DigitalNetHosting

Loading

Blog

Creating Html Reports With Virto Workflow Activities Kit For Sharepoint

Introduction

The necessity of data receiving from a certain list and generating a report often appears when sending e-mail alerts or creating a document. For instance, a user needs to display the list of his active tasks, administrator needs information about new users in the system, a client wants to see his active issues, etc. In other words, it’s highly important and effective to create a report based on data list.

Activities of business process automation are often implemented with Microsoft Office SharePoint Designer, which is easy to use and suitable for quick implementation. But unfortunately, generating reports is not available with Microsoft Office SharePoint Designer.

This article describes how to create a report with VirtoSoftware Workflow Activities Kit for SharePoint and prepare it for sending/processing.

Installation

Install and activate VirtoSoftware Workflow Activities Kit for SharePoint on your site.

Case Example

Then add fields.

ame Type Description IssueOwnerEmail Single line of text Responsible Person or Group Description Multiple lines of text Enhanced rich text (Rich text with pictures, tables, and hyperlinks) Priority Choice (menu to choose from) Choice:
Low
Normal
High
IssueStatus Choice (menu to choose from) Choice:
Active
Closed Resolution Multiple lines of text Enhanced rich text (Rich text with pictures, tables, and hyperlinks)

After completing that, add several issues to this list where Issues with different responsible users are contained and whether they are active or closed Issues.

Creating a Report

Let’s run Microsoft Office SharePoint Designer 2007, connect to the site and select File/New/Workflow in the menu. Then enter name “Create report for Responsible“ in the displayed window, and select list ”Company Issues” that was created before. Since we need to generate a report, both while creation and modification of a list, we should check all the boxes in “Select workflow start options for items in …” block.

After checking all the boxes, click Next to create activities.

To create a report, you only need to create one activity – “Generate report”. “Generate report” activity produces the report template parameters and parameters of collecting items from a list. The generated report is stored to a string variable. You can even describe the data source, filters and data sorting on the activity level. You should also describe the view structure of your report with the help of header, footer and list item templates.

Scheme of the report:
[Header]
[Row for List Item 1]
[Row for List Item 2]

[Row for List Item N]
[Footer]

Since “Generate report” activities work with rows, we can generate the report in any text format: simple text, XML, HTML, etc.

To add new activity, click Actions and select More Actions in the drop down. In the displayed window select Virto Actions category and select “Generate report” action. Then click “Add”.

You will see the new activity in the list as a result.

“Generate report” activity contains the following parameters:

Parameter Description this header Optional. The template for the heading section of the report. this row template Optional. The template for the report rows. Use string [%FieldName%] construction to resolve field value from current list item. FieldName can be field display name, field id (GUID) or field index (int). this footer Optional. The template for the footer section of the report all Optional. List item filter. The filter string supports View Name, View ID and CAML string (…). Empty filter returns all items.
Use … element to sort list items. current list Optional. Source list. Default value is current list.

We will leave Current list field without any modifications since we are going to select data from the current list. In your projects you can select any available list as a data source.

We should point CAML request instead of all. CAML request will select open Issues for a current responsible user and sort them by priority.

CAML request which selects all Issues sorted by priority for user ID #123 looks as follows.

We should insert the text highlighted with bold instead of “all” value. This means that we will not insert Query tags and replace user ID with Responsible value from the current row. Unfortunately, if we add direct link to the value of Responsible field, Workflow will replace it to the row of DOMAINuser type while implementation. To receive user’s ID we need to use one more activity from Virto Activities Kit – “Lookup site user property”. This activity stores the value of select user profile in the variable. Let’s add this activity before report generating.

Insert responsible variable to CAML request.

Instead of CAML request description, you can use Web interface to create new view, filter and sort required rows, and enter name or its ID in the activity.

For simplifying reasons, the report will not contain too much HTML. Use the following values instead of this header, this footer and this row template values.

this header Active issues:

Title
Priority
Created
Description

this row
[%Title%]
[%Priority%]
[%Created%]
[?scription%]

this footer

If we leave at least one of these values without any modifications, empty row will be used while report generating. The most significant in these rows is the fact that you can use both Workflow Lookup and links to field values in row template description. To do this you should use [%Field name%] constructions. They will be replaced with real values while report generating.

The description of “Generate report” activity parameters is completed. Now, while creating or modifying of a current Responsible in the Issue, the report will be generated.

So after completing all that, send this report by e-mail. In order to do this, let’s add Send Email activity after report creating. We can use standard activity or one of the Virto Activities Kit. In this case you will have an opportunity to attach files, add sender, or adjust SMTP server which you want to use for e-mail sending.

