понеділок, 9 липня 2012 р.
Free SIP Softphone Apps
Ekiga was formerly known as GnomeMeeting. It is a general public license software that is available for GNOME (therefore Linux) and Windows. It is a nice and clean software with the basic features needed for good and fluid SIP communication. Ekiga also offers free SIP accounts. You can use Ekiga for both voice calling and video conferencing.
субота, 7 липня 2012 р.
BAT-файл, который бы запускал стандартный диспетчер задач Windows уже СВЁРНУТЫМ
Как написать BAT-файл, который бы запускал стандартный диспетчер задач Windows уже СВЁРНУТЫМ?
Отвечает Forward:
Создайте для Диспетчера задач ярлык через правую кнопку - Создать - Ярлык (в поле Укажите размещение объекта напишите Taskmgr, имя - любое) и в его свойствах укажите в поле окно "Свернутое в значок". Теперь при запуске Task Manager будет свернут. При необходимости добавьте ярлык в Автозагрузку.
Отвечает hacsoft:
Это делается так: start /min taskmgr P.S. Задачи на bat-файлах решают тут: http://forum.ru-board.com/topic.cgi?forum=62&bm=1&topic=6156
Ути-пути // рецепты приготовления продуктов из молока и не только
Ути-пути[править преамбулу]
Ути-пути — ставшее крылатым в вики выражение, иронично намекающее на детское (глупое, нелепое, смешное) поведение у человека, к которому оно обращено
http://www.wikireality.ru/wiki/%D0%A3%D1%82%D0%B8-%D0%BF%D1%83%D1%82%D0%B8
рецепты приготовления продуктов из молока и не только.
http://lavkazdorovja.su/kak_sdelat_maslo.htm
Раньше у меня не возникал вопрос, как самой взбить масло, сделать кефир, творог, мороженное. Я обычно всё это покупала в магазине, естественно, тщательно изучая этикетки, и всегда выбирала продукты с минимальным сроком годности. Но, после того как я однажды отравилась купленным в магазине молоком, я задумалась. А что мы едим? Можно ли доверять магазинной пище? Всегда ли честен производитель или, может быть, он все-таки подмешивает в продукты даже с минимальным сроком годности какую-нибудь химию? А может проще делать некоторые вещи самой? И я задалась целью найти рецепты приготовления продуктов из молока и не только. Предлагаю их Вашему вниманию. P.S. А молоко я теперь покупаю только в местах, которые специализируются на молочных продуктах, и, обязательно, обращаю внимание на то, чтобы срок годности был от 3 до 5 дней.
Как приготовить т в о р о г
Как приготовить с л и в о ч н о е м а с л о
Как приготовить т о п л е н о е м а с л о
Как приготовить т о п л е н о е м а с л о ГХИ
Как приготовить к е ф и р
Как приготовить с м е т а н у
Как приготовить м а й о н е з
Как приготовить м о р о ж е н о е ПЛОМБИР
Как приготовить ШОКОЛАДНОЕ м о р о ж е н о е
Как приготовить ЯБЛОЧНЫЙ м а р м е л а д
Будьте Здоровы!
|
.
пʼятниця, 6 липня 2012 р.
дріжджі термофільні ))
четвер, 5 липня 2012 р.
MyDefrag is a disk defragmenter and optimizer
Snapshots of MyDefrag in action | ||
MyDefrag is extremely solid because it is based on the standard defragmentation API by Microsoft, a system library that is included in Windows 2000, 2003, XP, Vista, 2008, and Win7. Most defragmenters are based on this API, including the free defragmenter that comes with Windows and many commercial defragmenters. Basically all MyDefrag does is send "move this file to that location" commands to the API. The API is part of the operating system and can safely move almost any file on the disk, without risk and while the computer is in full use.
|
PageDefrag v2.32 || Sysinternals web site )))
Introduction
One of the limitations of the Windows NT/2000 defragmentation interface is that it is not possible to defragment files that are open for exclusive access. Thus, standard defragmentation programs can neither show you how fragmented your paging files or Registry hives are, nor defragment them. Paging and Registry file fragmentation can be one of the leading causes of performance degradation related to file fragmentation in a system.
