The pollute of your laptop

The tech industry has a dirty little secret: it has toxic waste of its own. Phones and computers contain dangerous metals like lead, cadmium and mercury, which can contaminate the air and water when those products are dumped.

It’s called electronic waste, or e-waste, and the world produces a lot of it: 20 to 50 million tons a year, according to the UN — enough to load a train that would stretch around the world. The U.S. is by far the world’s top producer of e-waste, but much of it ends up elsewhere — specifically, in developing nations like China, India and Nigeria, to which rich countries have been shipping garbage for years. There the poor, often including children, dismantle dumped PCs and phones, stripping the components for the valuable — and toxic — metals contained inside. In the cities like the southern Chinese town of Guiyu, they work with little protection, melting down components and breathing in poisonous fumes. What can’t be recycled is simply dumped, turning already poisoned rivers into toxic sludge. It’s all done in the hope of earning a few dollars from the detritus of the clean digital economy. Read the rest of this entry »

Is Cost a bottleneck to opt Technology?

Technology and the related costs are two things that can unexpectedly defeat any budget boundaries. These two terms are directly dependent on each other; if you compromise on cost, you will have to suffer somewhere while making a choice for the technology. Whether your business is small or big, these tips can help you slash costs, accumulate capital, and let you focus on what’s really vital for your business. Read the rest of this entry »

What is Data Processing

What is Data Processing – Data Entry – Data Processing – Imaging – Data – Data Analysis – Data Compression – Decimal Numbers – Negative Numbers

<!–
google_ad_client = “pub-1705799527853110”;
/* 336×280, created 5/22/08 */
google_ad_slot = “4167359563”;
google_ad_width = 336;
google_ad_height = 280;
//–>

The word ‘data’ refers to, facts concerning things such as people, objects, events etc. A list of class students, showing students roll numbers, names, marks etc. is an example of student’s data. Therefore, data is defined as; collection of raw facts and figures, which is collected for specific purpose. The data may be in the form of text, numbers, sounds, images, video clips etc. Read the rest of this entry »

How recursive DNS queries work.

The basic concept of DNS name resolution is fairly simple. Every Web site is assigned a unique IP address. In order to access a website, a client needs to know what the site’s IP address is. Of course users don’t usually enter an IP address into their Web browser, but rather enter the site’s domain name instead. In order to access the requested website, the Web browser must be able to convert the site’s domain name into the corresponding IP address. This is where DNS comes into play. The client computer is configured with the address of a preferred DNS server. The requested URL is forwarded to the DNS server, and the DNS server returns the IP address for the requested website. The client is then able to access the requested site.

As you can see, the name resolution process is pretty cut and dry. However, there are countless websites in the world, and new sites are being created every day. It is impossible for your DNS server to know the IP address of every single website. When a DNS server does not know the address for a requested site, it uses one of two methods to determine the site’s IP address.

The preferred name resolution method is called recursion. Generally speaking, recursion refers to the process of having the DNS server itself to make queries to other DNS servers on behalf of the client who made the original request. In essence, the DNS server becomes a DNS client. Some administrators prefer to disable recursion for performance reasons. If recursion is disabled, then the DNS server uses a process called iteration to resolve the name request. Read the rest of this entry »

Free Satellite TV On PC

Technology is advancing so fast that now one can watch satellite TV or hear radio on a home PC. All you need is special hardware known as PCTV cards that are of two kinds. One kind needs to be installed in the PC while the other kind is an external box that plugs into the PC’s USB port. Read the rest of this entry »

How Proxy Servers Protect Your Privacy

Since real servers can’t directly access your information (e.g. browser type, location, IP address, internet service provider), this information can be prevented from being discovered by the real server.

Proxy servers are used to avoid recognizing information from the requests of the user. These are called anonymous proxy servers. Nowadays, numerous anonymous proxy servers are already available on the Internet. You can find lots of free services. Read the rest of this entry »

What is a USB device?

The USB interface expands a computer’s plug and play capabilities, as it allows a wide array of devices that have been specifically created for USB to be connected with the PC, either with or without device drivers installed. USB’s standard design was accomplished by the USB Implementers Forum (USB-IF), a consortium of leading computer and electronic companies that serves as the industry standards body. As a result of the standardization, third-party hardware is identical on all platforms and differs only in the required OS-specific software. Read the rest of this entry »

Monitoring Remote Teams

Accessing and managing remote teams is quite a daunting task with a number of small-large organizations following the pattern of having remote teams. When the teams are spread across different geographical locations, it becomes difficult to keep a tab on them and also get the work done through them. The remote teams are mostly found in IT organizations and home–based offices. It definitely requires some special techniques to successfully manage remote teams. Read the rest of this entry »

External USB hard disk drive HDD

Since the introduction of the external hard drives, they are becoming more popular and the use of USB external hard drives is increasing for purpose of backup data storage and software. The bandwidth of USB 2.0 is higher that is useful and essential for the peripherals of high speed. The peripherals of high speed can be the DVD & CD drives, removable hard disk drives and the high speed scanners. Read the rest of this entry »

Is Indian IT really fattening?

In the global slow down scenario, where all the countries are facing a recession, the Indian IT industry seems to be gradually gearing up to the mark in export revenues. According to IT research firm Gartner, IT end-user spending in India is expected to grow at a compound annual growth rate (CAGR) of 14.8 per cent from 2007 through 2012 to generate US $110 billion in 2012. We can say that the Indian IT industry hardly has a radical effect in the retrenchment of employees. The reason is that the Indian businesses continue to invest in IT in order to drive operational excellence and innovation to represent a significant growth opportunity for IT vendors. Read the rest of this entry »