Feb 13, 2015

Virgin Media focusing on infrastructure over content with £3bn investment

Chief executive Tom Mockridge says first infrastructure expansion in 15 years is overdue as company reveals it has passed the 5 million cable customer mark

Tom Mockridge

Virgin Media’s planned £3bn investment to extend its cable network to an extra 4m homes shows the company’s focus is on infrastructure rather than content, according to its chief executive, Tom Mockridge.

The cable company’s first big infrastructure expansion for 15 years was overdue, said Mockridge, and could not have happened before it was acquired by John Malone’s Liberty Global in 2013.

Liberty reported record revenues of more than $18bn (£11.7bn) on Thursday in the US and Virgin subsequently unveiled its results on Friday morning, which showed it passed the landmark of 5 million cable customers and revealed its huge network expansion programme – Project Lightning.

Mockridge declined to comment on speculation about Liberty Global being interested in bidding for ITV, almost a decade on from the doomed bid by NTL (the cable company that later merged with Telewest to form Virgin Media) for the broadcaster.

Related: Virgin Media challenges BT with cable network extension plan

However, he pointed out that “the message from [Friday’s Project Lightning] announcement” was that the focus for Virgin is on putting its money into infrastructure and its “core business”.

Virgin Media’s figures showed its revenue increased 3% to £4.2bn in the year to 31 December 2014, with operating profit up 41%, mostly due to revenue growth and economies of scale following its purchase by Liberty.

Cable subscription revenue grew 3% in 2014 and the quad-play company’s mobile revenue was also up, by 9%, while churn rate – the number of customers not renewing their subscriptions – reached a record low of 14.6%.

Mockridge put the fall in customers leaving down to better customer service and a more effective network, which people value more as they watch more video via broadband: “The fundamental reason is people use their broadband services so much more. The use in our network is running up 60% on last year.”

Average monthly revenue per user also rose, to £49.36 in the fourth quarter of 2014. While some could be attributed to price rises, the company also sold more products across its quad-play offering of telephony, broadband, mobile and television services.

Following its intervention into the Premier League auction rights process – asking Ofcom to investigate if the Premier League auction process which resulted last week in Sky and BT paying a record £5.1bn for rights to live top-flight football is fair for consumers – Mockridge said it was now “up to the referee” to decide.

The former News International chief executive said Virgin awaits the outcome but he said it was “helpful” that Sky – which provides its sports channels to the cable operator on a wholesale basis – had recently indicated it was going to absorb some of the rise in rights costs.

Related: Virgin Media urges Ofcom to pause auction of Premier League live TV rights

Over a year ago, Mockridge said Virgin Media was holding talks with Amazon about putting its video-on-demand service, Prime Video, on its network, but he told the Guardian that there is still no outcome.

The Project Lightning strategy – also called the UK Network Extension – has received support from the government, with David Cameron saying: “This additional private investment will create more opportunities for people and businesses, further boosting our digital economy.”

But Mockridge said that while all the investment in Project Lightning comes from the private sector, “where the government has been supportive”, it has been in terms of infrastructure policy as Virgin still has to “dig a hole in the ground” to extend its cable network.

However, terms and conditions do apply. Virgin’s results have a caveat about the £3bn investment which says: “Depending on a variety of factors, including the financial and operational results of the earlier phases of the programme, the UK Network Extension may be modified or cancelled at our discretion.”

The Virgin Media chief said that trials in Teesside and Glasgow showed that up to 23% of homes took up the service, but “we’ve got to be better than that”. While Liberty’s approval for the investment in the five-year expansion programme showed its belief in Virgin’s strategy, Mockridge said it was right there were terms and conditions, “the boss is saying we’ve got to deliver”.

The company is asking householders who want to take advantage of its services to register their interest at virginmedia.com/cablemystreet in order to see where it is best placed to invest in first.

To contact the MediaGuardian news desk email editor@mediaguardian.co.uk or phone 020 3353 3857. For all other inquiries please call the main Guardian switchboard on 020 3353 2000. If you are writing a comment for publication, please mark clearly “for publication”.

