ShapeDesigner SaaS is an advanced general beam section calculator. ShapeDesigner calculates thecross-sectional torsion and flexural structuralproperties, includingtorsion constant (J),warping constant (Cw), normal, warping and shear stresses. These properties are absolutelynecessary for the design in static, free vibrations, dynamic and buckling analysis. ShapeDesigneris a useful tool for structural engineers, for the design or analysis of steel, aluminum, and polymericor composite materials sections. ShapeDesigner calculates the stress distribution includingnormal, warping and shear stresses, the equivalent Von-Mise, principal and residual stresses.
You may view theShapeDesigner SaaS User Guide (HTML document)or download theShapeDesigner SaaS User Guide (7.1MB PDF document).The user guide contains step by step examples, theoretical foundations and numerous references.
Constant CW Free Download
I myself have used this software (and its earlier versions) for teaching to read Morse code with much success since 1993.
If you are running a Morse code class, you can at any time use PCW Tutor as a Morse keyer, just like you would use a straight or semiautomatic key. The main feature though is that randomly generated Morse characters, or randomly created words from a loaded list, or randomly created Q-codes can be produced. Version 6.8 now adds radomly generated strings of words or "Phrases", and these phrases are loaded from a file you can define all by yourself. All this is equally helpful in a Morse code class or for training all by yourself.
Morse speed can be easily changed on the fly or automatically increased within a session. And of course, the Farnsworth training method is supported, which uses a constant fixed speed for the single characters and longer pauses in between to have some "thinking time".
Constant control words are simply words that control at the end of the decoding process in place to change several times a minute and remains constant, but this is only temporary until an error caused this to happen is fixed, so that it can be constantly hours, days and sometimes longer.
Internet security is a constant worry. Many times I have written on thissubject, yet I have little doubt that I will be writing many times more, Godwilling. Of course, this has to be studied within the context of theinstallation; a large corporate network will be protected differently from astand-alone home computer, but both do require protection to prevent problems.
So how does a firewall work? With the TCP/IP protocol used for Internetworking, each computer in an internal or external network has an address in theform of an IP number, to which can be added thousands of open ports. The objectis to close off all the ports that are not actually required, so that theycannot be used, in either direction. The internal IP address for one's owncomputer is generally 127.0.0.1, by convention, and the port is mostly used forsending an e-mail, for example, is usually 110. The address to access a networkfor an outgoing message is therefore normally 127.0.0.1:110
. This address iskept open by the firewall for the outgoing data only but is closed for theincoming data. For large and medium corporate networks, a dedicated hardwarefirewall is usually required. This is often an expensive piece of equipment andmay be combined with a gateway, commonly a dedicated computer for routingmessages to different internal and external networks or intranets. To use suchan expensive item for the small business or home, the user is obviously out ofthe question and there are various software solutions that do the same thingdirectly on the computer used for Internet access. These may cost anything up toa few hundred dollars, depending on the functionality. There are some excellentfree ones, such as the simplest form of ZoneAlarm, which can easily bedownloaded from the Internet.
How safe is one equipped against spyware? Just as much as with politicalspying, it is possible to be paranoid, but this may be something to worry aboutin the not-too-distant future. In fact, spyware is not just one type of securitybreach; there are several. The commonest is the cookie. The original idea of thecookie is to store information on a user's hard disk about one's access to a Website. For example, one legitimate use would be to store registration informationabout a forum access, so that there is no need to enter the user ID and passwordeach time. Theoretically, only the Web site accessed should be able to read theinformation on a cookie, but this is not an inviolable rule and this is wherethe weakness lies. If a cookie has recorded, for example, your credit cardnumber, even in encrypted form, then there is a potentially dangerous weakness.Web browsers can be set to stop all cookies, which may be a wise decision,although an operational pain or to ask permission before recording one. Myadvice is to use the latter and allow cookies only from reliably known sitesthat you are likely to visit regularly. If you cannot gain access to a site thatyou absolutely must visit, without recording one, then do so but remove it againmanually from your hard disk, immediately afterwards, if you are worried.Browsers have this possibility. However, it does not stop at cookies. Anygraphics you download and especially if you click on banner advertisements(hence the synonym "adware"), may be used to hide a small executable that can bedownloaded on your computer. This can be used to send information on thecontents of your hard disks and how you browse to the perpetrator or even toinstall a spyware programme, totally transparently. Unless, you have a spywaredetector and remover, anyone who browses the Internet indiscriminately may wellhave several such files hidden within his operating system. Of course, it isunlikely that spyware would be installed from a reliable, known site, but bewareof advertisements anywhere. However, "unlikely" is not a synonym of"impossible", especially if the site was conceived by an unscrupulous thirdparty. Free software is also often "spywared", so be careful what you downloadfor free. Some companies openly offer "spywared" and "unspywared" versions, witha difference of price. With a good firewall, you should theoretically fearnothing as the port for outgoing information should be closed, but it ispossible to use shared open ports, so it is not absolutely safe. Even if youdelete the application, the spyware system remains active on your system.Spyware should not be confused with its cousin, the Trojan Horse, which shouldbe detectable as a virus.
Now, how can you cure this problem? There are some free or paying softwareswhich claim to be able to detect and remove spyware applications on yourcomputer. However, they do not come without a price. If you remove spyware thatcame with a freebie software, the software may no longer work or it may evenblock your Internet access altogether. There have been reports that they maystop the operating system itself from working. Dire as all this sounds, theproblem has not yet reached endemic proportions. I have recently tested myInternet computer and found 44 instances of potential spyware. Of these, 42 wereinstalled from a CD-ROM of an OEM version of a well-known software, suppliedlegally with my computer. The testing software reported zero use of it, and Iassume that it was to monitor potential abuse of OEM software. One was a "real"cookie spyware that "arrived" a couple of years ago and had reported back fourtimes, before I installed a firewall. The last one was initiated with an updateof a browser video plug-in and monitored when it was used (which was rare),again before the firewall blocked it (I had allowed the firewall to communicateduring the installation of the plug-in, but subsequently blocked it again).
For our first visit, let us go to the ubiquitous IPC site. A little browsingtakes us into the list server archives and, sure enough, there is an HDI forum.This was apparently started in June 2001. In 2 years, we can expect a livelydiscussion on this topical and technically challenging issue, don't you think?To my total surprise, one question has been asked, with half an answer,twice-offered (does this make a full answer?). Does this apparent lack ofinterest mean that HDIS technology is a solution waiting for a problem or is thetechnology so simple that questions need not to be asked? From my experience,neither, especially as some of the other forums receive some stupid questions onmature techniques, so why wouldn't this one? Let us dig deeper, now. I did asite search using "microvia" as a key word; ah, that is better, 72 responses butno 5 star ones. The single 4 star reply is entitled HDI and MicroviaTechnology, right up our alley. This page gives a four-paragraph summary ofwhat it means, with no great technical detail. More important, it gives links to26 technical papers presented at IPC conferences over the last years, publishedin PDF format. At last, some good information. I must say, though, that I thinkit is a pity that the file size is not shown beside each link, as some of themare quite big, involving several minutes download on a DUN connection. Anyway,this is a good source to find some useful information.