This is site will talk to you about IT, Computer, Antivirus, Peripheral, Software and ETC
Advertisements
Link Unit
Wednesday, July 9, 2008
Portable printers still in demand
Zatni Arbi , Contributor, Jakarta
http://www.thejakartapost.com/news/2008/07/07/portable-printers-still-demand.html
With the capacity of USB flash disks getting larger and larger and portable USB hard disks offering hundreds of gigabytes of storage, who would need a portable printer?
If your organizing committee wants a hard copy of your presentation, just copy the PowerPoint file to a USB disk and hand it to them. Give them the name of the file and they will take care of the rest. The good thing is you do not have to worry about your ink expenses.
But there are times that you have to do the printing on your own. If you are in your hotel room late at night, the business center is closed, and you remember that you have to prepare an invoice to be submitted to your client first thing in the morning, you may find yourself wishing you had a printer in your suitcase.
And if you happen to be in an unfamiliar city, would it not be better to have a printout of the map depicting the route to the convention center where you are supposed to give your presentation? Just go to the Web, select the right map, zoom in the right area, print it out and keep the printed map in your pocket.
A portable printer has long been a notebook companion for a lot of road warriors. The early models did not use ink. Yes, you guessed it right, they used thermal transfer fax paper. Of course, the biggest drawback with this kind of printout is that it fades quickly.
A much noisier type of portable printer uses the old dot matrix technology, but this type generally is for special purposes. For example, they are used to print labels, receipts, tickets, etc. They are no good for printing a press release.
For many years, top printer makers such as Canon, Citizen and HP have sold quiet but reliable portable printers. Courtesy of Datascrip, I had the chance to play around with the latest portable printer from Canon, the PIXMA iP100. It is the successor to the Canon PIXMA iP90, which I did not get to test drive.
PIXMA iP100 is a portable photo printer. It can print full page photos without borders. (JP/Zatni Arbi)
Packed in a plastic box with a silver-finish, the CNet Editor's Choice PIXMA iP100 has two ink tanks -- one for the black and the other for the colors.
A unique feature is Canon's Use Composite mode.
If you run out of black ink, you still can print black text as the printer has the intelligence to mix the color inks to produce black. To cut down the use of black ink, there is a Save Black Ink mode. The printer prints various sizes of paper, with A4 the maximum.
Like most high-end printers nowadays, Canon uses a technology that it calls ChromaLite 100, which promises that the printouts will last for 100 years. I do not think I will live long enough to verify that the promise is kept. The photo quality is enhanced by the use of Canon's FINE technology, which now has 1,856 nozzles to spurt the ink on the paper. Additionally, one droplet of ink has the volume of a picoliter.
Different technologies have made photo printouts look more detailed and colors more vibrant, but if you still insist on knowing the resolution, the iP100 has a printing resolution of 9600 x 2400 dot-per-inch (DPI).
More interesting is perhaps the ability of this printer to print photos without borders. But, perhaps, the most relevant feature is the speed that Canon claims this printer is capable of.
The company's press release says that it can churn out up to 20 black-and-white text pages per minute and 14 color pages per minutes. A full color, 4-by-6-inch photo takes around 50 seconds. I did not have a stopwatch to check this.
There are three different ways to connect the portable printer to a notebook computer. You can use a USB cable, which I did in my test. There is also infrared connection, which is commonly called IrDA. You can also invest in a Bluetooth adaptor (BU-30), which will enable you to print directly from Bluetooth-capable PDA or notebook. You can print directly from your digital camera or a camera phone without the help of a PC. The printer also works with Macs.
Unfortunately, there is no media card reader and there is no way to add Wi-Fi, either. On the other hand, the Solution Menu application really makes it easy to select the photos you want to print. You can also check the status of the ink in the cartridges, although it only tells you that the ink level is "Adequate".
"Customers are still interested in portable photo printers," Nisyarani, a member of the Datascrip media relations staff, told me.
