Sunday, October 24, 2010

A brief description of JSF and Facelets



JSF and Facelets

Attempt to combine JSF and JSP is like trying to make foot hard into the glove: It may do, but there is a better solution before an expedient measure. In this article, JSF enthusiastic supporter of Rick Hightower introduces his favorite on the content of Facelets: easy HTML-style templating and reusable composite components.

As the recent Java? Server Appearance (JSF) project work, I am very fortunate for the first time using Facelets. About Facelets, my favorite is that it allows me to create reusable composite components. Be able to come up with a page (for example, JSP) and turn it into components, for my JSF development is really a great advantage. My conclusion is what? If not Facelets, then JSF can not be obtained from the largest gains.

JSF and Java Server Pages technology mismatch between, JSF development is a serious problem. The question is how to integrate JSP's dynamic content JSF component-based model. JSP attaches great importance to generate dynamic content output, but JSF requires JSP to coordinate the component model. For this task goes beyond the original purpose of JSP, so had a Distance.

Most JSF developers simply learn to deliberations to address these problems, but it is like a pillow on the hammer, injuring his head will eventually fall. Facelets is a more comprehensive solution: for JSF component model tailored templating language.

Facelets has the following attractive features:

鈼?Templating (like Tiles)

鈼?Composite Components

鈼?Custom logic tags

鈼?expression language

鈼?Development of the designer-friendly page

鈼?Create component library

These features than I expected to be more relevant and uniform. In this article, I discussed the first two: templating and composite components. I use Web-based application for the suspect for my family who developed a JSF application, I put it to use Facelets view update instead of Tiles. Before reading further, should download the sample code. If you want to discuss together with the operation, also need to install Facelets.

Facelets Overview

For Facelets may do the greatest wrong assumption that it is only a substitute for Tiles. Facelets much more than that: it is the new way of thinking JSF.

JSP is the kind of template of the language generated servlet. Subject and JSP servlet's doGet () and doPost () method is equivalent to (that is, as jspService () method). JSF custom tags (such as f: view and h: form) is called JSF components to render the current state of their own. JSF component model is independent of the life cycle of the generated JSP servlet's life cycle. This independence is a source of confusion.

Different with JSP, Facelets templating language that, from the start, on account of the life cycle of JSF components. Use Facelets, generated template build the component tree, not the servlet. This allows better reuse, as components can be combined into one component.

Facelets custom tags to reduce the preparation needs to use JSF. Facelets itself can use the JSF custom components. Communication JSF and Facelets requires very little special code: to do all the work is Facelet JSF tag library components declared. In the Facelets templating language can be used directly JSF components, without any additional development.

Facelets template framework

Building design in the provision of a template for the component framework, Facelets and Tapestry (see Resources) similar. However, we have the background for JSP, Facelets seem friendly and more than Tapestry. It allows the use of the familiar style of JSTL tags and JSTL / JSF / JSP expression language style. Greatly reduce the learning curve means you can start developing more rapidly.

Facelets allows the definition can be included directly into the page, or easily added to the Facelet tag library of components. Happily actually defined in the Facelets custom tag (composite components and JSP custom tag like tag) is very fast. Set to use these components, Facelets also allows the definition of site templates (and a smaller template). This is similar to using the Tiles, but less definition files. JSF components can also be customized for internal use Facelets, because the Facelets API provides JSF components can be easily integrated with the interface.

From Tiles to JSF and Facelets

As mentioned earlier, where the sample Web application to use for my on the JSF for the skeptics to create the sample series. It is an online CD store inventory management, create, read, update, and delete (CRUD) list. It includes a form to allow users to enter a new system, CD, a radio button list, allows the user to select the music category. When the user selects a classification, it immediately triggers some javascript form submission back to server. Application also includes a CD list, the user can list the title or the artist's CD on order.

The original application received from the Tiles view, support, and now I'll build Facelets view. I will start replacing the example with Facelets Tiles support beginning, and then write complex components.







相关链接:



Ulead SmartSaver Pro 3.0 Cheats bit of communication (17)



Domestic Long Road CAXA CAD Lead The Way Down To Earth



"Adopted piecemeal measures" to enhance the ENTHUSIASM of distributors



MPEG To 3GP



PATRIOT mp3 fashion stakes



Education Introduction



Who is the "mini-Ben" King?



