Clinic Management Software: Benefits of Clinic Software

Clinic management software is a web-based program which helps clinic owners manage their operations. It is already widely used in clinics in many regions of the world especially in the American continents, Europe, and Australia.

Here is a list of the many benefits of clinic management software.

1. It helps clinic owners simplify their business and helps them manage one clinic or a huge group of clinics.

2. It keeps and updates patients’ demographics like residence, gender, age, ethnicity, and diagnosis of patients.

3. It keeps and updates patients’ records like lungs chart, heart chart, kidney chart, weight and height charts, nutritional date, respiratory system chart and others.

4. It can print out prescriptions, patient records, billings, certificates, and others. It can also give information about patients’ prescription, medicine available, and the formulation of the medicine.

5. It completes receptions in an automated and systematized way.

6. It manages accounting needs and maintains the inventory.

7. It completes billing transactions.

8. It checks account balances.

5. It schedules multiple appointments.

6. It can send out multiple email reminders.

7. It allows patients to confirm appointment in real time with the use of a mobile phone or a computer.

8. It allows practitioners an easy and quick access to their schedule and patients’ record anytime.

9. It includes reporting tools which could quickly present, print out, or send out reports like patient visits, patients referred to other doctors, patients referred by other doctors, list of fee collection, and daily profit report.

10. It can multitask and designed for quick and easy usage which consequently lessens the stress of clinic owners and clinic employees.

11. It saves business owners a significant sum of money since clinic management software does not require expensive servers or IT support group.

12. It allows clinic owners maximize billable time and spend more time in taking care of their patients since almost all administrative procedures are supported by the software including the daily backing up of everyday reports.

13. It also allows clinic owners to spend more time in making their business grow.

14. Clinic management software general has security features like password facility to validate users, entry validation, data secrecy feature, and data access that is user defined.

Business establishments like clinics need to cope up with the fast advancement in technology nowadays. Otherwise, they will be left behind since most business enterprises are already using such software.

Posted in general | Comments Off on Clinic Management Software: Benefits of Clinic Software

How to Retrieve Deleted Text Messages & Not Go Crazy in the Process

It’s happened to all of us. We’ve deleted a text message only to realize a short while later that we either deleted the wrong message, or we need to retrieve information off one of the deleted text messages. We then frantically search out ways online how to retrieve deleted text messages hoping to find an easy solution. We pour through websites pulling our hair out because we can’t find an easy solution.

Ultimately we walk away dismayed because either we were not able to find any solutions on how to retrieve deleted text messages, or the solutions we found seemed to require so much “detective” work, that the solution itself should be on a an episode of CSI.

Are there really any “easy” ways to retrieve deleted messages?

The good news is that YES, there are a couple options that do exist which enable anyone to easily recover deleted texts, and both are not only very affordable, but both work exactly as advertised.

Before we dig into the solutions, there is one solution that is often discussed, which does not work, although many people do still talk about it.

What does NOT work?

Going to your own phone carrier is not going to be a viable option. Yes, they are required by law to keep records of your communication (SMS, call, etc.), but they are not required to turn over their logs to you, unless requested by a court of law. You cannot call up AT&T, Verizon or Sprint and tell them you want to retrieve a deleted text message from last week because there is something really important within the contents of the message. It just wont work.

The only information AT&T, Verizon, Sprint, or any other cell phone carrier is going to provide you is the number, date, and time of a call or message. You can plead all you want, but they will not be able to do anything, so it’s not worth your time to attempt this approach.

What DOES work?

There are actually two options available for anyone who is looking for information on how to retrieve deleted text messages. These options rank from the “quick and easy” to the more difficult, but also the most effective.

1) Quick & easy method.

