Showing posts with label provide. Show all posts
Showing posts with label provide. Show all posts

Tuesday, 1 March 2016

How to Write a Fashion Show ScriptIn Feburary 2016 30,

In Feburary 2016 30,
Fashion show script writing begins with solid research and careful thought. Spend time with each of the garments to find out what makes them special. Investigate what they are made of, what is fashionable about the cut, what its function is and how it is meant to be worn. Learn whether it belongs to a particular genre and what is new and different about it. Identify the designer for each garment and dig up the story behind the inspiration for it.
Developing a Vocabulary
If you don't already have a large and sparkling fashion vocabulary, start reading fashion magazines. Pay particular attention to how outfits are described and the storytelling methods used to sell an outfit. Read clothing catalogs and outfit descriptions. Make notes about compelling and inspiring language. Peruse fashion sites that provide lists of words to use for clothing.
Writing the Descriptions
Don't approach the writing as an elementary school descriptive writing exercise. Tell stories to make your writing shine. The National Opinion writer Julia Robson writes, 'Although the writing at its best might look simple, it isn't. A combination of speaking from the heart and punchy, one-liners can take hours, days even, to get right.' Start with the obvious when describing the garment and then include important details about what makes it special -- what its story is. Introduce the designer and the model. Devote time to editing and polishing it. Read it aloud. Read it to a friend. Take out anything that is repetitious or is too hard to say. Pare it down to the bare necessities, while still making the text sparkle. Write to any word counts or time limits that you have for the fashion show.
Putting It All Together
Start the script with an introduction that talks about the show's purpose -- whether it is a fundraiser, highlighting a particular brand or following a specific theme. Welcome the audience. Organize outfits into
runs
and put the descriptions in the proper order. Double-check with organizers to ensure the script matches the order of model appearance. Some fashion shows will have entertainment or guest speakers between runs, mark such elements in your script. At the end of the show, include the emcee's closing speech along with any thank yous to models, designers or sponsors.
Formatting the Script
Find out how the emcee wants the script structured -- whether she can read it from a hand-held tablet or from hard copy. Put the name of the outfit in bold or all caps with the name of the designer and model immediately after it. Leave a space and then include the description you wrote. You may choose to put key facts in bold for easier reading. Break up your descriptions into short paragraphs so they are easy to read. Read the script aloud to ensure it flows and follows the time sequences. Adjust as necessary.
In Feburary 2016 30,

Monday, 29 February 2016

How to Troubleshoot Wireless Speaker IssuesIn Feburary 2016 29,

In Feburary 2016 29,
Follow the power cord to an outlet if the speakers aren't producing any sound, and confirm that they're plugged in. If they are, check that the cord is securely fitted into its socket in the speaker. Switch the plug to a different outlet to see if that solves the problem.
Look at the other parts of the system, such as the transmitter, to confirm they're also connected to a power source. If the power is on, switch out cables between the transmitter and the receiver, or connect the transmitter to a different sound source. If you're controlling the setting with a remote, replace the batteries with fresh ones to see if that makes a difference.
Adjust the settings on your sound system. The receiver may be set on mute or the sound may be turned down too low to hear. If only one speaker is silent, check that your balance control is set to provide sound to both speakers equally.
Change the position of your speakers. If your speakers operate in the 5.8-GHz band or use infrared technology to receive signals, they have to stay closer to the transmitter than a 2.4-GHz speaker. Infrared speakers also require line-of-sight positions to operate properly.
Bad Signal
Adjust the frequency controls on your system to a new setting, then tune the speakers to find a setting that provides a clear, strong signal.
Walk through your house and identify other radio sources in the 2.4-GHz range, if your wireless speakers work at that frequency. This is a standard range for devices such as cordless phones, cell phones and baby monitors, all of which can interfere with your signal, as can your microwave oven. See if turning the devices off while you're listening eliminates the interference.
Move the speakers closer to the transmitter. With less distance to travel, the signal degrades less. Less distance also reduces the chance of a barrier, such as a heavy metal appliance or a concrete wall, interfering with or distorting the signal.
Unsuccessful Pairing
Reconnect your Bluetooth device to the speaker adapter if you've recently deactivated Bluetooth on the device, because after Bluetooth is enabled, it won't reconnect with the speaker automatically. Go over the settings on your device and confirm they're set up to stream over Bluetooth. If your computer's Bluetooth is turned off, for example, nothing's going to happen.
Move your speakers closer to your device. Bluetooth's range is roughly 30 feet. If you have solid obstructions between the device and the speakers, remove them or reposition the system so that there are no obstacles in the signal's path.
Use the manufacturers' instructions to clear out the list of Bluetooth pairings on your device and speakers, then start over with the pairing process, repeating the steps you originally took to set up the wireless connection.
In Feburary 2016 29,

