SoftwareSponsored by Flatiron School

38K

Solutions

38K

Contributors

Software is any set of instructions that directs a computer to perform specific tasks or operations. Computer software consists of programs, libraries and related non-executable data (such as documentation). Computer software is non-tangible, contrasted with computer hardware, which is the physical component of computers. Software written in a machine language is known as "machine code". However, in practice, software is usually written in high-level programming languages than machine language. High-level languages are translated into machine language using a compiler or interpreter or a combination of the two.

Share tech news, updates, or what's on your mind.

Sign up to Post

The 14th Annual Expert Award Winners
LVL 7
The 14th Annual Expert Award Winners

The results are in! Meet the top members of our 2017 Expert Awards. Congratulations to all who qualified!

We have a new branch that uses the QuickBooks pro 2017 software, they are getting the following message below to update quickbooks software.
2018-04-12_13-01-47.png
i need to know how to upgrade the quickbook software. Please note the quickbook database is on a server in the datacenter that the quick books client connects to. Please advise.
1
 
LVL 102

Expert Comment

by:John
The update has already been downloaded. Just click on Install Now. The new update will work with your current Server Manager (assuming it to be V2017)

You should ask this in Q&A as there is no value to any of us in answering your posts.
1
 
LVL 44

Expert Comment

by:pcelba
It seems I should explain what meant my sentence "Public forum is not good place to ask questions like this."...

QuickBooks is a paid software installed in a company which must have some policies about updates and upgrades. Such updates should not be allowed to users which do not know how to handle them.  How such user can recognize what is installing, what software displays the message and what to do at all?

To simply tell "Install it" just because the dialog window in the question is similar to the one displayed by the paid product can install whatever the attacker needs on your computer! Any click on your computer is at your own risk. Even the internet Ad closing by the X button can do unpredictable things...

Following is derived for the person which has computer background and which maintains software installations in your company/branch:

The first place where to ask is QuickBooks support (https://community.intuit.com/products/quickbooks-help-en-us). They surely know the answer and you've prepaid your questions already.

The second place is regular question here as Brian B proposed. Go to https://www.experts-exchange.com/askQuestion.jsp and ask the question again.  DON'T FORGET to add  QuickBooks as the Topic and don't forget to add whether you are sure the dialog is from the QuickBooks software.
0
Intel is dropping plans to patch old CPU's for the Meltdown patch.

http://www.zdnet.com/article/intel-we-now-wont-ever-patch-spectre-variant-2-flaw-in-these-chips/?bhid=23164040498209351948461508422926&ftag=TRE-03-10aaa6b

So it really is time for people to move on. New machines means better hardware security and Windows 10. It can easily be made to look and feel like Windows 7.

Time to upgrade software also to improve security.

0
gSuite help is still terrible.

I have several comments about how using paid support for Office 365 is far superior to the experience using gSuite including my comment on this article from 2015.

Yesterday's call to gSuite support reconfirms.  Problem is a user wants to have access to Android apps on his new Google Pixelbook. Going to settings on the Pixelbook to enable the feature is grayed out.  A call to Pixelbook support confirmed the issue is the user is a member of a business gSuite account and there is a feature that has to be turned on.  I was directed to call into gSuite. Calling gSuite support is about as helpful as talking to my 2 year old niece. The gSuite tech acted as if he had no knowledge of a Pixelbook. I had to explain several times it was a product of his own company. Even going down the Chromebook route didn't help. He could simply point to turning on a feature that was already set. Otherwise, I would have to call the Pixelbook Support.

I have called into office 365 support for many issues. Sometimes the issue went beyond the scope of what the tech should have helped for their own silo, but they still were able to spend 30 to 60 minutes on the phone to solve the issue with great patience and product knowledge.

After the sale support many times goes unnoticed or untested.  When evaluating a service or software, I will call in…
1
 
LVL 55

Author Comment

by:Scott Fell, EE MVE
Thanks for the nudge Andrew.  Perhaps I will do just that.
0
 
LVL 17

Expert Comment

by:Andrew Leniart
Please do Scott. I'll be more than happy to edit and get it published for you.