The ‘quick & easy method’ is to buy a SIM card reader, often referred to as a SIM card spy device. This device looks like a USB reader, and the way it works is you remove the SIM card out of your phone, and then place the SIM card into the SIM card reader, and then plug the reader into your computer. Using the included software (of the SIM card reader), you’ll be able to immediately retrieve and read deleted text messages. The time frame will vary, based on what new information is overwritten on the SIM card, but you’ll at least be able to retrieve and read the last 15-20 messages and scan through your call history and contacts, even if they were all deleted.

Positives of this approach?

  • Very easy.
  • Enables you to quickly recover deleted messages.
  • Does not require software to be installed prior to the message being deleted.

Negatives of this approach?

  • A bit costly.
  • Limited cell phone support.
  • Does not work on CDMA networks.

2) More difficult, but most effective method.

The more difficult, but most effective method’ is to purchase a cell phone monitoring app that is often used to spy on cheating spouses, monitor teen cell phone use, track cell phone location, and locate missing or stolen cell phones. These apps (often called spy apps or spy phone software) are often used by people who want an easy and convenient way to back up and store all their own personal cell phone data. The reason why this method is fast becoming a popular way to back up their own personal cell phone data is because everything happens automatically. There is no “syncing” required, or any buttons or settings to worry about. Your cell phone data (text messages, call history, etc.) are automatically backed up every single day. This means if you ever delete a text message, and then need to quickly recover it, all you have to do is log onto your account and then in just a few clicks, you’ll have full contents of every message that was either sent or received from your phone. In addition, you’ll get access to all your call logs and contacts.

The reason why this is a more difficult method, is because it requires that you download the software from your cell phone’s web browser and install the application on your phone. Not everyone is comfortable downloading cell phone apps from the internet using their phone’s web browser. However, once you do complete the download, the actual installation is similar to installing an app on your computer. If you are willing to roll the dice and go with this method, you’ll be very happy with the results. It’s essentially a real time person back up solution that requires absolutely ZERO work on your part. Everything is done for you. The only drawback with this approach is that it does require you to install the software BEFORE you delete the text message that you want to retrieve. This means you need to be proactive and install the software ahead of time.

Positives of this approach?

  • Extremely effective.
  • Affordable.
  • Full contents of text messages are retrieved.
  • Large amount of cell phones are supported, including the popular models such as Android, BlackBerry, iPhone, Nokia, and more.

Negatives of this approach?

  • Can be difficult if not familiar with installing cell phone apps.
  • Software must be installed prior to message being deleted.
  • Requires a data connection such as 3G or Edge
  • May increase data fees if a large amount of text messages are sent on a daily basis.

There you go. Now you know how to retrieve deleted text messages using a couple different approaches. The next time someone asks you how to retrieve deleted text messages, you’ll know what options exist, and which one is the best for that particular situation.

Good luck!

Posted in general | Comments Off on How to Retrieve Deleted Text Messages & Not Go Crazy in the Process

Advantages and Disadvantages of Professional Shopping Cart Software

Advantages & Disadvantages of professional shopping cart software As e-Commerce is becoming a regular technique in the business industry it appears that more and more software development firms are developing professional shopping cart software to be released in the market. There is currently a huge range of free shopping cart software that has been released, and it seems that most e-Commerce website owners prefer these free systems over paid for professional shopping cart software. In this article we are going to look at the advantages and disadvantages of professional shopping cart software.

Advantages

• Even though you will have to pay for the solution, you get a cart package that has been fully developed, tested and used in the real working world by other e-Commerce websites. If the solution is used by a popular website service then the chances are it has been under more than enough testing to be deemed ready for use.

• Professional shopping cart software will be supported by the people who developed it. A lot of free solutions out there are simply developed and then discontinued as the freelance developers move onto their next project. Support is essential if you are going to want upgrades as mentioned in our next point.

• As the system is supported, the development team are likely to fix any bugs that may occur and provide patches and security fixes. This means the shopping cart software will only get better as time goes on and furthermore improve your e-Commerce website.

• Your site is likely to be more secure when using a professional software solution as in most cases the it developed house private content management systems. This improves security as public content management systems such as WordPress are constantly under threat from hackers as they try to compromise the free source code.

