Portal talk:Technology
From Wikipedia, the free encyclopedia
A WikiProject facility for Technology has been created and awaits anyone who has contributions, questions, comments, suggestions, whatever... Quinobi 4 July 2005 08:51 (UTC)
- This article needs so much work.... Elfguy 20:12, 5 August 2005 (UTC)
Contents |
[edit] Improvement Drive
The articles on Multimedia and Sysop are currently nominated to be improved on WP:IDRIVE. You can add your vote there to support the article.--Fenice 10:12, 12 August 2005 (UTC).
[edit] We need your help!
That's right, we need your help picking suitable articles and pictures to feature on the main portal page. Please post any and all suggestions here. I can think of stuff to pick on my own (for a while), but I am only one person, and my knowledge of the field is more limited than all of our collected knowledge of the field. Thanks! --Cyde Weys votetalk 02:44, 3 January 2006 (UTC)
- See Wikipedia:Featured articles#Technology and Wikipedia:Featured pictures. If you run out of featured articles to display, you may find quality articles at Wikipedia:Good articles.--cj | talk 06:38, 3 January 2006 (UTC)
Biography suggestions:
- Charles Babbage
- Thomas Newcomen - (article not great, but it has enough good info for the portal box)
- Elmer Ambrose Sperry - (again, not great)
- Luther Burbank
- Carl Wilhelm Siemens
- Alexander Graham Bell
- Leonardo da Vinci
- Wright brothers
- Samuel Insull
--ragesoss 07:25, 19 March 2006 (UTC)
- I'm no deity, but I would like to suggest a few:
-
- Isaac Asimov with some of his essays has contributed to techonology.
- Albert Einstein has to do with science, which in turn becomes techonology we use.
[edit] misquote
I believe that the quote attributed to Bill Gates regarding the 640k limit is incorrect, and not something he actually said mrgenixus@gmail.com.
[edit] Version 1.0 core topics
Hello. I'm part of Wikipedia:Version 1.0 Editorial Team/Core topics working toward a release version of Wikipedia (on paper or CD).
If you're interested in helping, these are some related articles we plan to include:
If you think any of these are ready, please let us know. You can see our proposed initial quality standards or learn more about the overall project.
Thanks. Maurreen 04:01, 14 February 2006 (UTC)
[edit] How to read and write a pdf file using java?
I want to read a pdf file ? is there any packages in java ? or any jar file ? if any how i use that one
thanks in advance kumsh
This is the wrong place to ask for that. vidarlo 22:11, 12 April 2006 (UTC)
[edit] Links
I just removed all the links from "things to do" and actually put in some things to do. I notice another list of links, under "Reference links". Is this actually useful? To me, this seems like another spam magnet — something we just don't need. I think we should get rid of that section from the portal. Any objections or thoughts? -Aude (talk | contribs) 21:33, 23 March 2006 (UTC)
[edit] Technology news
Also, I suggest getting rid of the "Technology news" section, unless some volunteers come forth to regularly maintain it. With other portals I'm working on, the right column is generally used to provide topic browsing (e.g. categories, subportals, article directory, ...), and the left column is where the featured article, picture, do you know?, etc. go. For this portal, it would be logical to put the categories in that spot. Any objections to removing the "technology news" section? or volunteers to maintain and keep it? -Aude (talk | contribs) 21:37, 23 March 2006 (UTC)
[edit] The quote.
I took the freedom to change the quote to one by Albert Einstein instead, since the old one has been around for a long time. Please flame me for doing so, but give me good reasons for keeping the old one for so long if you choose to flame me. Otherwise, please leave it alone. vidarlo 22:10, 12 April 2006 (UTC)
[edit] =First personal computer
This a debatable subject, and Xerox was not the first corporation to market a personal computer, that is if a personal computer is a computer that is used by a single person in an office, if this was the case then the IBM 610 should be mentioned as the first PC. Because, it was John Lentz who designed this machine (between 1948 and 1954) and he coined the name Personal Automatic Computer, if you drop the Automatic you get PC. FrontLine 12:43, 26 April 2006 (UTC)
[edit] What is going on with these contents lists?
This is the second portal I've seen today with a contents list that takes up 90% of the title area. Is this a CSS issue or is there a problem with the software?
[edit] Selected biography
I have removed the "Selected biography" from the portal, as it was last updated in December. Furthermore, I don't see enough technology-related biographies in Wikipedia:Featured articles to keep this updated adequately. It would be better to include biographies among the "Selected articles". -Aude (talk | contribs) 22:13, 21 June 2006 (UTC)
- I've readded the biography, newly updated. Actually, it had been updated several times since December, most recently in mid-May. Selected biographies needn't be featured articles, and there are plenty of good enough biographies. I'll make sure it doesn't go for more than a month without an update from here on out.--ragesoss 23:52, 31 July 2006 (UTC)
[edit] Silicon Valley of India move proposal
Hi all, please visit the above move proposal discussion - we need further input. Posting here as Wikiproject Technology appears to be a ghost ship. thanks Bwithh 14:16, 16 July 2006 (UTC)
[edit] Brief about Baking domain in IT industry..
I jus wanna get a brief note about Banking Domain in IT industry....
Things i would like to know are as follows..
1. Impact of Information Technology in Banking domain. 2. How it favours or Supports Banking operations. 3. What are all the technologies used basically in Banking applications. 4. What is the role played by Java technology in Banking domain.
Wud b gr8 if someone cud help me out...
[edit] Brief about Banking Domain and not Baking....
Oops... There was a mistake.... Sorry.... —The preceding unsigned comment was added by Govi.ks@gmail.com (talk • contribs) 12:09, 5 September 2006 (UTC).
[edit] Slight error
There is a slight error in format about the sub-heading of this portal. The edit option in the top heading is covered partially due to the lenght of the blue heading. --Siva1979Talk to me 13:33, 21 September 2006 (UTC)
[edit] Internet security
As of this day, the Internet is connecting millions of computers in 260 countries on every continent, including Antarctica. The Internet is not a single network, but a vast array of loosely connected networks situated all over the world, easily accessible by individual computer hosts in a variety of ways. Today, the Internet uses gateways, routers, dial-up connections, and Internet service providers (ISP's) to make itself readily available at all times. Individuals and organizations worldwide can reach any point on the network without regard to national or geographic boundaries or time of day. The great importance of Internet security However, while using the Internet, along with the convenience and speed of access to information come new risks. Among them are the risks that valuable information will be lost, stolen, corrupted, or misused and that the computer systems will be corrupted. If information is recorded electronically and is available on networked computers, it is more vulnerable than if the same information is printed on paper and locked in a file cabinet. Intruders do not need to enter an office or home, and may not even be in the same country. They can steal or tamper with information without touching a piece of paper or a photocopier. They can create new electronic files, run their own programs, and even hide all evidence of their unauthorized activity. Basic Internet security concepts The three basic security concepts important to information on the Internet are:
Confidentiality. Integrity. Availability.