The full scheme of the business process looks as follows:

Save this business process. Then go to your site, add a new Issue or close (edit) the existing one. The responsible user will receive an e-mail notification to his e-mail address with the list of active Issues.

Conclusion

With the help of Virto Software Workflow Activities Kit for SharePoint, we have found the solution for business tasks regarding HTML report generating based on SharePoint list data. Further versions may include table display improvement and adding HTML links on objects. This is helpful to navigate to objects from the e-mail message directly.

Source by Virtosoftware

Computer Monitoring Software – is it Ethical?

Computer monitoring software is used to spy on a person’s internet activities. There are software programs nowadays that can track everything a person does on the computer –

record instant message conversations, log emails sent and received, record all visited websites, so on and so on. The programs can be hidden from the unsuspecting user, and they usually have no idea

they are being monitored. Only the person who installed it, and is doing the monitoring, will know where it is, and how to access all the devious activity, if there is any.

There are three primary uses for computer monitoring. To monitor your child’s internet activity, spy on your spouse or partner, or track your employees activities at the workplace (if you own a business).

Is it ethical? In most cases I believe it is, in others there is a gray area.

In the case of monitoring our children, I do believe we as parents have every right to know what they are up to. The internet can be a very dangerous place for kids, and has become a haven for sexual predators.

How do you think your teen would react if they found out you were watching them? They would probably go ballistic on you for betraying their trust.

I would suggest just telling them that you will be keeping an eye on their activities, and explain why. You do not have to tell them you are using spy software, just one warning to tell them you know what’s going on, should suffice. It’s our duty to protect our kids and ensure their safety in any way we can.

Just give them a warning that you will be watching and set limits on their internet use. Make their working computer in the living room or den, a computer in their bedroom is asking for trouble. Even when your not at home, you can view their activities from a remote computer, if your working or on vacaction.

You can even see what they are doing remotely from another computer in the house you have access to.

Catching the cheating spouse. This is where it can get dangerous. I had once caught my exgirlfriend exchanging rather erotic emails with some guy over the web. Sure enough, she was having an affair. She had forgotten to log off her yahoo email account, and when I was checking my yahoo email, she was still logged on.

You can imagine I felt hurt and betrayed. This ultimately led to our break up, because she started dating the guy. I just think how would I feel if she was the one spying on me? I would feel very betrayed that she did not trust me. However, there is something inside all of us, that just has to know the truth. If you use computer monitoring on your spouse or partner, be careful your not caught. If your more computer savvy than them, most likely they will not know. If you are the faithful one, you certainly have a right to know.

Employees at the workplace. You want to make sure your employees are actually working and not goofing off at their workstations. With computer monitoring software, you can monitor multiple workstations at once. Is it ethical? Well, only the employees who have something to hide would say no.

You are trying to run a business, paying workers , you run the show. You have every right to know where your hard earned money is going. I would personally just let them know upon hiring, that all workstations are monitored for productivity.

Source by Tim Chirillo

Using the Visual Studio Report Tool

The visual studio report tool collects the graphical query and design tools that are hosted within the environment. As long as the report designer provides the report data pane, then the visual studio report designer will easily organize the data in the reports of people. As long as the visual studio report tool provides the query designers to help them specify the data that they need in order to retrieve from the data sources. As long as the expression dialogue can specify the report in order to use the layout.

It is very important to provide the query designers in order to help the specify data in order to retrieve from the data sources. As long as the visual studio c# will go for the expression dialog in order to specify the report data in order to use the report layout. You can also go for the query design tools that require for the reporting services in order to connect to report the data. When you work with the report expressions then you can always design the report layout. If you have the visual studio c#, we suggest that you connect the reported data with the report expressions. You may also go for your ideal layout in order for you to actually host the visual studio c# option.

If you also have the option to go for the Report Designer that can start the menu, then you can point to the programs in order to go for the SQL server 2008 that will comply with your system. After you open the business intelligence development studio, then you can always create and open the new project template. Once you’ve selected the report server project, then it will be easy to just go for the report designer that you opt for. The visual studio report tool will then provide with you the project that you need as long as the data that you already have with you.

It is very easy to learn how to create the reports that you need with the visual studio report tool. You can always opt for the report design basics in order for you to understand the tutorial with the creation of the basic table report. If you have the tabular, chart, matrix and freeform reports and gauges, then you can always opt for the visual studio report tool needed for you to actually make things work.

The visual studio report tool may also come with the report definition that is listed in the reported description of the changes and the saved .rdl files that are connected to the reported changes. When you are designing the report with the software, you can always go for the reports that are processed and rendered whenever you go for the report server uses. When you ensure these then you can always decide on which report to go for. You can also publish the report of the company in the visual studio report designer. Once you have decided to publish this to the server, you will see that the hard drive is copied to the report server database.