To get the latest media news to your desktop or mobile, follow MediaGuardian onTwitter and Facebook.

post from sitemap

Feb 12, 2015

Apple enables two-step authentication for iMessages and FaceTime

Additional login step brings extra layer of protection against hackers for Apple’s messaging and video chat, but more can be can be done say experts

iphone 6

Apple is finally enabling two-step authentication to help protect users of its iMessages and FaceTime on iPhone, iPad and Mac computers.

Related: How Google, Facebook and Hotmail aim to stop holiday hacking

The security feature adds an extra layer of protection against hackers trying to access users’ accounts. After logging in with their usual name and password, two-factor asks account holders to use a second security code to verify their messaging and video chat accounts.

The login protection was added to Apple’s iTunes and iCloud accounts in March 2013, meaning Apple users who have perviously logged into a Mac, iPhone or iPad with their Apple ID were already protected by the extra security.

Related: Twitter introduces 'two-factor authentication' to stop password hacking

Now the same service has been activated for two more of Apple’s services, meaning that if users log out of their FaceTime or iMessage accounts and attempt to log in again, or log in on another machine, they will require a security code to confirm their username and password.

“It’s really great to see Apple extending its two-step authentication to cover more services, particularly person-to-person communication services such as these, which have been so widely abused in the past (Facebook, Skype etc),” said Rik Ferguson, vice president of security research at Trend Micro.

Two-step authentication means that even if an attacker has the username and password for the account they cannot access it without the extra code. While the extra security is welcome Ferguson said more can be done to secure user accounts.

“Two-step authentication, such as a message to a mobile device, is still not the same as fully-fledged two-factor authentication. Multi-factor authentication typically relies on something that you know (a password) in addition to either something you have (eg. a swipe card), or something that you are (a fingerprint),” said Ferguson.

Banks have been using card readers or numeric key fobs with security codes for years. But for internet sites and services, including Facebook, Twitter and Google, the second step is either a code-generating smartphone app or a text message with a code send to the phone number registered to the account.

“Two-step authentication is simply two sets of something that you know,” said Ferguson. “The ability to enter to enter the SMS-based password doesn’t depend on your ownership of the smartphone, only your access to the text message. If attackers can divert the calls or messages of that device, for example by calling the mobile service provider, this two-step authentication can and has already been subverted.”

Related: What to do if your email gets hacked - and how to prevent it

Apple’s two-step implementation uses codes sent via text message to a registered phone or the company’s Find My iPhone app. More than one phone number can also be associated to the account just in case one of them is lost or stolen.

A recovery key that is intended to be kept safe for emergencies can also be used to log into the account in place of a security code.

post from sitemap

Feb 11, 2015

Windows 10 With The Latest Technical Preview Build



If you have been keeping an eye on the Microsoft Windows 10 Technical Preview, then you should really focus on here for a second. Microsoft has steadily improved its windows 10 Overview of new constructions loaded with new features. These constructions have come fairly regularly with the first rookie in October 1. The next version, which was known as Build 9860, left about three weeks ago, and Microsoft has just released the latest version Build 9879. But why these new buildings so important?

Windows 8 will not be able to attract customers that Windows 7 has, of course, Microsoft is under great pressure to ensure that Windows 10 locations great pomp as possible. In this sense, Microsoft opened a preview of Windows program started, the goal is to encourage people to download and install Windows 10 and share your opinion with Microsoft for the company to see if you made the right decisions. Keeping up with the latest versions ensures that your comments relevant and updated.

Windows Rentals Nationwide

To keep you have to run the latest version, but how do you do it? If you are not running Windows 10 Technical Preview can be downloaded to your PC, it is not recommended unless you want to do it in a free and independent team. It can be downloaded as an ISO file and copy this file to a DVD or USB drive to install it on another pc on a separate partition or a virtual machine on your existing equipment.

Ok, so if you have any facts or already have Windows 10 running, it's time to get the latest version. And here's how:
* If you use Windows 10, click the Start button and then click the PC configuration option.
* In the PC Setup screen, click the update configuration and recovery.
* In the update screen and Recovery, click the option integrated preview.
* In the screen above is based, click the Check button now.

