Mar 10, 2013

CLOUD COMPUTING

1.Don’t be confused by the expression “cloud services, you are probably already using them if you use Amazon, Gmail, Hotmail, or Facebook. All it means is that your data is stored virtually.

2.Cloud computing is the delivery of hosted services over the Internet .The origin of the term cloud computing is not known but it may be based on practice of using drawings of clouds to denote networks in diagrams of computing and communications systems.

3.Cloud computing provides easy, scalable access to computing resources and IT services. It can be thought of as similar Cloud Computingto a utility like an electricity grid, delivered over a network .It involves the sharing of resources, services and infrastructure and can often be very cost effective.

4.Amazon played a key role in the development of cloud computing by modernizing their data centers, which were using a fraction of their capacity . The new cloud architecture gave significant efficiency improvements and small, fast-moving teams could add new features faster and more easily. Amazon then developed a product that could provide cloud computing to external customers, and launched Amazon Web Service on a utility computing basis in 2006.

There are three characteristics of cloud services that differentiate them from traditional hosting.

They are sold on demand, typically by the minute or the hour;

They are elastic — a user can have as much or as little of a service as they want at any given time;

services are fully managed by the provider , so the consumer only needs a personal computer and Internet access

To be successful, Companies today need to compete in the global economy and keep up with the pace of innovation. Their IT departments must be agile when responding to changing business needs, and must optimise efficiency and manage costs while enabling their business to stay productive. Cloud computing is one of the key technology trends creating opportunities to address these needs.
Private or Public Cloud.

A public cloud sells services to anyone on the Internet. An example is Amazon Web Services which is thought to be currently the largest public cloud provider.

A private cloud is a privately owned network or a data centre that supplies hosted services to a limited number of clients.

When a service provider uses public cloud resources to create their private cloud, this is known as a virtual private cloud.

A hybrid cloud or hybrid IT is a composition of at least one private cloud and at least one public cloud. Some resources are managed in-house and others are provided externally. For example, an organization might use a public cloud service, such as Amazon Simple Storage Service (Amazon S3) for archived data but continue to maintain in-house storage for customer data that is still active. This hybrid approach takes advantage of the scalability and cost-effectiveness that a public cloud environment offers without exposing critical applications and data to third-party vulnerabilities.


Cloud services are broadly divided into three categories:

Infrastructure-as-a-Service (IaaS),

Platform-as-a-Service (PaaS)

Software-as-a-Service (SaaS).

Infrastructure-as-a-Service allows users to start, stop, and access and configure their virtual servers and storage. An example is Amazon Web Services. A user will pay for only the capacity that is needed, and can bring more online when required. Because this pay-for-what-you-use model resembles the way electricity, fuel and water are consumed, it’s sometimes referred to as utility computing.

Platform-as-a-service is a set of software and product development tools hosted on the provider’s infrastructure. An example is GoogleApps. Developers create applications on the provider’s platform.

Jan 25, 2013

JOB ADVERTISMENT: TANZANIA BROADCASTING CORPORATION (TBC)

The Tanzania Broadcasting Corporation (TBC) is a Public Service Broadcaster established by Government Order in 2007 and became operational on 1st July, 2007 replacing the then Tanzania Broadcasting Services which was established in the year 2002 pursuant to Public Corporation Act No 2 of 1992, Government Notice No 20 of 14th June 2002.

10.5 ICT OFFICER GRADE II - 1 POST

10.5.1 DUTIES AND RESPONSIBILITIES
  • Initiates development of information systems,
  • Assists in setting up and maintains servers, workstations· and peripherals
  • Carries out system back-up and periodically tests recovery· procedures.
  • Appraises the supervisor on release of updates and· software,
  • Assists in providing IT support services to users,
  • Perform any other related duties as may be assigned by the· supervisor.

10.5.2 QUALIFICATIONS AND EXPERIENCE

Bachelor Degree in Computer Science, Information· Technology, Electronics or its equivalent from a recognised Institution.

10.5.3 REMUNERATION

Attractive remuneration package in accordance with the Institution’s salary scale PGSS 11.