Concepts related to people using this information are authentication, authorization, and nonrepudiation. When information is read or copied by someone not authorized to do so, the result is known as loss of confidentiality. For some types of information, confidentiality is a very important attribute. Examples include research data, medical and insurance records, new product specifications, and corporate investment strategies. In some locations, there may be a legal obligation to protect the privacy of individuals. This is particularly true for most banks and loan companies, debt collecting agencies, businesses that offer credit to their customers or issue credit cards, hospitals, doctors' offices, and medical testing laboratories, individuals or agencies that offer services such as psychological counseling or drug treatment and agencies that collect any form of taxes. Information can be corrupted when it is available on an insecure network. When information is modified in unexpected ways, the result is known as loss of integrity. This means that unauthorized changes are made to information, whether by human error or intentional tampering. Integrity is particularly important for critical safety and financial data used for activities such as electronic funds transfers, air traffic control, and financial accounting. Information can be erased or become inaccessible, resulting in loss of availability. This means that people who are authorized to get information cannot get what they need. Availability is often the most important attribute in service-oriented businesses that depend on information (e.g., airline schedules and online inventory systems). Availability of the network itself is important to anyone whose business or education relies on a network connection. When a user cannot get access to the network or specific services provided on the network, they experience a denial of service. To make information available to those who need it and who can be trusted with it, organizations use authentication and authorization. Authentication is proving that a user is whom he or she claims to be. That proof may involve something the user knows (such as a password), something the user has (such as a "smartcard"), or something about the user that proves the person's identity (such as a fingerprint). Authorization is the act of determining whether a particular user (or computer system) has the right to carry out a certain activity, such as reading a file or running a program. Authentication and authorization go hand in hand. Users must be authenticated before carrying out the activity they are authorized to perform. Security is strong when the means of authentication cannot later be refuted - the user cannot later deny that he or she performed the activity. This is known as nonrepudiation. Why should we be concerned about Internet security? It is remarkably easy to gain unauthorized access to information in an insecure networked environment, and it is hard to catch the intruders. Even if users have nothing stored on their computer that they consider important, that computer can be a "weak link", allowing unauthorized access to the organization's systems and information. Seemingly innocuous information can expose a computer system to compromise. Information that intruders find useful includes which hardware and software are being used, system configuration, type of network connections, phone numbers, and access and authentication procedures. Security-related information can enable unauthorized individuals to get access to important files and programs, thus compromising the security of the whole system. Examples of important information are passwords, access control files and keys, personnel information, and encryption algorithms. Internet security abuse is often reported in the media. Nobody on the Internet is fully or completely immune to a security breach. Those affected include banks and financial companies, insurance companies, brokerage houses, consultants, government contractors, government agencies, hospitals and medical laboratories, network service providers, utility companies, the textile industry, universities, and wholesale and retail trades. The consequences of a break-in cover a broad range of possibilities: a minor loss of time in recovering from the problem, a decrease in productivity, a significant loss of money or staff-hours, a devastating loss of credibility or market opportunity, a business no longer able to compete, legal liability, and the loss of life. The General Center for Internet Services Inc/ edited by Dritan Axhami —The preceding unsigned comment was added by Tanni.sya (talk • contribs) 02:25, 4 January 2007 (UTC).
- This seems to be an article, not a talk discussion...Lithium fun! 16:23, 6 February 2007 (UTC)
[edit] DELETE LINK?
SHOULD WE DELETE THIS LINK? http://en.wikipedia.org/w/index.php?title=Category:Integrated_Circuits ~~Magistrand~~ 23:28, 11 January 2007 (UTC)
[edit] Is anyone updating this portal?
This portal seems to have been dead for awhile, and if no one else is updating this, I would be happy to update it to the best of my ability. Lithium fun! 16:18, 6 February 2007 (UTC)
[edit] how to send signals through the LPT port using java source code
hello, i need some guidelines for the following. i am doing a group project. here it is:
In this project our primary objective is to control any electrical equipment via a computer by using our mobile phone. If this can successfully be implemented, then a user can easily check the status of the electrical equipment of his or her house.
Say if the user has accidentally left the AC in his/her house turned on, and then while the user is on the road, then he/she would easily be able to use the mobile phone and switch of the AC in the house.
Requirements:
1. Keep a mobile phone connected with MIDP 2.0 with the computer through the USB port. 2. Send SMS to this mobile phone from any other phone from any place. Therefore the user must always carry a phone with him or her. 3. The mobile attached with the computer would send the signal upon receiving the SMS to the computer which would then decode this message. 4. There will be electrical equipment connected with the computer through the LPT port / USB port. [ A central hardware control switch might be required ] 5. Once the computer processes the message, appropriate actions would be taken. That is if the user sends ‘FAN OFF’, then the computer should be able to switch off the FAN that might be turned on. And then it will send a success message (SMS) to the user. 6. To run this successfully, a computer in the house must always be switched on.
The mobile attached with the computer would send the signal upon receiving the SMS to the computer which would then decode this message. how can i do this using java? please give help.
mmk_deadman@hotmail.com, manzur139@yahoo.com —The preceding unsigned comment was added by 203.83.160.84 (talk) 18:16, 17 February 2007 (UTC).