Once you do this, Windows will tell you if a new version is available and shows a Download Now button. If there is a new construction and a message will warn you that there are no new localized display modes. If new construction is then:
* Click the Download Now button. Windows start downloading and installing the new construction.
* Once installed Windows building will prompt you to restart the PC.
* Restart your computer, log back on and the new building will be ready and waiting.



Then you can confirm that you have the latest version, looking at the bottom right of the desktop. There you will see the Windows label Technical Preview copy evaluation, followed by the build number. Currently, the final build number is 9879. The next time you perform this process, you should see a number of top construction process.

Now you are able to deal with the new building to see what you like, what works and what does not. Microsoft OneDrive, for example, you are not working in the current version. As Microsoft releases new buildings, new features and new bugs will be noticed. To post comments, click the Start button and then click the Windows Feedback block. On the wall of Windows, you can select a specific category and see user comments or their own.

Microsoft already has some plans for Windows 10 and how it will fit and shape things the final version, although the company is certainly count on the return that is receivable from the Technical Preview builds. If you were less happy with Windows 8, then this is your chance to make Windows 10, the operating system that you have always wanted.



Microsoft Borrows A Few Tricks From Apple For Windows 10 Operating System

The latest Microsoft Windows operating system (OS) really a great competitor and is OS X. OS X Apple Granted usually found only on Apple computers while Windows is, well, almost every other team on the planet; yet both are competing, however. Windows 8 can not make the impact on consumers that Microsoft wanted the company turned its gaze to Windows 10, the next version of the operating system. With Windows 10 in direct competition with Apple's OS X 10.10 Yosemite, it is interesting to see how well the two operating systems are made for each other.




Desktop-Dedicated OS

Microsoft has released a preview version of Windows 10 and many are critical. Interestingly, many reviews that say, such as Windows 10 OS X seems to Yosemite! One of the main changes and possibly major flaws Microsoft did with Windows 8, which attempts to match the position of your operating system and the mobile OS system. Apple has always done a good job of iOS, the maintenance of its mobile operating system, OS X and independently. Windows 10 seeks to change this and return to being a desktop operating system really dedicated.


View job

Windows 10 and OS X 10:10 Yosemite are very similar, but it is not necessarily a bad thing. One feature that both operating systems seem to share original Apple OS X Mission Control (bottom). Mission Control allows you to see all Windows programs running on an organizational heads-up. It also allows you to view multiple desktops and add additional jobs with a click of a button. Windows 10 has a nearly identical feature known as the task view (Top).



By clicking or pressing the Display group in the Start menu button takes each mode of heads-up application window in a grid. From here you can see other virtual desktops or create your own virtual desktops meaning are back. What's even more interesting is the gesture shortcut up view task is identical to the Windows 10 Mac OS X. Simply slide three fingers on the trackpad and the mode is set. Of course it is a rip-off of OS X, Apple, but also a very smart move by Microsoft.

Start menu Return & more

One of the most important things that users do not like Windows 8 was that the Start menu is essentially gone, replaced by direct Tiles Planet. The good news is that the Start menu is back and not at the expense of the tiles, essentially making everyone happy. The tiles are now able to join the Start menu and can also display updates in real time. This is also similar to the OS do with your notification center X Yosemite. OS X Yosemite offers customizable widgets on the Today screen as in iOS 8.


OneDrive

However, Microsoft can take credit for the similarities between OS X and Windows 10 in terms of Yosemite OneDrive and iCloud unit. In both operating systems, the login user accounts can be linked their discs. When this happens, iCloud, and a hard drive fit perfectly with the desktop experience, making it easy to access files and folders from the cloud or to save the files that are synchronized with the cloud. Apple users were after a more or Dropbox OneDrive approach to cloud services and now they are getting their wish.