"During the computer exhibition at the Jakarta Convention Center last month, we ran out of stock. People were even willing to buy this demo unit," she added, referring to the printer unit that I was trying out.
It was rather surprising news, as the price tends to be on the higher end. Without the rechargeable battery, the price is US$248. With the battery, it is $292.
"The battery will enable you to continue working even while stuck in traffic," said Merry Harun, Datascrip's director for Canon division.
A fully charged battery can last for around 450 printouts. There is also an optional car kit, so that you can recharge the battery using the cigarette lighter jack in your car.
The unit weighs around two kilograms. You will need a wheeled bag if you have to carry both this printer and a notebook. The plastic feels a bit flimsy, and I have no idea how resilient the PIXMA iP100 when facing the abuse of regular travel. However, if you are habitually careful with your electronic gadgets, this is a good solution for your occasional -- probably desperate -- printing needs.
Each time you decide to carry your portable printer, just remember to throw in a pair of spare ink cartridges just in case. You do not want to add two kilograms of dead weight in your suitcase -- especially now that airlines are more unforgiving when it comes to excess baggage in light of rising fuel prices.
http://www.thejakartapost.com/
Website Sales Purpose
by: Sharon Housley, from articlecity.com
When designing a website, it is important that webmasters ask some general questions before they begin the design process... What Is The Purpose Of Your Website? Many companies use websites to establish their brand. Others use websites as a communication tool. Some companies see websites as sales vehicles and "billboards". Still others use their website as an educational tool. And some may be any combination of the above. The website must have a purpose in order for it to be effective. What Is It That You Are Trying To Accomplish With The Website? A strong understanding of the website will allow a webmaster to emphasize the action they want the website visitor to take on the website.
By defining and understanding the purpose of the website, webmasters and publishers can better structure the information on the website. Information can be provided with the appropriate emphasis and navigation. An ideal website will lead the web visitor to take the action the webmaster wants. Who Is Your Audience? You must identify and understand your target audience.
Understanding your demographic will allow you to cater content specific to that group. What Are The Objectives Of The Website? You also need to determine what the objective of your website is. What are you attempting to accomplish? Are you trying to sell something? Are you looking for downloads, or is sales your real objective? Is your website trying to promote a specific product or service? Do you want your visitors to take a specific action? Is the intent to profit from ad space in general or to have website visitor's click on specific ads? Are you trying to build a brand? Do you want visitors to purchase a product, or provide an email address? When attempting to solicit a specific action, there are some general guidelines that you should follow. Your website should be designed to solicit the action you desire, so the navigation should intuitively lead the visitor to take the desired action.
If clicking a link is the goal, then that link should be clearly indicated and prominent on the page. This will not only help insure that the maximum number of visitors will be able to adequately view and navigate your content, but it will also help prompt those visitors to take the action you wish to have occur. For example: Many software companies struggle with the action they wish to solicit from the website visitor. Software companies and eBook publishers are often guilty of pushing users to download, at the expense of the actual sale. Some companies prefer to have users download prior to making a purchase decision, while others lose impulse purchasers by only pushing the download rather than the sale. In Order To Maximize The Websites Sales Purpose And Objectives, Follow These Simple Steps... Address Compatibility Issues If a website visitor is unable to view the website's content, they are obviously going to be unable to complete the desired action. The compatibility issues could be related to technology or usability.
Avoid using technologies that require the website visitor to download a plug-in before they can view the website content. If providing content using flash is important to you, you should also provide a flash-free version as well. Also, do not alienate website visitors who might have a disability -- use proper web construct, provide alt tags for images, and avoid using a color scheme that will cause confusion. Define A Clear Navigation Path A website's navigation should provide the visitor with a clear path. Information architecture is the organization and categorization of online content -- the process of creating clarity and organizing online information in a purposeful, and logical way.
Prioritize and emphasize the most important items on the website. Give visitors a clear path to what they are seeking. Each and every page should intuitively provide them links to additional information and purchase options. Minimize Distractions Minimize choices and other website distractions. Website visitors should be provided a clear path of action. Do not provide the website visitor an abundance of choices -- studies show that a large number of choices often puts the consumer off. It is generally recommended that you provide no more than 3 choices. Keep your message concise and on-topic.
Website visitors will often just scan a webpage rather than reading it, so bulleted lists and headlines might be used to emphasize your message. It may sound like a cliche, but it's the little things that can make the biggest difference. Pay attention to all aspects of your website. Defining the specific website objectives and purpose will help to encourage the desired action or behavior from your website visitors.
How to Clean your Keyboard-Part 2
by: Ray Geide, from articlecity.com
When it comes to cleaning your keyboard there are many methods that can be used, some harder and more effective than others. The easiest method is the Shake Method. It is so easy that you can do it right now. Pick up your keyboard, turn it over being careful not to press any keys, and shake it. See all of that stuff fall out? It is dirtier than you thought, isn't it? You can use one of the following methods to clean it further.
The Blow Method - You can buy cans of pressurized air at the computer department or computer store which are made especially for cleaning your computer. They usually have either a hose and nozzle or a tube extending from the nozzle. Hold the keyboard up vertically (that means that end of the keyboard is up and the other end is down), aim towards the keys and press the button. Keep blowing until all of the debris is blown out. Be sure to get around and in between all of the keys.
This can be done with the computer on, but it is better if it is off so that you do not have to worry about pressing the keys and coming up with a page of aaaaaaaaaaaaaaaaaaaaa's. The Vacuum Method - This is just like the Blow Method except that a vacuum is used instead of a can of pressurized air. It is quite simple. Just turn the vacuum on, pull out the hose, and run the nozzle over the keys. Before doing this make sure your keyboard does not have any loose pop off keys that could be sucked into the vacuum.
The Cotton Ball Method - This can be done in addition to the above methods and in lieu of the following methods. Take a cotton ball or cloth and wet it with rubbing alcohol. It should not be so wet that the alcohol runs down into the cracks of the keyboard. Wipe the tops and sides of the keys. The Dishwasher Method - I hesitate to tell about this method because there is the possibility that it could fry your keyboard.
When I had less experience with computers, I dunked my keyboard in a sink full of water to clean it. It did work afterwards, so I don't doubt those who say this method will not mess up your keyboard, but if it does, don't complain to me. I warned you. If your keyboard is not the standard membrane type of keyboard or if it is on a laptop, do not even think of trying this. This is how you do it. Unplug the keyboard and place it face down in an empty dishwasher.
Do not disassemble the keyboard and do not put it in a dishwasher that has dirty dishes in it. Some say to add soap, some say not to. Run the dishwasher through a regular cycle. Take the keyboard out, shake the water out, and stand it on end until it is completely dry (this may take several days). If it does not work after doing this, it may not be dry. Let it stand another week and try it again. If it still does not work, I warned you.
The Disassembly Method - This is the most thorough method, but it should not be done on laptop keyboards or non-standard non-membrane keyboards. Turn off the computer and unplug the keyboard. Turn the keyboard upside down. You may want to get two books or short boards to place the keyboard on. Position them so that they hold up the keyboard on the edges when it is turned over. This should leave the keys dangling and not touching the books or the floor.
This is especially needed when the keyboard's back is off; otherwise the keys will be lifted out of their position by the floor (or whatever surface it is laying on). Get a screwdriver and remove all of the screws from the back of the keyboard. Lay the keyboard down on the books and carefully remove the back. Take everything apart and clean thoroughly. It is better to take the keys out one at a time and clean them so that you do not put them back in the wrong place. Wipe each one down with a wet cloth and then with a dry cloth. Any keys that may be hard to put back in, can be cleaned in place without removing them.
Wipe around the keys as they sit in place and blow any debris out with your lungs (using compressed air or a vacuum may upset the keys). If you are really brave, you can remove all of the keys at once and give the frame a good wipe down too. Do a once over and make sure that you have cleaned everything. Then reassemble it all. Don't forget the keyboard's cable. Wrap a wet cloth around it and wipe it down. It may have an accumulation of grime that needs to be scrubbed off. Also if any of the letters on the keys have rubbed off, you can use a fine point permanent marker to draw the letter back on the key. Use these cleaning methods and your keyboard will last a long time and be something you can be proud of.
How to Clean your Keyboard- Part 1
by: Ray Geide, from articlecity.com
I know most of you will not heed this advice, but KEYBOARDS CAN MAKE YOU SICK (how's that for tactfulness?). Germs live on your hands and fingers. When you type, many of them jump on to the keyboard. When someone else types on your keyboard, those germs transfer to their fingers. Or when you later type on the same keyboard, those germs reconquer your fingers. Regularly disinfecting the keyboard can prevent this.
To disinfect the keyboard, turn off the computer. Then spray disinfectant on a cloth. Be sure to use disinfectant and not just any type of cleaner because not all cleaners disinfect. Also do not spray the disinfectent directly on the keys. Spray it on the cloth. Wipe down the top and sides of the keys. Give the keys a few minutes to dry off before turning the computer back on. Now that you know how to do it, you should make it a regular practice to disinfect the keyboard. It's one step towards a healthier you.
So you have your keyboard disinfected and life is great. Then your child spills koolaide all over it. What do you do? There are certain steps that you should take when something, like pop, beer, wine, coffee, milk, or kool-aide, is spilled on the keyboard. The first thing to do is immediately unplug the keyboard from the back of the computer and turn the keyboard over so that its keys are down. This will allow the liquid to drain out.
You will probably want to put a cloth under the keyboard or at least make sure that the surface you have put it on is washable. Then use the mouse to shut down Windows and turn off the computer (this is important because later you will have to plug the keyboard back into the computer and you should never plug any device into a computer while it is on).
While the keyboard is upside down use a cloth to dry as much of the liquid off as you can. If you have a can of compressed air or a vacuum, while the keyboard is upside down blow or vacuum it out. Then let the keyboard set upside down for at least a night so that it can adequately dry out. If the liquid that spilled on it was sticky, you may want to follow the extensive cleaning procedure explained in the next article, How to Clean your Keyboard - Part 2.
Liquid spilled on a laptop keyboard can easily reach the hard drive, so turn it over immediately and leave it in that position until it dries. Keyboards are quite resilient and so it should work when you turn it on again. But if not, another attribute of keyboards is that they are cheap and so it won't cost too much to buy another one. With these pointers in mind and a quick reaction, you just may save your keyboard from total destruction the next time it gets coated with coffee.
Symantec Norton Antibot The Latest In Norton Computer Protection Software
by: Lisa Carey, from articlecity.com
It seems like every other month a new “program” comes along to make our lives that much easier. For example, first we could bookmark favorites, and then RSS feed them, and then came widgets and now “bots” which are robots that do a lot of our computer work for us in the background. Examples of friendly bots are weather bots, game playing bots, instant messaging and my favorites are those on AOL Instant Messenger which do all kinds of functions for me like shop, find movie times and even give updates on the Wall Street Journal.
Unfortunately not all bots were created “equal.” Some are friendly and some are not. The ones that are not friendly can be a form of malware that allows control of your computer to be released, providing hackers with the opportunity to access your information and spread harmful bots to others. This type of computer virus can then be used to spread spam and commit various types of identity theft and other online fraud.
So with new threats to our computers and information, new methods of protection are required. One of the oldest and most well known software protection designers has recently released a new protection program, Symantec Norton AntiBot. This is a software product designed to prevent the hijacking of one’s personal computer by bots and uses the bots on design programs against them, to located and destroy them.
Many people already employ some form of protection on their personal computer, such as increasing the protection level from internet information to “high.” But these cannot detect some of the most recent bot programs and may not be the most efficient means of information protection, especially with the Internet being used more and more frequently for online shopping, ticket purchases, travel and other “high risk” activities. A more effective method of detecting and eliminating threats caused by bots is to install software designed specifically to detect, destroy and prevent bots from having access to your computer. With Symantec Norton AntiBot software, protection against bots is enhanced several times and the threat of bot attack is greatly diminished.
It’s program protects against bots by blocking bots from entering your computer through downloads and e-mail attachments (two of the common ways bots enter a personal computer), checking for any unusual behavior on your personal computer and eliminating it, and detecting malicious bot software at all levels; keeping your personal, financial and credit card information safe and stopping identify theft before it can occur. Because bots operate in the background and are not detectable by antivirus or antispyware programs, many computer users are completely unaware that their personal computer has become infected. Many problems caused by bots go undetected until it is too late.
Warning signs that your computer may have been accessed include: slowness of computer speed and unusual or irrelevant error messages. However, many times com these symptoms are sporadic and computer users will take little notice. Many people will continue to use their personal computer, unaware that bots have hijacked their personal computer and are slowly at work; looking for credit card numbers, passwords, and logon information which can be used for identity theft and in committing other types of online crime.
This program scans your personal computer on a continuous basis, closing the gaps that could allow bots to infect your personal computer and better ensuring that bots do not invade and gain control. The use of Symantec Norton AntiBot to determine what a harmful or useful bot and allows you to continue using those bots you love and have come to depend on for information and services. It can be used in addition to several other antivirus and antispyware programs. Its compatibility is not limited to only Norton products.
The cost of this software is $29.95 for one year of service. It was awarded PC Magazine’s Editor’s Choice Award (2007) and underwent rigorous testing which included using AntiBot on computers with existing threats as well as allowing threats to try to access the computer after installation. With the growing threat of identity theft and credit card fraud Symantec Norton AntiBot offers an additional level of protection needed to combat the threat of bots and prevent them from turning one’s personal computer into a robotic that turns into an instrument of destruction to both your personal and financial well-being.
Saturday, July 5, 2008
Indonesian ISPs ban video-sharing Web sites
by Annisa Rochadiat , The Jakarta Post , Jakarta
At least three Internet companies say they have blocked access to YouTube and MySpace because of an anti-Islam film by a Dutch lawmaker.
The move Tuesday was in response to a decree issued on April 2 by the Communication and Information Ministry.
IndosatM2, a popular Internet Service Provider, and two others, namely Telkomnet Speedy and IndoNet, said they had temporarily blocked YouTube, Multiply and other video-sharing Web sites.
According to IndosatM2 customer service officer, Deddy, in addition to YouTube, popular social networking website, MySpace and video sharing site Liveleak, were also blocked since Monday.
"The ban is based on a ministerial decree from the Information and Communication Ministry related to a recent criminal act,” Deddy told The Jakarta Post, referring to the hosting of an anti-Islam film by Dutch right-wing lawmaker Geert Wilders, 'Fitna'.
"We cannot say when the ban will be lifted, but until we receive a follow-up instruction from the DepKomInfo, the blockade will remain,” he added. (amr)
The Dell XPS M1330: Still a strong contender
This notebook was launched in Indonesia in February, when Dell announced it was also entering the consumer segment. Previously, Dell mainly supplied our market with desktop and notebook PCs in the business category.
When I received the notebook and opened it, for example, my nose was immediately stung by the smell of clove cigarette ash. Clearly, the earlier reviewers were intentionally or unintentionally testing the unit against unfriendly particles.

Also atypical of previous Dell notebooks, there is a row of touch buttons on the top right-hand end of the keyboard. It is called Dell MediaDirect. The touch-sensitive buttons detect human fingers only. Nothing happened when I tried to press any of them with a cotton bud. Unfortunately, though, they are placed too close to each other that, I think, the system sometimes gets confused if they are not touched in the right spot. It is a challenge for people like me, who have fat fingers.
