Custom Search

News World

Apr 30, 2008

Video Conferencing Systems > Application and File Sharing


Application Sharing is described in Section A. It requires software that supports application sharing using the T.120 protocol such as Microsoft NetMeeting. If using a computer-based video conferencing system, application sharing can take place at the same time as the video conference, assuming there is enough bandwidth available. Group systems may require the use of a computer linked to the unit to support application sharing across the link.

Programs such as NetMeeting or CUseeMe include general applications such as Chat shared whiteboard. Chat opens a window at each end; users can then type messages to each other.
Whiteboard in this context is a program that looks like a painting or graphics program. When run it is visible at both ends of the link; users from either end can draw or write on it (this should not be confused with an interactive whiteboard mentioned elsewhere in this document). These general applications are designed to support collaborative working and can operate with or without an audio or video conference taking place at the same time.

The sharing of specific applications such as word-processing or spreadsheets is possible with some conferencing software. In practice, one user will open an application, e.g. a document in a word processor, and either user can take control and edit the document.
File sharing enables users to send files to each other across the conference link.

Video Conferencing Systems > Software

Group systems will be controlled by software. This will have been designed for the unit and is specific to it. Updating of the software is often possible. The update is usually downloaded from a central server.


Low-cost, computer-based systems will use conferencing and collaboration software available for the type of computer. A number of programs exist such as

  • Microsoft NetMeeting,
  • CUseeMe,
  • VideoLink Pro
  • Microsoft Messenger
  • Etc

All programs can manage directories of users, initiate conferences, control sound and video as well as provide collaborative tools and application and file sharing. The hardware specification must meet the requirements of the software.


Desktop systems will often be supplied with specific, proprietary software which matches the hardware.


Some software is standards compliant, enabling users to conference with other Standards compliant systems, e.g. a PC running NetMeeting can conference with a group system or a desktop system running proprietary software. It may not be possible to use some features on the lower cost systems and the video quality may be poorer but basic conferencing will be possible.
Proprietary software will enable conferencing with other units as long as it is standards compliant.

Some software packages support the use of Directory Servers and connection via Gatekeepers.
Depending on the network you use, this may be an important feature. NetMeeting and many proprietary software packages support these services.

Windows Messenger, recently included with the Windows operating system, is part of a self-contained service that requires users at either end to have a version of Messenger installed.

Messenger relies on a service which can identify those you wish to contact and inform you if they are currently logged on to the service. It is possible to video and audio conference with contacts as well as share applications, chat and files. It is not possible to conference from Messenger to users on other systems or using other software. Other video conferencing software packages similarly require both near and far-ends to be using the same software.

Apr 28, 2008

Polycom/Polyspan SoundStation 2NEXW (Non Expandable Wireless)






Description - Soundstation 2W



Now there’s a conference phone without cords that gives you the freedom to conference anywhere team collaboration is important – even in rooms where there are no phone lines. With superior voice quality to the award winning SoundStation, proven 2.4 GHz or 1.9 GHz wireless technology, added security of voice encryption, up to 24 hours of talk time, and the ability to dial through a cell phone, the SoundStation2W is the new standard for everyday conferencing.




SoundStation2W delivers voice quality that is twice as loud and provides twice the microphone sensitivity as the original SoundStation enabling clearer natural, two-way conversations. Our secure and proven 2.4 GHz or 1.9 GHz platforms provide simple and robust wireless capability with any analog phone line. With reliable 150 foot wireless roaming from the base station, wireless frequency hopping to avoid interference, and a long lasting Lithium-ion battery, the SoundStation2W truly meets today’s needs for excellent voice quality and usage flexibility.




SoundStation2W is also the first phone that combines cell phone convenience and Polycom voice quality. The standard headset cable provided enables users to instantly connect their cell phone to the conference phone. This mode gives users the option to dial directly through a cell phone or transfer between handset and conference phone mode during a conversation. Because the call is dialled through the cellular network, there is no need for an analog phone line– providing true portability and wireless freedom!




Compatible Cell Phones for the SoundStation 2W
The SoundStation2W – designed to be used where you need it, because the conference room isn’t always enough!

Note: SoundStation2W models use either 2.4 GHz WDCT (Worldwide Digital Cordless Telecommunications) or the 1.9 GHz DECT (Digital Enhanced Cordless Telecommunications) standards, depending on the wireless requirements where the phone will be used.
Features - Soundstation 2W




  • Echo cancellation and suppression adapt automatically to changing rooms and telephone lines

  • Remarkable Voice Quality

  • High performance mics and speaker for the best conferencing experience possible

  • Talk from two to 10 feet away from a mic and still be heard on the far end

  • Leading Wireless Capabilities

  • 150 ft. wireless range

  • 64 bit Voice encryption for added security

  • Aux out (record) activated from console

  • Easy to Use and Install

  • Cell Phone Dialling

  • Convenience of transferring calls from your cell phone to group conference speakerphone mode

  • Dynamic Noise Reduction (DNR)

  • Software Upgradable (via Mini USB port)

  • Expandable (EX version only) with 2 EX Mics (sold separately)

  • Backlit graphical display with soft keys

  • Easy to read icons for wireless status

  • Compact Base Station with standard analog interface

more : http://www.videocentric.co.uk/audio-conferencing/polycom-audio-conferencing/soundstation2w.shtml

Apr 26, 2008

Polycom 2705-00106-001 Limited Edition Soundstation (Lunar Silver Color)



Polycom Limited Edition SoundStation.


Limited Edition Lunar Silver SoundStation.

Our most popular conference phone ever in exciting millennium metallic! SoundStation's three microphones and powerful, digitally tuned speaker provide full 360-degree coverage, whether you use the system in a conference room or your office. The built-in keypad looks and works like a touch-tone telephone, offering such handy features as a mute button and flash key.

There's even a jack to plug in a tape recorder.SoundStation is as easy to install as it is to use. The compact console unit is connected by a single cord to a wall module or universal module containing both power and telephone interfaces. SoundStation can be configured at the factory to meet the specifications of virtually every country's telephone network.


Polycom Limited Edition SoundStation Features

  • Lunar Silver color
  • Echo cancellation & suppression
  • Integrated keypad
  • Award winning design
  • Three quality microphones
  • Powerful speaker
  • Mute button/dual color LED status lights
  • Requires analog telephone line
  • Flash key / 600 mils per second (Also configurable to 100 or 300)


Polycom Soundstation Premier EX500 w/ 2 Extension Mics, Remote & Satellite External Speaker



Polycom Soundstation Premier EX500


Introducing the Polycom Soundstation Premier EX500 audio conferencing system. Includes 2 external, wired microphones and 1 satellite speaker. Polycom SoundStations connect to analog telephone lines (the same used by a fax, modem or any telephone that you might use in your home).


Use the Intelligent Terminal Adapter (ITA) to connect your Polycom SoundStation to any digital telephone system in just 1 easy step. SoundStation Premiere sets a new standard and full-duplex audio conferencing quality. Incorporating Polycom's revolutionary echo canceling and noise reduction technology, SoundStation Premiere virtually eliminates echoes and reverberation.


Polycom Soundstation Premier EX500 Features

  • Full-duplex operation
  • Hypercardioid microphones
  • Noise reduction and automatic gain control
  • High fidelity speaker
  • Integrated keypad with 16-character LCD
  • Wireless infrared remote control

Polycom 2305-06375-001 Definity Driect SoundStation Premier Expandable Phone



Polycom SoundStation Premier


SoundStation Premier sets a new standard in full-duplex audio conferencing quality. Incorporating Polycom's revolutionary echo cancellation and noise reduction technology, SoundStation Premier virtually eliminates echoes and reverberation.