Intel claims AMD is Due to be executive pay



National College Venture Competition officially kicked off



AVI To MPEG4



Vista security holes found in the kernel can be a



XviD to MP4



Review Calculators And Converters



Pharmaceutical Co., Ltd. Shenzhen million base



Specialist Pager Tools



Thursday, October 21, 2010

Sybase raise money for love during the full Sichuan



SMS costs donated humanitarian aid to help the disaster areas

The world's largest dedicated information management and information technology, enterprise-class mobile software company Sybase has announced that the company will Sybase365 Hub China Mobile users through all the messages in Sichuan cost of all Juanzeng to Sichuan.

"For the victims of the earthquake, and we sympathize. Sybase in Chengdu, Sichuan has a large branch, our heart is hit all staff employees and their families, and the majority of the victims in Sichuan." Sybase's chairman and chief CEO John Chen said. "During the earthquake hair, communications facilities, in particular, are often paralyzed by land line, cell phone text message (SMS) in exceptional circumstances with the advantage of faster and most convenient, therefore, deserved to become the most reliable means of communication."

From May 12 until June, Sybase will through the China Mobile network, using the Sybase 365 Hub for all messages between the cost of Sichuan donated to the disaster areas to assist humanitarian relief activities and friends among each other. China Mobile by Sybase 365 Hub with over 50 countries, more than 200 operators to exchange international SMS.

Sybase several major cities in China, with offices and R & D centers, including a branch in Chengdu, Sichuan Province. Currently, there are 78 employees in the affected areas of Sichuan and Shaanxi. Company very much concerned about these employees and has raised an emergency relief fund to help earthquake affected directly by the employees and their families, for temporary seismic room, food, medicine and clothing expenses.

In addition to text messaging fees donated, Sybase has also launched an emergency relief fund match the donation, the employee donations to the United States through the Chinese Red Cross Disaster Relief Fund, Red Cross Society of China (RCSC), the United States and other aid agencies, charitable organizations do counterpart contributions.

About Sybase

Sybase is the largest focus on information management and information technology enterprise mobile software company, its industry-leading technology and solutions Zhongxin data from the data passed to the Di Fang Ren He required. Sybase offers at any time, any place can both deliver information security, open, cross-platform solutions that help customers build a leading position in information applications. The world's most important business, communications, finance, government, healthcare and other industries critical data on all systems running on Sybase. For more information, visit the Sybase Web site in China: http://www.sybase.com.cn or Sybase headquarters Web site: http://www.sybase.com.

About Sybase 365

Sybase 365 is a subsidiary of Sybase, is a leading global provider of mobile messaging interoperability, which provides text messaging, multimedia messaging, mobile office and enterprise-class messaging services. Sybase 365 sent messages each year more than 100 billion, with its vast network of more than 700 mobile operators worldwide connected to 2.4 billion users worldwide. For more information, visit www.sybase.com/365.







Recommended links:



Manufacturing integration trend manufacturing and EMS has Approaching



SAP Henning dialogue: a complete understanding of China



Farewell, ANNOYING pop-up window



Infomation Accounting And FINANCE



Dell amended financial statements over the past four years, net profit is expected to cut 150 millio



Top Mail Servers



Six college students recruited reef Workplace



DOS, also use flash tips



3GPP To WMV



import contacts from excel to outlook easily for



Premier Search OR Lookup Tools



Step By Step Teach You Uncover And Remove Trojan Horse Disguised



MPEG to MOV



TOD to WMV



Beijing TV (radio and television media)



Specialist MATHEMATICS Education



Wednesday, October 6, 2010

The basics of intrusion detection rules



Basic knowledge of the rules
Network Intrusion Detection System is a network communication that we need to find a pattern. To give you different types of rules have a basic idea, let's look at the examples that can be used to identify and methods.

Sent from a fixed IP connection requests. This can be in the original IP header address area easily identified.

Mark packets with illegal TCP set. This can be a known set of legal and illegal, and the TCP header tags in the tag comparison and conclusion.

E-mail containing a special virus. IDS can be the title of the message or the attachment name and e-mail-related viruses known to compare the title of the conclusion.

Included in the payload of the DNS queue buffer overflow attempt. Through the analysis of DNS domains and check the length of each queue, so that IDS can identify the existence of a domain in DNS buffer overflow attempt. Or another way is to look at the payload queue overflow procedure exists.

By submitting thousands of times the same command to carry on the POP3 server denial of service attacks. Way to deal with this attack is to set the number of orders submitted, once more than the number of times the system will set the alarm.

By submitting a file or directory tried to skip the login process prior to access files on the FTP server attacks. Can develop a tracking system to monitor the successful landing of the FTP communication, if we find someone trying to enter in pre-certified through the system, it will sound the alarm.