Whenever you go for the deployment and building up of the commands available in order to go through the visual studios for more information that will go for the publishing data sources and reports that provide the multiple way in order to export the report and the different file format like the Microsoft Excel and Microsoft Word. If you can also get the information that you need to view and save the reports, then you can check whether these are outstanding and beneficial to your company. Once you’ve decided on this matter, then this is the one that you can go for the visual studio report tool.

View on-line demo:

http://www.perpetuumsoft.com/Demo/Rss/RssWebDemo.aspx?lang=en&pid=21

Source by Perpetuum Software Team

Traditional vs. Electronic Prescriptions – A Comparison

E-prescriptions are computer-generated prescriptions prescribed by your physicians or doctor’s point of and sent directly to your pharmacy.  In traditional environment, doctor wrote your prescription on a piece of paper which you later take along with you to your nearest pharmacy or dispenser. In e-prescription the doctor or other healthcare provider enters the information or the prescription directly in to his or her computer instead of writing it on a paper and then it is atomically forwarded from doctor‘s end to the pharmacy or dispenser.The pharmacy and the health provider share a private network between them; the information is not send open over the internet like an email. Networks that are used to send e-prescription electronically are private, secure and closed.

E-prescriptions are fast; your prescription arrives at your pharmacy before you leave your doctor’s office. But this does not mean that it will be immediately ready when you arrive at the pharmacy. The time needed to prepare your prescription can be affected by things like the number of prescriptions in the pharmacy’s computer, how quickly you arrive at the pharmacy after your doctor’s visit, and how many people are already waiting at the pharmacy. However It is more Convenient you don’t have to make that extra trip to drop off your prescription at the pharmacy and plus doctor will forward your prescription to the place where u can get it easily n those who already got stock of the prescribed medicines.

E-prescribing can help reduce the risk of medication errors associated with poor handwriting, illegible faxes and additional key strokes. Many prescription errors take place on a daily basis with the help of online prescription method, this risk has been minimized. In prescription no handwriting is involved for the pharmacist to interpret.
It is more Economical which make it easier for your doctor or health provider to prescribe the most cost effective medication based on your insurance coverage and your healthcare provider send your prescription to any dispenser or pharmacy that you choose. Currently in USA more than 75% of pharmacy is accepting e-prescription, and that rate is increasing every day.  If the pharmacies where you usually go don’t accept e- prescription, your doctor can provide u a print of the prescription.

E-prescriptions meet the requirements of Health Insurance Portability and Accountability Act (HIPAA). Your health information contained the record of your prescription, whether they are electronic or hand written. All that information is protected by federal law and state laws.

In short E-prescribing means the transmission uses electronic media, of prescription or prescription-related information between a prescriber, dispenser, pharmacy benefit manager, or health plan, either directly or through an intermediary, including an electronic prescription network. E-prescribing includes, but is not limited to, two-way transmissions between the point of care and the dispenser.

Source by daniel

How to Capture Still Image From DVD and Video Files Like Mp4, Avi, Flv, Wmv, Mpeg and More?

Do you love movies? Do you like movie stars? If you do, so do you want to get FREE photos of favorite movies and stars? but how can I get these photos for FREE? capture them from HD videos, yes, capture them! But how? That’s the point! My advice is using IM Video Image Capture to do that, it’s an easy-to-use video, dvd image capture software, it supports capturing still image from video, DVD, BD, FLV, MP4, MPG, AVI, WMV… whatever, you name it, even you can save these images captured from video as bmp. jpeg, png, gif and pdf! Or you can setup them as your desktop wallpaper. I want Angelina Jolie be on my desktop, ok, no problem, capture “her” from “WANTED” or “Mr And Mrs Smith”, that’s really cool! Okay, here is just SOME of the information about what can you do with IM Video Image Capture.

  • Capture still image from video files and DVD in seconds.
  • Play most known video formats like DVD, FLV, MP4, AVI, MPEG, WMV, OGG and more.
  • Create and edit categories to better organize image frames captured from video.
  • You can seek to the desired position by dragging the slider bar or simple pressing Step One Frame Forward button.
  • You can browse image frames captured with built-in image explorer.
  • You can crop and resize image frame stored in built-in image library.
  • You can export image frames captured into folder or web album for online viewing.
  • More…

So, let’s say that you have tons of DVD and video files, but why just play and watch them? Videos and DVDs are huge image collections! Why not capture image frames from them?

Source by Ken Thomas

MediGate – A Complete Hospital Management System Software

  MediGate HMS Complete Hospital Management System

  Why MediGate-HMS ?

