuity