01 Sep 2015 at 02:28
What we call desktop publishing isn’t really a A single job. It’s a series of individual tasks performed over and over again until everything looks and reads just right. If we shave even a few seconds off such repetitive tasks as changing type specifications, printing draft copies, and placing the insertion point at the right spot on a page, those seconds can add up to hours over the course of a complex job.
Design for Minimum Maintenance
One of the most time-consuming and nitpicky jobs in desktop publishing is checking for mishyphenations and overly letterspaced words. The major source of these bothersome problems is justifying text in nice, neat columns. By telling the computer to make everything line up flush against both the left and right …
24 Aug 2015 at 15:13
Back in 1997, IT managers at Miami University set out to make their system Y2K compliant–and their technology overhaul snowballed shortly thereafter.
“We realized that the amount we were willing to invest for Y2K could bring us a whole new system that would grow with our future technology needs,” says Kristin Froehlke, associate provost for computing and information services and CIO at Miami University. “We knew it was time to seize the moment.”
Their first need was for a more robust software solution to handle the school’s many administrative duties. They had been operating with a patchwork of commercial, custom and homegrown legacy systems and applications running on an IBM 9672 R21 mainframe under OS/390 MVS and CICS.
“We had a hybrid of homegrown and vendor-supplied …
16 Aug 2015 at 21:04
IF YOU THINK YOUR PRIVACY IS PROTECTED, GUESS again. Anyone with access to a computer and certain online services can dig up more about you in one afternoon than an old gumshoe could track down in a week. In just 10 minutes, for example, we found out Vice President Al Gore’s and House Speaker Newt at Gingrich’s home addresses and phone numbers, their lengths of residency, the value of their homes, and their estimated incomes, using the PeopleTracker database. PeopleTracker also provides another choice bit of information: The names, addresses, and phone numbers of Gore’s and Gingrich’s neighbors.
Fame and fortune, however, are not criteria for disclosure. Depending on the state you live in, other CDB Infotek services and databases, such as Nexis, might provide personal …
09 Aug 2015 at 12:40
AFTER WEEKS OF BURNING THE MIDNIGHT OIL, you’re finally wrapping up an important project. While envisioning yourself stretched out on a tropical beach with a Mai Tai in your hand, you click on File/Save, and make a note to call your travel agent in the morning.
A screech jolts you back to reality, followed by an alarming crunching noise and a sickening thud as your hard disk grinds to a halt. You threaten, cajole, and beg your PC to come back to life. Just when you think things couldn’t get any worse, you remember what else is entombed on that disk–your customer database, accounting records, marketing materials, and more. Do you know what to do next?
Data disappears from our desktops for a variety of reasons: According to Hard Drive Recovery Group, an Irvine, California-based data recovery service (www.harddriverecovery.org), 44 percent of data is lost to mechanical failures, 32 percent to human error (which includes fire), 14 percent to software problems, 7 percent to viruses, and 3 percent to natural disasters. While the best defense against data loss is regular backup, backups aren’t foolproof, nor can they protect your data against physical damage to your hardware.
Our data recovery guide introduces software tools and services that can bring your data back from the dead, offers strategies for recovering lost files, Continue reading →
05 Aug 2015 at 12:07
As handheld devices and network computers compete with traditional PCs as targets for application development, defining the goals of portable software requires more careful consideration.
Portable code is not, in itself, a novel achievement. The Ada language, for example, ensures that a given program will compile and run according to specification on any combination of computer and operating system for which a validated Ada compiler has been written.
Note well, however, the distinction between running according to specification vs. running identically from one platform to another. An Ada program, for example, lets a programmer specify that numbers shall have a certain minimum precision in decimal digits, but an optimizing compiler might provide more precision than required if this is a free side effect of using …
01 Aug 2015 at 09:51
On average, an employee’s name appears 16 different times across myriad corporate systems. It’s more than likely Joe Doak’s payroll records, human resource dossier and travel preferences are all completely separate. Each instance of Doak’s name is unaware of the others. If Doak’s name appears 16 times inside the company, imagine the havoc wrought by a simple change of address.
We all know what happens. The address gets changed in one or two places, with the other records trailing by years or, worse, never catching up. And the likelihood of all records ever containing the same basic information is slim to none. What’s the answer? The Holy Grail, of course–global directories.
No one disputes the huge advantage of global directories, doing no less than what IBM’s …