PageDefrag uses advanced techniques to provide you what commercial defragmenters cannot: the ability for you to see how fragmented your paging files and Registry hives are, and to defragment them. In addition, it defragments event log files and Windows 2000/XP hibernation files (where system memory is saved when you hibernate a laptop).
http://technet.microsoft.com/en-us/sysinternals/bb897426.aspx
Benchmarking on Windows XP
Benchmarking on Windows XP
Home Edition and Professional
Updated: December 4, 2001
Microsoft Windows XP offers excellent overall performance in part because it dynamically adjusts itself based upon individual use. This article addresses some of the dynamic tuning capabilities of Windows XP, and outlines steps you should take in order to get consistent benchmark results. It provides information on how to avoid System Restore checkpoint activity during benchmark runs.
On This Page
Introduction
General Concepts: The Dynamic Nature of Windows XP
Benchmarking on a Dynamic and Self-Tuning Windows XP
Idle Task Scheduling: The ProcessIdleTask API
Other Testing Issues
Summary
For More Information
Introduction
The Windows XP operating system achieves excellent performance in part by dynamic adjustments that it makes in response to how a system is utilized. In particular, many adjustments are made when the system first runs following setup and when newly installed applications are used for the first time. These adjustments greatly influence the performance of the system. Unfortunately, the dynamic nature of Windows XP can make benchmarking more of challenge than with previous Windows versions.
The purpose of this article is to familiarize the reader with the dynamic tuning done on Windows XP, to explain why performance on Day 3 after installing the system and applications may be better than on Day 1, and to outline a testing methodology that is both representative of what real customers will experience and capable of producing consistent results from benchmark run to benchmark run.
General Concepts: The Dynamic Nature of Windows XP
Windows XP is a dynamic, self-tuning operating system, and has built-in features that support this both at setup and during continued use. As a consequence, the systems performance after having the opportunity to tune itself will be different from its performance when it boots up for the first time or when it executes a particular application for the first time.
Operating System Setup
There are two types of dynamic adjustments made during the setup of Windows XP: RAM-based adjustments and video-based adjustments. The RAM-based adjustments are simple; if the system has 64 MB of physical memory during setup, then:
-
No background bit map will used by default
-
Fast user switching will be off by default
The video-based adjustments are determined by running a variety of atomic tests after the video resolution and color depth have been automatically determined. If a specific atomic test takes too long to complete, then the corresponding visual effect is turned off by default. Microsoft added the visual-based adjustments to ensure a responsive user experience with the new user interface and visuals. The majority of systems will have all of the visuals on by default; a few systems with video driver or video adapter performance issues will be configured with the effects off by default.
The following effects are dynamically configured during setup:
-
Slide taskbar buttons
-
Use drop shadows for icon labels on the desktop
-
Smooth edges of screen fonts
-
Fade or slide menus into view
-
Fade out menu items after clicking
-
Fade or slide ToolTips into view
-
Show shadows under menus
-
Show translucent selection rectangle
-
These visual effects and others can have dramatic impact on benchmark scores.
Although Microsoft strongly recommends using the defaults because that is what most users will use, the configuring of visual effects settings can be done quite easily on Windows XP. To display the full list of easily configurable visual effects settings, right-click My Computer, select Properties, select the Advanced tab, and select the Settings button under Performance. The Performance Options dialog box is shown below in Figure 1.
Figure 1: Performance Options dialog box used to manually configure visual effects.
Disk Efficiency Optimizations
The physical placement, or layout, of files on the disk can have a considerable effect on performance, up to 10% for normal use. Windows XP observes file usage patterns as the system is used. If deemed necessary, Windows XP will adjust the file layout at three day intervals. By placing files that are referenced together near each other on the disk, and towards the more dense outer edge of the disk, seek distances are reduced which results in shorter seek times and improved performance. The performance benefit of placing files becomes increasing important as the size of the disk increases.