In addition, the exceptionally sensitive hypercardioid microphones and intelligent microphone mixing minimizes background noise, allowing you to effectively zero in on meeting participants as they are speaking, even in a room full of people


Polycom SoundStation Premier Features

  • Definity Direct Soundstation Premier Expandable.
  • Plugs directly into a DEFINITY system's digital wall jack or ca be plugged into DEFINITY voice port that supports the 6400, 7400 or 8400 series phones.
  • Full-duplex audio conferencing.
  • Echo cancellation.
  • Noise Reduction.
  • Intelligent, Sensitive hypercardioid mic's.
  • Expandable (Additional Microphones





Polycom 2200-06848-001 Voicestation 100 Full Duplex Conference Phone



Polycom VoiceStation 100


VoiceStation 100 is the clear alternative to handset speakerphones when conducting remote meetings. With Polycom’s full duplex Acoustic Clarity Technology,™ VoiceStation 100 enables natural, free-flowing conversation, assuring that everyone can hear and be heard clearly without the need to raise your voice or repeat words and phrases.


Polycom’s full-duplex audio conferencing systems are found in more conference rooms, boardrooms, and other meeting areas than all other types of audio conferencing systems combined. Now there’s a perfect solution for offices and other smaller meeting areas. VoiceStation 100 by Polycom.


Full-duplex is the ability to communicate in 2 directions simultaneously so that more than one person can speak at a time. Half-duplex means that only one person can talk at a time, which is unnatural in normal free-flowing 2-way communications, like conference calls. VoiceStation 100’s crystal-clear, full-duplex audio allows you to speak in 2 directions at the same time—as naturally as speaking face-to-face.


Polycom VoiceStation 100 Features

  • Full-duplex performance—simultaneous 2-way communication
  • Business quality conferencing anytime
  • Powerful speaker/3 sensitive mics—hear and be heard clearly
  • Easy to install/easy to use


Polycom 2200-05200-001 Sound Station Premier100 Non-Expandable Phone




Sound Station Premier 100


New standard in full-duplex audio conferencing quality.

Incorporating Polycom's revolutionary echo cancellation and noise reduction technology, SoundStation Premier virtually eliminates echoes and reverberation.

In addition, the exceptionally sensitive hypercardioid microphones and intelligent microphone mixing minimizes background noise, allowing you to effectively zero in on meeting participants as they are speaking, even in a room full of people

Sound Station Premier 100 Features


  • This unit is non-expandable and comes without the remote control.

  • State-of-the-art full-duplex technology rivals talking on a handset

  • Hyper cardioids microphones for 360° pick-up, echo cancellation and automatic gain control

  • DSP technology produces intelligent mic mixing for precision voice pick-up

  • Neodymium speaker produces hi-fidelity sound with dynamic, balanced range

  • 16 digit LCD displays caller ID, time of day and duration of call

Polycom Sound Station Premier With Expandability Model # 2200-01900-001 And Ir Remote Keypad


AUDIO CONFERENCING SYSTEM



  • Includes IR REMOTE KEYPAD, and TWO MICROPHONE PORTS

  • For Future Expandability (Compatible With Either The External or Wireless Microphones, or Satellite Systems)

  • Unsurpassed Clarity and Performance For Superior Audio conferencing

  • Noise Reduction

  • Three Exceptionally Sensitive Hyper cardioids Microphones Provide 360' Room Pick-up
  • Automatic Gain Control and Intelligent Microphone Mixing Minimizes Background Noise



  • Neodymium Speaker Provides Clear, High Fidelity Sound with Balanced Dynamic Range 16-Character LCD for Displaying caller ID Capability, Time of Day, and Length of Call, Console Features Hold, Redial, Mute Buttons, and Connects to Wall Module Via a Single Cord

  • Full-Duplex Operation

  • Separate Echo Cancellation For Each Console Microphone

  • Flash Key to Access Telephone System Features Such as Hold, Transfer, and Conference Palm Software Interface-Dial/Control All Sound Station premier Models from your Palm Wall Module Contains Power, Telephone Line, and RCA Jack (Recording/Wireless Mic) Interfaces Optional Infrared Remote Control, Wireless Microphone System, and Extended Microphones

GFI Fax Maker – FAX Options When Using Your Email Application


If you want to send a fax using fax options that differ from the default settings set by either your administrator or yourself, you can do this by using the fax options described in this paragraph. The fax options should be typed in at the top of the body of the e-mail message, preceded by a double colon::

Please note that the recipients of the fax will not be able to see these specifications in the received text.


The following options can be used:

To specify a cover page

::C=cover page name

For example: ::C=cover1

`Cover page name' stands for the name of your cover page. If you do not want to send a coverpage, but by default a coverpage is added, you can override this option temporarily by specifying `none' instead of a cover page name. This will cause FAXmaker not to add a coverpage.

Note : Remember that the cover page must be stored and configured on the server first.

To specify high or low resolution

::'H' or 'N'

For example: ::H

`H' stands for high resolution (200 * 200 dpi) and `N' for normal resolution (200 * 100 dpi).

To specify a front cover page

::F=cover page name

For example: ::F=cover2

To schedule a fax

::nn:mm

For example: ::23:15

`nn' equals hours and `mm' equals minutes. If you want to send a fax at a scheduled date or time, this option can be used.

To specify a billing code

::B=nnnn

For example: ::B=5

`nnn' can be replaced by any number. This number will be added in the log file and can then be used to apportion costs.

To specify priority

::p=low/high/l/h or priority= low/high/l/h

For example: ::p=low

`P' stands for priority. You can enter low, high or l or h. This option is handy when you have submitted a large fax mailing and you wish to send out this fax immediately.


Multiple options

When you are using multiple options in a message, you must type them on the same line, separated by a comma.

For example;

:: c=cover1, 23:15, B=5


Sending an SMS

To send an SMS from your e-mail client:

  1. Create a new mail message and enter the text to SMS. An SMS message can contain a maximum of 160 characters - if you enter more characters the text will be truncated on multiple SMS messages.

    Note: Remove your email signature! Otherwise the email signature will be included with your SMS message!

  2. Now enter the recipient of the SMS message in the To: field, using SMTP addressing in the following format: number@smsmaker.com. e.g: 0614570126@smsmaker.com

    Note : This method of addressing requires that your mail server has been configured to forward all mails sent to smsmaker.com to the GFI FAXmaker fax server. The procedure to do this has been described for Lotus Notes and for Microsoft Exchange Server 5.5 and is similar for all other mail servers.

  3. When you are ready, click on the Send button. FAXmaker will now send the SMS. Soon after you will receive a report on whether the SMS was sent successfully or not.

GFI Fax Maker – Sending and Receiving Faxes & SMS Fom Email Clients

Introduction

If your company does not have Exchange Server 2000 or 2003 or if you are not using Microsoft Outlook, then you can send and receive faxes and SMS's using the method described in this chapter.


Sending a fax

To fax from your e-mail client:

  1. Launch the New Message form from your e-mail client. Type in the fax message. If you do not enter a message, no cover page will be faxed. If you enter a subject, this will appear in the field in your cover page. You can also attach any Microsoft Office, PDF or HTML documents.

  2. Specify the recipient of your fax: Enter the fax number in the `To:' field in the following format: number@faxmaker.com. e.g: 0614570126@faxmaker.com

    Note :
    This method of addressing requires that your mail server has been configured to forward all mail sent to faxmaker.com to the GFI FAXmaker fax server. The procedure to do this has been described for Lotus Notes and for Microsoft Exchange Server 5.5 and is similar for all other mail servers.

