<?xml version="1.0" encoding="UTF-8" standalone="no"?><rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:blogger="http://schemas.google.com/blogger/2008" xmlns:gd="http://schemas.google.com/g/2005" xmlns:georss="http://www.georss.org/georss" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/" xmlns:thr="http://purl.org/syndication/thread/1.0" version="2.0"><channel><atom:id>tag:blogger.com,1999:blog-5503046232652716232</atom:id><lastBuildDate>Wed, 02 Oct 2024 09:58:02 +0000</lastBuildDate><category>Cell Phone</category><category>Computer Security</category><category>Digital Camera</category><category>Web Design</category><category>Podcasting</category><category>Bluetooth</category><category>Battery</category><category>Blackberry</category><category>Raid</category><category>Software</category><category>Technical Support</category><category>USB</category><category>Windows</category><title>Information Technology</title><description></description><link>http://informationstechnology.blogspot.com/</link><managingEditor>noreply@blogger.com (Unknown)</managingEditor><generator>Blogger</generator><openSearch:totalResults>54</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><language>en-us</language><itunes:explicit>no</itunes:explicit><itunes:subtitle/><itunes:owner><itunes:email>noreply@blogger.com</itunes:email></itunes:owner><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5503046232652716232.post-4697493615958333280</guid><pubDate>Tue, 22 Mar 2011 13:22:00 +0000</pubDate><atom:updated>2011-03-22T21:22:23.592+08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">USB</category><title>A Technical Introduction to USB 2.0</title><description>&lt;div style="text-align: center;"&gt;&lt;b&gt;This document introduces the features and benefits of USB 2.0 and&lt;/b&gt;&lt;/div&gt;&lt;div style="text-align: center;"&gt;&lt;b&gt;describes its impact to users, PC manufacturers and PC peripheral&lt;/b&gt;&lt;/div&gt;&lt;div style="text-align: center;"&gt;&lt;b&gt;manufacturers. Following a recap of USB 1.1, this paper overviews&lt;/b&gt;&lt;/div&gt;&lt;div style="text-align: center;"&gt;&lt;b&gt;the technical aspects of USB 2.0 whose details are in the&lt;/b&gt;&lt;/div&gt;&lt;div style="text-align: center;"&gt;&lt;b&gt;specification draft released in October.&lt;/b&gt;&lt;/div&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;USB 2.0 Executive Summary&lt;/b&gt;&lt;br /&gt;
A core team from Compaq, Hewlett Packard, Intel, Lucent, Microsoft, NEC and&lt;br /&gt;
Philips is leading the development of the USB Specification, version 2.0, that will&lt;br /&gt;
increase data throughput by a factor of 40. This backwards-compatible&lt;br /&gt;
extension of the USB 1.1 specification uses the same cables, connectors and&lt;br /&gt;
software interfaces so the user will see no change in the usage model. They will,&lt;br /&gt;
however, benefit from an additional range of higher performance peripherals,&lt;br /&gt;
such as video-conferencing cameras, next-generation scanners and printers, and&lt;br /&gt;
fast storage devices, with the same ease-of-use features as today’s USB&lt;br /&gt;
peripherals.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Impact to User&lt;/b&gt;&lt;br /&gt;
From a user’s perspective, USB 2.0 is just like USB, but with much higher&lt;br /&gt;
bandwidth. It will look the same and behave the same, but with a larger choice of&lt;br /&gt;
more interesting, higher performance devices available. Also, all of the USB&lt;br /&gt;
peripherals the user has already purchased will work in a USB 2.0-capable&lt;br /&gt;
system.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Impact to PC Manufacturer&lt;/b&gt;&lt;br /&gt;
USB 2.0 will provide system manufacturers the ability to connect to high&lt;br /&gt;
performance peripherals in the least expensive way. The additional performance&lt;br /&gt;
