Type Title Body Nid Author Replies Last Post Reads Category
Blog Hyper-V in windows 2008 server Configuring Hyper-V in Windows 2008 It will be helpful to begin by understanding a few important terms as follows: Virtual means not real and 144 Sharath Reddy 12 2011-07-19 11:34 1,167 Microsoft
Blog The Top 5 Free Memory Optimizer The Top 5 Free Memory Optimizer Memory optimizers are programs that analyze current RAM memory usage and check if these data are still needed by 511 Sharath Reddy 13 2011-07-13 21:38 2,880 Others
Blog Trend Micro Titanium Maximum Security Trend Micro Titanium Maximum Security Trend Micro Titanium Maximum Security is an antivirus program that features real-time scanning of all kinds 1173 Bilroth 13 2011-07-15 21:00 1,587 Virus & Spyware
Blog HP's version of IPAD - HP Touchpad HP's version of IPAD - HP Touchpad Recently, HP released their equivalent version of Apple’s IPAD, the HP Touchpad. This new invention 5405 Mayax1988 4 2011-10-22 15:53 2,124 Others
Blog Basic facts about the Internet Basic Facts about the Internet Internet’s usefulness is undeniably important these days since it is capable of broadcasting information and 546 Sharath Reddy 23 2011-06-26 16:18 6,749 Internet
Blog All about Exchange Server 2003 Tools – Top All about Exchange Server 2003 Tools – Top 20 Tools You might have heard of the exchange server 2003 tools, which are in abundance for 576 Sharath Reddy 10 2011-06-14 08:30 1,669 Exchange 2003
Blog Inventory Management Softwares for IT Inventory Management Software for IT companies for hardware asset management Inventory management application or software is one of the computer 543 Sharath Reddy 14 2011-11-30 13:40 3,478 Computer Hardware
Blog Domain name management (World Wide Web (WWW DOMAIN NAME MANAGEMENT World Wide Web (WWW) simply called web, is a way to access information over the internet. It is information for  515 Sharath Reddy 16 2011-11-30 13:39 3,131 Internet
Blog DHCP is Dynamic Host Configuration Protocol DHCP - Dynamic Host Configuration Protocol 1.  Static Address Allocation: In this client request for the static IP address request from DHCP 575 Sharath Reddy 12 2011-07-19 12:50 1,432 DHCP
Blog Introduction to Computer & IT Insecurity Introduction to Computer & IT Insecurity Computer security and IT security are terms associated with the protection of computer software, 583 Sharath Reddy 15 2011-07-18 16:49 2,002 Security
Blog CSharp Language : Its History and Uses CSharp Language: Its History and Uses The symbol of programming language that will be discussed later was rooted on the note of music which is 578 Sharath Reddy 14 2012-07-12 22:53 2,406 Programming
Blog Introducing ADO.Net and ASP.Net Frameworks ADO.Net Vs ASP.Net The ASP.Net arrived during late 96’ when ADO version 1.0 was issued comprising a latest way of enthusiastically 574 Sharath Reddy 8 2011-06-15 17:27 1,380 Developer
Blog Performance of browsers: A short Study Performance of browsers: A short Study Firefox 3.5: The most unique feature of Firefox is its simplicity. Users will be excited with so 577 Sharath Reddy 11 2011-06-09 19:21 1,667 Internet Explorers
Blog Most popular and leading Operating Systems Leading operating systems Windows 3.0 & 3.1 Microsoft entered the operating systems market with the Windows 3.0 (released in 1990) and much 537 Sharath Reddy 13 2011-06-16 12:47 1,223 Operating System
Blog Major differences oracle 9i, 10G and 11G Major differences oracle 9i\10G\11G Oracle is an extremely accepted database management scheme. Lots of editions are on hand and put into 1291 Sharath Reddy 9 2011-06-15 23:50 12,407 Database
Blog All OS types in Linux family and explanation The types of Operating Systems in the LINUX family Linux has gained extreme popularity as one of the best operating systems available, along with 1065 Sharath Reddy 11 2012-07-17 06:09 3,116 Operating System
Blog MacBook Pro 15-inch: Its Features and Value MacBook Pro 15-inch: Its Features and Value Here presenting a new MacBook notebook, powered by i5 family processor and, its features. Apple 2168 Anderson11 15 2011-06-19 14:48 1,295 Apple
Blog 5 best free print server managers Here we discuss on some of the best print managers CUPS (Common UNIX Printing System) It permits a workstation to act as a print server. 133 Sharath Reddy 13 2011-11-30 13:37 3,316 Others
Blog Memory (RAM) - a brief buyer guide Memory (RAM) - a brief buyer guide When we come to upgrading a PC, the most-often upgradeable part, comes to our mind is the memory. This is 2200 Jones brown 16 2011-06-15 08:37 1,382 Computer Hardware
Blog Start blogging using the most prominent Blog platforms When blogging started, subject experts used to write informative articles or a thoughtful person would write out his rants in the 1037 Sharath Reddy 14 2011-07-02 15:00 1,053 Others
Blog Ethical Hacking and its Difference to Ethical Hacking and its Difference to Malicious Hacking Ethical Hacking is also often termed as Intrusion, Penetration Testing, Tiger Teaming, 582 Sharath Reddy 20 2011-06-22 21:29 1,712 Security
Blog Best free 5 audio editors Best free 5 audio editors As we know, no one is expert in anything. So by having multiple options, we may have best solution for the problem we 571 Sharath Reddy 14 2011-06-12 16:27 1,549 Softwares Talk
Blog ICT Overview: Functions and Organization ICT- Overview ICT which refers as the Information and Communications Technology is basically a synonym that is being used for  Information 644 Sharath Reddy 14 2011-06-20 12:26 1,905 Others
Blog Computer Programming Language: Python, Pearl Computer Programming Language: Python, Pearl and Ruby What’s Python, Perl and Ruby? Python is an extraordinarily dominant, vibrant, and 1718 Vincentanthon 14 2012-07-11 23:30 2,585 Programming
Blog Microsoft System Center Virtual Machine Microsoft System Center Virtual Machine Manager “Microsoft System Center Virtual Machine Manager” is quite a mouthful, so let’s 1737 Joseph.mack 15 2011-11-30 13:38 4,131 Softwares Talk