The files moved for more efficient layout are also kept contiguous. Windows XP does not intentionally fragment files as was done by some earlier versions of Windows.
Even though the disk layout optimization does insure some files will be defragmented, it is not a complete substitute for fully defragmenting the disk. Users should still defragment their drives regularly. The built-in Windows XP defragmentation program understands the file layout directives and will position the files if they arent already placed properly. However, it will not update the layout file with new information gathered in the last three days. Without manual intervention, the layout file, %windir%\Prefetch\Layout.ini, will only be updated once every three days. The contents of the Layout.ini file can be viewed with Notepad.
Boot Prefetching
Windows XP speeds up system boot by observing the code and data needed each time the system is booted and prefetching the necessary file contents early in the boot process. This prefetching is not done until the third boot of the system, when sufficient information is available to make the prefetching most effective. The files observed during system boot will be used in the disk layout process mentioned above. Additional information on the prefetcher and the Windows XP boot process can be found at Fast Boot/Fast Resume for the Windows Platform.
Application-Launch Prefetching
Windows XP also uses prefetching when launching applications. The files and the contents of the files accessed by each new process are observed and recorded. No prefetching can be done for the first launch of an application, so first launches are often considerably slower than subsequent launches. About 85% to 90% of the improvement is realized after just one launch of an application, with the remaining speed improvement coming after the system has had an opportunity to adjust the disk layout with information specific to this application.
Benchmarking on a Dynamic and Self-Tuning Windows XP
Benchmarking an operating system that is attempting to improve itself over time based upon observed usage patterns can be difficult. It becomes ever more difficult to benchmark if the operating system is also attempting to create dynamic system restore points when large amounts of applications are installed. Fortunately, there is a methodology that provides consistent results, accurately reflects the performance that Windows XP systems will achieve, and is fairly easy to follow.
The basics of the methodology are:
-
Install
Install the OS and benchmark as normal. -
Use
Run the benchmark one or more times.
OR
Use the applications in the benchmark as real users would. -
Let Idle Tasks Run
Leave the system for a bit after using it, (up to three days for disk layout optimizations).
OR
Call the ProcessIdleTask API from advapi32.dll. -
Test
Run the benchmark as usual.
Idle Task Scheduling: The ProcessIdleTask API
The file placement optimization, which is done no more often than once every three days, is an example of a task that is carried out when the system is deemed to be idle. System Restore and other features of Windows XP also attempt to defer some work until the system is deemed to be idle. There are also some done-once-after-setup work items that also operate under the Idle Task Scheduling mechanisms.
All of these "idle tasks" are controllable by a system API in advapi32.dll, ProcessIdleTasks. The APIs sole purpose is to allow benchmarks a simple way to force any pending idle tasks to be executed immediately, without having to wait a lengthy period of time.
The API ProcessIdleTasks can be called in one of two ways, from the command line or synchronously from a program. To call ProcessIdleTasks from the command line, use this syntax:
- Rundll32.exe advapi32.dll,ProcessIdleTasks
When called from the command line, the ProcessIdleTasks work is done in the background asynchronously. It can take 10 to 15 minutes for idle tasks to complete. Task Manager will report processes running, and the disk will likely be active during this time.
The ProcessIdleTasks API takes no arguments and returns a standard Win32 error code. The definition is:
- DWORD
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- ProcessIdleTasks()
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
The API itself is synchronous, so it wont return until the idle tasks have completed.
Other Testing Issues
Clean Installation Preferred
When benchmarking Windows XP, Microsoft strongly recommends a clean installation using NTFS. There are several reasons why performance for a clean installation will tend to be superior to that for upgraded systems. An upgraded system will constrain the placement of files and file system data. The old disk format may not use an optimal file system cluster size. In a clean installation, the placement of file system data on the disk and the internal organization of that data can be optimized, resulting in a smaller system footprint and fewer and faster I/Os when using the system.