As you can see from the above, a wide range of rules, from the simplest check header files to highly complex, such as Zhenzhenggenzong Lianjiezhuangtai or extensive protocol analysis Deng. In this article, we will focus on some simple rules and discuss their complexity in development. Please note that the rules of IDS in a different capacity to change, so the technology described in this article may be used in your firewall may not be applicable. For example, some network IDS products to the customers to write their own rules or configure the capacity of the existing rules is weak, and some products allow you to customize almost all the existing rules and to all the rules you can think of the definition into the system. Also to be considered an important factor in some IDS products can only check a specific payload Zhu Xing header files, and some products can be given in any part of Renhe package Shu Ju.

Rules which features services

The purpose of intrusion detection rules so? The answer is, different rules is not the same purpose. The result we need is that when the invasion occurred, the system alerts. But let us think about why we need to customize or modify their own rules? Maybe you see some single network communication, and you want the next warning is given when such communications occur. You may have noticed, it has a special header symbol, you want to define a rule to match this known mark; Perhaps you want to configure the IDS to detect unusual or suspicious that the communication, not just Detection of attacks and detection. Some rules can tell you which way a particular attack or an attacker trying to attempt an attack against which vulnerabilities, while others rule is that there are no abnormal behavior, rather than point out a specific kind of attack. The former is bound to spend more time and resources, but give you more information, such as why you would be the purpose of attack or the attacker is.

Header file attributes

We have fast rules about the type, and then let us focus on the characteristics of a simple rule: header file attributes. Some header file attributes is obviously not normal, so we need to develop a lot of options in the rules. Classic example of this rule is marked with a TCP SYN and FIN packets set. In RFC793 (the standard used to define the TCP) a vulnerability, so many tools are trying through this loophole to try to bypass firewalls, routers and intrusion detection systems. Many exploits, including the header file attributes aimed against the RFCs, because many of the operating system and applications are based on the assumption that compliance with RFCs written, and on this basis of communication in error not be corrected. There are many tools contain errors or incomplete code, so these tools are made by the package which contains the header files against the RFCs property. Those who write very bad invasion of technology tools and a variety of written rules for identifiable property.

It sounds good, but please note that not all operating systems and applications are fully inherited RFCs's. In fact, many systems or procedures are at least partly against the RFC's. So, over time, the agreement may be given not included in the RFC in the new property, then the new standards there would be unlawful prior to the standard into a now legal. RFC3168 is a good example. Therefore, IDS rules rely on the RFC may lead to many positive error occurs. Of course, RFC still in the development of accounting rules is very important position, because many malicious attacks are directed RFCs come. As the RFC upgrades and other factors (such that we'll discuss that later), so need to periodically review and upgrade of existing rules.

While illegal file attributes is the first part of the rule base, the first legal but suspicious file attributes are also important. For example, for connecting the port such as 31337 or 27374 suspicious (these are often related to the port and the horse), if issued a warning on these connections, you can quickly identify the actions Trojan. Unfortunately, some normal healthy communication may also use the same port. If you do not use the more detailed rules to define the communications of the other features, you will be difficult to determine the true properties of communication. Suspicious but legitimate property, such as the number of port number, preferably comprehensive consideration of other properties.

Identify the rules of composition may

Header file attributes based on the best way to develop the rules is by example. Synscan is a widely used tool for scanning and detection system. Interconnection line in early 2001, it frequently activity, because its code is often used to make Ramen worm, the first stage. This event provides a good example, because it's package includes a large number of identifiable characteristics. Here are some of the early spread of the worm exists in the Ramen worm in the IP and TCP packet header file attributes. (Note that my IDS is configured as the default has not been requested cancellation of communication, so I can only see the first packet of each attempt)
A variety of different source IP address
2 TCP source port 21, destination port 21
3 type of service is 0
4 IP identification number 39426
5 SYN and FIN flag set
6 serial number to set the various
Set all the confirmation number 7
8 TCP windows size is 1028

Now we know Synscan package contains the header files which features, we can begin to consider how to develop a good rule. Let us Zhao Zhao those illegal, abnormal, suspicious property, in many cases, these features are corresponding to the attacker trying to exploit loopholes or correspond to the attacker used a special technique. Although the normal package properties often include restrictions on some communication, but such restrictions can not be the characteristics of a good rule. For example, we will deal in properties of the normal IP protocol is defined as 6, this way we can view the TCP packet. However, some other completely normal characteristics, such as the service type is set to 0, the rule of development is very negative.

Synscan package some of the unusual features can be identified using the following rules:
1 only SYN and FIN flag set is a clear sign of malicious behavior.
2 Another feature is the confirmation number of these packages have a variety of different properties but the ACK flag is not set. If the ACK flag is not set, the confirmation number should be set to 0.
3 there is a suspicious feature is that the source port and destination port are set to 21, which is a normal FTP server does not associate. If both of the same port number, which we call reflexive. In addition to some special communication (such as a specific NetBIOS communication), usually such a situation should not exist. Anti-body against the TCP port is not standard, but in most cases is not normal. In the normal FTP communications, we will see a high port (greater than 1023) as the source port, destination port is 21.

Thus, we identified three characteristics can be used to make rules: SYN and FIN flag set, the confirmation number is not set to 0 and no ACK tag, and anti-body port is set to 21. There are also two points to note: TCP windows size of the regular set to 1028, IP identification number is 39426 set all the packages. In general, we expected TCP windows size is greater than 1028, although this value is not very normal, but should also draw attention. Similarly, IP RFC defines IP identification number in a different package should have different values, so a fixed value is highly questionable.

Select a rule

As we have found five to be the rule of the elements, So we have the option to develop many different based on head Wenjian rules and a good rule should include more than one of Te Zheng. If you just want to set the most simple rules, you can use packet marking to set the SYN and FIN. While this is a kind of good identification methods of malignant behavior, but behavior can not be given why this would happen. Remember, SYN and FIN are usually used to bypass firewalls and other equipment, so they can play the role of the scanner, the implementation of information gathering or attacks. Therefore, a SYN and FIN only rule for our purposes is too simple.

However, if a rule includes all of the above five suspicious features, although they could provide more detailed information, but compared with the detection of a property rule only, the utility or much worse. Rules of relevance and accuracy of development are always trade-off between the two. In many cases, the relatively simple rules is easier than the complex identification of positive error, because the relatively simple rules in general for the overall concept. And complex than the simple rule of rules is easier to recognize passive error because the characteristics of some tools and algorithms will change over time.

We assume that a rule intended to determine what kind of tool used. In addition to other markers SYN and FIN, what attributes are most appropriate? Let us look at the anti-body port is very suspicious, but many tools have this feature even with some lawful existence of such communications will feature, it can not provide enough detailed information to Zhidingguize. ACK ACK value is set but no tags, it is clearly illegal, it can and SYN, FIN together to make rules. Windows-1028 size, a little suspicious but can also be considered within the normal range. The IP identification number 39426 then? We can combine the above properties, the development of several different rules. But still can not determine which is the best, because the best rules should change with time and environment at any time adjustments.

Summary

In the next period, we will use to determine which properties SYNSCAN rules, and rules for more SYNSCAN assess the effectiveness of communication. We will further study the general rules relative to the merits of specific rules. We will also continue to focus on discussion of IP protocol header file attributes in the rule development role.







Recommended links:



Report Dictionaries Education



How to properly charge the battery for notebook



OGM converter



MPEG to MOV



MP4 to FLV



e-cology in the Pan Micro Series 29



No trace of her it just so to find the original 1000 Baidu



Screen Savers REPORT



Adobe "culmination of the track" Result of Contest winners



"Heroes of the RESISTANCE front" Medal and process Raiders



Ping Command Usage



To clarify the status table and table space



Astronomy CATALOGS



Capital gray screen under the Waterfront



Monday, September 27, 2010

Xi'an: A6 experiential training shock city


In August of the ancient city of Xi'an, s hot. August 11, 2006, UFIDA training center a warm atmosphere, the ongoing collaborative management software A6 UF Zhiyuan experiential training activities no less fiery atmosphere of the sun in summer. The inquiry by the Shaanxi Yi Electronic Technology Limited Company, UF Zhi Yuan Software Technology Company Limited, experiential training, experience this new model is the first attempt in Shaanxi. From the province from more than 20 large and medium sized enterprises on the afternoon of the departments are divided into two attended the event.

The start of training activities, first by the Northwest Regional Manager UF Zhiyuan Cheng Hsiao-tung a report entitled "collaborative management, full information of the first step" on the topic. In throwing the current common enterprise problems of poor execution, in layman's language for the on-site guests, introduced the concept of collaborative management and collaborative management to bring business value, so that guests have a profound idea of the collaborative understanding. "Synergy" is not only effective Jiejuezuzhi information communication, Zhi Xing process Nanyikongzhi, the issue of information dispersed Deng, also Bangzhu enterprises Danwei well Wenhuajianshe, establish Zhishigongxiang Ku, a Kuaisuxiangying changes within the Wai Jie and Xu Qiu's agile organization .