• Another huge advantage of using professionally developed software in e-Commerce is that they will already support a huge range of different payment options for your customers. There are various carts – that only offer PayPal for payment by standard, and it can take a very long time to find plug-ins or figure out how to add other methods yourself. With professional software you can save time and possibly money as it is all included.

Disadvantages

• Your e-Commerce venture might be a small time project and professional cart does cost money which you may not have. In this case you may have to make do with a free shopping cart solution. The good part of conducting business online is that after you have made profit with the free system you can reinvest your money to buy a professional package.

• You trust the developers to do everything they promise to ensure the best experience. It might be slightly difficult to use at first and you might have to spend some time getting used to the bespoke system. You also have to understand that you are vulnerable until patches are made if a security flaw is found.

Posted in general | Comments Off on Advantages and Disadvantages of Professional Shopping Cart Software

History and Components of a Modern Mainframe Computer

Mainframe computers are critical for some of the largest corporations in the world. Each mainframe has more than one modern processor, RAM ranging from a few megabytes to multiple-score gigabytes, and disk space and other storage beyond anything on a microcomputer. A mainframe can control multiple tasks and serve thousands of users every second without downtime.

The chief difference between mainframes and other computing systems is the level of processing that takes place. Mainframes are also different in terms of data bandwidth, organization, reliability, and control. Big organizations-banking, healthcare, insurance, and telecom companies, etc.-use mainframes for processing critical commercial data.

In this article, we discuss the evolution of mainframe computers and their components.

History of mainframe computers

IBM developed a critical part of mainframe computing, the Automatic Sequenced Controlled Calculator (ASCC) for arithmetic operations, in 1944. From the late 1950s through the 1970s, several companies manufactured mainframes: IBM, Burroughs, RCA, NCR, General Electric, and Sperry Rand, for example. Since then, System / 390 by IBM is the only kind of mainframe in use. It evolved from IBM's System / 360 in 1960.

An Early mainframe occupied a huge space. New technologies have drastically reduced the size and cost of the hardware. A current-generation mainframe can fit in a small closet.

Components of a modern mainframe computer

Like a PC, a mainframe has many components for processing data: operating system, motherboard or main board, processor, controllers, storage devices, and channels.

• Motherboard: The motherboard of a mainframe computer consists of a printed circuit that allows CPU, RAM, and other hardware components to function together through a concept called "Bus architecture". The motherboard has device slots for input cards and cable interfaces for various external devices. Where PC motherboards use 32- or 64-bit buses, mainframes use 128-bit buses. General instructions regarding the internal architecture help the motherboard connect to the other devices and retrieve data using binary computation.

• Processor: A CPU acts as the central processing point in mainframe architecture and includes an Arithmetic Logic Unit (ALU) for performing arithmetic calculations. It also works as a controller for the bus architecture and handles traffic and data requests. The processing power of mainframes is much higher compared to PCs, so that they can handle huge amounts of data.

• Storage devices: Storage devices are for entering, retrieving, storing, and recording data. Many are external devices, such as hard drives, tape drives, and punch card readers, all connected to terminals of the mainframe and controlled by the CPU. Their capacity for data storage can be hundred or even thousands of times that of a PC.

• Communication controllers: Communication controllers allow remote computers to access a mainframe. With the help of networks, LAN or WAN, communication controllers establish connections with various devices, perform data transmission over communication channels, and keep track of users at terminals.

• Channels: The "channels" are the cables used to connect the CPU and the main storage to other parts of the system and make sure that data is moved in a systematic way without losing its integrity.

Modern mainframes have advanced features such as expanded service management capabilities, cross-platform integration facilities, etc. And so are suitable for critical data center operations. The cost of maintaining modern mainframes is much less compared to older models.

Posted in general | Comments Off on History and Components of a Modern Mainframe Computer

How Are Brains Different From Computers?

Ever wondered how brains are different from computers? This article shows how. Read on to find out.

Brains consist of cells called neurons and they connect with millions of other neurons and information gets transferred across connection gaps called synapses. Inside the cells data are processed which gives rise to an idea, concept or understanding.

Computers are built of hardware chips and the central processing unit (CPU) processes data after receiving them from the other chips. How it processes data conss of several steps but the main outline is that software programs are fed into the CPU and processed. They provide end result information depending on how the programs are furnished with data and what the query is that fed into the system. If some information is asked that is outside the scope of the software programs, the computer gets limited in functioning.

Brains, however, are limitless. From childhood until adulthood, the brain gets more and more developed and mature. It can process unknown data or abstract data as well and provide insights and knowledge.

The brain is more complex than the CPU and therefore, with neurons and synaptic connections, it is possible to process all kinds of information. It uses the five senses: touch, smell, hearing, taste and sight and takes in information and produces knowledge.

On the other hand, the CPU of computers takes in data from the typing of the keyboard and processes it, which is very limited. However, it is only human beings feeding data, writing software programs and making the computer like like a brain although not quite so.

The brain is still more intelligent than the CPU of computers and has yet to train the computer to have like the brain of a human being.

Yes, computers will be able to take over many tasks of human beings but without human beings, they are lifeless because humans have to give life to these computers, operate on them and have regular updating, monitoring and maintenance on them.

Just as a brain needs to rest and relax, computers will also need that from time to time but they can operate longer times than the average brain. While the brain sleeps, the computer can carry on with its duties of processing data and converting them to knowledge and information.

Summing up, although the CPU is sometimes called the brain of the computer, it is actually a misnomer because as I have outlined in this article, the brain is definitely different from the computer in varying ways and the brain has yet to teach the computer to Behave 100% like a brain.

Posted in general | Comments Off on How Are Brains Different From Computers?

What Is The Difference Between ERP And Enterprise System?

Enterprise system and Enterprise Resource Planning System terms are similar but there is difference between an enterprise system and an ERP system. An ES or enterprise system is a large scale system which includes packages like ERP and CRM. ERP is a subset of Enterprise System or it can be said that ES is a superset of ERP. It contains a variety of solutions. ES contains applications and packaged solutions which can be directly used in an enterprise. On the other hand ERP system is the automation of the business processes and the solutions are in the form of modules which are designed according to the client’s requirements.

The functions are customized according to the client’s business environment. Enterprise system does not include architecture of other solutions whereas an ERP implementation automates systems using technical aspects. ERP system includes architectures and databases and is client server architecture. The system is server based therefore the consultant needs to be aware of the technical aspect too.

Another difference between an ES and an ERP system is that the ERP is aimed at improving the functionalities of the organization whereas the ES helps to improve the overall maintenance and accuracy. It provides for better solutions and aids in decision making. ES is difficult to implement compared to Enterprise resource planning and even the timeframe needed for implementation maybe more. The overall impact is high but so are the risks involved. If the ES is not implemented in the right manner, it can cause business failure and if implemented properly it can increase the efficiency and profits of the business organization. It is normally required when there is a big drawback in the current procedures and methodologies in the organization and need to be corrected. The company going in for enterprise system needs to be careful while choosing the software and the vendors due to the risk of failure involved.

The difference between an enterprise system and an ERP system is that ERP is mostly used for medium scale companies to big companies and ES is restricted to the big companies. There are many complex functions involved in big companies which cannot be provided solutions for alone by ERP. The role of ERP is restricted when compared to enterprise system because it does not include customer relationship or vendor management.

These applications are needed when the business process is complex and on a big scale. Therefore bigger organizations need to go with ES instead of enterprise resource planning alone. ERP is also an important system to streamline the internal processes but it does not provide for taking care of the external processes. Enterprise system takes care of the end to end business process of organization since it involves other applications also like SCM and CRM. There is quite a lot of difference between an enterprise system and an ERP and it depends on the company whether it wants to go with an ES to streamline the entire process starting from supplying, production and customer or whether he wants to go with an ERP system to streamline the internal process.