capabilities of USB 2.0 can be added with little impact to overall system cost.&lt;br /&gt;
Indeed, high-bandwidth interfaces such as SCSI adapters may no longer be&lt;br /&gt;
required in some systems, leading to a net saving of system cost. Simpler&lt;br /&gt;
construction will result since only USB connectors will be needed on many future&lt;br /&gt;
PCs. Today’s ubiquitous USB connectors will become USB 2.0, superceding&lt;br /&gt;
USB 1.1.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Impact to Peripheral Manufacturer&lt;/b&gt;&lt;br /&gt;
Today’s USB devices will operate with full compatibility in a USB 2.0 system.&lt;br /&gt;
The added capabilities of USB 2.0 will expand the market segment for USB&lt;br /&gt;
peripherals, while enabling retail products to transition with the installed base.&lt;br /&gt;
Support of USB 2.0 is recommended for hubs and higher bandwidth peripherals.&lt;br /&gt;
Designing a USB 2.0 peripheral will be a similar engineering effort to that of&lt;br /&gt;
designing a USB 1.1 peripheral. Some low-speed peripherals, such as HID&lt;br /&gt;
devices, may never be redesigned to support the USB 2.0 high-speed capability&lt;br /&gt;
in order to maintain the absolute lowest cost.&lt;br /&gt;
Historical Perspective – Universal Serial Bus&lt;br /&gt;
The Universal Serial Bus was originally developed in 1995 by many of the same&lt;br /&gt;
industry leading companies currently working on USB 2.0. The major goal of&lt;br /&gt;
USB was to define an external expansion bus which makes adding peripherals to&lt;br /&gt;
a PC as easy as hooking up a telephone to a wall-jack. The program’s driving&lt;br /&gt;
goals were ease-of-use and low cost. These were enabled with an external&lt;br /&gt;
expansion architecture, as shown in Figure 1, which highlights:&lt;br /&gt;
· &amp;nbsp;PC host controller hardware and software,&lt;br /&gt;
· &amp;nbsp;robust connectors and cable assemblies,&lt;br /&gt;
· &amp;nbsp;peripheral friendly master-slave protocols,&lt;br /&gt;
· &amp;nbsp;expandable through multi-port hubs.&lt;br /&gt;
Figure 1. Example USB 1.1 System Configuration&lt;br /&gt;
(available in full version)&lt;br /&gt;
&lt;br /&gt;
Today, USB is enjoying tremendous success in the marketplace, with most&lt;br /&gt;
peripheral vendors around the globe developing products to this specification.&lt;br /&gt;
Virtually all new PCs come with one or more USB ports on the box. In fact, USB&lt;br /&gt;
has become a key enabler of the Easy PC Initiative, an industry initiative led by&lt;br /&gt;
Intel and Microsoft to make PCs easier to use. This effort sprung from the&lt;br /&gt;
recognition that users need simpler, easier to use PCs that don’t sacrifice&lt;br /&gt;
connectivity or expandability. USB is one of the key technologies used to provide&lt;br /&gt;
this.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Recap of USB 1.1 Operation&lt;/b&gt;&lt;br /&gt;
An understanding of the roles of each of the major elements within a USB 1.1&lt;br /&gt;
system will better show the evolutionary step that USB 2.0 provides.&lt;br /&gt;
Role of Host PC hardware and software.&lt;br /&gt;
The role of the system software is to provide a uniform view of IO system for all&lt;br /&gt;
applications software. It hides hardware implementation details so that&lt;br /&gt;
application software is more portable. For the USB IO subsystem in particular, it&lt;br /&gt;
manages the dynamic attach and detach of peripherals. This phase, called&lt;br /&gt;
enumeration, involves communicating with the peripheral to discover the identity&lt;br /&gt;
of a device driver that it should load, if not already loaded. A unique address is&lt;br /&gt;
assigned to each peripheral during enumeration to be used for run-time data&lt;br /&gt;
transfers. During run-time the host PC initiates transactions to specific&lt;br /&gt;
peripherals, and each peripheral accepts it’s transactions and responds&lt;br /&gt;