1)   World’s First Ever Mid-Segment Hospital Management System

2)   Easy to learn & Operate-No Training Required

3)   Highly Modular- To Suit Each Hospital’s Need

4)   Best Affordable Price

5)   Multiple Tier Server Architecture-Scale Easily-Thousands of Users

  How MediGate-HMS benefits Customer ?

  Ø Better visibility, control, and efficiency to improve your       services through Enhanced healthcare experience

Ø Provide clinical information to doctors at a mouse – click

Ø Almost Nil – wait time for patient discharge and payment     settlement

  Ø A single- click generated, consolidated bill to the patient for  all services availed.

  Ø Improved hospital administration.

  Ø Reduced administration costs due to better tracking of     expenses.

  Ø Reporting, and effective management of beds and hospital     inventory.

 Ø Mitigating cost and compliance issues.

 Ø Maximized asset utilization through integrated asset     maintenance.

 Ø Improved inventory management by supplier consolidation.

 Ø High-Tech ICU/Ward Alert System.

 Ø Effective monitoring and management of clinical staff.

  Why Choose Us?

  We have overall expertise in the healthcare industry: Pharmacy, Healthcare Product Development and Implementation.  Our large pool  of skilled associates is experienced in designing, implementing, and supporting health care applications.  Our consultants take complete responsibility for analysis, estimation, design and programming, application testing, problem resolution, acceptance, documentation, and status reporting.  They draw from experience and capabilities in healthcare delivery, clinical practice, medical informatics, security and privacy, biomedical engineering, and information technology.

Technology Used :-

Front End :-   Visual Basic .NET (Microsoft .NET 1.1 Framework)

BackEnd  :-   SQL Server 2000 / SQL Server 2005   Can be implemented on LAN / WAN , network based architecture.   Main Modules of the Product (Medigate ) are as follows  

  1.  In Patient Department
  2.  Out Patient Department
  3.  Patient Registration          
  4.  Ward Management
  5.  Stores Management
  6.  Appointment Schedule    
  7.  Roaster Management
  8.  Hospital Administration
  9.  Pharmacy               
  10.  ICU Management
  11.  OT Management
  12.  Purchase Management
  13.  Billing
  14.  Security
  15.  Patient Information System
  16.  Nursing
  17.  System Administration
  18.  Equipment Maintenance
  19.  CSSD
  20.  MIS

For more info please visits

http://www.chinarsoftech.co.in/medigate.html

Source by ravi_kaul

Creating Online Backups-A Simple yet revolutionary process

Storage space has always been the primary differentiator between the computing systems of different generations, and this hasn’t changed even in the current context. All advancements in the integration techniques resulted in higher storage space in a smaller size, and ever since this was achieved, the aim has been to be able to achieve unlimited storage space. While technically, the computing world is still looking for its next major breakthrough in integration techniques, there is a concept that gives access to unlimited storage space at a fraction of the cost that a conventional medium would incur. Cloud storage or online backing of data is something that has caught the eye of the regular user in the recent times, simply because of the advantages that it offers. There are a lot of service providers available, that provide data hosting options over the internet and charge for it as a service, using SaaS model. The popularity of the concept is growing steadily, and it won’t be long before it starts challenging the very concept of storing data locally.

The best online backup facility would have a lot of things, and all of these are contained by the top offerings in the market currently. The data stored on the storage facilities managed by the service providers, is safe from all potential hazards, as the security measures are extremely high. This is not the case with local storage, where even the slightest of discrepancy, may result in catastrophic loss of data. This alone is strong enough a reason to advocate online backups, but there are other factors as well, which are equally crucial and have thus played an important part in making Cloud Storage the phenomenon it is today. One of the most important and advantageous features, especially from a business perspective, is the way that the service provider charges for this storage. Bringing into use the SaaS model, service providers charge nominal amounts of money from the user as per their usage. The best part is that the user ends up paying a much lower price, as compared to what he would have, if he’d gone in for a full physical storage setup.

The security aspects along with the performance enhancements, when compared to conventional storage options (local), are what make online storage a force to reckon with, and a definitely weapon in the arsenal of the leading computing organizations of the world.

Source by jamessms1

Things you should know about file sharing

File Sharing: The Basics, The Myths, Some Tips

Would you like to see photos that someone else wants to share?
How about sharing a whole gallery of music you wrote and sang?
What if you want to share your resume?

Sharing files is something that has been done from the very beginning of the internet and you’re likely to want to do from time to time. There are many ways to share files and they vary in complexity and efficency and this guide will help you decide which choice is best for you. An additional concern is the legality of sharing and after reading this guide, you’ll have a firm grasp of what you can do, what you can’t do and when you’re going to need to find out more.