Personal experience to make the guests to bring A6 collaboration to the enterprise management of the Smart and convenient, designed to link the guest experience the scene. Simulate a hot spot device manufacturers, guests assigned to each company in different roles, each role is done in an enthusiastic self-introduction, the simulation team building and start working! Distributed tasks book, guests books, step by step in accordance with the tasks dedicated to start operation in the field under the guidance of the staff, all the players are less than an hour to complete the work.

Then to share the experience of the discussion is a lively atmosphere, lots of reaction to experience profound. After several exchanges of users have expressed the hope on the A6 to do more in-depth understanding of the system, showing a great interest. Successfully held the training is a UF system in Shaanxi Province A6 Zhiyuan a new appearance and good marketing, demonstrating UF Zhiyuan company focused on creating collaborative application management software in China the first brand new results. We firmly believe that first-class products and professional services is to promote SMEs in the localization of information technology the best way to take off. Easy telecommunications company will continue to strengthen cooperation with the UF Zhiyuan company, for the ancient city of Xi'an in the SMEs to enhance the competitiveness of executive power and contributions.

Experience comments:

Information center in an industrial enterprise director, said they have investigated many of OA products companies, today's experience helped him deeply felt Zhiyuan A6 product easy to use easy to use, without any training can easily complete the work, and that the system difficult to implement small, low maintenance cost, which is in any other OA products can not be compared.

Chief Executive Officer of a business enterprise, said she had no contact with similar products, today's experience so that she was deeply shocked, information management business has been able to bring such a qualitative leap. A6 system interface is clear and powerful, as long as the open system will clear all of the work to improve the efficiency of enterprises and the process can be traced to achieve a transparent management is essential to improve the management level management system.

Related links: http://www.seeyon.com/news/html/2006815164622-1.html






Recommended links:



CONVERT for



Thunder look at real-time on-demand player in the player to build pan-



Easy Kids Education



jsp, servlet talk about Chinese issues



Data Domain is bidding to users in China which Enlightenment?



Samsung's NAND Flash Memory Capacity Greatly Increased



ASF To MPEG



Evaluation Desktop



3 Accounting in a drama, colorful festival Foshan accounting



MKV TO DivX



COMPARE FTP Clients



reviews Firewall And Proxy Servers



vb6 how to dynamically add CONTROLS



M2TS to MOV



2009 China will reach 911 million yuan telephone payments



Thursday, September 16, 2010

Is out of date, ADSL Anecdotes


ADSL (Asymmetric Digital Subscriber Line) stands for asymmetric digital subscriber line, is called a non-symmetric, is due to the realization rate is up less than 1Mbps, down less than 7Mbps. It is a home or small business can make use of the existing telephone network with high-frequency digital compression for network service providers ISP for broadband access technology. This access method so it is a non-symmetrical manner, from ISP-ended client (downlink) requires large bandwidth to support, but from the client to the ISP side (upstream) bandwidth of only a small amount can be.

ADSL principle introduced

ADSL modem and ISDN and traditional as well as the transmission medium using the telephone network. When the two ends of a pair of telephone lines were in place an ADSL device, the use of modern frequency modulation and coding, this phone line will be able to create three information channels: a high-speed downlink channel (1.5 1.8Mbps), one is the speed duplex channel, one is the ordinary telephone channel, and these three channels can work simultaneously. That is, it can get the most out of existing telephone line data transmission capacity, so users can access a telephone line not only fast-track "Surf", you can call to send a fax, call or reduced without affecting the effect of Internet . Specific work flow is: ADSL Modem encoded by the signal transmitted through the telephone line telephone office and then by a signal recognition / separator, if it is transmitted voice signal on the telephone switch, if the digital signal to access Internet.

See Figure 1, ADSL service is composed mainly of the following:



Figure 1 ADSL diagram

* ATM Backbone (ATM backbone): is the ISP to provide broadband services to the core backbone network, is the intersection of all data. Not only provides high bandwidth, and because ATM has its own advantages, making use of the channel and data exchange more efficient.

* DSLAM (DSL ATM multiplexer): This is the central office equipment to provide ADSL services. Central Office on a similar program-controlled switches.

* Telephone lines to provide services: the current ADSL services provided through the normal analog telephone line that carries voice and data services. People were asked whether the ISDN line will be converted into ADSL line, in fact, provide ISDN is a digital transmission, and ADSL must rely on analog circuit implementation.

* Voice, data separation / integrator: This is an important part of the output in the central office DSLAM ADSL central office line and voice line when the device is integrated through a transmission line. To the client and then separated by a similar device to form a data line, a voice line.