Programmers Take on Rock Star Status

(Newser) – A growing number of computer programmers aren’t content to be anonymous code monkeys: Today’s most talented tech nerds are paid exorbitantly well to turn out brilliant code, and can even earn a small amount of fame doing it, ComputerWorld reports. “Some developers base their careers around eventually becoming rock stars,” while others “practically worship” at their “virtual altar,” said one writer who rates programmers.

Coding contests give the would-be software gods a way to make a name for themselves – one frequent winner, known as Tomek, is treated like a celebrity in Poland, even appearing on a billboard and inspiring a rap song. At the same time, deep-pocketed tech companies are desperate to find the most brilliant developers, and will pay to get them.

TopCoder Inc offers $50,000 to first place winners at its annual TopCoder Open in Las Vegas.
TopCoder Inc offers $50,000 to first place winners at its annual TopCoder Open in Las Vegas.   (topcoder.com)
The Top 5 competitors pose for a photo at the 2007 TopCoder Open.
The Top 5 competitors pose for a photo at the 2007 TopCoder Open.   ( (c) Luís Guilherme)
If you're a rockstar of the coding world, the TopCoder competition in Las Vegas is prepared to offer you fame and fortune.
If you're a rockstar of the coding world, the TopCoder competition in Las Vegas is prepared to offer you fame and fortune.   (Shutterstock.com)
Competitors break for Guitar Hero at the 2007 Topcoder Open.
Competitors break for "Guitar Hero" at the 2007 Topcoder Open.   ( (c) mecruns24)
TopCoder Webcast   ( FouQuoi (YouTube))
post from sitemap

Computer Visionary Dennis Ritchie Dead at 70

(Newser) – Dennis Ritchie, who invented the C programming language and helped create the UNIX operating system, died last weekend at age 70. His death after a long illness was first reported by Google engineer Rob Pike. Obituaries popping up on tech sites hail his work, vision, and legacy:

  • “Ritchie's contribution to computer science cannot be overstated. … His vision, innovation, and hard work shaped much of what has come in the following four decades,” writes Lawrence Latif on the Inquirer. “To this day C is arguably the fastest, most efficient, most widely deployed high level programming language."

  • The birth of C is perhaps not as well known as other legendary moments in the history of computing, but it “has as much claim, if not more, to be the true seminal moment of IT as we know it,” writes Rupert Goodwins in an extensive post on ZDNet. Ritchie was focused on “making software that satisfied the intellect while freeing programmers to create their dreams."
  • “C remains the second most popular programming language in the world … and ushered in C++ and Java; while … UNIX led to, among other things, Linus Torvalds’ Linux,” writes Rip Empson on TechCrunch. “The work has without a doubt made Ritchie one of the most important, if not under-recognized, engineers of the modern era."

Dr. Dennis Ritchie, Bell Labs Fellow, poses after receiving the 2011 Japan Prize at Bell Labs headquarters in Murray Hill, New Jersey, on Tuesday, May 19, 2011.
Dr. Dennis Ritchie, Bell Labs Fellow, poses after receiving the 2011 Japan Prize at Bell Labs headquarters in Murray Hill, New Jersey, on Tuesday, May 19, 2011.   (Victoria Will/AP Images for Japan Prize Foundation)
post from sitemap

Computer Program Catches Chess Cheaters

(Newser) – Cheaters beware: A chess wiz has developed a program to catch you. Potential cheating has become a noted problem in chess, the New York Times reports. Alleged text messaging prompted a five-year ban on a trio of players in 2010; in 2006, a player was accused of using a computer in the bathroom in an incident dubbed Toiletgate. The controversy inspired an international chess master and University of Buffalo professor to develop a computer program to investigate cheating.

Kenneth Regan reviewed some 200,000 chess matches dating back to the 19th century, building a database of the moves played. His work compares human players' moves to the ones a computer would make. When a player's honesty is in doubt, Regan's program analyzes the player with reference to his or her skill ranking. At this point, the program is only robust enough to function as supporting evidence following a cheating allegation. But his work matters to more than chess, says a computer science professor: He's "trying to model how people make decisions."

A chess expert has developed a computer program to catch cheaters.
A chess expert has developed a computer program to catch cheaters.   (Shutterstock)
post from sitemap

Want to Vote, O'Connor? Think Again

(Newser) – The Information Age has been bad news for O'Connors, D'Angelos, Al-Husseins, and Van Kemps everywhere. Apostrophes in Irish, French, Italian, and African last names; hyphens in Arab names; and spaces in Dutch ones cause their owners endless headaches when computer systems reject or mis-record them, reports the AP, blocking them from voting, booking flights, and taking college exams.

Thousands of votes weren’t counted in the 2004 Michigan caucus because of computer problems with voters’ names. Such glitches happen either because the system filters out strange-looking names or because punctuation is mistaken for computer code once the name is stored. Some people are giving in and changing their surnames’ traditional spelling—at least when dealing with technology.

A young voter hands over his identification as he registers to vote at the Chicago Board of Elections Thursday, Jan. 17, 2008. In the 2004 Michigan caucus, thousands of votes weren't counted because they were cast by people with apostrophes or hyphens in their last names. (AP Photo/M. Spencer Green)
A young voter hands over his identification as he registers to vote at the Chicago Board of Elections Thursday, Jan. 17, 2008. In the 2004 Michigan caucus, thousands of votes weren't counted because they...   (Associated Press)
Iraqi refugees in Syria register their names on Wednesday, Feb. 13, 2008 in a center for the United Nations Higher Commissioner for Refugees to receive food assistance in Damascus. Many might find their last names distorted or rejected by computer systems that can't handle hyphenated names.(AP PHOTO)
Iraqi refugees in Syria register their names on Wednesday, Feb. 13, 2008 in a center for the United Nations Higher Commissioner for Refugees to receive food assistance in Damascus. Many might find their...   (Associated Press)
Clerk Shawntae McCain feeds envelopes containing absentee ballots into a scanner that verifies signatures on those envelopes with registration records, in preparation for counting in the California Super Tuesday Primary election at the office of the Los Angeles County Registrar-Recorder in Norwalk, Calif., Tuesday afternoon, Feb. 5, 2008.  Thousands of...
Clerk Shawntae McCain feeds envelopes containing absentee ballots into a scanner that verifies signatures on those envelopes with registration records, in preparation for counting in the California Super...   (Associated Press)
post from sitemap

Single App Nets $600K in Month

(Newser) – With more than 20,000 iPhone apps available, it seems inevitable that most would make peanuts. But Ethan Nicholas’ tank artillery game, iShoot, raked in $600,000 in one month——$37,000 on its best day—proving the gold rush is on in the App Store, Wired reports. The store provides a platform for selling and distributing software, allowing individual coders to match software giants in their reach, provided their products are good.

When Nicholas launched iShoot in October, business was slow. So he coded a demo version, iShoot Lite, that users could download for free. Nicholas advertised the full $3 version inside it, and within months 320,000 of the 2.4 million demo users had purchased the game, pushing it to the App Store’s No. 1 spot—where it stayed for 26 days. The game is still at No. 6.

Apple customer uses an Apple iPhone at an Apple store in Palo Alto, Calif., Thursday, Oct. 16, 2008. Apple Inc.'s fiscal fourth-quarter report, expected after the market close Tuesday, Oct. 21, 2008.
Apple customer uses an Apple iPhone at an Apple store in Palo Alto, Calif., Thursday, Oct. 16, 2008. Apple Inc.'s fiscal fourth-quarter report, expected after the market close Tuesday, Oct. 21, 2008.   (AP Photo/Paul Sakuma)
In this Oct. 19, 2007 file photo, a customer holds an Apple iPhone at the Apple store in Palo Alto, Calif., Friday, Oct. 19, 2007. Following the success of Apple Inc.'s iPhone, mobile phone manufacturers are racing to produce touch screen models of their own.
In this Oct. 19, 2007 file photo, a customer holds an Apple iPhone at the Apple store in Palo Alto, Calif., Friday, Oct. 19, 2007. Following the success of Apple Inc.'s iPhone, mobile phone manufacturers...   (AP Photo/Paul Sakuma, file)

I'm not going to be a millionaire in the next month, but I'd be shocked if it didn't happen at the end of the year.
- Ethan Nicholas, creator of iShoot, an application for Apple handheld devices

post from sitemap

Intel, Microsoft Fund Multicore Research

(Newser) – Intel and Microsoft will fund researchers at two universities working on new programming techniques for multicore chips, sources told the Wall Street Journal. The companies will reportedly provide $2 million annually for five years, to speed the development of chips that can contain dozens—or even hundreds—of microprocessors of multiple types. One of the grants is expected to go to UC Berkeley.