When performing a clean install, Microsoft recommends that NTFS be used and that the system be installed in a single partition on each disk. Under Windows XP, big partitions are better managed than in previous versions of Windows. Forcing installed software into several partitions on the disk necessitates longer seeks when running the system and software.
If you do choose an upgrade from Windows 2000 or Windows 9x, you may be working with a FAT32 file system. Performance will generally be better if the file system is left as it is, rather than converted to NTFS. A partition converted from FAT32 to NTFS may have to use 512-byte clusters, rather than 4096-byte or 8192-byte clusters, which can result in a higher number of fragmented files.
Installation in 64 MB Differs from Installation in 128 MB
Windows XP determines at setup time which, if any, operating system features will be turned off by default. In 64 MB there will be no background bitmap on the desktop and Fast User Switching will be disabled by default. Thus, an installation in 128 MB or more which is then restricted to using 64 MB of memory (for example by setting the MAXMEM option in boot.ini) will behave differently than would a proper installation in 64 MB.
First and Second Boots Following Installation
As noted in the previous section, Windows XP fast boot only begins to operate on the third boot following installation. For the first boot there is simply no information available that would indicate what code or data needs to be prefetched. The first boot, moreover, must perform a large number of initialization and other one-time-only tasks. Consequently, using information about this boot as a template for subsequent boots would be a mistake. It is this second boot, therefore, that is observed and information about this boot is used for subsequent prefetching and disk layout optimizations. By the third boot, appropriate information is available that will greatly improve boot speed. Microsoft has found that about 90% of the speed improvement in boot will occur for the third boot, with the remaining 10% coming after the system has had a chance to lay out the files to improve disk efficiency.
Windows Activation and Windows Update
Microsoft recommends that you activate your Windows XP installation before using it to measure performance, because the activation detection will impose a slight cost on the system at some times and no cost at other times. The variability is the issue. Also, because users need to activate within a short period of time after installation, the vast majority of system use will be done after activation, which makes measurements taken after activation more realistic.
Note that you can still create master images that have indefinite shelf life using standard RTM product keys (but not for MSDN keys or evaluation keys/media). This is accomplished by installing the image master with any standard retail key. The master should not be activated. As the final step prior to shutdown, run sysprep (available on the distribution media from the Support\Tools folder in Deploy.cab). This will reset the activation logic to provide indefinite storage prior to imaging and the full 30-day activation grace period for clones. Sysprep will reset the activation grace period on any master or derivative up to three times.
Because activating large numbers of machines can be undesirable, you might want to run most of your benchmarks on unactivated systems and reserve your activation tests for the final round, or in cases where you are concerned that activation might be a problem. If you must activate large numbers of machines, the draft WPA Deployment white paper available on the Windows Beta web site might provide some useful advice.
Similarly, Windows Updates should either be applied or disabled so that the system will not try to check whether updates are available in the middle of benchmark runs. Microsoft believes most consumers will apply the updates so it is best to apply the updates before testing.
Video Resolution
The video resolution chosen for the system will have a strong impact upon the sizes of bitmaps and other data structure in the kernel. If the graphics subsystem can support it, the default pixel color depth for Windows XP is 32 bits per pixel. If you are comparing Windows XP with a different version of Windows, it is important to ensure that the color depth for the two systems is matched. It is also best to try to use the same drivers for both, using the most recent versions of drivers from the web, or to take the default, inbox drivers for each system and compare default to default.
Summary
Windows XP can deliver excellent performance, but because it is more sophisticated than previous versions of Windows, care must be taken to obtain valid results. Understanding the issues described in this article can help you arrive at better benchmarking practices and save time and effort
For More Information
For the latest information on Windows XP, check out the Windows XP home page.