accordingly. Additionally the host PC software incorporates the peripheral into&lt;br /&gt;
the system power management scheme and can manage overall system power&lt;br /&gt;
without user interaction.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Role of the hub.&lt;/b&gt;&lt;br /&gt;
Besides the obvious role of providing additional connectivity for USB peripherals,&lt;br /&gt;
a hub provides managed power to attached peripherals. It recognizes dynamic&lt;br /&gt;
attachment of a peripheral and provides at least 0.5W of power per peripheral&lt;br /&gt;
during initialization. Under control of the host PC software, the hub may provide&lt;br /&gt;
more device power, up to a maximum of 2.5W, for peripheral operation. A newly&lt;br /&gt;
attached hub will be assigned its unique address, and hubs may be cascaded up&lt;br /&gt;
to five levels deep. During run-time a hub operates as a bi-directional repeater&lt;br /&gt;
and will repeat USB signals as required on upstream (towards the host) and&lt;br /&gt;
downstream (towards the device) cables. The hub also monitors these signals&lt;br /&gt;
and handles transactions addressed to itself. All other transactions are repeated&lt;br /&gt;
to attached devices. A hub supports both 12Mb/s (full-speed) and 1.5Mbs (lowspeed)&lt;br /&gt;
peripherals.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Role of the peripheral.&lt;/b&gt;&lt;br /&gt;
All USB peripherals are slaves that obey a defined protocol. They must react to&lt;br /&gt;
request transactions sent from the host PC. The peripheral responds to control&lt;br /&gt;
transactions that, for example, request detailed information about the device and&lt;br /&gt;
it’s configuration. The peripheral sends and receives data to/from the host using&lt;br /&gt;
a standard USB data format. This standardized data movement to/from the PC&lt;br /&gt;
host and interpretation by the peripheral gives USB it’s enormous flexibility with&lt;br /&gt;
little PC host software changes. USB 1.1 peripherals can operate at 12Mb/s or&lt;br /&gt;
1.5Mb/s.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;What does USB 2.0 add?&lt;/b&gt;&lt;br /&gt;
USB 2.0 is an evolution of the USB 1.1 specification, providing a higher&lt;br /&gt;
performance interface. Today’s USB 1.1 connectors and full-speed cables will&lt;br /&gt;
support the higher speeds of USB 2.0 without any changes. Characterization&lt;br /&gt;
that has already been done on these cables confirms this compatibility. Analysis&lt;br /&gt;
that has been done by the electrical team suggests that a target of 480Mbs is&lt;br /&gt;
achievable on USB 2.0. USB 2.0 will specify a microframe, which will be 1/8th of&lt;br /&gt;
a 1msec frame. This will allow USB 2.0 devices to have small buffers even at&lt;br /&gt;
high data rates.&lt;br /&gt;
&lt;br /&gt;
Support of higher speed USB 2.0 peripherals connected to a hub assumes USB&lt;br /&gt;
2.0 hubs as shown in Figure 2. The higher transmission speed is negotiated on a&lt;br /&gt;
device-by-device basis and if the higher speed is not supported by a peripheral,&lt;br /&gt;
then the link operates at a lower speed of 12Mb/s or 1.5Mb/s as determined by&lt;br /&gt;
the peripheral.&lt;br /&gt;
&lt;br /&gt;
Figure 2. Example Future USB 2.0 System Configuration&lt;br /&gt;
(available in full version)&lt;br /&gt;
&lt;br /&gt;
As shown in Figure 2, high-speed connections were negotiated between the root&lt;br /&gt;
hub and the external USB 2.0 hub and between the external USB 2.0 hub and&lt;br /&gt;
the video-conferencing camera (a USB 2.0 peripheral). All other connections are&lt;br /&gt;
at USB 1.1 data rates, i.e. 12Mb/s automatically downshifting to 1.5Mb/s for lowspeed&lt;br /&gt;
peripherals. Note that the external USB 2.0 hub has different signaling&lt;br /&gt;
rates on its ports. Using a 40x multiplier for USB 2.0, the USB 2.0 hub example&lt;br /&gt;