* ADSL CPE equipment (ADSL customer premises equipment): This is a user-purchase or lease of equipment to the central office. Usually ADSL Modem or ADSL Router.

Some of the problems on the ADSL

* ADSL in the end be able to provide much speed? See from Figure 2, ADSL lines using a frequency higher than the Mandarin audio line (4400kHz), up to 1MHz. Therefore, to provide 8Mbps maximum bandwidth.



Figure 2 ADSL lines over the frequency of use of 4400Hz

* ADSL there are no weaknesses? It is susceptible to interference, high requirements for the line, with the cable length increases the quality of subsequent deterioration of data transmission.

* ADSL is not an outdated technology?

In fact, the application of each technique has its surface, just as Bluetooth technology is the same as 10 meters for communication, and wireless local area network suitable for a wider range communication. I believe that, ADSL as an ordinary telephone line can transfer the technology itself has very good flexibility, that is, each ADSL phone users are directly applicable. Also for home users and small and medium enterprises do not need a guarantee by buying bandwidth of 10M FTTB access the Internet, as 10M itself is virtual, if it is the commitment rate, then ISP, ISP to guarantee the export of the Internet bandwidth, this cost is not generally Users can affordable.






Recommended links:



Thief 3 of original experiences



Mts To Vob Converter



Zhou Chengyu Court hematemesis: die IN the end to fight a lawsuit



Record 2 Room To Visit A New Generation Of IDC



IDS rules to establish (2)



Using a password reset DISK recover lost XP passwords



Ts format



Create visual IMPACT



The basic principles of SSL



Puzzle And Word Games Infomation



Delphi Shop



VBScript DateDiff Function



psp video converter MP4



News about Converters And Optimizers



Simple Education



J2ME learning REVIEWING the Old Posts



m4a Converter



Thursday, July 22, 2010

Agriculture: the first km and the last mile


Whenever the local Fair Day (the North called the "country fair"), Fujian Sanming City Farmers to 155 service stations will be consulting. If (right) shows

From 1994 the "Golden Agriculture Project" proposed to the current 11 years, agricultural information for farmers in the production and what have brought much change? For farmers, the information actually mean?

When the information is profoundly changing the business management and government services when the sense of "information" for those facing LOESS back overturned farmers, perhaps only "computer" and "network" synonymous. From 1994 the "Golden Agriculture Project" proposed up to now, 11 years, agricultural information for farmers in the production and what have brought much change? The following set of figures for some of us the number of heavy: At present, most of central and western regions vast majority of county and township agricultural sector, the country has not been configured computer. Although many of the agricultural sector to establish a local area network, but there are many areas of obsolete equipment and software deficiencies. China's urban telephone penetration rate of 39 to every hundred person, just six rural penetration of Internet users in animal husbandry and fisheries account for only 1.9%. "Ninth Five-Year" period, provincial, prefectural, and county agricultural sector, construction of information system for a total investment of less than 500 million yuan, equivalent to only 5 km of new highway investment.

Compared to other sectors of information technology, agricultural information is a much larger and complex system, weak information base, information awareness and backward information-investment decisions of agricultural information of "inherent." This year's central "One document" clearly calls for "strengthening the construction of agricultural information", and through information technology to improve agricultural productivity and rural information technology requests, it has been central in the reform and opening up before work on the three rural 6 "Document" is never mentioned before.

Currently, the most troubled of agricultural information is the information chain, "2": how to integrate the various departments of agricultural information resources, a unified platform for agricultural information services, access to agricultural information "first mile"; how agricultural information every family, open up agricultural information "last mile." As Minister of Agriculture Du Qinglin said: "actively promote the building of agricultural information work, should always adhere to the government at all levels and relevant departments for the macro-oriented agricultural production and management services and micro services as those who promote the agricultural information the starting point and end point. "

Access to the "first mile"

Sanming City, Fujian Province, "96155" (agriculture to services, homophonic) hotline has been known for local farmers. But, who knows the "155" behind a huge collection of agricultural, animal husbandry and forestry resources, agricultural resources and a platform of services by the team of experts from various quarters.

"To achieve one-stop service, you have to have a strong contingent of information resources and services." Sanming City, said Agriculture Secretary Lin Shaoqin. Changes in the agricultural sector, agricultural services 155 "Agriculture" of the traditional model, integrating all the resources of agriculture sector through the computer network, telephone, video systems and other modern means of free and convenient for farmers to provide efficient, full service.