Executive Summary:

Each of the methods of file sharing has benefits and drawbacks. The significant benefits are speed, security and the ability to ensure the other people sharing the file will be able to receive it. The significant drawbacks are software requirements, complexity and security. Choosing the best method is going to depend on how many people you need to share with, what you can expect from them and how secure you need to keep the data. HTTPS for example is complex to set up but fast, secure and widely compatible and an appropriate choice for a business with many clients. SFTP is far less complex to set up, secure and fast, but requires specific types of software be used by recipients and is appropriate for people who want to automate recurring secure file transfers.

In addition to the methods of sharing files, it is very important to learn about the legality of sharing files. There are some instances where sharing files is necessary and completely legal while sharing those same files in different circumstances may be illegal. Generally speaking, you cannot share anything which is copyrighted by someone else without special exemptions.

Simple methods:

Pros: Fast and easy for “one to one” or “business to you” file sharing
Cons: Quickly becomes expensive, fails with very large files, fails with very many files

The two easiest ways to receive a copy of a file from someone else:
1) Download it from your email 
2) Download it from their web page

Terminology tip: downloading is the process of getting something from somewhere else onto your computer. Think of it as taking something ‘down’ from the isle in the grocery store and ‘loading’ it into your shopping cart. Uploading is the opposite process, think of it as taking something from your loaded cart and putting it back ‘up’ on the shelf.

Both processes are simple for you since getting email and browsing the web are the two most common uses of the internet. In the case of sharing a file by email, there is a cost incurred for the time it takes to move the data and the space it takes to store the file. It is compounded by the fact that email was not designed to manage files so they are turned into text making storing them and transmitting them significantly more costly than other methods. If you want to get a copy of a file from someone or share a file with someone and don’t plan to do it more than once and if the amount of data you’re sending isn’t too large, then email is a simple and acceptable way to exchange copies. Be aware that email is not considered secure and while most companies do try to ensure that you’re the only one that can get to your email, there is not built in security for the protocol. If you need to keep something secret, you shouldn’t trust email for the job.   Getting a file from a web page is simple for the recipient. This is probably the most common method of file distribution since it allows companies to exercise some control over who has access to files and potentially manage security. The disadvantages are the complexity of setting up a web site, maintaining it, managing security and efficiency. Even if a website does everything extraordinarily well, the cost of distributing the file is still the same for every person who requests it. Fifty people downloading the file means fifty times the bandwidth will be used and potentially only being able to provide 1/50th of the available server speed to each requester. If you want a file that a company has decided to share as a link from a web page, then most of the time that’s an acceptable method of getting the file. You should bear in mind that there is a difference between a secure connection and an insecure one and you should avoid getting anything you want secure from any web page where you don’t see the lock icon.   Sharing files with someone else by setting up a webpage for someone else to access is a complex enough process that you really shouldn’t plan to do it that way unless you have significant experience managing web sites including hosting charges, bandwidth fees, DNS management, certificate management and authentication scheme experience. If you’re running a business where you specialize in that sort of management or can afford to hire someone with the skill set, then distributing files by hosting a website is the right decision when you want to ensure customers or partners have the easiest access possible.  

Alternative traditional methods: One of the early methods of sharing files was called FTP, which means simply File Transport Protocol. It works much like a web page does and requires similar expertise but has the advantage of being faster and less expensive to host than using the web (HTTP – HyperText Transport Protocol.) Running an FTP server is typically simpler than running an HTTP server. FTP has minimal security built into it in that it requires a username and password exchange, but the communication is not encrypted so it shouldn’t be used for things that require strong security. The advantages are a lower cost, simpler configuration and widespread compatibility. Most web browsers will allow you to use and FTP link inside a webpage and many will handle the file management automatically so it is a good choice if you have many customers or partners but want to minimize your cost as a second priority.   Alternatively, if you want strong security with most of the benefits of traditional FTP there are three similar methods of setting up a server to allow file sharing.  FTPS is FTP with encryption bolted on later. The methods of adding the encryption on vary and the tools that will work with it have to consider many different implementations so it can be complex to use FTPS successfully. If you are already running an HTTP server with FTPS capability, and can ensure that your clients are going to use software compatible with it, then FTPS is acceptable.    A very similar alternative is SFTP which is essentially a secure communication with FTP bolted on afterward. SFTP is actually easier to set up for the person who wants to share files and easier for the client to use since it has far fewer options that might make it complex. SSH servers like KypM are relatively easy to set up and some systems (Linux, Unix and Mac) come with support for it as a standard option. SSH is the secure communication protocol and the FTP part is just a minor addition. It is possible to use SSH without FTP added since SCP is the secure copy protocol that is built into it, but SFTP is usually trivial to enable as an addition and comes with a variety of useful additional features. Since SSH supports the ability to manage key based logins, most SFTP servers can be managed so that you can manage security without the client needing to share their information, making it even more secure than other options. If a client manages their private key correctly and you manage their public key correctly, clients can use a single key to allow access to multiple servers without needing to constantly put passwords in. The cost of transport is higher than with FTP but secure and lower than HTTPS or FTPS options in most cases.   HTTPS is the standard secure method of managing file distribution. The cost is significant both in management and registration, but is most compatible of all the options for securely sharing files with clients. If you’re running an HTTPS server and want to offer files to clients then you’ve probably got the expertise necessary, however this is not something most people should use to share files with other people.  