in Figure 2 has an input rate of 480Mb/s and output rates of 480Mb/s for attached&lt;br /&gt;
high speed USB 2.0 peripherals, and 12Mb/s or 1.5Mb/s for attached USB 1.1&lt;br /&gt;
peripherals. Any downstream port of a USB 2.0 hub can support attachment of&lt;br /&gt;
any speed USB device. The USB 2.0 hub must match the data rates sent out of&lt;br /&gt;
its downstream ports to the data rate appropriate to the attached device. This&lt;br /&gt;
increases the hub’s role in a USB 2.0 system as outlined below.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Overview of USB 2.0 Operation&lt;/b&gt;&lt;br /&gt;
The external view of a USB 2.0 system looks no different from a USB 1.1 system&lt;br /&gt;
as evidenced by comparing Figures 1 and 2. A casual observer will not be able&lt;br /&gt;
to discriminate between the two system versions – which is exactly the view the&lt;br /&gt;
user should have. However, the user will have to be able to distinguish between&lt;br /&gt;
USB 2.0 hubs and USB 1.1 hubs in order to optimize the placement of USB 2.0&lt;br /&gt;
high-speed devices. The roles of the components of the 2.0 system have minor&lt;br /&gt;
changes from the roles in a USB 1.1 system.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Role of Host PC software&lt;/b&gt;.&lt;br /&gt;
Current applications software on the PC continues to operate with USB 1.1&lt;br /&gt;
peripherals and is unchanged. The system software will comprehend the&lt;br /&gt;
increased capabilities of USB 2.0 peripherals so that it can optimize&lt;br /&gt;
performance. The system software will also detect sub-optimal configurations,&lt;br /&gt;
i.e. a USB 2.0 peripheral attached to a USB 1.1 hub, and will alert the user and&lt;br /&gt;
recommend a better configuration for attaching the peripherals. New&lt;br /&gt;
applications will be written to take advantage of the higher speed capabilities and&lt;br /&gt;
ease-of-use of USB 2.0 peripherals and drivers.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Role of the hub.&lt;/b&gt;&lt;br /&gt;
&lt;a href="http://www.amazon.com/Belkin-4-Port-Ultra-Mini-F5U407/dp/B000Q8UAWY?ie=UTF8&amp;amp;tag=internmark032-20&amp;amp;link_code=bil&amp;amp;camp=213689&amp;amp;creative=392969" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;" target="_blank"&gt;&lt;img alt="Belkin USB 2.0 4-Port Ultra Mini Hub F5U407" src="http://ws.amazon.com/widgets/q?MarketPlace=US&amp;amp;ServiceVersion=20070822&amp;amp;ID=AsinImage&amp;amp;WS=1&amp;amp;Format=_SL160_&amp;amp;ASIN=B000Q8UAWY&amp;amp;tag=internmark032-20" /&gt;&lt;/a&gt;A USB 2.0 hub accepts high-speed transactions at the faster frame rate and&lt;br /&gt;
must deliver them to high-speed USB 2.0 peripherals and USB 1.1 peripherals.&lt;br /&gt;
This data rate matching responsibility will require some increased hub complexity&lt;br /&gt;
and temporary buffering of the incoming high-speed data. In the simplest case of&lt;br /&gt;
communicating with an attached USB 2.0 peripheral, the hub repeats the highspeed&lt;br /&gt;
signals on appropriate USB 2.0 upstream and downstream cables just as&lt;br /&gt;
a USB 1.1 hub repeats full and low-speed signals today on USB 1.1 devices.&lt;br /&gt;
This allows USB 2.0 peripherals to utilize the majority of USB 2.0 bandwidth.&lt;br /&gt;
To communicate with USB 1.1 peripherals, a USB 2.0 hub contains a mechanism&lt;br /&gt;
that supports the concept of matching the data rate with the capabilities of the&lt;br /&gt;
downstream device. In other words, the hub manages the transition of the data&lt;br /&gt;
rate from the high speed of the host controller to the lower speed of a USB 1.1&lt;br /&gt;
device. This feature of USB 2.0 hubs means that USB 1.1 devices can operate&lt;br /&gt;
along with USB 2.0 devices and not consume disproportionate amounts of USB&lt;br /&gt;
2.0 bandwidth. This new hub architecture is intended to be as simple and cost&lt;br /&gt;