  3. You can attach files to your message using the `Attach file' function.

  4. When you are ready, click on the 'Send' button. FAXmaker will send the fax, and it will notify you on the status of the fax, by sending you a transmission report by e-mail.

Apr 25, 2008

GFI Fax Maker – Previewing a Fax

For some very important faxes, you may want to see how the fax will look before you send it. In this case you can ask the fax server to send you a preview:

  1. In the subject, include this tag [::preview].

  2. The fax server will find that tag in the subject, convert the fax and send it back as an attachment. The subject will have a code similar to [::send=pbc123ff].

  3. If you want to actually send the fax, hit reply and click send. The fax will be sent immediately by the server.
    A fax sent for preview must be sent within 1 day, otherwise it will be deleted.

  4. When you are ready, click on the Send button. FAXmaker will now send the SMS. Soon after you will receive a report stating whether the SMS was sent successfully or not.

Apr 24, 2008

GFI Fax Maker – Resending a Fax

Resending faxes is easy: simply reply to the failed or success transmission report sent by the FAXmaker server. GFI FAXmaker stores a copy of the fax on the server so that it can immediately resend the fax.

It will also ensure that the reply to address is the fax number of the original recipient. This way you can simply hit reply to resend the exact same fax to the same recipient. Of course GFI FAXmaker will not include the transmission report in the fax. If needed, you can edit the recipient number in the to field. However do not edit the subject field because it contains a code to find your fax.

GFI FAXmaker stores failed faxes for 1 week on the server and succesfull faxes for 2 days on the server. Beyond that, you can resend a fax in 2 ways:

  1. From the transmission report e-mail, hit the reply button and edit out the transmission report. GFI FAXmaker will set the reply to address to the fax number of the original recipient. The original text of the fax will be in the body of the reply mail. Click Send to resend the fax.

  2. If your original fax had attachments, not included in the cover page text, you have to use the forward function of your e-mail client, since replying to a mail will not attach the original fax files. In this case, from the transmission report e-mail, hit the forward button. Now copy and paste the fax number from the `from field' of the transmission report. Hit the send button to resend the fax.

GFI Fax Maker – Sending a Fax Using the Send Command

Microsoft Office applications include a Send command, enabling you to send a document via email. You can use this same command to send a document via fax. To do this:

  1. Create your document and select the `Send To > Mail Recipient (As Attachment)' command from the menu.

  2. Outlook will now start a `New message form' with the document as an attachment.
    Now follow the steps 2 onwards outlined in `Sending a fax using a Microsoft Outlook Message form'. The procedure is identical.



Sending an SMS from Microsoft Outlook

You can send an SMS directly from Microsoft Outlook using the `One off' addressing format. It is not possible to select the recipient from the Outlook contacts list. To do this you need to use the FAXmaker SMS Message form. To send an SMS from Microsoft Outlook:

  1. Start up Outlook and create a new mail message and enter the text to SMS. An SMS message can contain a maximum of 160 characters - if you enter more text the text will be truncated on multiple SMS messages.

    Note:
    Remove your email signature! Otherwise the email signature will be included with your SMS message!

  2. Now enter the recipient of the SMS message in the To: field, using the [sms: ] format, for example [sms: 99785623]

GFI Fax Maker - Sending Faxes & SMS from Microsoft Outlook

Introduction

If your company has Exchange Server 2000 or 2003, then you can send and receive faxes directly from Microsoft Outlook using the methods described in this chapter.

If your company does not have Exchange Server 2000 or 2003, then you can still send and receive faxes directly from Microsoft Outlook, however you have use the method described in `Sending and receiving faxes & sms from email clients'. Refer to this chapter also if you want to send and receive faxes from Microsoft Outlook Express via Exchange Server 2000/2003

  1. Print to the FAXmaker printer driver (requires that your administrator has configured the Outlook New Message form to appear automatically after printing to the FAXmaker printer driver) or create a new mail message in Outlook.

  2. If you have printed to the FAXmaker printer driver, your document will be attached to the new message form. The text you enter in the e-mail message will be formatted onto the default company cover page. You can also attach Office documents and HTML or PDF files. The message itself can be formatted using HTML.

    Note :
    If you want to attach a file that has an object in it or uses fonts not found in a standard installation, print the document locally rather then attaching it, since the Fax server will not have access to your fonts or embedded objects.

  3. Now specify the recipient(s) of the fax: Click on the To... button in the Outlook New Message form. The Outlook address book will appear. Now select the Outlook Contact List and choose a recipient. You have to ensure that the recipient has a fax number entered in the Business Fax field. If he/she does, he will appear in the outlook address book with (Business Fax) behind his/her name.

    Click on the `To->' to add the recipient. You can add multiple recipients. Click OK when ready.


    Tip:
    How to create a one-off address using SMTP addressing

    If you are sending a fax to a one-off recipient, and don't want to enter them into your contacts list, enter the fax number in the To: field in the following format: [fax:], for example [fax: 0614570126].

  4. When you are ready, click on the Send button. FAXmaker will now fax out your document. Soon after you will receive a transmission report in your inbox including information on whether the fax was sent successfully, how many pages were faxed and at what time. If your fax failed, it will contain information about why the fax failed.

Note about company field in cover pages

If you want the recipients company name to appear in the cover page, you must use the FAXmaker Fax Message form OR select a recipient from a public contacts list to which the FAXmaker fax server has access. This is because Microsoft Outlook will not include the recipient's company name in the e-mail message. For more information please contact your administrator.

Apr 23, 2008

GFI Fax Maker - Sending an SMS using the FAXmaker SMS form

To send an SMS, use the FAXmaker Send SMS Message Form. This form gives you the option of selecting the SMS recipient from your Outlook contacts list. You have to ensure that the recipients mobile field is filled in.

  1. Start-up the FAXmaker SMS Message form from the FAXmaker client program group, and input the mobile number in to the “to; cc or bcc” text box.

  2. You can specify the recipient in 2 ways: by typing in the number in the To: field or by selecting a recipient from the Outlook address book. In this case you have to ensure that the recipient has a mobile number entered in the mobile field, before you click on the To: button. To enter a mobile number for a contact, go to the contacts list (contacts node) and double click on the recipient. Now enter the GSM mobile number in the mobile field (just below business fax). Click on Save and Close to save the mobile number.

    Note: If you are using an SMS web service, ensure that you enter the mobile number in international format, i.e add the country code in front of the number. For example +62 61 77617448 or +62 8126550192

  3. Now you can select the recipient by clicking on the To... button. The Outlook contacts list will show up. Select the recipient. (e-mail will be written behind the contact, however the SMS form will retrieve the mobile number all the same). You can select multiple recipients. Click OK when done.

    Note: The contact will not show up, if you have not entered either an email address OR a fax number. So you have to enter an email address or fax number for each contact.

  4. When you are ready, click on the Send button (Keyboard: CTRL +S).
    FAXmaker will now send the SMS. Soon after you will receive a transmission report in your inbox including information on whether the SMS was sent successfully or not.

GFI Fax Maker - Sending and receiving SMS

Introduction to the SMS gateway

FAXmaker includes an e-mail to SMS gateway, allowing users to send SMS messages. SMS is very popular, and is increasingly used for business purposes as well.


What is SMS?