File Hosting Cloud Services: If you want to share files with other people but don’t want to incur the cost or learn how to manage your own server, then this is a pretty good compromise. You can take advantage of Dropbox, Box.net, Google Drive or in some cases if you want to share the right types of files, Flickr, Picasa or Youtube. There are many businesses who have taken their expertise and spending power and used it to make sharing files easier for the consumer.  If you have files that you want to share and don’t have a lot of computer and server expertise, then you can still make it easy for other people to access your files by using one of these offerings. Sites like Facebook, Google Plus, Flickr and Picasa make it easy to share pictures and Youtube and Facebook make it easy to share videos. Dropbox, Box.net and Google Drive (as a few examples) make it pretty easy to share files of nearly any type with other people. So long as you don’t have particularly large files, need significant security, or do a whole lot of sharing, then using a hosting service from a cloud service provider is a good method. Companies should be careful to avoid trusting too much to the security of these types of offerings without a contract and you as a consumer should consider how secret your data needs to be before using them, but they’re a great option for most people.  

Peer-to-peer file sharing: Sometimes someone will want to share files with a lot of people but not want to incur the financial or management costs of running their own server. One of the significant limitations of more traditional file sharing options is the speed with which you can transfer files from your computer (or server) to someone or many someones. With web pages and FTP type servers each client who wants a copy of a file has to share the total available bandwidth you have available which can be very costly to expand if demand is high. If you want to get a copy of large files or share many or large files, then file hosting cloud services may not be an option due to their rules or cost. Peer-to-peer file sharing is a method of sharing files that minimizes the cost and complexity of sharing large amounts of data.   A company or individual that wants to offer inexpensive or free software for example may not want to incur the cost of making files available through traditional methods. Peer-to-peer file sharing moves that cost to the consumer. Instead of the file to be shared coming directly from one source, the cost is spread across all the people who want to get a copy of the file. Large files are segmented into small pieces and indexed so that each client is both downloading and uploading pieces with other clients simultaneously. As a result a file that might be desired by 1,000 people is downloaded once from an original source then pieces of that file are downloaded from each client who wants the file from other people who are downloading the file at the same time. This way the speed of sharing is sped up according to how many people are wanting a copy at the same time without adding to the cost or speed limitations for the original provider.   There are several types of Peer-to-peer file sharing that have been popular and successful. Napster made the first significant inroads in the process by hosting a central system which allowed anyone to make available files they wanted to share with anyone interested in getting a copy. Napster was able to minimize their own costs while at the same time making files easy to share with thousands of people at a time. Later there were many alternatives created which overcame the limitations of Napster’s methods of sharing files, some of which have been quite successful.   The most popular current technology is probably bittorrent. Bittorrent works essentially like Napster did; it makes a file available by providing an index of clients who are currently sharing or trying to share a file, but doesn’t rely on a single source for the index. Anyone can download a bittorrent capable client and download files by finding someone who is providing the very small reference files responsible for directing you to other people sharing the desired file.   