effective as possible, and yet deliver the full capabilities of 1.1 connections.&lt;br /&gt;
The new USB 2.0 hub will be completely defined in the USB 2.0 specification&lt;br /&gt;
providing clear implementation guidelines for hub vendors and allowing a single&lt;br /&gt;
software driver to service USB 2.0 hub products from multiple vendors.&lt;br /&gt;
&lt;br /&gt;
&lt;img alt="" border="0" height="1" src="http://www.assoc-amazon.com/e/ir?t=internmark032-20&amp;amp;l=bil&amp;amp;camp=213689&amp;amp;creative=392969&amp;amp;o=1&amp;amp;a=B000Q8UAWY" style="border: none !important; margin: 0px !important; padding: 0px !important;" width="1" /&gt;&lt;br /&gt;
R&lt;b&gt;ole of the peripheral.&lt;/b&gt;&lt;br /&gt;
Current peripheral products do not require any changes to operate in a USB 2.0&lt;br /&gt;
system. Many Human Interface Devices, such as mice, keyboards and game&lt;br /&gt;
pads will not require the additional performance that USB 2.0 offers and will&lt;br /&gt;
remain as full or low speed peripherals as defined by USB 1.1.&lt;br /&gt;
The higher data rate of USB 2.0 will, however, open up the possibilities of&lt;br /&gt;
exciting new peripherals. Video-conferencing cameras will perform better with&lt;br /&gt;
access to higher bandwidth. Next-generation, higher-speed and higher&lt;br /&gt;
resolution printer and scanner devices will be enabled at the high-end. High&lt;br /&gt;
density storage devices such as R/W DVD, and high capacity CDROM jukeboxes&lt;br /&gt;
will also be enabled by USB 2.0. These devices require minor changes to the&lt;br /&gt;
peripheral interface, as defined in the USB 2.0 specification. Overall, the&lt;br /&gt;
additional cost to support USB 2.0 is expected to be minimal to the peripheral.&lt;br /&gt;
Both USB1.1 and USB 2.0 devices will inter-operate in a USB 2.0 system.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Summary&lt;/b&gt;&lt;br /&gt;
&lt;img alt="" border="0" height="1" src="http://www.assoc-amazon.com/e/ir?t=internmark032-20&amp;amp;l=bil&amp;amp;camp=213689&amp;amp;creative=392969&amp;amp;o=1&amp;amp;a=1931448086" style="border: none !important; margin: 0px !important; padding: 0px !important;" width="1" /&gt;The USB Specification is currently at Version 1.1 and supports a wide range of&lt;br /&gt;
products. Many vendors are moving towards USB, drawn by its inclusion on&lt;br /&gt;
virtually all PC platforms and its ease-of-use. More and more types of innovative&lt;br /&gt;
new peripherals are taking advantage of USB, which further enhance the&lt;br /&gt;
&lt;a href="http://www.amazon.com/USB-Complete-Developers-Guide-Guides/dp/1931448086?ie=UTF8&amp;amp;tag=internmark032-20&amp;amp;link_code=bil&amp;amp;camp=213689&amp;amp;creative=392969" imageanchor="1" style="clear: left; display: inline !important; float: left; margin-bottom: 1em; margin-right: 1em;" target="_blank"&gt;&lt;img alt="USB Complete: The Developer's Guide (Complete Guides series)" src="http://ws.amazon.com/widgets/q?MarketPlace=US&amp;amp;ServiceVersion=20070822&amp;amp;ID=AsinImage&amp;amp;WS=1&amp;amp;Format=_SL160_&amp;amp;ASIN=1931448086&amp;amp;tag=internmark032-20" /&gt;&lt;/a&gt;available USB product portfolio.&lt;br /&gt;
The version 2.0 specification that is under development is an evolutionary step&lt;br /&gt;
that increases performance capabilities at low cost for USB peripherals in a&lt;br /&gt;
backwards compatible fashion. It is expected to broaden the market for new and&lt;br /&gt;
higher performance PC peripherals, and supercede USB 1.1 on future PCs.</description><link>http://informationstechnology.blogspot.com/2011/03/technical-introduction-to-usb-20.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5503046232652716232.post-6841654094909569336</guid><pubDate>Tue, 22 Mar 2011 05:07:00 +0000</pubDate><atom:updated>2011-03-22T13:13:54.388+08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Technical Support</category><title>RJ 45 Standard</title><description>&lt;span class="Apple-style-span" style="font-family: 'Courier New';"&gt;&lt;b&gt;&lt;u&gt;Color Codes&lt;/u&gt;&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: 'Courier New';"&gt;&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: 'Courier New';"&gt;  &lt;/span&gt;&lt;br /&gt;