To learn more about how Microsoft and its OEM partners are working to improve boot and resume times, see Fast Boot/Fast Resume for the Windows Platform.
середа, 4 липня 2012 р.
Андроги́н
Андроги́н (др.-греч. ἀνδρόγυνος: от άνδρας «муж, мужчина» и γυνή «женщина») — «идеальный» человек, наделённый внешними признаками обоих полов, объединяющий в себе оба пола либо лишённый каких бы то ни было половых признаков.
Содержание |
В мифологии
В мифологии андрогины — мифические существа-предки, перволюди, соединяющие в себе мужские и женские половые признаки, реже — бесполые. За то, что андрогины пытались напасть на богов (возгордились своей силой и красотой), боги разделили их надвое и рассеяли по миру. И с тех пор люди обречены к поискам своей половины.
Платон в диалоге «Пир» рассказывает миф об андрогинах, предках людей, сочетавших в себе признаки мужского и женского пола. Подобно титанам, андрогины были страшны своей силой и посягали на власть богов. Зевс решил разрезать их пополам, уменьшив тем самым их силу и наглость вдвое. Основа этого мифа, возможно, имеет древнее происхождение, но в изложении Платона миф напоминает скорее пародию на этиологические мифы, и на самом деле служит введением в учение об Эросе (именно Эрос соединяет разделённые половинки андрогинов). Дальнейшее описание становится более комичным: андрогины имели округлое шаровидное тело, спина их не отличалась от груди, рук и ног было по четыре, на голове имелось два совершенно одинаковых лица, смотревших в противоположные стороны, две пары ушей.[1]
В религии
В религиозной мифологии многих народов упоминается, что первый человек был создан андрогином, и лишь затем был разделён на мужчину и женщину.[2] Такова каббалистическая трактовка первых глав Книги Бытия: вначале Бог сотворил человека «мужчиной и женщиной», то есть андрогином (1,27), а затем разделил его на двух разнополых существ, отделив женщину от бока мужчины (2,22): «Человек заслуживает это имя лишь постольку, поскольку он объединяет в себе мужчину и женщину. Адам, верно отражающий Адама высшего или первичного, должен был, в согласии с этой моделью, объединить в себе мужское и женское начала. И первоначально он был создан андрогином».[3]
«Не мужчина и не женщина есть образ и подобие Божье, а лишь андрогин, целостный человек. Дифференциация мужского и женского есть последствие космического падения Адама. Образование Евы повергло старого Адама во власть родовой сексуальности, приковало его к природному „миру", к „миру сему". „Мир" поймал Адама и владеет им через пол, в точке сексуальности прикован Адам к природной необходимости. Власть Евы над Адамом стала властью над ним всей природы. Человек, привязанный к Еве рождающей, стал рабом природы, рабом женственности, отделенной, отдифференцированной от его андрогинического образа и подобия Божьего. Мужчина пытается восстановить свой андрогинический образ через сексуальное влечение к утерянной женской природе.»[4]
Религиозные мистики чувствовали андрогинизм нового Адама — Христа. Этим объяснялось отсутствие в абсолютном человеке жизни пола, похожей на жизнь человеческого рода. Иисус вновь соединил мужское и женское в единый андрогинный образ. Якоб Бёме показывает, что учение о человеке как андрогине делает понятным, почему Иисус Христос, абсолютный и совершенный человек, не знал женщины, подобно Перво-Адаму: «Адам был мужчиною, равно как и женщиной, но и не тем, и не другим, а девою, исполненною целомудрия, чистоты и непорочности, как образ Божий; он имел в себе и тинктуру огня и тинктуру света, в слиянии которых покоилась любовь к себе как некий девственный центр; чему и мы уподобимся по воскресении мертвых, ибо, по слову Христа, там не женятся и не выходят замуж, а живут подобно ангелам Божиим».[5]
«Уже в самом воплощении и рождении Христос уничтожает первое и главное разделение природы человеческой на мужской и женский пол. Через бессеменное зачатие и нетленное рождение Он разрушает законы плотской природы, показывая, что Богу был, вероятно, известен иной способ размножения людей, отличный от нынешнего, и устраняя самым делом различие и разделение человеческой природы на полы.»[6]