Saturday, 27 February 2016

How to Configure Safari ProxiesIn Feburary 2016 27,

In Feburary 2016 27,
Gather the following: type of proxy server, the IP address or DNS name for the server and the port number. The person who purchased an Internet subscription from an ISP (the network administrator) should be able to provide this information.
Choose 'Preferences' under the Safari menu.
Select 'Advanced.' From this menu, you'll be able to configure and set your proxies.
Click and select any one of the listed proxy settings offered. Each proxy setting (web proxy, secure proxy, FTP proxy, SOCKS proxy or streaming proxy) is configured the same way, by entering the URL of proxy server and the port number provided by the website. For example, for a web proxy configuration, enter a URL server, such as 'proxy.rice.edu,' and its port, 8080. For a list of web proxies, see Resources.
In Feburary 2016 27,

Friday, 26 February 2016

How to Find a Person Using a Social Security Number or Driver's LicenseIn Feburary 2016 26,

In Feburary 2016 26,
Search online or in the phone book to obtain phone numbers for several private detective agencies. Call each agency and explain that you would like to find someone using his Social Security number or driver's license number. Inquire about the services offered and what types of fees are associated with the search.
Choose the private detective that best suits your needs and budget. Set up an appointment at the detective's office.
Arrive on time to your meeting and provide the detective with the driver's license number and Social Security number of the person you wish to locate. Fill out any paperwork as requested by the detective. Pay any upfront fees. Provide a current phone number where the detective can reach you when he obtains any information.
Public Records
Search 'Public Records' in your preferred search engine. Review several public record websites and choose the one you prefer. Register for an account by providing your name, email address and password.
Select the type of plan you need, whether it covers a one-time search or multiple searches, and provide your credit card information. Open your email software and verify your account by clicking on the confirmation link included in the email sent by the public records company.
Log into your account at the public records website. Type the person's first and last name into the appropriate fields. For a more accurate search, select the individual's current state of residence if known. Wait for the results to populate.
In Feburary 2016 26,

Wednesday, 24 February 2016

How Do Web Databases Work?In Feburary 2016 24,

In Feburary 2016 24,
Web databases work differently than static databases, limited to one computer or a LAN network where the reference documents and other data does not change location. A web database is a dynamic website that indexes searchable information (either on the same website or to external web pages). Most web databases point to other sites. A typical web database will point to pages that have been deleted, altered or moved to another location. The creator or user of a web database has no control over the external pages referenced or linked to. Because of this non-static nature of the Internet, web database administrators attempt to keep on top of data changes and links to external pages. This is especially true with links to pages that have moved or vanished from the web. Metasites, which contain only links to other web sites, primarily search engines, tend to organize their databases in small hierarchies that provide links to other sites containing relevant data to a particular subject. These metasite web databases are organized around one subject, such as science, technology, news, games and other search engines. Another kind of metasite for web databases is a search engine site that runs multiple search engines. An example of this kind of web database is dogpile.com, which uses Google and other top search engines for random searches on the web.
Keeping Track of Data
Web databases store information in record and index structures. The record structure is visible to users, while the index structure is typically not available for users to browse. A number of web databases use artificial intelligence to handle updates to links. When a source of data moves to a new location on the Internet, the artificial intelligence changes the hyperlink's address to match the new destination. Other web databases use link-checking programs that must be manually run by a web database administrator. Links to metasites, journals and other records are listed in the heading of most online databases. The difficulty with the information provided in these headings is that the links tend not to show when they were last updated. The web database's main page typically displays the site having been updated the previous year. Check the subsidiary pages for a more accurate display of when web data and links have been updated. Use the information on the subsidiary pages for citing references in your research.
Systems and Languages
The most common web databases are MySQL, Oracle, Microsoft SQL Server, Postgre SQL, IBM DB2 and HSQLDB. The platforms web databases run on are Windows, Linux, Unix, and Solaris. Preprocessor hypertext (PHP) scripting language is used to create web databases (PHP runs on the server and not the browser). Learn to use PHP, because it enables web databases to run on multiple operating systems. PHP handles all requests from the web browser, so you won't have to hassle with heavy hypertext markup language (HTML) when you create your web pages.
In Feburary 2016 24,

Thursday, 18 February 2016

How to Create a Lead Capture Page for FreeIn Feburary 2016 18,

In Feburary 2016 18,
Sign up for an account with a free autoresponder service. These services let you create a series of email messages that the service sends out on a schedule that you choose. Autoresponder services offer form builders as a standard feature. A simple form, and one appropriate for most entry-level lead capturing, asks for a first name and email address. The autoresponder gives you a small piece of HTML code that you copy and paste into the HTML for your website or an HTML box in your content management system. The form then appears on your page. Numerous autoresponder services offer this at no cost, although some free services include advertisement in your emails to offset the service costs. Develop the email content before launching your lead capture page.
Domain and Hosting
If you already own a domain and employ a hosting service, the page itself costs you nothing. If you do not already own a domain or pay for hosting, you can get around paying for both. Numerous hosting services offer free hosting, and many provide a free sub-domain such as websitename.hostingservice.com. Free services tend to offer fewer bells and whistles, but most squeeze pages are so small and simple that it doesn’t affect page performance. Sign up with the hosting service to get the free service and sub-domain.
The Freebie
Few visitors give up their contact information for free. Internet norms dictate that giving up your email address means you get a freebie. The exact nature of the freebie depends, in part, on your business. If you deal primarily in intellectual materials, your business probably lends itself to a short report, white paper or ebook. A podcast offers a good alternative if you prefer talking to writing, and many people prefer listening to reading. If you provide a service, such as online identity protection, you might provide a checklist of simple ways to avoid identity theft without going off the grid.
Page Content
Once you get the technical elements in place and finish the preliminary content creation, develop the page content. An effective lead capture page starts with a compelling headline that identifies and promises a solution to a problem. An example headline might read, “You Can Be A Better Writer Today!” The headline identifies the problem, subpar writing, and promises a fix. The next step typically creates empathy with a short paragraph describing the individual’s plight and how the company understands it. The benefits of the freebie are described, typically with a bulleted list, and the page ends with a call to action. Calls to action ask the visitor to do something to get help with her problem, usually with a time-related word to create urgency. An example call to action might read, “Sign up now to get our 5 Steps to Better Writing Guide!”
In Feburary 2016 18,