The Short Message Service (SMS), also referred to as texting is the ability to send and receive text messages to and from mobile telephones. The text can comprise of words or numbers or an alphanumeric combination. SMS was created as part of the GSM Phase 1 standard. The first short message is believed to have been sent in December 1992 from a Personal Computer (PC) to a mobile phone on the Vodafone GSM network in the UK. Each short message is up to 160 characters is length when Latin alphabets are used, and 70 characters in length when non-Latin alphabets such as Arabic and Chinese are used.


Why use an SMS gateway?

SMS messages can be sent from any GSM mobile phone, as well as from several internet based service providers. However, using a central company SMS gateway has many advantages:

  • Sending messages from Outlook is much faster than from a mobile phone.
  • Sending messages from a computer allows you to use the Outlook contacts list.
  • Sending messages from a computer allows you to keep a copy of SMS messages sent.
  • A web based SMS provider means additional administration costs and means users will have to login to the service with their user account. Additional steps for the user and additional administration for the administrator.- If you don't have a company mobile, the user would have to pay for SMS messages sent privately.

GFI Fax Maker - Sending and Receiving Faxes - 03


Resending a fax

Resending faxes is easy: simply reply to the failed or success transmission report sent by the FAXmaker server. GFI FAXmaker stores a copy of the fax on the server so that it can immediately resend the fax.

It will also ensure that the reply to address is the fax number of the original recipient. This way you can simply hit reply to resend the exact same fax to the same recipient. Of course GFI FAXmaker will not include the transmission report in the fax. If needed, you can edit the recipient number in the to field. However do not edit the subject field because it contains a code to find your fax.

GFI FAXmaker stores failed faxes for 1 week on the server and succesful faxes for 2 days on the server. Beyond that, you can resend a fax in 2 ways:

  1. From the transmission report e-mail, hit the reply button and edit out the transmission report. GFI FAXmaker will set the reply to address to the fax number of the original recipient. The original text of the fax will be in the body of the reply mail. Click Send to resend the fax.

  2. If your original fax had attachments, not included in the cover page text, you have to use the forward function of your e-mail client, since replying to a mail will not attach the original fax files. In this case, from the transmission report e-mail, hit the forward button. Now copy and paste the fax number from the `from field' of the transmission report. Hit the send button to resend the fax.

GFI Fax Maker - Sending and Receiving Faxes - 04

Previewing a Fax

For some very important faxes, you may want to see how the fax will look before you send it. In this case you can ask the fax server to send you a preview:

See the Request preview toolbox :

  1. In the toolbar of the FAXmaker New fax form, click the "Request Preview" button, located to the right from the Send button.
  2. The fax server will convert the fax and send it back as an attachment to your e-mail inbox. The subject will have a code similar to [::send=pbc123ff].
  3. If you want to actually send the fax, hit reply and click send. The fax will be sent immediately by the server.

A fax sent for preview must be sent within 1 day, otherwise it will be deleted.



Receiving a Fax

Incoming faxes are received in the Microsoft Outlook Inbox. The message will read `Fax received'. To view the fax, double-click on the message. The message will open up with fax details. Then doubleclick on the fax attachment to display the fax.

The mail message shows the fax report, and the inbox shows the sender's fax ID .

Apr 22, 2008

GFI Fax Maker - Sending and Receiving Faxes - 02


Sending a fax

To send a fax from a Windows application:
  1. Create a new Windows document or open an existing one.
    Selected FAXmaker printer driver on the Printer form display.

  2. Print your document to the FAXmaker printer.
    For example, in Microsoft Word, choose Print from the File menu. In the Print dialog click on the Printer - Name dropdown box and select FAXmaker. Click OK.
    If you have selected that the Outlook New Message form should appear after printing to the FAXmaker printer driver, go to the chapter Sending a fax using the Microsoft Outlook Message form for the remaining steps.

  3. The FAXmaker Sendfax Client Fax – MAPI PostOffice Message form will pop up with your document attached as a fax file.
    If you want a cover page to appear in front of your document, you can enter the cover text in the form. You can also attach Office documents using the insert attachment function in the menu (or CTRL+T).
    Note:
    When attaching files other than FAXmaker fax files, make sure that all fonts and objects included in your document are also available to the server.

  4. Now specify the recipient(s) of the fax (see : selecting a recipient for the fax form) : Click on the To... button.
    The Outlook address book will appear. Now select the Outlook Contact List and choose a recipient. You have to ensure that the recipient has a fax number entered in the Business Fax field. If he/she does, he will appear in the outlook address book with (Business Fax) behind his/her name.


    Click on the `To--' to add the recipient. You can add multiple recipients. Click OK when ready.


    If you are sending a fax to a one-off recipient, and don't want to enter them into your contacts lists, you can specify the fax number directly in the To: field.

    If you use the FAXmaker Address Book
    Click on To: to bring up the FAXmaker Address Book. Here you can select a fax recipient. If you wish to add a new fax contact, click 'Add'. This will bring up the 'Edit Record' dialog in which you can add a recipient. Click OK when you have selected the fax recipient. This will add the recipient to the fax.

  5. After you have specified the recipient, you can specify the fax options.
    The Fax options dialog is available from the menu Fax > Options, from the options button in the tool bar, or via the CTRL+O key combination. The following options are available (on the Fax Options):

    Format options

    Resolution: Select which resolution you wish to send this fax in.*
    Send cover-page: Selecting this option will add a cover-page to the fax.
    Cover page name: If you want to send a different cover page other than the default cover page, enter the name of the custom cover page you wish to send (This cover page has to be configured on the server by the administratator).
    Note that the list of coverpages does not automatically list the available coverpages on the server.


    Fax delivery options

    Importance: Setting the importance level to high or normal will only effect the delivery time if there are a lot of faxes in the queue. You can specify this option directly from the toolbar.
    Billing code: The billing code is used for accounting purposes to apportion the cost of the fax (Optional).
    Scheduling: If you wish the fax to be sent at a later date or time, tick this option and select the date and time you wish the fax to be sent.

  6. Now specify a subject for the fax (this will allow you to recognize the fax when you receive notification regarding the status of the fax).

  7. When you are ready, click on the Send button (Keyboard: CTRL +S). FAXmaker will now fax out your document. Soon after you will receive a transmission report in your inbox including information on whether the fax was sent successfully, how many pages were faxed and at what time. If your fax failed, it will contain information about why the fax failed.


To send a fax from FAXmaker directly
  1. Start-up the FAXmaker Fax Message form from the FAXmaker client program group.
  2. Follow the procedure `Sending a fax from a Windows application' described above from step 4 onwards.

GFI Fax Maker - Sending and Receiving Faxes - 01


Introduction to sending a fax

Faxes can be sent in the following ways:

  1. Create or open a document in any Windows application and print it to the 'FAXmaker printer'. The document will be converted to fax, attached to the FAXmaker Fax Message form or Outlook New Message form.
  2. Startup the FAXmaker Fax Message form from the FAXmaker program group and send a fax directly from it.
  3. Open Microsoft Outlook, create a new message, enter the text to send, add attachments if needed and send the fax from Microsoft Outlook directly.
  4. From any Microsoft Office application, Use the Send To command, which can be found in the file menu.
This will attach the document you created to a new Microsoft Outlook mail message.
The FAXmaker client software consists of a fax printer driver, fax viewer and the optional FAXmaker Fax message form.

The FAXmaker fax message form supports the Outlook address book, although it includes its own address book for users who do not have Microsoft Outlook.


Specifying email address

Input specifying the email address in to the Email Address Form.
The first time you start the FAXmaker Fax Message form, you will be prompted for your email address. This will be used to mail you delivery reports.

