• Main Menu
    • Postfix

      Postfix

      The sum of X and Y is written as X+Y where + is the operator while X and Y are the operands. We have always learnt to write the sum of two numbers as X + Y; this notation is know as infix. Here, we’ll be talking about the postfix notation of representing arithmetic operations.

    • IC Design

      IC Design

      In the modern world of data and information, computer systems need circuits that are able to process and transfer that information. Because of this, a great deal of resources and innovation go into creating more advanced circuitry in order to increase data transfer rates and make computer systems smaller. This article will demonstrate how integrated

    • ITIL Processes

      ITIL Processes

      The Information Technology Infrastructure Library (ITIL) is a series of books that contain proper procedures to handle situations that any IT organization would come in contact with. Using a series of check lists, tasks and procedures, an IT organization can take what is available to it and implement it in such a way that ensures

    • Remote Access Security

      Remote Access Security

      Remote Access Security Overview To protect your corporate data from attacks from intruders and from being accessed by unauthorized users, you need to plan for and implement remote access security. You should authenticate remote access clients attempting to establish a remote connection with the remote access server. To secure connections to the corporate network, you

    • Troubleshooting ISA Server

      Troubleshooting ISA Server

      Tools for Troubleshooting ISA Server There are a variety of tools that you can use to troubleshoot ISA Server. The type of issue would determine which of the tools(s) listed here you need to use: ISA Server Reports tool: You can use the reporting feature included with ISA Server to obtain and view information on

    • Convert MM to Inches

      Convert MM to Inches

      Convert MM to Inches Automatically To convert MM to Inches, enter the number of MM to be converted into the MM box below. MM: Millimeters (mm) Results: Inches (in) 0 Feet (ft) 0 Yards (yd) 0 Rods (rd) 0 Miles (mi) 0 Micrometers (µm) 0 Centimeters (cm) 0 Meters (m) 0 Kilometers (km) 0 Convert

    • VoIP Security

      VoIP Security

      Any technology that involves transfer of data or information is prone to compromised security. It happens with telephones, cell phones, email and Internet transactions. Because VoIP (Voice Over Internet Protocol) has the Internet as its mode of transference it’s possible to have your Internet-based called intercepted. To make matters worse, there are techno-troublemakers who are

    • Managing Recipient Objects, Address Lists, and Distribution and Administrative Groups

      Managing Recipient Objects, Address Lists, and Distribution and Administrative Groups

      Recipient Objects Overview Active Directory objects such as user accounts, contacts and groups become recipient objects when e-mail address information is added to the object. The public folder is another type of recipient object. A public folder does not however usually have its own an email address. Exchange Server 2003 supports the following types of

    • WiFi Signal Strength Meter

      WiFi Signal Strength Meter

      Windows and other operating systems have a WiFi signal strength meter, but this is usually basic software and does not really tell the user much about the wireless signal. Fortunately, there are many other programs that do the same thing, but show the user more details about the wireless connection. We will describe some of

    • How to Dry Out a Cell Phone

      How to Dry Out a Cell Phone

      When dealing with a wet phone, it is important to act quickly. Few phone companies offer a warranty on wet phones and have gone as far as to place a "wet strip" on the phone that changes colors when it has gotten wet. What this means is that the wet strip will allow the company

    177 queries in 0.946 seconds.