Legal considerations: There is nothing inherently wrong with sharing files, but it is not legal to share all types of files. Napster and similar companies that have made sharing files with Peer-to-peer networks have often been shut down because they were found to encourage sharing files that the people sharing them didn’t have legal rights to share. If you don’t want to be bankrupted by lawsuits, it is important to know not only how to share files, but what kind of files you are legally allowed to download for your own use and to share with other people.    What you can do: If you produce a file that contains something you have the rights to, such as your own resume, videos or pictures you nearly always have a right to share that file. Things that you own or create are yours to distribute as you please so long as doing so doesn’t violate other very specific laws. You’re nearly always allowed to share software that you build from scratch or modify according to licenses such as GPL which allow you to redistribute your work.   If you’d like to share pictures or video that you create then you’re nearly always allowed to do so by whatever means you find most convenient. Web pages that you or your company create, software you build and things which specifically allow redistribution are typical examples.    Software like Debian Linux is often distributed by bittorrent to minimize cost and is completely legal both to download and share. Videos you create are usually legal to share with Youtube. Pictures you take are usually legal to share with Flickr, Google Plus or Picasa.   What you cannot do: You are not allowed to distribute things which belong to other people who don’t explicitly allow for redistribution. That means that you can’t legally share songs, videos or software which you don’t own rights to unless they’re purposely exempted from that restriction by the original creators and owners.   Napster and many bittorrent hosting sites have been successfully sued for encouraging people to share things they didn’t have a right to share.   Individuals have been successfully sued for sharing songs, videos and software they didn’t have a right to share.   It is illegal to share certain types of software with entities in regions which aren’t supposed to have access to that type of software. (Confusing? Yes, but there is a pretty easy to understand concept behind it.) Certain countries where specific ideas are deemed to have military value are prohibited from sharing those ideas in too much detail with other countries. Encryption is considered potentially critical to a country’s military strategy so some countries don’t allow software using certain types of encryption to be shared with countries which might be a potential enemy. For example, the US developed a variety of very secure methods of encrypting data that cannot be shared with many foreign countries. As a result, many of these types of secure encryption methods were duplicated independently in foreign countries without such restrictions so it is permissible to get encryption from places and share software using it with them, while at the same time it is illegal to share software containing US specific encryption that does the same thing with them. In some instances, it is illegal to download software from foreign countries that infringes on these types of laws specific to the US. (Many countries have similar laws, the US is used as a strong but not unique example.)  

What you should research before doing: If you create something that includes the work of someone else, then you need to research exactly what is allowable in your specific instance. If you’re creating something built on software licensed under GPL and you want to redistribute it, for example, then you’re not so much allowed as required to provide specific things if you choose to share.   If you produce a video which contains music owned by someone who doesn’t allow redistribution, then you may not be allowed to redistribute it, or you may be allowed to, depending on how and how much was used. A video of your child singing along to a Prince song may not be legally uploaded to Youtube for example, but a skit where you use the same music to make a humorous satirical point may be.   The US and other countries have a concept of “fair use” which allows for to reuse works created by other people within specific limitations. Humor is a part of free speech which often allows someone to make fun of something which the owner may not approve of, but making a point with humor may be a right. Small portions of a work such as a song or video may be reproduced and shared without the consent of the owner for the purpose of journalism. Significant reproductions may be shared for the purpose of education which might not be require consent.   If your own work falls into one of these categories and you wish to share your work, then you need to research the fair use restrictions and allowances which pertain to the work you want to share in your legal environment.   Your own resume may be an example of such a work. If you are a musician with expertise in reproduction of music by Meatloaf for example, it might be legal to include clips of you playing provided the clips are short, but not legal to provide the full song. If you are an editor, it might be legal to provide short examples of your proposed editing of a popular novel, but not legal to provide large segments of the same thing.  

What you might not realize you need to know: There are some myths about file sharing which you need to be aware of.    Sharing something without making a profit does not make it legal. Many people believe that they can share songs, videos or articles created by other people so long as they don’t plan to make a profit by sharing. Your intent to make a profit or not does not determine whether you are guilty of copyright infringement. There is an idea that sharing something for free limits the ability of someone else to control the rights to what they create. Sharing a music file for example might allow people who would purchase the file to get it for free and thus limit the value that producing the song would otherwise offer. Rights of redistribution are given to the copyright holder regardless of the intent of people who might want to share.    Sharing something with only your personal friends does not make it legal. Most copyright holders don’t pursue lawsuits against someone who shares something interesting with a friend or co-worker, but it is still illegal to share something you don’t have the right to share regardless of the size of the audience. Many small offices share emails and articles with each other without realizing they are infringing on the copyright holder’s rights. Software is a particular issue since software producers have copyrights which limit the options for reusing software even if it is only with a small number of people.

Source by Boyce Crownover

Total War Shogun 2 Steam CD-Key

Produced by The industrial Meeting, Full Warfare: Shogun 2 may be a tactic personal computer online game nevertheless it would not be wrong to say that this online game has always been reinvented truly out of your unique tablet. Indeed, it provides a advanced, enlarged, better and gleaming overall performance over its predecessors. The entire Battle: Shogun 2 show has civilization and bigger enjoyable. This can be a recreation that all Total Conflict: Shogun 2 veterans this type of newbies hosting fascination with the experience can savour experiencing a entertainment and pleasure.