Apr 21, 2008

Video Conferencing Systems > Hardware




Video conferencing is a powerful tool and provides a virtual meeting environment that gives the benefit of real meeting.

There are various kinds of conferences held using a video conferencing information system.
Depending on the nature of the conference it becomes important to plan the video conferencing information system schedule. It becomes very important to check the requirements for smooth progress of the meeting. Back when video conferencing was a new trend, the quality and consistency of the feed was generally less than perfect.

However, videoconferencing future is very bright.


HARDWARE

The following section includes additional notes relating to the main types of video conferencing system.


Low-cost, Computer-based Systems

Low-cost systems are based on standard computer hardware. This type of system needs a fullduplex sound card, a headset, a web-cam (usually connected via a USB port) and suitable software. If used with a group, multiple headsets can be used via a splitter unit, enabling more than one user to conference.

PCs have had NetMeeting included with MS Windows for some years. The recently launched XP version of Windows is supplied with Windows Messenger as well as NetMeeting.

Apple Mac computers can run a range of software. Some Mac packages, such as VideoLink Pro, are compliant with video conferencing standards, while others, such as CUseeMe, require the same software running on near and far-end systems.
These systems are suitable for IP based video conferencing across local and wide area networks or via a dialup connection. It is not possible for such a system to call an ISDN based video conferencing system.

Note:
there is a distinction to be drawn between a dedicated or group-based video
conferencing system which is connected to the ISDN network, communicating using H.320 conferencing protocols, and an IP based H.323system which uses ISDN to dial into a network).

Applications and whiteboards can be shared whilst in a conference according to the facilities available within the software. The bandwidth available for the link may restrict or slow down application sharing. See Application and File Sharing for more details.


Desktop Systems

A number of manufacturers market units that can provide a better conferencing experience due to the use of better quality cameras and, in particular, better control over the audio.

Many units plug into the computer via a USB interface; others have to be installed into the computer. The majority of systems support IP conferencing; a smaller number support ISDN based conferencing.

These systems will use either Microsoft NetMeeting or proprietary software. Most systems of this type are standards compliant.


Group Systems

There is a very wide range of group systems available. Units in this category are often sold with a number of options, e.g. support for ISDN, IP or both, choice of the number of ISDN lines supported or choice of microphones. These choices can result in a wide variation in cost.


When choosing a system the following should be considered:

  • Number of ISDN lines supported
  • IP bandwidth supported
  • Type of microphone supported. For example, some include microphones within the base unit; others use remote/table-top microphones
  • Range of connections for connecting peripherals such as document cameras, VCRs or
    Laptops
  • Quality of the audio and video compression systems
  • Ability of the audio system to discriminate between voices and background sounds.
  • Ability of the audio system to detect the location of the person speaking and move the
    camera to that person.
  • Ability to give the user easy control of sources, e.g. cameras, laptops, VCR inputs etc.
  • Easy to use user interface
  • Support for multiple monitors to show near-end, far-end or source such as a laptop Group systems, including the monitors, can be built into roll-about cabinets, or may simply be small set-top units that can be used in a number of locations. However, so-called, roll-about systems are often only used in a dedicated video conferencing room or studio.



Audio control on desktop and group systems

Modern video conference systems use autogain control of the audio input in conjunction with the echo cancelling electronics to minimise the effect of big variations in sound level. In an interactive session it is far better to have all the participants, if they are all contributing to the meeting, to be sited at an equal distance from the microphone. The audio input will ‘hear’ equal sound pressure levels and adjust the audio input level [and thus the audio the far-end hears] to a ‘standard’ level to maintain the echo cancellation performance.

If a speaker gets close to the microphone it won’t matter how loud he speaks, the autogain control system will actually reduce the input audio level to the ‘standard’ level. If another speaker, further away, now speaks, the system will not have time to adjust the input level for a short period and the second speaker appears to be very quiet. This is a very common problem for new users of video conferencing and is often characterised by the new user speaking ‘at’ the microphone in an attempt to ensure the far end can hear correctly. It is also important to ensure there is reasonable distance between the microphone and the speakers. Usually this is three to five metres for group systems.
This helps the echo canceller.

Operating System > Windows Vista



Windows Vista is the newest version of Windows and not an upgrade to Windows XP but an entirely new operating system.

If you use Windows XP, you should find many similarities with Vista and expect to gain greater functionality in the areas of communication, multimedia, and security. A new interface known as Windows Aero will be available that uses 3D graphics and other high-end visual effects to enhance your interaction with the operating system.


Microsoft's system requirements for Vista are listed below. UITS
has formulated IU-specific system recommendations for those who plan to use Vista on the IU network.


Microsoft lists Windows Vista hardware requirements in two categories, Vista Capable and Vista Premium Ready. Vista Capable computers will be able to run Vista, but may have limitations in the functionality of some new features.

Windows Vista Capable minimum hardware requirements are as follows:

  • A modern processor (at least 800MHz)
  • Minimum 512MB of system memory
  • A graphics processor that is DirectX 9 capable
  • Minimum 20GB of hard drive capacity with 20GB free space
  • CD-ROM drive



  • Vista Premium Ready computers will be able to take full advantage of the new features available in Vista, including the Windows Aero advanced graphical interface. Microsoft lists the minimum hardware requirements for Vista Premium as follows; UITS recommends further requirements as noted:

    • 40GB of hard drive capacity with 15GB free space UITS recommends: 80-100GB capacity
      DVD-ROM drive
      Audio output capability
      Internet access capability
    • 1GHz 32-bit (x86) or 64-bit (x64) processor UITS recommends: A dual-core (Core 2) processor
    • 1GB of system memory UITS recommends: 2GB system memory
    • A graphics processor that is DirectX 9 capable with Hardware Pixel Shader v2.0 and WDDM Driver support
    • 128MB of graphics memory UITS recommends: 256MB graphics memory; non-integrated video card


    Apr 20, 2008

    Threat Management Solution with Firebox® X Core™

    Growing businesses have the same critical network security needs aslarge enterprises, but generally have limited resources with which tobuy, install, manage, and maintain their security solutions. To tacklethese resource challenges, you need a solution that provides powerfulprotection, is easy to use, affordable, and capable of meeting yoursecurity needs not just today, but into the future. Here’s why yourUnified Threat Management Solution is the Firebox® X Core™.

    1. Intuitive Management Console

      Every Firebox X Core can be easily configured and managed using WatchGuard®System Manager. It provides real-time monitoring of status and events, richreporting, icon-based policy management, and drag-and-drop VPN configurationand logging – simplifying network security for the IT expert, while providingindispensable ease of use for novice network administrators.

    2. Centralized VPN Management

      To extend security to remote offices, Firebox X Core comes bundled* with a4-node VPN Manager license upgradeable to 10, 20, or unlimited users forsecure deployment of encrypted VPNs. Turn the complex task of setting upmulti-site tunnels into a simple 3-step process using VPN Manager technology toinstantly create VPNs.

    3. Comprehensive Unified Threat Management

      The Firebox X Core provides comprehensive security by integrating statefulpacket firewall, VPN, deep application inspection, gateway antivirus, intrusionprevention, anti-spyware, spam blocking, and URL filtering into a single appliance,reducing the time and cost associated with managing multiple-point solutions.

    4. Zero Day Protection Out of the Box

      Firebox X Core scrutinizes traffic as it flows into the network for anything thatdoes not conform to standard protocols, behaviors, and patterns. It inspectstraffic at multiple layers as it flows into the network to proactively blockfragmentation and DoS/DDoS attacks, viruses, spam, worms, spyware, trojans,and blended threats, providing zero day protection from attacks during thewindow of vulnerability before signatures are made available.

