Masonic Symbolism Book – Grip Of The Lion’s Paw

“Judah is a lion’s whelp: from the prey, my son, thou art gone up: he stooped down, he crouched as a lion, and as an old lion; who shall rouse him up?”

Gen. 49:9

In the tribal benediction pronounced upon Judah and the tribe of which he was the founder, the term lion’s whelp symbolized strength. Therefore, the emblem on the banner of the Tribe of Judah was a lion. The same symbolism is found in Masonic ritual and has enjoyed several philosophical and theological interpretations.

To our Christian brethren, the phrase “Lion of the Tribe of Judah” refers to the Messiah, who is said to have brought light and immortality into the world. To our Jewish brethren, Judah was the fourth son of the patriarch Jacob and represents the fourth point discussed in ancient Freemasonry. Both Kings David and Solomon are also said to have descended from the Tribe of Judah. However, there is a more ancient usage of the lion’s paw that may have application to the Masonic mysteries.

Candidates who successfully passed the Mithraic initiations were called Lions and were marked upon their foreheads with the Egyptian cross, or ankh. Throughout the entire Mithraic ritual references were made of Mithra as the Sun God, who came to earth to offer himself as a sacrifice for man and by his death giving men life eternal. After initiation, the candidate was hailed as one who had risen from the grave and was permitted to learn the secret Persian mysteries … Read more

The Main Functions of Computer Memory

The major and the basic function of computer memory is to store all the data on the computer. Depending on the type of data, apart from storing data, it performs some other functions as well. All its functions are related to storage only due to its primary role of storing, like RAM, ROM, data storage, hard drives and flash memory. Each of them performs its required function to keep the computer working.

The functions are as below.

— RAM

Random access memory (RAM) provides the space for all the temporary application data storage. Whenever a computer needs some data, instead of going back and finding information on the hard drive, it gets it all in the RAM as it stores all the frequently used applications. This becomes easy for the system to find the required information.

When we shut down the computer, the system erases or transfers all the data of the RAM to the hard drive while making a room for the new data to get stored when the computer begins its operations again.

— Hard Drive

A hard drive is the core of a computer’s data storage. It supplies storage for system and user files that include everything from your operating system to images and documents. In technical terms, a hard drive is a rotating disk that is treated with a magnetic coating, similar to the magnetic ribbons, which are used to store data on cassettes. There is one moving arm that reads and copies all the data … Read more

On the Origin and Evolution of Computer Viruses

Trends and industry analysts state that the efforts of the propagators will not relent. Last year marked the first ever mobile phone virus and Bluetooth technology, for example, compounds the threats to security. 35% of PCs in the US are infected while in China and India the rates hit 50%.

Experts in the field of security report the first virus was spread as early as 1981. Fred Cohen, however, wrote in his seminal paper that the first virus was conceived as an experiment on November 3rd, 1983. Since then viruses and malware have plagued and wreaked havoc among computer systems worldwide.

Risks through the Internet

With the advent of such communications advances like the Internet, mobile telephony and Bluetooth (a short range radio technology that simplifies wireless communication among devices such as computers and mobiles. It also aims at quickly and easily connect these devices to the Internet) computer viruses have spread at an alarming rate. The downside to such advances is that where before only a few computers would get infected, now thousands, if not millions, are at the mercy of virus authors.

Early Threats Disable 10% of Computers Infected

In 1987 a large network (ARPANET) used by universities and the US government was infected by a virus. Robert Morris, son of a computer security expert for the National Security Agency, sent malicious code through ARPANET, affecting about 10% of the connected computer hosts – at the time there were only 60,000 hosts connected to the network. The code … Read more

Beginner’s Guide to Buying a Desktop Computer

People certainly aren’t camping outside stores in the rain to get the latest and greatest desktop computer these days, but PCs are far from dead. Simply put, there are certain functions that mobile devices and laptops either can’t do or can’t do nearly as well as a desktop.

Not to mention, there’s no beating the price. A budget desktop is going to be miles ahead of a budget laptop. It’s expensive to make things small. The small size is what appeals to some people when choosing a new computer, but these days big honking towers aren’t your only choice.

Styles of desktop computers

There’s a lot more variation and choice in the desktop form factor, which is great in some ways, but also makes the buying process that much more complicated. You can find computers in each of these categories at a variety of price points, so the most important thing to keep in mind is how you plan to use your desktop.

Tower

The classic desktop form factor, towers have stuck around for good reason. It’s hard to fit a lot of power into smaller devices like a laptop or tablet for a reasonable price. The power to price ratio of tower computers is pretty much unbeatable.

There’s also a lot more flexibility with a tower. There’s more room to upgrade and expand the system when newer technology comes out, whereas with smaller devices you may just have to buy a whole new system.

Towers do, however, take up … Read more

Save Money by Investing in Industrial Computer Enclosures That Increase the Lifespan of Computers

In this time of global economic crisis, there is an even more immediate need to spend money wisely. This is a huge challenge not only to households, but more importantly to companies who are definitely experiencing the crunch and the pressure. While companies need to cut down costs and make wiser decisions, they cannot compromise the need to invest in computers to make their businesses run efficiently. In this information age, companies need computers for daily operations; hence they invest their dollars in getting the best units and latest software. By doing so, they remain at the top of their game despite these trying times.

Industrial companies need not just any old computer; these companies need computers that are able to withstand unfavorable conditions. In settings like warehouses, factories, or laboratories where exposure to water, chemicals, and extreme heat or extreme cold is inevitable, computers need to toughen up their hides in order to remain functional. There are some companies that avoid this problem by investing in industrial computers.

While industrial computers no doubt get the job done, these units are quite costly. These are hardly a wise choice during an economic crunch. Not only are the units expensive, but also are expensive to maintain. When a unit fails, a specialized service is needed to get them working again. Moreover, the people will have to spend extra time learning how to operate the industrial computers, since their commands are different from regular computers.

On the other hand, companies who want … Read more

Computer and Intellectual Property

Computer technology plays an increasingly important part in modern society. Computers – electronic machines with an ability to store up and/or process data – are called hardware. The expansion of hardware is astonishing: computers are more potent and computer technology enters more areas of life, not only in technological environments as well as, but also in more ordinary surroundings such as domestic appliances, cars, watches and similar products.

A computer cannot function without instructions. These instructions may be embedded into the hardware, for example in ROMs, but most frequently they are created, reproduced as well as distributed in media which are separate from the computer hardware. Computer programs for personal computers are distributed on diskettes or CD-ROMs. Computer programs are created in a programming language which can be understood by people trained in that language. That form of appearance of the program, which can be on the computer screen or printed out on paper, is usually referred to as the source code. Another form of appearance is called object code, where the program is transferred into the digital values 0 and 1. In this form the program is incomprehensible for persons, but it is machine readable, for example from a diskette and in that form it can be used really to organize the operations of the computer.

Typically the computer hardware as well as the program needs to be supplemented by manuals and other support material, prepared by the producer of the program, which give the essential instructions and reference … Read more