I think a lot of people may benefit from your experiences, and it may just be the push Google needs to provide some decent support.
0
More on the two "villians" too. It has a nice description, not overly technical (though inevitable at times) for understanding. Crux of it is remediation is really for CPU vendors to issue firmware updates to protect against these attacks. The OS and affected vendor will "support" with their release to reduce the attack surface or make it harder to exploit.

Unfortunately, there are no software patches or operating system mitigations that can fully mitigate the impacts of the Spectre attacks and the flaws being abused. Only saving grace is browser vendors have begun updating their browsers to disable certain features which make the Spectre attack feasible via JavaScript. If really paranoid, back to basic to disable active scripting like Javascript.

https://research.kudelskisecurity.com/2018/01/04/meltdown-spectre-attacks-on-cpu-flaws/
1
 
LVL 50

Expert Comment

by:dbrunton
I think the microcode patches will come through the system vendor, Dell, HP etc etc.  Intel will probably supply them with the patches to distribute.

As for the lawsuits that will be interesting.  Unless it can be proven that there is a significant slowdown those lawsuits will go nowhere.  And at this stage there is no real evidence of that.  The most likely candidates will be those who run VM instances in the cloud and we'll need to wait for those to occur.

It will be a pity if the lawsuits don't succeed because I'd love a new Core 2 Quad processor replacement ...
0
 
LVL 66

Author Comment

by:btan
Agree. Nice.
0
Hi all
I have a win2000 server running bespoke software that obviously needs to be retired, so I am hoping to create a vhd file of this machine & run it on a 2008R2 server.
Not having done this before I need advice on firstly, can this be done? & secondly how to step through what is required to do this. The Microsoft website is confusing, to say the least.
What software would I need etc. Disk2VHD won't work on 200 as there is no VSS.

Hoping some kind person might be able to enlighten me.

Regards

Brian P.
0
 
LVL 26

Expert Comment

by:Brian B
Yes, but you have entered this as a post. It looks like you are asking for help. To get the best response from the Experts, you should probably re-submit this as a question using the "ask a question" button at the top of the page, or this link: https://www.experts-exchange.com/askQuestion.jsp

If you do ask a question, please post the link to it back here so others can find your question and help you more quickly.

Please see here for further details: http://support.experts-exchange.com/customer/portal/articles/756544-how-to-succeed-at-ee-as-an-asker
1
Immutable Class Builders
 
The other day I showed 1 way to make a Class #Builder more meaningful, #semantically, leveraging the #programming language's type system. Today, I'm going to address how to make them immutable, its benefits, and its drawbacks.
 
Why?
 
Class Builders typically use mutable architectures where the programming language allows. In #Java we often see the following model:
 
@Immutable  
final Class Person {  
 
public final Name name;  
public final Address address;  
 
Person(final Builder builder) {  
  this.name = builder.name:  
  this.address = builder.getAddress();  
}  
 
}  
   
@Mutable
final class Builder {  
 
public final Name name;
@Nullable private Address address;
 
private Builder(final Name name) {
  this.name = name:  
  this.address = Address.empty();  
}  
 
public static Builder named (final Name name) {  
  return new Builder(name);  
}  
 
public Builder with (@Nullable final Address address) {
  this.address = (null == address) ? Address.empty() : address;
}  
 
public Address getAddress () {
  return (null == this.address) ? Address.empty() : this.address;
}  
 
public Person build () {  
  return new Person(this);
}  
 
}  
 
Whatever Person field is required, we find in the Builder's constructor. In the above example, that's Name.
 
Other fields are optional, and their value is added to a Person instance by using one if the Builder.with() instance methods.
 