    5. Advanced OS with Enhanced Security Services

      WatchGuard Firebox System (WFS) is the operating system that ships standardon the Firebox X Core. Upgrade to Fireware™ Pro, our advanced operatingsystem, and take advantage of enhanced security services such as GatewayAntiVirus/Intrusion Prevention Service with anti-spyware, WebBlocker, andspamBlocker. Fireware Pro provides advanced networking features, includingmulti-WAN load sharing and interface failover, dynamic routing, high availability,port independence, and traffic management and prioritization to intelligentlymanage resources, increase uptime, and optimize network traffic in demandingnetwork environments.

    6. Smart Defaults

      Out of the box, Firebox X Core initiates default security settings that protect youfrom more attacks than other vendors. You don’t have to be a security expert tobe protected from day one.

    7. WebBlocker URL Filtering

      WebBlocker enables you to centrally mange and configure where and when usersaccess the Internet, drastically reducing exposure to spyware, trojans, virusdownloads from rogue Web sites, and other malicious Web-based mechanisms.Configure up to 40 Web site categories to stop the sites and Web tools you mostwant to block. This integrated service is sold per firewall. Other vendors changeper user, which can be much more expensive.

    8. SpamBlocker

      This powerful, integrated spam blocking service relies on real-time detection forimmediate protection from spam outbreaks. Spam is blocked regardless of thelanguage, content, or format of the message. It’s the best service in the industryat distinguishing legitimate communication from spam attacks in real time,blocking up to 97% of unwanted e-mails. This service is sold on a per appliancebasis, so one subscription covers all users behind your Firebox X Core.

    9. Device and Service Cloaking

      Firebox X Core hides the presence and identity of your servers by rewriting serveridentification strings, which stops hackers from collecting useful information ondevices, servers, or services. It also cloaks itself, preventing would-be invadersfrom identifying your security appliance.

    10. Gateway AntiVirus/Intrusion Prevention Service

      with anti-spywareThis is an integrated, signature-based security service that scans e-mail at thegateway to block viruses, spyware, and other malware. It also provides in-lineprotection from attacks that carry malicious content for an additional layer ofprotection against application exploits including trojans, buffer overflows, SQLinjections, and policy violations. In addition, you can block instant messagingand P2P applications. A single subscription provides network-wide protectionfor all users configured behind your Firebox X Core.

    more : www.watchguard.com

    Apr 19, 2008

    Transfering File with FTP (File Transfer Protocol )


    Ftp (File Transfer Protocol)

    Is a method for transferring files between two computers on a network. The two computers must be on the Internet. Examples of Ftp use are: to transfer files between your computer and your web space on a large computer, to transfer software or files to your computer from known Internet sites.


    Ftp has two parts: the client and the site.

    • The ftp client is a program on the computer you are using or are logged in to.

      An FTP Client
      is software that is designed to transfer files back-and-forth between two computers over the Internet. It needs to be installed on your computer and can only be used with a live connection to the Internet.

      The classic FTP Client look is a two-pane design. The pane on the left displays the files on your computer and the pane on the right displays the files on the remote computer.

    • The ftp site is a program on a remote computer that you want to connect to.

      An FTP site is like a large filing cabinet. With a traditional filing cabinet, the person who does the filing has the option to label and organize the files how ever they see fit. They also decide which files to keep locked and which remain public. It is the same with an FTP site.
      The virtual 'key' to get into an FTP site is the UserID and Password. If the creator of the FTP site is willing to give everyone access to the files, the UserID is 'anonymous' and the Password is your e-mail address (e.g. name@domain.com). If the FTP site is not public, there will be a unique UserID and Password for each person who is granted access.

    This handout describes the general capabilities of most ftp clients and servers. However, not all ftp programs are alike and you may find that your ftp client or the server you are connected to has slightly different behavior. In particular, the commands in this handout are presented in command line format, like that used on many large computers. IBM PC and Macintosh client software, such as WS-FTP or Fetch, present a graphical, window-oriented interface.


    FTP (File Transfer Protocol) is a fast, convenient and secure way to transfer files over the Internet. That is why many webmasters use FTP for uploading their websites on their hosting account and to add files and pictures to their web pages.



    How to use FTP for transferring files?

    To make an FTP connection you can use a standard Web browser* (Netscape, Internet Explorer, Mozilla Firefox, etc.) or a dedicated FTP software program, referred to as an 'FTP Client'. To use an FTP client you need to have an FTP account to the web account where you plan to upload your files. In case this is your hosting account, the main account for using FTP is your control panel account. You can also create additional FTP accounts for other users.


    When using a Web browser for an FTP connection, FTP uploads are difficult, or sometimes impossible, and downloads are not protected (not recommended for uploading or downloading large files).
    When connecting with an FTP Client (such as FileZilla or CuteFTP), uploads and downloads couldn't be easier, and you have added security and additional features. For example, you're able to resume a download that did not finish successfully, and continue with it later on. This is a very nice feature for people using dial-up connections which frequently breaks down.

    SiteGround has long experience in providing web space for clients using FTP. Our FTP hosting service is the best choice for you for it offers the richest set of features, FTP-expertized support team and lots of FREE tools.


    How to create FTP Account

    To create a new FTP account from the cPanel, please click the FTP Manager icon. Select the FTP accounts option and then click the Add FTP Account link. In the spaces provided please enter a username, a password and the specific directory you have created for the user.
    SiteGround recommends that a specific directory is designated for each particular user. Leaving the directory space blank will allow your FTP users access to the main directory, and they will be able to alter the content of your website.

    If you are willing to grant such access, please consider doing this for a limited time and then change your password. The more public your authentication data is, the higher the risk for your account.
    Please note that using one and the same directory for the purpose of both password protected and FTP storage is not recommended.


    FTP Commands

    When the ftp client is started, it is ready to accept commands. Most ftp clients will prompt you for a command like this:

    ftp>
    Use the quit command to terminate your ftp client:
    ftp> quit
    Most ftp client programs will also respond with a list of available commands if you enter a "?":
    ftp> ?


    Using ftp with CUTCP telnet

    Telnet is a program used to interactively log in to a remote computer. CUTCP telnet is a program that runs on a PC and is used in CIRCA labs and elsewhere on campus to log in to remote computers. This program can also function as an ftp server when you are logged in to a remote host. This means that you can use the host's ftp client to connect back to yourself. Here's how you do it:
    1. First use telnet to log in to the remote host.
    2. Press Alt/T. This will generate an ftp command with the proper network address and start the ftp client program on the interactive host.
    3. When it asks for a name, enter anything.
    4. When it asks for a password, press Alt/W. This will provide a hidden password to authenticate the connection.

    Remember that when you have completed this connection, your PC is an ftp server, and the interactive host is running an ftp client. To transfer a file from the interactive host to your PC, use the put command. To transfer a file from the PC to the interactive host, use the get command.


    Anonymous FTP

    Many universities, government agencies, companies, and private individuals have set up publicly accessible archives on the Internet. There are thousands of these sites that contain a myriad of programs, data files, and informational text. At these sites, public directories and files that may be read by the rest of the world via FTP are set aside. These directories are usually named /pub. You can usually find specific directions and information about the site in greeting messages or in files with names like README.

    Remember that anonymous FTP is a privilege granted by the organization that owns the computer to which you are connecting. Some general guidelines for using anonymous FTP are:

    • Don't transfer files you don't need.
    • Don't transfer an excessive amount of material.
    • Restrict your transfers to off-peak hours, if possible.