"Everybody is madly racing toward multicore technology, and they don't have a clue about how to program it," said one Stanford professor. Possible applications include media-rich programs like 3-D imaging, pattern recognition, and financial analysis, all of which require hardware/software combinations that can process large, complicated quantities of data.

Intel Corp. Vice President and Chief Technology Officer Justin Rattner briefs the media in Bangalore, India, Wednesday, Jan. 16, 2008.
Intel Corp. Vice President and Chief Technology Officer Justin Rattner briefs the media in Bangalore, India, Wednesday, Jan. 16, 2008.   (AP Photo/Aijaz Rahi)
Steve Ballmer, CEO of Microsoft, addresses the media during a news conference at the CeBIT in Hanover, northern Germany, on Monday, March 3, 2008.
Steve Ballmer, CEO of Microsoft, addresses the media during a news conference at the CeBIT in Hanover, northern Germany, on Monday, March 3, 2008.   (AP Photo/Joerg Sarbach)
The Intel exhibit at the Consumer Electronics Show at the Las Vegas Convention Center, Wednesday, Jan. 9, 2008.
The Intel exhibit at the Consumer Electronics Show at the Las Vegas Convention Center, Wednesday, Jan. 9, 2008.   (AP Photo/Paul Sakuma)
post from sitemap

Treat Your Marriage Like Software Code

(Newser) – No software code is free of bugs, and no marriage is free of hitches. Fortunately, in both cases, those issues can be addressed—using techniques that are surprisingly similar, writes David Auerbach at Slate. He should know: He's a software engineer, and so is his wife. A few of his tips:

  • Beta-test your marriage: Make sure you've given the relationship plenty of time before you walk up the aisle. "We waited 10 years to get married, to rack up enough evidence that the code was now robust enough to keep the product running smoothly."

  • Bugs "hibernate," but they don't go away by themselves. "If you haven’t actually fixed anything, it’s a dead certainty the enigmatic bug will return." Same with that niggling issue in your marriage—the friend you can't stand, for example. Take the time to "talk it out."
  • Most code is simply support structure for the task the program is actually supposed to do. Likewise, a marriage can't just be about love; that would be "about as stable as Windows 3.0." You must work on the infrastructure, "the little piddly things around scheduling and finances and chores."
  • Bugs might hide for a very, very long time before you notice them. Programs can crash years after they're written, and "a good programmer knows that she never knows everything about a program," Auerbach notes. "Likewise, even after 18 years together, I know that my picture of my wife is still only an approximation of a very complex person, and thinking it complete and accurate will inevitably lead to error upon error."
Click for the rest of Auerbach's tips.
For a successful marriage, treat it like software code.
For a successful marriage, treat it like software code.   ( Shutterstock)
post from sitemap

New Bot Plays Perfect Poker: Researchers

(Newser) – The world's greatest poker players have a formidable new foe. Scientists have developed a computer program they say plays an effectively perfect game of Fixed-limit Heads-up Texas Hold 'em, the BBC reports. The Cepheus system "can't be beaten with statistical significance within a lifetime of human poker playing," developers say. The game won't necessarily win every hand, the Guardian reports, but it should beat humans in the long run. It developed its abilities after "playing 24 trillion hands of poker every second for two months," says a researcher. The program reportedly learns from its mistakes, experiencing what might be called electronic "regret" over moves that don't work out perfectly. If you're skeptical, you can try playing against it right here.