Calculate Conflict: Shogun 2 show no longer concentrate on Realm but that doesn’t mean the joys and exhilaration is over. Still it has lots of theater, fun and delight. The dimensions is scaled-down that renders it extremely simple to recognize the overall game and enjoy yourself. Okay, if this is the case chatting more nuances resembling gameplay, knack, graphics and be it playable or do not, we have to say Whole Struggle: Shogun 2 s deserving of nothing only a status praise. It is certainly indeed an amazing and very interesting recreation who has a capability to keep you engaged. No mattter whether you would love to play Full Fight: Shogun 2 solo, against neighbors or together, this can be one recreation which may be zenith of the war series. Right pictures, clear effects together with animation has all been done this wonderful, it’ll tiptoe your sympathy instantly. Surely, Whole Battle: Shogun both would not be a promising popular among all and some of the gamers have also referred to it as lackluster, though actually it is not that boring! Japan is extremely rendered inside the Absolute Conflict: Shogun both too. Those types of mmorpgs are setting up a lot of successful trigger the players and Total Fight: Shogun both has managed to get to the fool in addition.

A single pipe, Calculate Battle: Shogun both is undoubtedly an absolutely idealistic example of advance trumping rise up. Though The Creative Fabrication has tried all its imaginative instincts to manufacture a rich difficult playing the game, vivid number and breathtaking identify, the enthusiasts remain to atmosphere “something misplaced.” It does appear to be that despite making use of all such skills and applying all variety of exploration, Full Battle: Shogun 2 nonetheless falls short of some key elements. Newcomers would have to look for the video game a trifle punishing as the tip place and guidelines weren’t defined great. However, owing to journey, interesting factors, Calculate Battle: Shogun 2 becomes quite astonishing.

Bragging an exceptional gameplay and theme, Calculate War: Shogun both has become among the many most-wanted video game titles for some game players out there though it would also fail to be bad to suggest that certain better matters were really also predicted belonging to the designers.


Source by Ashish pandey

Can Articlesbase’s new owner revive the dying piece of internet history?

If you are interested in any form of content marketing then chances are you have heard of Articlesbase. The site at it’s peak generated over 20 million visitors per month and delivered advertising revenue of over $500,000 each month.

However this is where the success story ends, fast forward only 5 years and the site is dying a fast and painful death. Currently the site gets around 200,000 visitors per month (that’s a 99% decline) and generates revenues of around $3,000 per month. After paying for hosting, online tools and general running costs, that does not even leave enough for a single person’s salary.

Why the epic fail from a site which was so strong just 5 years ago?

Previous owner Simon Gelfand explained

“we were hit massively by google’s algorithm changes over the years with both Panda and Penguin, with our focus on other projects we were unable to react to the changes quick enough. We with the best of luck to the new owners, we had over 10 happy years but it’s now time for some fresh ideas.”

Andrew Slack the new owner, who also owns MoreNiche had the following to say:

“The site has had huge success in the past and is a piece of internet history, however they have failed to evolve.

The site is riddled with duplicate content and offers users very little value, the internet has moved on and sadly Articlesbase has not.

It is our aim to change that, we need to pack 5 years of evolution into a small window before it’s too late. It feels like we’re experiencing life or death surgery right now and we are running out of time.”

Andrew Slack who have run successful online brands for over 12 years in very competitive markets, went on to list some of the short­ term plans for ‘reviving the site’ which included:

  • Fully integrate with Copyscape to clean up the content on the site (any duplicate content will be gone) even if Articlesbase is the original source.

  • Introduce new minimum posting standards to vastly improve the quality of new content being posted, the site has focused on quantity of content over quality, this will need to change.

  • Evolve the look and feel of the site and contributors area to meet today’s standards, including more dynamic content.

Some advanced features included:

  • A ‘ranking system’ similar to how google rank webpages for both authors and articles, allowing them to determine which content adds the most value to the readers and give that more exposure across the site.

  • A collaboration system similar to Wikipedia so that contributors can help improve and build upon the original author’s work, eventually allowing multiple authors to collaborate on single pieces of content what they call ‘co­authors’.

Andrew Slack went onto say:

“We hope this will allow authors and collaborators to build their own personal brands within the Articlesbase ecosystem.

We will encourage authors to add more embeddable content by recommending relevant Tweets, Facebook posts, YouTube videos and more during their article crafting journey.”

It is clear that the new owners have some work cut out for them, but seem extremely excited by the challenge.

If you have any suggestions for the new owners or would like to voice your appreciation for the service and past owners, please do comment in the box below. Please do share this article if you think others will find it interesting.

Other sources:

  • http://www.whatsnewinpublishing.co.uk/content/articlesbase-bought-moreniche
  • http://www.themarketingblog.co.uk/2016/07/articlesbase-is-bought-by-moreniche-with-plans-to-revive-declining-visitors/

Source by Articlesbase