    To Hide Link from Address Bar Browser




    Do you have website ?
    And so many link site on your website?
    May you want every user can not read your link address from the browser address.

    So, how to do that?

    Step 1.
    Open or create your index/ default file (as generaly : index.html)

    Step 2.
    Write the html script and your content web page like the picture on your index.html file












    Step 3.
    Upload your file to your hosting

    Step 4.
    Open your browser and browse your web site


    by web.solusi@gmail.com

    Video Security and Surveillance System - WebCam Monitor v4.30

    WebCam Monitor is a motion detection software that monitors your home, office, or any premise.

    The software records action triggered by motion or noise as it happens. It is as simple as connecting a USB camera to your PC or selecting an IP camera and using WebCam Monitor to turn your computer to an inexpensive video surveillance system that is on guard 24 hours a day and user can view activities monitored by your camera from anywhere with an Internet connection.

    User can customize alerts like video and audio recording, taking snaps with date and time, sounding alarms, and sending SMS notifications. Automatically upload recorded video, audio and snaps to a FTP server of your choice. Large areas can be effectively monitored using multiple cameras. User can configure individual cameras to start and stop monitoring automatically and even schedule automatic monitoring sessions to start and end at weekly or daily intervals, once or at application startup. All monitored activity is displayed in an event log for quick reference.

    WebCam Monitor is a complete video security software with multiple camera support and remote monitoring features. With these powerful features and customizable alerts WebCam Monitor goes beyond traditional video security systems. It is the perfect solution to turn your home/office PC to a sophisticated monitoring and surveillance system.

    With WebCam Monitor you can:

    • Use webcams and IP cameras to create a surveillance system.
    • Use one camera, or automatically cycle among any number of cameras Record video, audio or snapshots either when motion is detected, or on a regular schedule.
    • User can also record video continuously.
    • Receive instant e-mail notification when motion or noise is detected by your camera, with a snapshot of the triggering event attached.
    • Schedule monitoring to start and stop automatically on a daily or weekly basis View the video from your camera remotely over your network or the Internet Stamp the video recording with date and time for legal purposes.
    • Use a wizard to automatically configure WebCam Monitor for common monitoring scenarios.
    • Preview all recordings and snapshots from within WebCam Monitor.
    • Log all events and save the logs for use as evidence.
    • Automatically update images on a web site using WebCam Monitor Digitally zoom up to 200% of the view from any video device.
    • Pan and Tilt cameras to adjust their coverage areas Digitally mask each camera's detection area to help avoid false alarms.
    • Upload recorded video, audio, and snapshots to an FTP server either as they are created, or at set intervals. Supports more than 100 different IP cameras and almost all USB and FireWire cameras
    For additional features, try the professional version, Security Monitor Pro.
    Among other advantages, it can simultaneously monitor and record using multiple cameras and allows you to configure settings individually for every camera.


    Important, to Support Web Monitori that is Remote Monitoring

    This section covers methods of monitoring your surveillance system remotely—that is, from a different location. Methods include automatic upload of recordings and snaps to an FTP server and video and audio streaming. This sections chapters are:

    • Configuring FTP Settings
    • Uploading Video, Audio, or Snaps When Motion or Noise is Detected
    • Uploading Video, Audio, or Snaps Periodically
    • Configuring the Proxy Server
    • Configuring the DNS Server
    • Configuring Video/Audio Streaming
    • Show Streaming Status
    • Show Upload Status
    • Assigning a Static IP Address to Your Computer
    • Getting the IP Address of Your Computer

    more information http://www.deskshare.com/

    Video Converter - 123 Video Converter 3.3.3.7

    This software that is so very - very easier to use, you only need 6 step to convert your file video to other file.

    All-In-One Video Conversion Solution

    123 Video Converter is a comprehensive video conversion software that makes it easy to convert and split video files among

    • AVI (DivX, XviD...),
    • MPEG (MPEG-1, MPEG-2),
    • iPod/PSP/MP4,
    • WMV/ASF,
    • MOV (QuickTime),
    • 3GP,
    • 3G2 formats.

    It can also extract audio tracks (convert to WAV/MP3).


    Quick Start - 123 Video Converter

    Step1
    Install 123 Video Converter

    Step2
    Lauch 123 Video Converter. Click "Add Task".

    Step3
    Click "Add Files" to add the video files that you want to converter. 123 Video Converter allows you to add as many as files in different video formats at one time. To make sure you have add the right video, you can preview it by pressing "Play". And then, click "NEXT".

    Step4 (Optional)
    123 Video Converter offers you the chance to cut out a part of the video, so that you can get your favourite part!You can specify the beginning and end time by sliding the right and the left arrow.It's very easy to locate the individual scenes to extract from the video. Simply watch that scene on your Windows Media Player, and note your "time index".

    Step5
    Select an output format from the drop-down list of "Output Format" to AVI, MPEG, WMV, MOV, MP4, iPod, PSP, 3GP or 3G2 format. And, if you want to listen to a song that’s in the background of your video, select the output format as WAV or MP3. (Optional) Set the output video codec, audio codec, width, height, framerate, etc by clicking "Advanced Options". Click "Browse" to select a location to save your output video files.Click "Finish".

    Step6
    Click "START" to begin the conversion.
    If you have other files to convert, click "Add Task" and add a new conversion task. The batch conversion feature helps you cut back on your work time, so that you can concentrate on other activities.

    more infomation about this software http://www.dvdvideotool.com

    Video Converter – Easy & Powerful Video Editing + DVD Authoring with Fox Video Converter



    One of technology for video converter that is Fox Video Converter.

    This software special for video editing and DVD authoring software that offers more options in video production.

    Using this sofrtware maked easy to Convert and burn video files. Convert any multimedia file from the supported formats to another format, including :

    • AVI,
    • ASF,
    • WMV,
    • MPG,
    • MPEG,
    • MOV,
    • MP4,
    • OGG,
    • WAV,
    • MP2,
    • DivX
    • and more

    Convert one or more media files to :
    • DVD,
    • iPod,
    • PSP,
    • Smartphone,
    • Web streaming,
    • and many other multimedia formats in one easy process with complete control of size and quality.


    Correctly if user said this sofrware as home video software to meet all your needs for watching new DVDs in your home theater or storing them on your PC. It is compatible with DVD burning. It is easy to use and only requires 4 steps to burn or convert movies.


    Burn DVD
    Create movie DVDs from a wide range of supported video file formats with fast converting speed and top output quality. Watch all your movies on your home DVD player with friends and family!
    An intuitive Burn Menu helps you to burn several files onto discs quickly and easily.

    Platform
    Windows XP, Windows NT, Windows Me, Windows 98, Windows 2003, Windows 2000

    Language
    German, French, English

    Of course this software is not free, you must buy the full version http://www.foxeasy.com.


    Apr 17, 2008

    Automated Backups

    1. Welcome to Automated Backups


    Automated 'set it and forget it' backups with SyncBackSE

    Everyone who uses a computer at some point in time loses files they really don't want to lose. It could be that your hard drive seizes up, perhaps some files have been corrupted, accidentally deleted, overwritten, or your computer is stolen. There are many ways to lose those all important files. Don't let this happen to you. You protect your home and belongings from theft, fire, and other misfortunes, and the same should go for your valuable data.

    Many people don't backup their files simply because they think making a backup is a hassle.

    With SyncBackSE it's simple, so there's no longer any reason not to protect yourself against data loss. This e-book shows you just how easy it is to set-up hibernation in Windows, and to create a scheduled profile with SyncBackSE. From that point on your files will be automatically saved without any further intervention from you.