So, what do I think of the M1330, which has received an Editor's Choice from PCMagazine as well as a long list of other awards? When it comes to lightweight and thinness, it may have arrived a tad too late in the market. But, when it comes to performance, comfort-of-use and style, it still offers truly exceptional value. It should definitely be on your list of alternatives if you are in the market for a new notebook.
How to clean your Mother Board
by: Ray Geide
If you have not done the inspection mentioned in the previous article - How to Clean your Case, now is the time to do so. Look at the blades of the fan in the back of the computer. Also look at any vents. Is there clusters of dust there? Is there grime caked on to it? If so, the inside needs to be cleaned. If the fan blades are clean but it has been several years since you have cleaned the motherboard or if the computer is around cigarette smoke, it probably should be cleaned anyway. Dust and particles in the air (like cigarette smoke) can build up on the circuitry of the motherboard and cause it to heat up and/or corrode. The first thing that you need to do is unplug your computer.
Then open up the case to get access to the motherboard. Cases open differently. If you don't know how to open your case, look on the back of your computer along the edge for some screws. These screws may hold on side panels or an upside down U shaped panel that covers the sides and top.
Removing the screws will allow you to take off the cover. Other cases have the screws on the front of the computer. To get access to these screws, you must first remove the front panel by pressing a hidden latch. The cover is there to give easy access to the inside of your computer, so if you look hard enough, you should be able to figure out how to remove it.
Remember that if you touch anything on the motherboard, you should be grounded by either touching the metal frame of the computer with your other hand or by wearing a special grounding device.
The goal of cleaning the motherboard is to remove all dust and debris from the motherboard and all components inside of the case. This can be done using one of three methods. The preferred method is to use a can of compressed air to blow it out. Always hold the can in an up-right position to prevent the propellent chemicals which can damage or corrode components from coming out. Dust and dirt should be blown away from the motherboard and out of the case. Another way to remove dust is to use a vacuum. The common advice is to only use a battery operated vacuum because an AC powered vacuum causes static and static can ruin the motherboard.
I have used an AC powered vacuum (before I knew that it was not recommended) to clean my motherboard many times and it has never caused any problems, but I may have just been lucky. When using the vacuum, keep the nozzle a couple of inches away from the motherboard or any other components so that it does not come in contact with them and so that any small parts are not sucked into the vacuum. If you do not have a can of compressed air or a vacuum, you can use a dry cloth and brush to clean the motherboard. Be careful not to dislodge or break anything using this method.
While cleaning the motherboard, be careful not to unplug any cables or connections or to dislodge any loose components, such as, jumpers. Methodically clean the whole inside of the case going over all of the motherboard from one end to the other and all other components. Don't forget to clean the fans and heat sinks. Do not open up the power supply box or stick anything in it beyond the fan. If you do, you could get a shocking surprise and ruin your computer. If your computer does not work when you put it back together, something was obviously dislodged during the cleaning.
Open the case back up and push all connections and cards into their slots. Look for anything that may have become disconnected. Cleaning the motherboard is probably the most dangerous form of cleaning but it is necessary to prevent an early death of your computer.
resources: articlecity.com
Tuesday, July 1, 2008
Web 2.0 And Why You Shouldn't Fake Reviews
Internet And Business Online – The Act Of Interdependence
The best role of business online is that of interdependency. We’ve all heard the old saying, “No man is an island.” When it comes to online business this is especially true. If a business owner who takes their business into the online world determines they will be self reliant and never accept the help of anyone then that individual will not be in business long enough to change their minds. It is accepted fact that the greatest tool for long-term exposure to your website is through Search Engine Optimization (SEO).
Tuesday, June 3, 2008
Operating System
This articles will talk to you description about OS....