Who can understand the difficult integration of resources behind it? Six years, Lin Shaoqin running all over the county in Sanming City and the following to all agriculture-related departments. In order for these departments to create a site set aside some funds in order to achieve integration of network resources, Lin Shaoqin worn lip service, at times, "why withstood the pressure, their own money." Now, "155 model" to mature in the model to other counties, townships to promote the process, Lin Shaoqin biggest problem remains the integration of various related departments of agricultural resources.

At present, there are still nearly a quarter of the county did not establish agricultural information service platform, more than half of the township failed to establish rural information service stations, to a certain extent, there is duplication of information resources issues. Ministry of Agriculture Fan Xiaojian, vice minister of China's agricultural resources development will be described as a horizontal "information island" and vertical "sites identical." Horizontal "information island" performance in the agriculture sector is not smooth communication and information exchange system is imperfect, can not be achieved agriculture-related information sharing. Agricultural sector and agriculture sector have their own information resources, but have not established an effective co-ordination mechanisms. Vertical "sites similar" performance in the central and local agricultural information website content duplicate, not around the features, even the implementation of certain information in a unified data standard. Agriculture-related sites around the country of 1.8 million homes, but these sites are of variable quality.

In order to integrate agricultural information resources, in 2002 started the wheat, corn and other agricultural monitoring and forecasting work, started in agriculture, animal husbandry, Shui Chan, land reclamation, agricultural and other fields, Xin Xi acquisition channels and established information-sharing mechanisms, potential domestic and international market supply and demand Zong predicted and analyzed. In 2003, started the society launched the "Economic Information Department of Agriculture released the calendar," all walks of life regularly publish information. In order to completely break the "information island" and "similar sites", in 2004, the Ministry of Agriculture decided that the next few years will establish a nationwide monitoring and warning system of agriculture, agricultural products and promote service systems, agricultural price information system, agricultural science and technology joint services systems and agricultural market information system monitoring. Through these five information service system construction, development and integration of domestic and international resources, to build a extends to the county's rural information service network in 31 provinces, Xinjiang Production and Construction Jianlinongye data center, more than 90% of the county establish agricultural information platform, 70% of the township to establish rural information service stations.

In 2005, the agricultural information resources integration is still one of the highlights of agricultural information. At present, there are nine provinces and autonomous regions Agricultural Information Centre by E-mail a daily or occasional Agricultural Information Network to send information, agricultural information network in China will receive part of the provinces and municipalities of E-mail messages and from the provinces, autonomous regions extract information on the city Web site, loaded into the editing made in the Rural Information System (WCM) platform, database editing made available for use in the release. In the next few years, their own way how to resolve the division's Web site, open up agricultural information resources horizontal vertical agricultural information work is still important and difficult.

Open up the "last mile"

Compared to access the "first mile", in recent years opened up "last mile" to achieve the pattern of agricultural information to explore the real ground can be described as flourishing, Fujian "155 model", Gansu Province, "urn model" Hebei "Three of a room "Mode ... ... around the administrative system for the existing agricultural, or reform, or subversion, the emergence of a time-tested model, in these models, the agricultural information to start a little penetration to the fields.

"Last mile" of information technology in agriculture last link is the most difficult part. The existing administrative system of agriculture, the rural villages are often located in agricultural technology station, with an agricultural technician, farmers have difficulties to find the ATM station. Changes in the system, the agricultural administrative system also suffered a "labor pains", the ATM stations unable to pay wages, most of all agricultural technician to make a living overseas, many agricultural technology station idle. Information chain through the cities, towns, villages, farmers in the last link in the stuck shell.

In addressing the "last mile" attempt, "Three-One Office" (TV, computer, telephone, room service agricultural science and technology) are combined is the most common practice. Gaocheng City in Hebei Province through the establishment of "vitalizing Agriculture Information Network", the establishment of a fixed feature of agricultural television program "Gaocheng agriculture", opened 96 356 information hotline to provide agricultural information services to local farmers, but also to agriculture and information technology services to the Office for the service window To take the initiative to seek them out to provide services to farmers. This "Three-One Office" mode has also been used in many places, but the big cost in this way, if you do not do a good job overall planning, the information is likely to become repeat.

In addition to "Three of a room", Gansu and Fujian are opened up "last mile" on a pioneering attempt to practice. They broke the existing agricultural system, for the landing of agricultural information has provided valuable experience.

