Monday, May 28, 2007

Does Spelling Really Matter?

 
May 28, 2007  
TechNewsletters Alert
   
  Your Update from the Directory for IT Newsletters
132,451 Subscribers  
 

Does Spelling Really Matter?

A Cambridge University study concluded that it doesn't matter what order the letters in a word are arranged. The important thing is that the first and last letter are in the right place. The rest doesn't matter. This is because the human mind does not read every letter by itself, but the word as a whole.

Wonder if that's how the word spell-checker works. :)

For an example, read the text below....if you dare. Muhwaa ha ha ha.

Aoccrding to a reserach at Crmbaidge Univsreity, it dosen't mtater in waht oredr the letters in a wrod are. The olny ipmortant tihng is taht the frist and lsat lteter be in the rihgt palce.

The rset can be a tatol mses and you can sitll raed it wuthoit prlboem. Tihs is bscauee the huamn mnid deos not raed erevy letter by iteslf, but the wrod as a wohle.

This site allows you to enter your own text to scramble...and even provides the source for your own enjoyment.

Deb Alloway
Editor

Subscribe
Alert Archive
TechNewsletters
Advertise with us

IT Humor


IT Resources

LANsurveyor
makes it easy to map, manage, and report on your entire network.

Network File Sharing (NFS) Server DiskShare 6.0
allows Windows NT/2000/2003/XP-Pro workstations and servers to perform as NFS servers


Automatic Synchronizer

Heatsoft Automatic Synchronizer (HAS) is a folder mirroring and file synchronization utility that enables you to perform the automated or manual synchonizing of local and network files.

 


"Forefront Security for
Exchange Servers:
120-Day Trial Download
"

The Forefront Security for Exchange Server 120-day trial download includes support for multi-node active/passive Exchange clusters, plus support for 32-bit installations for evaluation with the Exchange 2007 32-bit trial download.

Register for Your Trial
Download here.

 


"Secure Network From
Internal Threats
"

This on-demand Webcast shares how to secure your network from internal threats. You will learn:

  • Common causes of internal network threats
  • Best Practices for Locating Rogue Wireless Access Points
  • Determining if unauthorized application traffic is present on the network
  • Securing SNMP
  • Detecting Restricted Document Transfers
Request Your On-Demand
Webcast here.
 

Major Publishers

Cert Mag CERTguide.com CertTimes.com CIO Magazine
Computerworld ePro Magazine IBM iEntry
Internet World InternetVIZ iSeries Network ISPworld.com
ITtoolbox ITworld SiteProNews SunBelt Software
Support Alert TechTarget ITproPortal VertMarkets IT
Windows ITpro Windows Guide WUGNET ZATZ Publishing
 

You subscribed to receive this newsletter as networking.world@gmail.com.
You were sent this offer because you previously registered at TechNewsletters.com. We take your privacy very seriously. If you no longer wish to receive this newsletter click here. Please be advised that this may restrict your ability to use the TechNewsletters.com website. If you have further questions or concerns, contact us.

No comments: