28 December 2014
HP Proliant MicroServer Gen8 - Hard Drive
Video footage of me adding the Hard Drive into the RAID slot in the Server.
21 December 2014
HP Proliant MicroServer Gen8 - Motherboard
The tour of the inside of the HP Proliant MicroServer Gen8 when I open up the server and see the motherboard.
br />
br />
14 December 2014
Booting Up Windows 10 Technical Preview on Dell Inspiron 6400
I have this laptop since 2007 and still in working order.
This time I install Windows 10 Technical Preview on my laptop.
See how fast it boots
Full View
Screen only View
This time I install Windows 10 Technical Preview on my laptop.
See how fast it boots
Full View
Screen only View
07 December 2014
Ten Commandments of Computer Ethics
10
Commandments of Computer use by the CISSP (Certified Information
Systems Security Professional) an organization of computer security
professionals - has used the commandments as a foundation for its own
ethics rules.
Bible
Version
1. Thou
shalt not use a computer to harm other people.
2. Thou
shalt not interfere with other people's computer work.
3. Thou
shalt not snoop around in other people's computer files.
4. Thou
shalt not use a computer to steal.
5. Thou
shalt not use a computer to bear false witness
6. Thou
shalt not copy or use proprietary software for which you have not paid.
7. Thou
shalt not use other people's computer resources without authorization or proper
compensation.
8. Thou
shalt not appropriate other people's intellectual output.
9. Thou
shalt think about the social consequences of the program you are writing or the
system you are designing.
10. Thou
shalt always use a computer in ways that ensure consideration and respect for
your fellow humans.
Original
Version
1. Do not
use a computer to harm other people.
2. Do not
interfere with other people's computer work.
3. Do not
snoop around in other people's computer files.
4. Do not
use a computer to steal.
5. Do not
use a computer to bear false witness
6. Do not
copy or use proprietary software for which you have not paid.
7. Do not
use other people's computer resources without authorization or proper
compensation.
8. Do not
appropriate other people's intellectual output.
9. Do think
about the social consequences of the program you are writing or the system you
are designing.
10. Do
always use a computer in ways that ensure consideration and respect for your
fellow humans.
More
information:
Subscribe to:
Posts (Atom)