Posted in general | Comments Off on What Is The Difference Between ERP And Enterprise System?

How Useful is CAD Software to Engineers and Architects?

The emergence of advanced technology has made people today dependent on machines. Using computers and software, for example, is a very common illustration of this. Computer experts are coming up with more and more software to make more and more jobs easier.

A more specific illustration of this can be found in the modern approach towards engineering and architecture. These days, professionals in these fields use CAD computer software which is a program that allows them to create designs faster, easier and with more accurate measurements. Aside from the convenience that CAD software brings, it also helps put architects and engineers ahead of their competitors. CAD, which can render designs that are two-dimensional or three dimensional, stands for Computer Aided Design and has been in use since 1982.

So how does CAD computer software work? And what does it do exactly to help engineers and architects? The program is actually multifaceted in the sense that there are many ways it can help. To make CAD work will require, however, a careful study of its features and the many ways it can be used. It is rather a complex yet flexible and highly functional program.

This article will not be enough to discuss the various ways that CAD works but pinpointing its advantages could give some very good ideas. One great advantage of CAD computer software is its easy-to-use tools in the creation and alteration of designs. Obviously, this is so much better than the old fashioned way of using a pencil and eraser directly on paper. This method of designing is obviously so much easier and engineers and architects simply have more time to finish other tasks. In other words, high productivity is going to be the main end result of using CAD.

Before the design is actually printed on paper, CAD also allows both the design professional and the client to preview what has been finished so far. Any alterations can be made simply by manipulating the drawing through the use of the software. With CAD, it is so much easier to spot errors because the designs can be rendered exactly as they would be in reality. Hence, modifications can be done even before printing, thus, allowing one to save.

With the tough competition that everyone has to face these days, it is wise to take advantage of new technologies that can help put them ahead in the race. While traditional methods hold a significant part in the history of design, advanced tools such as CAD software should only be welcomed as man’s way of furthering development in a field of expertise that he himself has created long ago.

Posted in general | Comments Off on How Useful is CAD Software to Engineers and Architects?

How Has Technology Changed Art?

We all are witnessing the changes being made in the art these days. Technology has the power to change anything. It is changing the traditional art into digital art.

Amazing digital art has taken place of traditional art. Digital art is exploring itself in many different ways that one can imagine. Different software is developed to increase the presence of digital art.

Photoshop Artists are one of the most common digital artists who give an amazing look to a picture with the help of imaging software and different applications.

These applications are developed with the help of technology. Anyone can be a digital artist having knowledge and proficiency in Photoshop.

Difference between traditional artists and digital artists is that traditional artists use paint and cement for their art and digital artists use imaging software and applications in their art. Some of the applications have the power to create 3D art work.

Technology has taken art into a new level of creativity. Let us talk about how technology has changed traditional art into digital art. We know that internet is ruling the world with its power. So, artists decided to present their art online with the help of internet. This is possible with use of technology.

You must have seen art galleries and attended painting exhibitions in your life. These doesn’t work well these days so artists find a way where they can get more attention and more praise for their work. Most of the artistic stuff is now seen online and is circulated to the art lovers.

There are some places where exhibitions are held and we do respect them. But presenting paintings, sculptures and art work online is in trend. Some of the artists are also showing their art on the basis of card swipe panel or coins.

How this work – when you enter coins or swipe card in the panel, the panel shows you some of the art work for a few minutes and then gets closed and if you want to see it again or explore more, further you need to swipe your card or add coins into it. This is how artists are using technology.

How digital artists are using technology for their art work

Digital artists already in touch with technology are aware of the systems that are in trend and use them to create their art work and sell them online.

Some of the professional digital artists are earning a lot of bucks by selling their art work. They can also design the ones that you want and are also ready to make any modifications you need.