Франц Баадер видит в восстановлении утерянной первоначальной андрогинной природы человека цель брачной любви: «Андрогин есть единство формообразующих принципов или органов или же соединение общеродовых способностей в одном теле. Это понятие не связано ни с импотенцией или бесполостью, ни с гермафродитизмом как его противоположностью, то есть с сосуществованием в одном теле обоих полов.» «Так, тайна и таинство истинной любви в том, чтобы взаимно помогать друг другу восстановить каждому в себе андрогина как целостного и чистого человека, который не есть ни мужчина, ни женщина, то есть не нечто половинчатое»[7]
В психологии
Психология обнаруживает андрогинность как глубинную особенность человеческой психики. Карл Юнг показывает в своём терапевтическом опыте, что человеческая психика андрогинна по своей природе. В жизни андрогин в подавляющем большинстве становится «только-мужчиной» или «только-женщиной», но обе эти формы существования ущербны и нуждаются в восстановлении изначальной целостности.
В культуре
Черты двуполости — изображение божеств определённого пола с особенностями противоположного пола можно встретить в иконографии многих народов. Такова, например, бородатая Афродита и Афродита с мужским половым органом. Древние греки чтили в числе других богов Гермафродита — сына Гермеса и Афродиты, в нём совмещались женские и мужские черты[8].
В пантеоне богов ведийской и брахманистской Индии выделяется Адити — божественная корова-бык, мать и отец богов. Там же видное место занимает Праджапати, создавший всё из самого себя. Египетский бог Ра, совокупившийся сам с собой, породил других богов, людей и весь мир. Своеобразным вариантом андрогинов являются персонажи, предстающие то в мужском, то в женском облике. Так, небесное существо Пулуга (в андаманской мифологии) в южной части архипелага принадлежит мужской природе, в северной — женской.
mozilla Search the web from the Address Bar
Search the web from the Address Bar
You can perform web searches right from the address bar. Just type in your search terms and hit Enter. Firefox will take you to the Google search results page. This article will show you how to customize this feature.
You can perform web searches right from the address bar. Just type in your search terms and hit Enter. Firefox will take you to the Google search results page. This article will show you how to customize this feature.
Internet Keyword search
When you type in the location bar and press Enter, Firefox takes you to the Google search results page (i.e. http://www.google.com/search?q=) for that search by default.
Turning off the Internet Keyword search
You can turn off the Internet Keywords search by changing a preference.
-
In the Location bar, type about:config and press Enter.
- The about:config "This might void your warranty!" warning page may appear. Click I'll be careful, I promise!, to continue to the about:config page.
- In the Search field, type keyword.enabled.
- Double-click the keyword.enabled preference to set its value to false.
Changing the Internet Keyword service
You can specify any valid URL to perform the Internet Keyword searches by modifying the keyword.URL preference in the about:config page:
- To use Yahoo!, set keyword.URL to http://search.yahoo.com/search?p=,
- For Bing, set it to http://www.bing.com/search?q= . Other services maybe specified similarly.
- To reset the Internet Keyword service to use a standard Google search, right-click on keyword.URL and select Reset.
вівторок, 3 липня 2012 р.
(NetBIOS over TCP/IP), + TCP port 445 in Windows
The use of TCP port 445 in Windows 2000
Among the new ports used by Windows 2000 is TCP port 445. In this paper we will look at what this port is used for, and how it relates to the security in Windows 2000.
The SMB (Server Message Block) protocol is used among other things for file sharing in Windows NT / 2000. In Windows NT it ran on top of NBT (NetBIOS over TCP/IP), which used the famous ports 137, 138 (UDP) and 139 (TCP). In Windows 2000, Microsoft added the possibility to run SMB directly over TCP/IP, without the extra layer of NBT. For this they use TCP port 445.