Note how the Builder also features a …
0
 

Author Comment

by:A.E. Veltstra
Thank you, Brian! I'll look into that.
0
 

Author Comment

by:A.E. Veltstra
Anton Shipilev showed in 2014 that using all final fields and setting them in the class constructor did in fact slow down initialization when using Oracle's HotSpot Java compiler on ARM and PowerPC. I have yet to see whether his recommendations have been committed. https://shipilev.net/blog/2014/all-fields-are-final/
0

TeamViewer hacked: Here’s how to protect your systems


Hi there,

TeamViewer can be exploited using a vulnerability allowing users to switch between viewer and presenter side, or remotely control the server. If you are using TeamViewer in your enterprise, do act now.

Read more: https://goo.gl/2E65yX
1
Type-safe class builders
 
The Builder design pattern for software architecture has found quite some traction among people who read the design patterns book by the Gang of 4, as well as those who seek a more fluent, clean-code approach. Oddly enough, these 2 approaches conflict. In this article I'll focus on the latter approach.
 
Uses for the Fluent Builder pattern include reduction of nullable constructor parameters of the target class, reduction of the number of constructors of the target class, reduction of the amount of parameters for constructors of the target class, and providing semantically meaningful method names to specify parameter values for the constructors of the target class.
 
And I find that in the latter use, implementations tend to be lacking.
 
For instance, a typical example is shown in Lokesh Gupta's Builder article over on HowToDoInJava. Read it.
 
Using that Builder reads like this (I have altered it slightly):
 
final User lokesh = new User.UserBuilder("Lokesh", "Gupta").mice(1).desk(14).monitors(3).build();
 
All the hallmarks of a fluent API are there, aren't they?
 
Well. Not really.
 
See, its method mice(int) doesn't signal what its effect will be. "Mice" is just a noun. Not a verb. This is common in Java POJO design, but it shouldn't be here. For self-describing code, I also expect that a setter method signals its effect. Something like setMice(int).
 
But what does that number signify? A type? An amount? Something else? Let's …
1
The future of ergonomics! Probably.

To nerd it up for us: Imagine a keyboard made to exactly match the way your hand moves.

https://weartesters.com/brooks-superfeet-true-running-shoe-customization-running-event/
0
Get expert help—faster!
LVL 12
Get expert help—faster!

Need expert help—fast? Use the Help Bell for personalized assistance getting answers to your important questions.

This is my school project / assignment scenario - I have to draw a Logical Network Design...NEED HELP

The rollout of the wireless network has been suspended for now, but the stock analysis tool is being implemented. It is to be called My Stock Analysis Tool (MSAT). MSAT is going to use a three-tier client-server architecture. The tiers will be a web browser at the client end, a separate web server tier, and the MSAT server that performs application logic and all the data storage and access logic. In this way, there is no issue with installing/supporting a software client on end-user computers. Both customers and DRUB staff will use MSAT through a web-based interface, although staff may see extra options. Apart from accessing MSAT, staff also use Microsoft spreadsheet and word processing software on their computers (Windows XP PCs and laptops) for preparing reports, with work-in-progress files stored on staff computers.
0
 
LVL 35

Expert Comment

by:Rob Henson
Snowbella, well done for being honest and up-front that this is a school project; that will help experts guide you rather than propose answers as they would for normal questions.

However, to get better assistance you need to raise this as a question using the big blue button at the top of the page or this link:

https://www.experts-exchange.com/askQuestion.jsp
0
Is there any downloadable software for Windows or for other devices connected to our network (such as cell phones)that would detect devices that are sending out SPAM.  Our internet provider has suspended our outbound email services until they know that we've fixed the problem.  I'd like to test all devices on the network to find out the source of the spamming.  Any ideas?  
0
 
LVL 15

Expert Comment

by:Ben Personick (Previously QCubed)
Setup an SMTP server (such as the free one included in windows under IIS) to act as a relay.

Point all of your actual applications that sdnd mail to this relay.

block all devices (except the IP pf the mail relay) from having port 25 ourbound.