NB: GENERAL CONDITIONS

i. All applicants must be Citizens of Tanzania and not above 45 years old, however, should also observe the age limit for each position where indicated.

ii. Applicants must attach an up-to-date current Curriculum Vitae (CV) having reliable contact postal address, e-mail address and telephone numbers.

iii. Applicants should apply on the strength of the information given in this advertisement.

iv. The title of the position and institution applied for should be written in the subject of the application letter and marked on the envelope; short of which will make the application invalid.

v. Applicants must attach their detailed relevant certified copies of Academic certificates:

- Postgraduate/Degree/Advanced Diploma/Diploma/Certificates.

- Postgraduate/Degree/Advanced Diploma/ Diploma transcripts.

- Form IV and Form VI National Examination Certificates.

- Computer Certificate

- Professional certificates from respective boards

- One recent passport size picture and birth certificate.

vi. FORM IV AND FORM VI RESULTS SLIPS ARE STRICTLY NOT ACCEPTED

vii. Testimonials, Partial transcripts and results slips will not be accepted.

viii. Presentation of forged academic certificates and other information in the CV will necessitate to legal action

ix. Applicants for senior positions currently employed in the public service should route their application letters through their respective employers.

x. Applicants for entry levels currently employed in the Public Service should not apply, they have to adhere to Government Circular Na. CAC. 45/257/01/D/140 dated 30th November, 2010.

xi. Applicants who have/were retired from the Public Service for whatever reason should not apply.

xii. Applicants should indicate three reputable referees with their reliable contacts.

xiii. Certificates from foreign Universities should be verified by Tanzania Commission for Universities (TCU)

xiv. Deadline for application is 6th February, 2013 at 3:30 p.m

xv. Applicants with special needs/case (disability) are supposed to indicate

xvi. Women are highly encouraged to apply

xvii. Only short listed candidates will be informed on a date for interview

xviii. Application letters should be written in Swahili or English

xix. APPLICATION LETTERS SHOULD BE POSTED TO THE FOLLOWING ADDRESS. HAND DELIVERY IS NOT ACCEPTABLE:

Secretary

Public Service Recruitment

P. O. Box 63100

DAR ES SALAAM.

OR

Katibu

Sekretarieti ya Ajira katika Secretariat,

Utumishi wa Umma

S. L. P 63100,

DAR ES SALAAM.

Nov 19, 2012

MAKING WINDOW 7 GENUINE USING COMMAND PRROMP

when using a computer installed Windows 7 you may get the message that the copy of your windows is not Genuine ,and to make it genuine it needs you to activate online and this process associates with some payments. today i want to teach you how to make window 7 genuine without using any of the farmous loaders, this time we are going to use command prompt. follow the steps bellow
1.Launch your command prompt as Adiministrator
2.When the command prompt appers, type SLMGR-REARM and then press ENTER
3.The following dialog box will pop up with the message "command completed succesifully."
4.After that process restart your computer so as to save the changes made.
5.Congrats you are done and your Windows 7 operating system is Genuine. You will be able now to access to the features you were denied at first.
THAX FOR VISITING www.pox10.blogspot.com KEEP VISITING THIS SITE FOR MORE COMPUTER TIPS if you face any computer problem mail to: jacobmwaipopo@gmail.com or call at: +255719053466

Nov 16, 2012

MUST ATTEND! ADVANCED TRAINING FOR PREVENTING WEBSITE’S AND WEB SYSTEM FROM HACKING ATTACKS

Web security Training by TWIGA HOSTING LTD (Source: Daily News Paper 1st November 2012)
  • Do you know 80% of websites and web applications can be hacked? 
  • Do you know security holes that exist in your website that used (can be used) by hackers to hack your website?
  • Do you want to know how to prevent your website and web applications from being hacked?

Title:  ADVANCED TRAINING FOR PREVENTING  WEBSITE’S AND WEB SYSTEM FROM HACKING ATTACKS

Venue:  New Palm Tree Village Bagamoyo

Date:   23rd – 24th November 2012

Target: Web master, IT managers, IT specialists and Web developers

Facilitator: Training will be facilitated by an experienced resource person with in-depth knowledge in techniques used by hackers.