Its favored version of poker starts with players receiving two cards the other player can't see, and that's key to the significance of Cepheus. Computers have previously developed winning strategies for games like chess, but in those games, each player has all the information about what's happened so far—they're called "perfect information games." Prior to Cepheus, "no nontrivial imperfect-information game played competitively by humans" had been "solved," researchers write in Science. At the Guardian, poker writer Christopher Hall has some doubts:

  • "One of the bot’s limitations appears to be that it did not seem to adapt against my change of style, something that could be its undoing. The most important thing in any heads-up battle is finding out your opponent’s flaws ... and relentlessly exploiting them until they change their style to compensate," he writes. He came out slightly ahead of Cepheus after 400 hands, though that's too small a sample size to draw a clear conclusion, he notes.

A dealer shuffles a deck of cards during a round of Texas Hold 'em at the World Series of Poker, Friday, May 31, 2013, in Las Vegas.
A dealer shuffles a deck of cards during a round of Texas Hold 'em at the World Series of Poker, Friday, May 31, 2013, in Las Vegas.   (AP Photo/Julie Jacobson)
post from sitemap

Man Who Coined 'Artificial Intelligence' Dead at 84

(Newser) – John McCarthy, the computer scientist who coined the term "artificial intelligence" in 1955, died Monday, reports the New York Times. He was 84. McCarthy was teaching mathematics at Dartmouth when he organized the first Artificial Intelligence conference in 1956. Later he founded AI labs at MIT and Stanford, and created the computer language Lisp (for List Processing Language) that still underlies much AI programming. McCarthy predicted that creating an AI machine would require "1.8 Einsteins and one-tenth the resources of the Manhattan Project."

Called "prophetic" by the Times, McCarthy spoke of what is now e-commerce in the 1970s, invented the computer memory clearing technique called "garbage collection," and developed "time sharing" systems for mainframe computers. McCarthy also held several less successful beliefs over the years—in the 1970s he believed that personal computers were mostly a waste of time, and more recently was largely a climate-change skeptic.

In this March 7, 1974 photo provided by the Stanford news Service, John McCarthy, professor of computer science, works at the artificial intelligence lab in Stanford, Calif.
In this March 7, 1974 photo provided by the Stanford news Service, John McCarthy, professor of computer science, works at the artificial intelligence lab in Stanford, Calif.   (AP Photo/Stanford News Service, Chuck Painter)
post from sitemap

Meeting the Tools in the Visual Basic Toolbox

When you write a Visual Basic program, you first have to design the user interface. Essentially, a Visual Basic user interface consists of objects that you place on the screen and arrange in some semblance of organization so that the screen looks pretty.

The common elements of a Visual Basic user interface appear in Figure 1 and consist of the following:

  • Forms (also known as windows)
  • Buttons (such as command buttons and radio buttons)
  • Boxes (such as text boxes and check boxes)
  • Labels
  • Pictures (such as icons and graphics)
figure

Figure 1: The elements of a typical Visual Basic user interface.

To design your user interface, follow these steps:

1. Create a form.

2. Choose the object you want to draw from the Toolbox. (See Table 1.)

3. Draw the object on the form.

Table 1: Tools in the Visual Basic Toolbox

Icon

Tool Name

What This Tool Does

Pointer

Selects objects

Picture box

Draws a box to display graphics

Label

Draws a box to display text

Text box

Draws a box that can display text and let the user type in text

Frame

Groups two or more objects together

Command button

Draws a command button

Check box

Draws a check box

Option (or radio) button

Draws a radio button

Combo box

Draws a combo box

List box

Draws a list box

Horizontal scroll bar

Draws a horizontal scroll bar

Vertical scroll bar

Draws a vertical scroll bar

Timer

Places a timer on a form

Drive list box

Draws a drive list box that displays all the disk drives available

Directory list box

Draws a directory list box that displays a directory on a particular disk drive

File list box

Draws a file list box that displays files in a specific directory

Shape

Draws a geometric shape such as a circle or a square

Line

Draws a line

Image box

Draws a box to display graphics

Data control

Draws a control to link a program to a database file

OLE

Draws a box to insert an OLE object

post from sitemap