They use different software to explore their skills and made it more impressive. They are using technologies that offer new ways to express their art work in a realistic way for much more time.

They are using different types of media and mix them to provide a more creative art work. Their 3D art work looks as real as it is present live in front of you.

Technology not only brings changes in education, medical field, industry and business but also brings a huge change in the art work and the artists as well.

Technology opens different paths for the artists to enter into for a good earning. They made their profession more powerful along with their art work.

In our busy lives we hardly get time to meet each other and our loved ones. How can it be possible to see exhibitions and galleries? So technology has brought this change in the art workers to show their skills and talent to people from anywhere in the world.

Technology is getting advanced and making more useful for the common man as well as artists. Technology has provided us with several things that we should be thankful. One of them is digital art work.

Posted in general | Comments Off on How Has Technology Changed Art?

Examples Of Spyware And What They Are

Spyware is a general term used to describe software that performs certain behaviors such as advertising, collecting personal information, or changing the configuration of your computer, generally without appropriately obtaining your consent first.

Spyware is often associated with software that displays advertisements (called adware) or software that tracks personal or sensitive information.

That does not mean all software that provides ads or tracks your online activities is bad. For example, you might sign up for a free music service, but you “pay” for the service by agreeing to receive targeted ads. If you understand the terms and agree to them, you may have decided that it is a fair tradeoff. You might also agree to let the company track your online activities to determine which ads to show you.

Other kinds of Spyware make changes to your computer that can be annoying and can cause your computer slow down or crash.

These programs can change your Web browsers home page or search page, or add additional components to your browser you don’t need or want. These programs also make it very difficult for you to change your settings back to the way you originally had them.

The key in all cases is whether or not you (or someone who uses your computer) understand what the software will do and have agreed to install the software on your computer.

There are a number of ways Spyware or other unwanted software can get on your computer. A common trick is to covertly install the software during the installation of other software you want such as a music or video file sharing program.

Any software that covertly gathers user information through the user’s Internet connection without his or her knowledge, usually for advertising purposes. Spyware applications are typically bundled as a hidden component of freeware or shareware programs that can be downloaded from the Internet; however, it should be noted that the majority of shareware and freeware applications do not come with SpyWare. Once installed, the Spyware monitors user activity on the Internet and transmits that information in the background to someone else. Spyware can also gather information about e-mail addresses and even passwords and credit card numbers

Aside from the questions of ethics and privacy, SpyWare steals from the user by using the computer’s memory resources and also by eating bandwidth as it sends information back to the spy ware’s home base via the user’s Internet connection. Because SpyWare is using memory and system resources, the applications running in the background can lead to system crashes or general system instability.

Because SpyWare exists as independent executable programs, they have the ability to monitor keystrokes, scan files on the hard drive, snoop other applications, such as chat programs or word processors, install other SpyWare programs, read cookies, change the default home page on the Web browser, consistently relaying this information back to the SpyWare author who will either use it for advertising/marketing purposes or sell the information to another party.

Licensing agreements that accompany software downloads sometimes warn the user that a SpyWare program will be installed along with the requested software, but the licensing agreements may not always be read completely because the notice of a SpyWare installation is often couched in obtuse, hard-to-read legal disclaimers.

Examples of SpyWare

These common SpyWare programs illustrate the diversity of behaviors found in these attacks. Note that as with computer viruses, researchers give names to SpyWare programs which may not be used by their creators. Programs may be grouped into “families” based not on shared program code, but on common behaviors, or by “following the money” of apparent financial or business connections. For instance, a number of the SpyWare programs distributed by Claria are collectively known as “Gator”. Likewise, programs which are frequently installed together may be described as parts of the same SpyWare package, even if they function separately.

o CoolWebSearch, a group of programs, takes advantage of Internet Explorer vulnerabilities. The package directs traffic to advertisements on Web sites including coolwebsearch.com. It displays pop-up ads, rewrites search engine results, and alters the infected computer’s hosts file to direct DNS lookups to these sites.