Now you can be pretty muxh assured that anything else which is sending email is blocked, and you can review the smtp logs of all devices which de relay through your local smtp relay server, allowing tou to troubleshoot connectivity and locate any abusive systems.
0
 
LVL 26

Expert Comment

by:Brian B
You have entered this as a post, but it looks like it is a question. To get the best response from the Experts, you should probably re-submit this as a question using the "ask a question" button at the top of the page, or this link: https://www.experts-exchange.com/askQuestion.jsp

Please see here for further details: http://support.experts-exchange.com/customer/portal/articles/756544-how-to-succeed-at-ee-as-an-asker
1
Open source cloud
Foss is a very good open source cloud support software like other software openstack,cloudstack,euckaly plus,synnefo,openqrm,openshift,cloudfoundry, docker.FOSS is more realiable and easy to install.
0
I see this over and over and over in here:  "Windows 10 forces me to update and my decade old legacy software won't work with the newest updates"

I wonder if these poor souls can connect the dots.

They turned off Windows 7 Updates to keep their legacy software running, and then they complained to Microsoft that their machine was hacked. It was hacked because security updates were turned off.

Microsoft's response:  "We have had enough!  New systems will update like it or not"

Is this any surprise to anyone?
1
 
LVL 53

Expert Comment

by:Jackie Man
Pull off the access to the Internet is the only way to keep legacy application working...
0
Cyber News Rundown: Edition 11/10/17

CyberNewsRundown.jpg
UK-Based Cryptocurrency Hit By Cyberattack

Prior to the official launch of Electroneum, a UK-based cryptocurrency that uses smartphones for its mining process, was targeted by a DDoS attack that shut down both the website and the app for several days. The attack effectively blocked all users from accessing their accounts, as the entire network was forced offline, to ensure the safety of investors’ funds.

Canadian University Held for Ransom

In the past week, officials have been working with affected students to secure their personal information after hackers breached the university’s systems and gained access to student records. The university has since taken its email system offline, as the hackers were spreading the leaked information throughout the email lists. Along with the data circulation, the hackers also demanded the university pay a large ransom of roughly 23,000 USD within 48 hours, though officials are still uncertain when the breach itself occurred.

WaterMiner Cryptocurrency Mod for GTA 5

As more cryptocurrency miners are embedded in software, one Russian hacker has gone a step further by exploiting a mod for the popular game Grand Theft Auto 5. The exploit silently uses a computer’s power to mine digital currency and, with the help of a modified version of the XMRig miner, can hide itself if it suspects monitoring software is active.

More on the Webroot blog here.
0
3
What can you benefit from moving Program files from C drive to D drive?

Can you simply move a program file from C: to D: ? In Windows, programs aren’t single files. Often, they’re not even found in a single folder, but rather in dozens of places on the hard drive. The file locations are referenced troughout Windows, which means that moving any of them would cause the program to fail. A simple file-move operation will be unsuccessful. Or will you manually uninstalling them and reinstalling to the D drive? Obviously, it’s not a good way especailly when there are a lot of applications installed on C drive.

Then, what is the best way? I think a third-party data migration software can make things much easier. Such programs are usually capable of dragging and dropping the program files from C drive to D drive safely and quickly. Here, EaseUS Todo PCTrans is recommended for its easy-to-use feature. It can help you transfer data and application to new PC/OS in simple steps in Windows XP/Vista/ 7/8/8.1/10 & Server 2003/2008/2012. All programs files like Facebook, Photoshop, Movie Maker, installed games, etc. that you downloaded from website and regarded as third-party software are supported.

Capture.JPG
ToDo PCTrans
0
 

Expert Comment

by:lpii
I would uninstall and reinstall the programs.  As you said, files are stored in different locations on the C drive, but there are registry entries that are created in every program's installation as well that point to those files and directories.  There maybe software that analyzes the software completely to move it, but if you have the software, I would uninstall and reinstall and pick your D drive and you won't have to worry about the software missing anything.

The advantage of installing on a different drive is if you are running out of room on your C drive, which can cause a slow down in your PCs operation.  If you have the room on the C, I would leave them on C, unless you are trying to organize your drives by having an app drive.