Participation fees and other condition: 
  • Each participant will be charged Participation fees of USD 300 (Three hundred USD). Participation fees should be in advance only by Cheques,  Deposits slip and by Cash. 
  • Traveling and accommodation expenses for participants shall be borne entirely by individual participants who are recommended to make advance bookings as soon as possible.
  • Twiga Hosting Company will provide tea/coffee during morning and afternoon breaks and buffet lunch at lunch break.
  • Training will start with registration at 8:30am and presentation at 9:00am.
  • Certificate of participation will be issued to each participant on successful completion of the training.

Kindly confirm your participation with Twiga Hosting Ltd by telephone no. 0755 763951 or 0715763951, Email: sales@twigahosting.com as soon as this advertisement appear in  newspapers but not later than 22nd November 2012 and please indicate the  full names  of  nominated participants, so as to facilitate preparation of certificate of participation in advance.

Managing Director
TWIGA HOSTING LTD - Josam House, 2nd Floor, P.O.Box 38443, Dar es Salaam.

Oct 26, 2012

INCREASE THE PERFORMANCE OF YOUR PC BY USING C-CLEANER

CCLEANER v3.24.1850 This software helps to clean your computer so as to optimize your system performance.
ccleaner v3.24.1850

Oct 23, 2012

HIDE YOUR FILES IN YOUR COMPUTER, YOU DO NOT NEED ANY SOFTWARE.

How can you hide your files and folders not to be seen by anyone other you? Its just a simple trick anyone can do, what you need is just a basic understanding of how to use a computer.
Do the following:

  • Click on a start button: In a search files and programs type the word RUN (doesn't matter whether you use capital letter or small letters)
  • Click on RUN and type the word CMD and a command prompt box will open. There you are and now you can hide your files, by:
This is how a command prompt looks like

  • Type the following line of command attrib +s +h D:\pictures (Depends on the file you want to hide, mine was pictures)
  • After you finish typing that press enter button in your keyboard, then go where your file was located and you will no longer find it.
  • What is that? The letter D is the drive where your file is located and pictures is the file name I want to hide which is located in D drive. So if the folder you want to hide is called music and is in drive E the command line will be attrib +s +h E:\music
  • So what if the folder called music is located within another folder called songs? Its easy you just type this                              attrib +s +h D:\songs\music and press enter button to hide your folder.

That was hidding a folder, now is how you can Unhide it.
  • It is just changing the + sign and put a - sign, for example in our first trial we hide the folder named pictures which is in D drive, this is how you can bring it back, 
  • Use the first and second step above to get to a command prompt
  • Type attrib +s +h D:\pictures
  • Press enter in your keyboard and get back to your drive to check your folder

NB:
  1. To unhide you just put a -(minus) sign before s and h while to hide you use +(plus) sign
  2. There are spaces between attrib and +s
  3. The drive letter does not start with a + sign

Oct 18, 2012

VLC MEDIA PLAYER 2.0.4 (32-bit)

VLC media player is a highly portable multimedia player for various audio and video formats as well as DVDs, VCDs, and various streaming protocols without external codec or program.
It can also be used as a server to stream in unicast or multicast in IPv4 or IPv6 on a high-bandwidth network.
VLC can play:
  • MPEG-1, MPEG-2 and MPEG-4 / DivX files from a hard disk, a CD-ROM drive, and so on
  • DVDs, VCDs, and Audio CDs
  • From satellite cards (DVB-S)
  • Several types of network streams: UDP/RTP Unicast, UDP/RTP Multicast, HTTP, RTSP, MMS, etc.
  • From acquisition or encoding cards (on GNU/Linux and Windows only) 

TUMPOX COMPUTER's solution TUMPOX COMPUTER's solution TUMPOX COMPUTER's solution TUMPOX COMPUTER's solution TUMPOX COMPUTER's solution TUMPOX COMPUTER's solution TUMPOX COMPUTER's solution TUMPOX COMPUTER's solution