o Internet Optimizer, also known as DyFuCa, redirects Internet Explorer error pages to advertising. When users follow a broken link or enter an erroneous URL, they see a page of advertisements. However, because password-protected Web sites (HTTP Basic authentication) use the same mechanism as HTTP errors, Internet Optimizer makes it impossible for the user to access password-protected sites.

o Zango (formerly 180 Solutions) transmits detailed information to advertisers about the Web sites which users visit. It also alters HTTP requests for affiliate advertisements linked from a Web site, so that the advertisements make unearned profit for the 180 Solutions Company. It opens pop-up ads that cover over the Web sites of competing companies.

o HuntBar, aka WinTools or Adware,WebSearch was installed by an ActiveX drive-by download at affiliate Web sites, or by advertisements displayed by other SpyWare programs-an example of how SpyWare can install more SpyWare. These programs add toolbars to IE, track aggregate browsing behavior, redirect affiliate references, and display advertisements.

oZlob Trojan or just Zlob, Downloads itself to your computer via ActiveX codec and reports information back to Control Server. Some information can be as your search history, the Websites you visited, and even Key Strokes.

Posted in general | Comments Off on Examples Of Spyware And What They Are

How to Change the MPI Node Address For a Siemens S7-300 PLC

I have seven Siemens S7-300 PLCs connected together using the MPI (Multi Point Interface) interface. The Siemens MPI protocol is used by Siemens PLCs to communicate with external devices. I want to rename each of the seven PLCs. Here are the steps to accomplish that task.

First, connect your MPI cable to the first PLC. I will be connecting my laptop to each PLC individually. Power up the PLC and open Simatic Manager. The "New Project" Wizard window will open. Just click Cancel to close the window. Now click the Accessible Nodes icon on the toolbar. A window will open showing the identification of the PLC you are connected to. My window is showing MPI = 2 (directly). Make a note of this address and close the window.

Next we need to download a hardware configuration to the PLC. This is where we will rename the PLC node address. There are probably a couple of different ways to do this – following is how I accomplish this. All seven of my PLCs are the same model; Therefore, I am using the same hardware configuration. For the obvious reasons, I want to give each a different MPI node address. I have a project file that contains all seven of my PLC programs and one hardware configuration file. I open the one hardware configuration file, and then double click Hardware in the right hand window. This will open the HW Configuration window. In this window you should see your PLC with its MPI address given.

Remember when we clicked the Accessible Nodes icon and saw MPI = 2 (directly)? My Hardware Configuration Window is showing a MPI address of 7. Place your mouse cursor on the 7 and double click. Your CPU Properties window will open. It should open to the General tab. Look down and you will see Interface Type MPI with an address of 7. Click Properties and the MPI interface Properties window will open. Using the pull down menu, choose your MPI node address and make sure the MPI (1) 187.5kbps is highlighted and click OK. You are now back on the CPU Properties window where you will see your address has changed. Click OK and you will go back to the Hard Ware window where you can verify your MPI node address has changed.

You will now click the Save and Compile icon and then click the download icon. The Select Target Module window will open. Click OK and the Select Node Address window will open. Here you will see the MPI node address you assigned earlier. You will need to click the View button right below this. You will see the current node address appear, this should be the same as what you saw earlier when you clicked the Accessible Nodes icon. Simply click on this number and you will see it appear in the MPI address slot under the Enter connection to target station. Click OK and the Download to Module window will open. Click OK and the Stop Target Modules window will open. Click OK and the "Do you want to start the module?" Window will open. Click Yes.

Now go back to the SIMATIC Manager window and click the accessible nodes icon. You will see your new MPI node address. You can see this same article with pictures at http://www.morerobototics.com .

Posted in general | Comments Off on How to Change the MPI Node Address For a Siemens S7-300 PLC