Most transfer software that I have used has been to transfer a complete drive to a new drive, not selected programs.  The transfer software images the disk and transfers it to the new drive (usually done because I've purchased a larger drive for my C drive).
0
 
LVL 16

Expert Comment

by:William Fulks
This reads more like an article than a question. Did you post it in the wrong category?
0
Looking for some feedback regarding whether or not to upgrade to the iPhone 8.
Pro: Financially, under Verizon's new billing system, it's only ~$2 more/month for the iPhone 8 compared to the iPhone 7 and as fast as they release new phones, it makes sense to get a newer version, if possible, so that the machine will work well with software releases.
Con: The new charging method of the iPhone 8 worries me. Wonder if the glass backing will make this phone more susceptible to breaks.

I've done some research (like this article) but curious for opinions one way or another to help me in this purchase conundrum.
0
 
LVL 1

Administrative Comment

by:Erin Wooddell
iPhone 6, Verizon. I'm about 9 months overdue for my 2-year upgrade.
0
 
LVL 3

Expert Comment

by:famousnametaken
Verizon's 'upgrades' are not what they used to be.  All you're being enticed to do is to is get a new phone and pay them monthly on their Edge plan.  That's fine.  I don't like two year agreements anyway.  And the phone trade in can be lucrative if you don't mind having an added monthly payment to your bill.
Go to Verizon's website and login to your account.  You should be able to get a nice trade in value for that phone towards an 8.  

I watched the Apple keynote a while back about the iPhone 8.

Start at 55:55
https://www.apple.com/apple-events/september-2017/

'Most durable glass phone in a smart phone ever'
'water and dust resistant'
'better retina display'
'new speakers'
and on and on.

Sounds like a great phone to have and I would be interested in getting one when I have enough money haha.

iPhone X imo won't be worth getting unless you're adamant about using their facial recognition AR heh.  Its so weird to me they went from 8 to 10.  *shrug*
0
Let’s learn something new is the term known Error Database. What is this KEDB? And how it is connected to software testing world?

The key to progress lies in climbing the stairs step by step, instead of a single jump skyward. Approaching slowly and carefully expects knowledge to be stored, utilized and enhanced. In Information Technology Infrastructure Library one such tool that enables associations to make this progress is the Known Error Database.

What is a Known Error Database Tool?

A known error database is a database that portrays the majority of the known issues inside the general frameworks. It depicts the circumstances in which these issues show up, and when conceivable, it offers a workaround that will get the client around the issue and back to profitable work. The configuration management system is part of known error database.

This database also turns out to be a part of the general Problem Management Database, where IT can go to distinguish and organize issues that need perpetual resolutions. Workarounds are just impermanent fixes with the goal that work can precede until the point when issues are definitely settled.

The ITIL known error database must incorporate screenshots of the issues, and additionally the content of error messages, and portrays the issue from the perspective of the client.

Advantages of a Known Error Database

IT groups inside undertakings build up a known error database format as it offers …
0
Get your problem seen by more experts
LVL 12
Get your problem seen by more experts

Be seen. Boost your question’s priority for more expert views and faster solutions

A weird Windows 10 issue I have not seen before.

Yesterday morning I started as normal but there was no internet. Bah Humbug!  I use my Rocket Stick to get morning email and head to a client. 4:00 pm there was still no internet.

I got home, reset the modem and internet came back. That was about 7:00 pm. I restarted everything: Modem again, router, wireless, printer and both computers.

The printer worked on my Desktop but my laptop said "out of paper" No, it was not. Standard troubleshooting steps did not resolve the issue. So I did a Driver Repair (Programs and Features). I have done this before.

Now here is the weird issue:  Restart (have to) and the display turned upside down!. No tablet controls would fix this. The only fix I could beyond what I did was to restore to the prior point. I did this (20 minutes) and that fixed the display. I spent some time updating software that got lost in the restore and all is well.