An operating system is the software component of a computer system that is responsible for the management and coordination of activities and the sharing of the resources of the computer. The operating system (OS) acts as a host for application programs that are run on the machine. As a host, one of the purposes of an operating system is to handle the details of the operation of the hardware. This relieves application programs from having to manage these details and makes it easier to write applications. Almost all computers, including hand-held computers, desktop computers, supercomputers, and even modern video game consoles, use an operating system of some type. See also Computer systems architecture.
Operating systems offer a number of services to application programs and users. Applications access these services through application programming interfaces (APIs) or system calls. By invoking these interfaces, the application can request a service from the operating system, pass parameters, and receive the results of the operation. Users may also interact with the operating system by typing commands or using a graphical user interface (GUI, commonly pronounced “guoey”). For hand-held and desktop computers, the GUI is generally considered part of the operating system. For large multiuser systems, the GUI is generally implemented as an application program that runs outside the operating system. See also Computer programming; Human-computer interaction.
Common contemporary operating systems include
The designs of the aforementioned operating systems, including Windows (especially Windows NT), were inspired by, directly inherited from, or are very similar to the UNIX operating system. UNIX was developed at Bell Labs beginning in the late 1960s and spawned the development of numerous free and proprietary operating systems.
The History About Microsoft

Main articles: Windows 1.0, Windows 2.0, and Windows 2.1x
The first independent version of Microsoft Windows, version 1.0, released on November 20, 1985, lacked a degree of functionality and achieved little popularity. It was originally going to be called Interface Manager, but Rowland Hanson, the head of marketing at Microsoft, convinced the company that the name Windows would be more appealing to consumers. Windows 1.0 was not a complete operating system, but rather extended MS-DOS, and shared the latter's inherent flaws and problems.
Furthermore, legal challenges by Apple limited its functionality. For example, windows can only appear "tiled" on the screen; that is, they cannot overlap or overlie one another. Also, there is no trash can (place to store files prior to deletion), since Apple believed they owned the rights to that paradigm. Microsoft later removed both of these limitations by signing a licensing agreement.
Microsoft Windows version 2 came out on December 9, 1987, and proved slightly more popular than its predecessor. Much of the popularity for Windows 2.0 came by way of its inclusion as a "run-time version" with Microsoft's new graphical applications, Excel and Word for Windows. They can be run from MS-DOS, executing Windows for the duration of their activity, and closing down Windows upon exit.
Microsoft Windows received a major boost around this time when Aldus PageMaker appeared in a Windows version, having previously run only on Macintosh. Some computer historians date this, the first appearance of a significant and non-Microsoft application for Windows, as the beginning of the success of Windows.
Versions 2.0x uses the real-mode memory model, which confines it to a maximum of 1 megabyte of memory. In such a configuration, it can run under another multitasker like DESQview, which use the 286 Protected Mode.
Later, two new versions were released: Windows/286 2.1 and Windows/386 2.1. Like previous versions of Windows, Windows/286 2.1 uses the real-mode memory model, but was the first version to support the HMA. Windows/386 2.1 has a protected mode kernel with LIM-standard EMS emulation, the predecessor to XMS which would finally change the topology of IBM PC computing. All Windows and DOS-based applications at the time were real mode, running over the protected mode kernel by using the virtual 8086 mode, which was new with the 80386 processor.
Version 2.03, and later 3.0, faced challenges from Apple over its overlapping windows and other features Apple charged mimicked the "look and feel" of its operating system and "embodie[d] and generate[d] a copy of the Macintosh" in its OS. Judge William Schwarzer dropped all but 10 of the 189 charges that Apple had sued Microsoft with on January 5, 1989.
We Welcome You
HP ini 1939
read More..............
David Packard and Bill Hewlett in their Palo Alto, California Garage
Hewlett-Packard is Founded. David Packard and Bill Hew
lett found Hewlett-Packard in a Palo Alto, California garage. Their first product was the HP 200A Audio Oscillator, which rapidly becomes a popular piece of test equipment for engineers. Walt Disney Pictures ordered eight of the 200B model to use as sound effects generators for the 1940 movie “Fantasia.”