    Getting Started

    Three Simple Steps to Automate your Backups

    It's very easy to have your important files backed up, safe and secure, without you having to
    remember to make a backup. The backup can be done automatically, every day, while you sleep. It can be done while you're on holiday or out of the office. Computers are designed to help automate tasks, so let yours automate your backups today.

    There are three simple steps to follow:

    Step 1
    Configure Windows to hibernate instead of powering off. This let's us automatically switch on the PC to make your backup.

    Step 2
    Create a profile in SyncBackSE to backup your files.

    Step 3
    Schedule that profile to run when you want the backups to be made automatically.



    Configuring Windows

    Step 1:

    Hibernation and Your Computer

    Many people with desktop computers don't know that you can hibernate your computer, instead of powering off. You don't need to be using a notebook/laptop to use power-saving features.
    When a computer is put into hibernation a record is kept of everything that is in the computers memory (RAM). This includes information like what programs are running, all the files that are currently open (perhaps you're working on a Word document), etc. A snapshot is taken of exactly what is happening on your computer, which is then saved to disk in a special file. After it's saved the computer is then switched off automatically. When you switch back on the computer that snapshot is read from disk and you are returned to exactly where you left off.

    By default Windows is not configured to use the hibernation power saving features so we
    must enable them before we can use them.

    Note: You must be logged on as an administrator or a member of either the Administrators or Power Users group in order to complete this procedure. If your computer is connected to a network, network policy settings might also prevent you from completing this procedure.

    You can follow Microsoft's own instructions here, or our instructions below:

    1. Click Start, click Control Panel,
    2. and then double-click the Power Options icon:
    3. Click the Hibernate tab (if the Hibernate tab is unavailable, your computer does not support this feature.),
    4. tick the Enable hibernation checkbox,
    5. and then click the Apply button:
      If there is an APM tab then click the APM tab. Click Enable Advanced Power Management
      support, and then click Apply.

    Note that the APM tab is unavailable on ACPI–compliant computers. ACPI automatically enables Advanced Power Management, which disables the APM tab, so there's no need to do this.
    Click the Advanced tab and select Hibernate from the drop-down list for When I press the power button on my computer: This means when you switch off your computer by pressing the power switch on the computer it will hibernate instead of switching off. If you switch off instead of hibernating then the computer cannot be automatically switched on to perform the backup at the scheduled time.

    You may also want to configure your computer to automatically hibernate after it's been idle
    for a certain amount of time. This is a good idea because it saves you money on your electricity bill. Click the Power Schemes tab, and then select a time period in System hibernates. Your computer hibernates after it has been idle for the specified amount of time:

    Click the OK button. We've now configured your computer to hibernate instead of switching
    off.

    We'll now create a 'Profile' using SyncBackSE.


    1.3 Create a Profile

    Step 2 – Creating a Profile

    This step assumes you've already installed SyncBackSE, which is very straight forward.
    Create A Profile

    Run SyncBackSE and click the New button (or press Ctrl-N, or select New from the Profiles menu). The following window will appear:A profile stores information about the folders or files you would like to backup or synchronize using SyncBackSE. Profiles can be very specific as to what, when, and how a given task is performed, but we are going to be concentrating on creating a simple backup profile.
    The Profile Setup Wizard walks you though the process of setting up your profile. The default settings make setting up a Backup profile a very simple process.

    Click the "New" button located on the lower left of the program window:
    Alternatively, choose "New" from the Profile menu:

    The Profile Wizard window will appear. Enter a name for your new Profile:
    Click "Next" located at the lower right of the window.

    For this example we are creating a backup profile which is the default option:
    The wizard will ask whether you wish to use FTP (File Transfer Protocol). FTP is used if you
    are backing up over the Internet. As the default "No FTP" option is selected by default, you
    need only click the "Next" button.

    The wizard will now ask whether you wish to compress your files into a zip. Once again, the
    default option is being used in our walk through.

    The "No Zip Files" option has been
    selected:
    Click the "Next" button on the lower right. The wizard will now request you enter a name for
    the source (where you are copying your files from), and that you select the location of the
    source by clicking the folder icon button.

    With Windows XP your documents, pictures, music, etc. are usually all stored in a special
    folder called My Documents. In the example below we are browsing to a folder where
    business files are located.

    When you click the folder icon a "Browse For Folder" window will appear in which you will
    locate your source. Click OK:
    The folder selection field will now show the full path to your source.

    Click the "Next" button. The choose Destination window will open.

    Enter a name and select the location for where you wish to make a backup of your files to
    (the destination) in the new screen:

    Click the Next button.

    The choose Destination window will open in the wizard. You now need to say where you want your backup files to be stored, which is known as the Destination. In this example we are assuming they are on another drive labeled "LACIE (L) (which could for example be an external drive connected via USB or Firewire).

    When you click the folder icon a "Browse For folder window will appear in which you will
    locate your destination. Click OK:
    After clicking the "Next" button on the destination screen you will be asked whether you wish
    to make a Fast Backup. Choose the "No Fast Backup" default option:
    Click the "Done" button:

    You have now setup your backup profile. A small informational window will appear informing
    you that the main Profile Setup Window will open:

    The Profile Setup Window allows you to check your choices.
    Click the My Documents folder then click the OK button. You now need to say where you
    want your backup files to be stored, which is the Destination. In this example we're
    assuming they're on another drive (which could be an external drive connected via USB or
    Firewire). Click the folder button next to Destination and select where you want your backup
    files to be stored. Click the OK button.

    The following dialog box will appear:
    Click No, but if you wish you could click Yes to test your profile. This will make a simulated
    run to check to see if everything is working correctly. No files are actually copied. Your
    profile has now been created and is ready to be scheduled so that backups are made
    automatically without you needing to be anywhere near the computer.
    Now we'll take the final step to schedule your profile



    1.4 Schedule Your Profile

    Step 3 - Scheduling the Backup

    If you're evaluating SyncBackSE (i.e. you haven't purchased it yet) then this step isn't going
    to work for you. The evaluation version of SyncBackSE always prompts you whenever a
    profile is run, even if it is run from a schedule. This means you'll need to click the Evaluate
    button on the nag screen for the profile to run even if a schedule is defined.
    If you haven't purchased a license for SyncBackSE and you're happy with the many features
    it has to offer, Buy SyncBackSE to unlock scheduling now.


    SyncBackSE Licensed Users

    If you've purchased SyncBackSE then you're ready to go. Follow these simple steps:
    In the main window of SyncBackSE click on the profile you want to be scheduled to backup
    automatically: Then click the Schedule button in the toolbar at the bottom: Click the Yes button.

    The dialog box (above) is a warning to make sure you enter your Windows login password
    on the following window. What is your Windows login password? It's the password you enter
    when you start Windows. If you don't have a login password then you can ignore the
    warning and there's no need to enter a password. Click OK to continue:

    If you have a Windows login password then click the Set password…button and enter it.
    By default your profile will run at 9am every day. If you want to change this then click the
    Schedule tab and make the changes required.

    Click the OK button:
    The window above will now appear giving you a summary of what the schedule is. Click the
    OK button.

    Congratulations! Your important files are now being backed up daily, and without you even
    needing to be anywhere near the computer for it to happen. It will all be done automatically:
    every morning your computer will switch itself on and SyncBackSE will make a backup of
    your files.

    IT Conversations

    Moneycontrol Latest News

    Latest new pages on Computer Hope

    Latest from Infoworld

    Door Lock

    Door Lock Import Top Door Lock from China Contact Quality Manufacturers Now