In Windows 2000 you have the possibility to disable NetBIOS over TCP/IP. You do this by right-clicking on My Network Places and selecting Properties. Then right-click on the appropriate Local Area Connection icon, and select Properties. Next, click on Internet Protocol (TCP/IP) and Properties. Now click Advanced, and select the WINS tab. There you can enable or disable NetBIOS over TCP/IP. The changes take effect immediately without rebooting the system.
From now on I will refer to the "client" as the computer from where you map drives and other shared resources, and to the "server" as the computer with resources that are shared. I will also refer to NetBIOS over TCP/IP only as NBT.
If the client has NBT enabled, it will always try to connect to the server at both port 139 and 445 simultaneously. If there is a response from port 445, it sends a RST to port 139, and continues it's SMB session to port 445 only. If there is no response from port 445, it will continue it's SMB session to port 139 only, if it gets a response from there. If there is no response from either of the ports, the session will fail completely.
If the client has NBT disabled, it will always try to connect to the server at port 445 only. If the server answers on port 445, the session will be established and continue on that port. If it doesn't answer, the session will fail completely. This is the case if the server for example runs Windows NT 4.0.
If the server has NBT enabled, it listens on UDP ports 137, 138, and on TCP ports 139, 445. If it has NBT disabled, it listens on TCP port 445 only.
In the case of Windows NT 4.0, null sessions always used port 139. A tool like winfo can give you a lot of information on Windows NT 4.0, but how does this work on Windows 2000? The answer is quite simple - it works according to the above description. To sum things up: if you run winfo from Windows 2000, and have NBT enabled, everything will normally work fine whatever the target system is. If you want it to never use anything but port 445, disable NBT.
неділя, 1 липня 2012 р.
ICT
Information and communications technology
Information and Communications Technology or Information and Communication Technology,[1] usually abbreviated as ICT, is often used as an extended synonym for information technology (IT), but is usually a more general term that stresses the role of unified communications[2] and the integration of telecommunications (telephone lines and wireless signals), computers, middleware as well as necessary software, storage, and audio-visual systems, which enable users to create, access, store, transmit, and manipulate information. In other words, ICT consists of IT as well astelecommunication, broadcast media, all types of audio and video processing and transmission and network based control and monitoring functions.[3]
The expression was first used in 1997[4] in a report by Dennis Stevenson to the UK government[5] and promoted by the new National Curriculum documents for the UK in 2000.
The term ICT is now also used to refer to the merging (convergence) of audio-visual and telephone networks withcomputer networks through a single cabling or link system. There are large economic incentives (huge cost savings due to elimination of the telephone network) to merge the audio-visual, building management and telephone network with the computer network system using a single unified system of cabling, signal distribution and management. This in turn has spurred the growth of organizations with the term ICT in their names to indicate their specialization in the process of merging the different network systems.
***
Інформаційно-комунікаційна система
Інформаційно-комунікаційна система (ІКС) – це сукупність інформаційних систем, мереж і каналів передачі інформації, засобів комунікації і управління інформаційними потоками.
Даний термін є вітчизняною адаптацією англійського терміну Information and communications technology, що широко застосовується у світовій практиці, та відповідає напряму підготовки фахівців у вищих навчальних закладах України за освітньо-кваліфікаційним рівнем бакалавра 6.170101 – “Безпека інформаційних і комунікаційних систем”.
)))
ICT infrastructure management
Information and Communication Technology (ICT) management[15] processes recommend best practice for requirements analysis, planning, design, deployment and ongoing operations management and technical support of an ICT infrastructure.
The infrastructure management processes describe those processes within ITIL that directly relate to the ICT equipment and software that is involved in providing ICT services to customers.
- ICT design and planning
- ICT deployment
- ICT operations
- ICT technical support