But I have not seen anything like this before. New territory.
0
 
LVL 16

Expert Comment

by:William Fulks
I'd check to see if your tablet installed any new Windows Update or vendor updates overnight. Might have picked up something buggy that screwed with your drivers.
0
 
LVL 102

Author Comment

by:John
I think the Printer repair step went wrong.

The laptop was fine; repair printer - weird problem; roll back and fine.

I don't know why the repair went bad but all was well before and all is well now.  

Thanks.
0
Today is the last day you'll be able to download Office 2007 SP's, Access 2007 Database Engine, Access 2007 Run time, and other software related to Office 2007 from Microsoft.

Make sure you download what you need to support your software.   Original post with some Microsoft Access links is here:

https://www.experts-exchange.com/posts/3107/MS-Access-2007-Users-Developers-IMPORTANT-NOTE.html

  You'll also want to download the Service Packs (SP's).
2
Does anyone have a recommendation for dashboard software.  I need to be able to switch between active IE windows preferably not tabs. I tried Dashboard rotator but it stops the plugin from working.
0
Hi,
Every week, I need to run 7-8 reports from external software for same week period for almost 8 branches, is there any VBA codes which can help me to automate the process, where it saves all reports automatically from external software on network directory just by adjusting dates? Your help will be appreciated.
0
 
LVL 26

Expert Comment

by:Brian B
You have entered this as a post, but it looks like it is a question. To get the best response from the Experts, you should probably re-submit this as a question using the "ask a question" button at the top of the screen, or this link: https://www.experts-exchange.com/askQuestion.jsp

Please see here for further details: http://support.experts-exchange.com/customer/portal/articles/756544-how-to-succeed-at-ee-as-an-asker
0
 
LVL 26

Expert Comment

by:Brian B
0
Cyber News Rundown: 10/13/17

CyberNewsRundown.jpg
Rigzone Founder Caught Stealing Data

Over the last few months, officials have been piecing together the case against Rigzone founder, David Kent. After selling the Rigzone domain several years ago, Kent used several backdoors he’d implemented to access account information for over 700,000 customers, which he then attempted to sell back to Rigzone. By setting up several dummy accounts, Rigzone staff determined the specific IP address Kent used and apprehend him.

Criminals Hack Eastern Europe Bank for Millions

In the last year, banks in several Eastern European countries have seen a drastic rise in fraudulent charges at ATMs that have allowed hackers to make off with nearly $40 million dollars. Attackers start by manipulating the banks overdraft protection and setting up proxies to allow accomplices in other countries withdraw massive quantities of money from separate accounts. In addition to spoofing the overdraft system, the attackers also installed remote access software on bank computers to enable further intrusion to the institution’s systems.

More on our blog here.
2
MS Access 2007 Users/Developers - *** IMPORTANT NOTE ***

  This is a heads up that the following Access components available as standalone downloads are moving past extended support in the near future and along with other Office 2007 products, will not be available for download after that time.

  If you have any software that depends on the 2007 (32bit) database engine or the 2007 run time, you'll want to download these as soon as possible so you have them.  

•      Access 2007 runtime  - https://www.microsoft.com/en-us/download/details.aspx?id=4438
•      Office Data Connectivity Components (ACE) - https://www.microsoft.com/en-us/download/details.aspx?id=23734&40ddd5bd-f9e7-49a6-3526-f86656931a02=True&a03ffa40-ca8b-4f73-0358-c191d75a7468=True&751be11f-ede8-5a0c-058c-2ee190a24fa6=True
•      ADE - https://www.microsoft.com/en-us/download/details.aspx?id=24569 (includes the packaging wizard, source code control, and the save as template functionality)
 
4

SoftwareSponsored by Flatiron School

38K

Solutions

38K

Contributors

Software is any set of instructions that directs a computer to perform specific tasks or operations. Computer software consists of programs, libraries and related non-executable data (such as documentation). Computer software is non-tangible, contrasted with computer hardware, which is the physical component of computers. Software written in a machine language is known as "machine code". However, in practice, software is usually written in high-level programming languages than machine language. High-level languages are translated into machine language using a compiler or interpreter or a combination of the two.