Tuesday, 16 February 2016

Kerberos StepIn Feburary 2016 16,

In Feburary 2016 16,
Before you begin setting up Kerberos on your system, you should know the name of your Kerberos, the hostname of the master and slave Key Distribution Centers (KDC) and how you are going to map your hostnames in the Kerberos realm. You will need to determine the ports that the KDCs and the database access (kadmin) services will use. You will also have to know how frequently the master and slave KDCs will fill the database.You will use the above information to configure the master KDC. The master KDC configuration files will be found at '/etc/krb5.conf' and '/usr/local/var/krb5kdc/kdc.conf' and can be edited in any text editor. The 'krb5.conf' file contains information about where to locate the KDCs and admin servers, as well as the host name mapping information. The 'kdc.conf' file contains the default information used when issuing Kerberos tickets. Open the '/etc/krb5.conf' and edit the 'login,' 'realms' and 'domain_realm' values so that they are correct for your system. Change the '/usr/local/var/krb5kdc/kdc.conf' so that it reflects the correct information for your KDC server.The next step is to create the database. Open a terminal and type the command 'kdb5_util.' You will be asked to provide a master key. This should be a string of letters, numbers and special characters similar to a password. This key will be stored in a stash file on the KDC's hard drive. If you would rather be prompted for the key whenever Kerberos starts, you can choose to not create the stash file.Finally, you will create the Access Control List (ACL) and add at least one administrator to it. The ACL is a user created text file that is called '/usr/local/var/krb5kdc/kadm5.acl.' This file should have the administrator listed in the form:
Kerberos_principal permissions [target_principal] [restrictions]
Once the ACL list is created, issue the command 'kadmin.local' and add each principal to the database. Start the Kerberos daemons with the command '/usr/local/sbin/krb5kdc; /usr/local/sbin/kadmin.'
Creating the Keytab File
The keytab file is used to decrypt the Kerberos tickets and determine whether the user should have access to the database. In order to create this file, type the command 'kadmin.local' again. This will provide you with a prompt where you will type the command: 'ktadd -k /usr/local/var/krb5kdc/kadm5.keytab kadmin/admin kadmin/changepw' to create the keytab file. Replace the section '/usr/local/var/krb5kdc/kadm5.keytab' with the keytab location that was specified in the '/usr/local/var/krb5kdc/kdc.conf' file. Type 'quit' to exit the 'kadmin' utility.
Configuring the Slave KDCs
To create the slave KDCs, you will issue the 'kadmin.local' command a third time. At the prompt, issue the command 'addprinc-randkey host/example.com' for the Master and each slave. Use the host name of each KDC in place of 'example.conf.' This will create host keys for each of the KDCs. Next, extract the keys on each of the slave KDCs by starting the 'kadmin' utility on each of the slaves and issuing the command 'ktadd host/MasterKDC.com.' Replace 'MasterKDC.com' with the host name of the master KDC.For the database to be propagated from the master KDC to the slave KDCs you will have to create a file called '/usr/local/var/krb5kdc/kpropd.acl.' This file must contain the principals for each of the KDCs in the form 'host/example.com.' Each principal should be placed on its own line. Next, edit the '/etc/inetd.conf' file on each of the KDCS and add the following lines:
krb5_prop stream tcp nowait root /usr/local/sbin/kpropd kpropd
eklogin stream tcp nowait root /usr/local/sbin/klogind klogind -k -c -eEdit the '/etc/services' file on each of the KDCs and add the following lines:
kerberos 88/udp kdc # Kerberos authentication (udp)
kerberos 88/tcp kdc # Kerberos authentication (tcp)
krb5_prop 754/tcp # Kerberos slave propagation
kerberos-adm 749/tcp # Kerberos 5 admin/changepw (tcp)
kerberos-adm 749/udp # Kerberos 5 admin/changepw (udp)
eklogin 2105/tcp # Kerberos encrypted rlogin
Propagating the Database
Propagating the database is done from the Master KDC. Issue the command '/usr/local/sbin/kdb5_util dump /usr/local/var/krb5kdc/slave_datatrans' to create a dump of the database. Next, issue the command ' /usr/local/sbin/kprop -f /usr/local/var/krb5kdc/slave_datatrans Slave-1.example.com' to manually propagate the database on each of the slaves. These steps will need to be completed on a regular basis. The easiest way to do this is to create as script and run the script as a cron job. The script should look like:!/bin/sh
kdclist = 'slave-1.example.com slave-2.example.com'/usr/local/sbin/kdb5_util 'dump
=> /usr/local/var/krb5kdc/slave_datatrans'for kdc in $kdclist
do
/usr/local/sbin/kprop -f /usr/local/var/krb5kdc/slave_datatrans $kdc
done
Of course, change the host names to reflect the values for your system.
Create Stash Files on the Slaves
The final step to setting up Kerberos is to create stash files on the slave KDCs. On each of the slave KDCs issue the command 'kdb5_util stash' and provide the master key when prompted. Once that is completed, you can start the 'krb5kdc' daemon on each slave with the command '/usr/local/sbin/krb5kdc/.'
In Feburary 2016 16,

Sunday, 14 February 2016

InterWorx Control Panel Vs. CPanelIn Feburary 2016 14,

In Feburary 2016 14,
Each service actually has two control panels. If you are running a hosting service, you get access to the server administration panel when you purchase InterWorx or cPanel. The InterWorx server control panel is NodeWorx. The cPanel control panel for the Web host is WebHost Manager. Website owners do not buy cPanel or InterWorx. Rather, they choose a Web host that provides one of these control panels. These website owners then get access to either the cPanel website control panel or InterWorx's SiteWorx.
Common Features
For Web hosts, common features found in both programs include the ability to create customized hosting packages for website owners, creation and management of new users, domain management, DNS management and the ability to offer reseller hosting.Website owners will find many of the same features in their control panels. Examples include email accounts, website statistics, subdomains, a file editor for editing in plain text and HTML, a file manager, FTP accounts for uploading files to websites, password protection for your website pages and backup options in case you lose data. Both control panels also provide for add-on domains, which are domains hosted under the same hosting package to save money. Both control panels also support cron jobs, PHP, MySQL and SSL.
Added Features
Each control panel offers a few things not provided by its competitor. For example, cPanel has FrontPage extensions, which allow you to directly upload files from FrontPage to your website. The cPanel product also provides several video tutorials for website owners. Services providing hosting for gaming sites can also choose the cPanel Game Server. Web hosts using Windows servers instead of Linux can choose cPanel's Enkompass control panel. InterWorx integrates the APF iptables firewall system for Web hosts. Web hosts can also use InterWorx to import entire domains previously hosted in cPanel, InterWorx or other control panels.Installation programs simplify the process of building a website, blog or similar features. To help website owners, cPanel uses the Fantastico Deluxe installation program, while InterWorx uses SimpleScripts. You can compare the list of available programs from these installation services to see which one you prefer.
Languages
Website owners in some countries may prefer a control panel due to language availability. At the time of publication, both services offer versions in English, Spanish, Portuguese, German and French. However, cPanel offers Iberian Spanish and Brazilian Portuguese, as well. Other languages that only cPanel offers include Arabic, Hindi, Dutch, Polish, Romanian, Russian and Chinese. However, only InterWorx offers Slovak, Hungarian, Italian, Turkish, Swedish and Czech.
Price
As of the time of publication, the InterWorx monthly license is about $25, and the yearly license is about $250. Support is included, but you must pay $50 for installation. Conversely, the cPanel yearly license is about $400, which includes installation and support. For an additional $200 per installation per year, you can get VPS Optimized2, which enhances performance while reducing memory usage. There is no cPanel monthly license. You can also get InterWorx for life for about $300. However, support ceases on that license after the first six months. An additional six months of support is available for $50. Both companies have authorized resellers or distributors. In that case, the price varies.
In Feburary 2016 14,

