How to avoid network downtime?
A network of any company or organization is created to provide users with easy access to information, applications and network services. However, both company’s productivity and revenues can suffer significantly…

Continue reading →

How the intranet works
If you choose the most important thing (at least for small businesses), in order for your network to be called an "intranet", it is necessary that: information exchange between participants…

Continue reading →

Z-tracks
In devices with a moving coil there are no pre-fixed positions. Instead, they use a special guidance system (positioning), which accurately brings the heads to the desired track. The system…

Continue reading →

recovery process

Processor performance

You can still praise the advantages of technical solutions of the processor. Moreover, the “stone” turned out to be really successful. But many are probably most interested in the end result. I hasten to immediately assure that the Athlon really surpasses the P-III in all respects. It is no accident, apparently, this time AMD performed almost all the performance tests familiar and unfamiliar to us. Continue reading

Novell High Availability Server™ (NHAS)

NHAS allows you to use Intel architecture equipment as part of two servers and a shared disk array connected to them. By pairing two independent servers in an Active / Active configuration, NHAS allows each NetWare server to mount the data of the other server if one of the servers in the cluster fails. Monitoring of servers is carried out through a conventional network connection, a disk channel, and / or a dedicated connection, using additional network cards. Continue reading

Checking the status of the Zip drive
TIP.EXE is a Zip disk surface quality test. The principle of the program is as follows: this program reads each sector of data from the disk, enters them into the…

...

But this is not Intel at all!
The ways of AMD and Intel, from our point of view, have long diverged. If earlier it was possible to install at least Intel or at least AMD into the…

...

Viruses are serious, and Win95.CIH is not alone
Currently, there are quite a few viruses that destroy the contents of CMOS. For example, the stealth virus FindMe (stealth virus - “invisible virus”, like the stealth bomber), the destructive…

...

SDRAM PC100
Until recently, the development of new technologies for manufacturing memory components took place in parallel with the development of chipsets manufactured by Intel. But it so happened that in 1998…

...