In 2000, Chen Juntao sent from the provincial government under the testing exercise of Jinta County deputy county magistrate, he found Jinta County in the agricultural information that there is a fault: on the one hand, the majority of the county's economic management with a computer network equipment, has an abundance of agricultural information; the other hand, very few farmers home computer, "Some villages have only one computer in the village, the village head is not to everyone with a locked door." "'last km 'lack of social and rural isolation of the network connection, the grassroots and often inaccessible to agricultural information services. "Chen Juntao said.

In 2001, Chen Juntao's initiative, Jinta County school opened up to create a "last mile" of the "urn model": Jinta County Information Network Center established at the county level, using the network, in the "urn economy Information Network "information platform to set the" Economic Information Guide "section, two per month, from the county's various departments and other web sites to collect all kinds of agricultural and market information, and then the village primary school in the county set up information point, from the village primary school students under the guidance of the teacher to download print Information Review, and after school to bring parents and neighbors. Feedback from farmers is also from the students return to school after the school collected in the form of e-mail back to the county information center.

"Urn model" in the landing pattern of agricultural information in a completely abandon the current administrative system of agriculture, the rural village primary school of information technology into the system, made a bold attempt. However, the school's mission is to teach knowledge, is not responsible for the dissemination of agricultural information on how to establish an effective evaluation mechanism? County Information Centre has the power to require schools to transmit information to download the Parents Guide and the collection of feedback information as a teacher's assessment project? The needs of farmers layers of information to reach the county by the school information center, and then layers of feedback from the schools down, in such a process, who is on the effectiveness and timeliness of the information is responsible?

Gansu Jinta chose to overturn the traditional mode of information released, and Lin Shaoqin was chosen to "improve" the realization of the agricultural information arrival. Sanming Meliet foreign X墨 is a mountain town area, more than 20 kilometers from the city of Sanming. Yang X墨 155 service stations to ATM Agricultural Station, fruit stand, livestock stations, epidemic prevention station, administered by the stations together, administered by the Station Officer Gong Xuejiao service station, as the 155. Whenever the local Fair Day (the North called the "country fair"), there have been farmers where to buy seeds come in consultation, where to buy fertilizer. Simple question, Gong Xuejiao can answer in person; if run into complex problems, or on the Internet searching for answers to the "155" service team expert for help.

Information to the ATM station is "155" model developed to explore this year's new. Previously, "155" model is to rely on farmers to call the hotline telephone, through the active assistance of farmers, and then mobilize the "155" behind the agricultural service resources. Changes in agricultural technology station functions, development of "agricultural economy" and would "155" approach to further solidify down. However, "155" is still a passive mode, "can not always sit at home and other farmers to seek them out, how to take the initiative in agricultural information sent to the peasants at home?" How active and passive integrating the Lin Shaoqin next year We should continue to think about.






相关链接:



Games And Entertainment Specialist



convert flv to avi



converter mp4 to 3gp free download



MSA 1500 How to link up with the EVA 4000?



what is rmvb



Brief Browsers



"Abnormal" Jason Jiang: Year One Is Moral Derailment



JSP page translation of the Principle of



ASP.net (C #) bulk upload



Mov to avi converter



Youtube Video to PS2 Utility



A-one Video to AVI Converter



Comment Converters And Optimizers



Specialist Access Control



WAVE BLACKBERRY Studio



Friday, July 2, 2010

Youtube Movie to PPC Shareware

It's most popular and very easy to use YouTube tools. helps you Fast download, convert, play, manage your favorite YouTube videos. If you're a YouTube fan, you'll love YouTube tool! is the most powerful YouTube assistant on the planet. YouTube tool easily: 1. Fast downloads YouTube videos, 2. Supports unlimited simultaneous downloads (a real time saver!), 3. Automatically names the downloaded video the same as the YouTube title, 4. Converts YouTube videos to various video formats, including Video, DVD, VCD, AVI, MPG, MPEG, Divx, Xvid, WMV, RM, RMVB, MOV, MP4, 3GP, SWF, DAT, H264, VOB, Flash, PDA, M4V, 3G2, AMV, CDA, DV,QuickTime, ASX, TV, VHS, FLV, H264, BDMV, MAC, Apple TV, Zune, iPod, PDA, PSP, PS2, PS3, Xbox, Xbox 360, Mobile Phone, Cell Phone, Blackberry, Wii, Laptops, Printers, Palm OS, Pocket PC, PPC, Treo, Psion, EPOC, iphone.
Easily Convert all popular video formats. Provides the highest speed to download YouTube video. Support unlimited simultaneous downloading tasks. Supports auto-name your downloaded video title as the YoutTube page shows. Offers you the most convenient task management and the easiest control capability. About Conversion Features. - is the most powerful YouTube assistant on the planet.