How to Fix Internet Explorer When It Can't Open a WebpageIn Feburary 2016 14,

In Feburary 2016 14,
Find out whether you can view any web pages. Open Internet Explorer and type in the address of a site with which you are unfamiliar. If you need an idea, look around the room and type in a brand name you see, such as 'Sony.com' or 'Saltines.com.' The reason for this is that if you have recently visited a site, the 'cached' files might appear on your screen and not provide an accurate determination. If you are able to see a new site, the issue is likely with the website you are trying to visit.
Check the connection to the modem or router. If you are unable to view any web pages, your connection might have been lost. Check physical connections to see if anything is unplugged. If you are using a wireless connection, verify that it is still working.
Unplug the modem. Pull both the power cord and the phone line or Ethernet plug out of the back of the modem and leave it alone for a few minutes. Plug the cords back in and allow it to power up completely. Try the connection again.
Contact your Internet service provider. A cable, DSL or phone line outage is a common cause for connectivity issues.
Delete Internet Explorer's history. Close any open applications and open a new Internet Explorer window. Click 'Tools' and then click 'Delete Browsing History.' Click each 'Delete' button, except passwords if you allow IE to retain them for you.
In Feburary 2016 14,

Thursday, 11 February 2016

WebIn Feburary 2016 11,

In Feburary 2016 11,
Customer support agents working for Web-hosting companies help clients with a variety of concerns, including setup issues such as website migration, software settings and any other initial problems getting started. Support staff continue to help clients after setup, troubleshooting issues such as connectivity problems, data storage and security. Web-hosting support and sales staff speak with clients to provide solutions over the phone and when needed they communicate through virtual private servers that allow customer support agents to control the customer's computer. Web-hosting jobs that revolve around sales require the same expertise. Sales agents identify the needs of potential customers while linking them to services offered by a Web-hosting company.
Job Requirements
Web-hosting jobs require in-depth knowledge of different types of software and computer systems that host websites. In addition to knowledge of Web-hosting platforms, workers need to be familiar with common website databases, programming languages, content-management systems and popular Web-based software such as WordPress and Joomla. Since the majority of work involves connecting with customers, Web-hosting workers must be comfortable communicating with clients and be able to relate to client needs. The ability to reach an understanding about technical issues with people who aren't technically adept is a crucial part of providing sales and service.
In Feburary 2016 11,

Monday, 8 February 2016

How to Find an FTP PasswordIn Feburary 2016 08,

In Feburary 2016 08,
Enter the URL to your hosting control panel in your Web browser.
Log in to your control panel and navigate to the customer service area. For example, many control panels include an icon or link to the 'Trouble Ticket' center on the index of the control panel.
Follow the prompts to create a new ticker or contact a representative.
Type a message explaining that you have lost your password and ask your host to provide you with the current password or to change it to something new.
FTP Password Recovery
Download and install FTP Password recovery. Click to run the program after installation has completed.
Open your FTP program, such as CuteFTP or Filezilla, that has your password saved.
Open the pane that shows your connection, account or site properties. In Filezilla, click 'File' and choose 'Site Manager.'
Change the connection server to 'localhost' and port to '21' in your FTP client. Make note of your existing FTP server so you do not lose it.
Confirm your changes and click the appropriate button to establish a connection in your FTP client. FTP Password Recovery will refresh and show your password.
Password Change
Log in to your hosting control panel in your Web browser.
Click the icon to access your FTP accounts. In H-sphere control panels, look for the 'FTP & Shell Manager' icon while cPanel will display a link to 'FTP Accounts.'
Click on your FTP user name, if there are more than one.
Select the appropriate option to change the password and type the new password into the field.
Click the 'Submit' button in H-sphere or the 'Change' button in cPanel to confirm the changes.
In Feburary 2016 08,