&lt;div class="MsoNormal"&gt;&lt;span class="Apple-style-span" style="font-family: 'Courier New';"&gt;&lt;span style="color: black; font-family: 'Courier New';"&gt;Pin&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; color&amp;nbsp; pair&amp;nbsp; name&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class="MsoNormal"&gt;&lt;span class="Apple-style-span" style="font-family: 'Courier New';"&gt;&lt;span style="color: black; font-family: 'Courier New';"&gt;---&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; -----&amp;nbsp; ---- ---------&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class="MsoNormal"&gt;&lt;span class="Apple-style-span" style="font-family: 'Courier New';"&gt;&lt;span style="color: black; font-family: 'Courier New';"&gt;1&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; wh/or&amp;nbsp;&amp;nbsp; 2&amp;nbsp;&amp;nbsp; TxData +&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class="MsoNormal"&gt;&lt;span class="Apple-style-span" style="font-family: 'Courier New';"&gt;&lt;span style="color: black; font-family: 'Courier New';"&gt;2&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; or&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 2&amp;nbsp;&amp;nbsp; TxData -&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class="MsoNormal"&gt;&lt;span class="Apple-style-span" style="font-family: 'Courier New';"&gt;&lt;span style="color: black; font-family: 'Courier New';"&gt;3&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; wh/grn&amp;nbsp; 3&amp;nbsp;&amp;nbsp; RecvData+&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class="MsoNormal"&gt;&lt;span class="Apple-style-span" style="font-family: 'Courier New';"&gt;&lt;span style="color: black; font-family: 'Courier New';"&gt;4&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; blu&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 1&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class="MsoNormal"&gt;&lt;span class="Apple-style-span" style="font-family: 'Courier New';"&gt;&lt;span style="color: black; font-family: 'Courier New';"&gt;5&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; wh/blu&amp;nbsp; 1&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class="MsoNormal"&gt;&lt;span class="Apple-style-span" style="font-family: 'Courier New';"&gt;&lt;span style="color: black; font-family: 'Courier New';"&gt;6&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; grn&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 3&amp;nbsp;&amp;nbsp; RecvData-&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class="MsoNormal"&gt;&lt;span class="Apple-style-span" style="font-family: 'Courier New';"&gt;&lt;span style="color: black; font-family: 'Courier New';"&gt;7&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; wh/brn&amp;nbsp; 4&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: 'Courier New';"&gt;&lt;span style="color: black; font-family: 'Courier New';"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;span class="Apple-style-span" style="font-family: 'Courier New';"&gt;&lt;a href="http://www.amazon.com/Belkin-R6G088-10-RJ45-Plug-10-Pack/dp/B00006HY3Q?ie=UTF8&amp;amp;tag=internmark032-20&amp;amp;link_code=bil&amp;amp;camp=213689&amp;amp;creative=392969" imageanchor="1" target="_blank"&gt;&lt;img alt="Belkin R6G088-10 RJ45 Plug (10-Pack)" src="http://ws.amazon.com/widgets/q?MarketPlace=US&amp;amp;ServiceVersion=20070822&amp;amp;ID=AsinImage&amp;amp;WS=1&amp;amp;Format=_SL160_&amp;amp;ASIN=B00006HY3Q&amp;amp;tag=internmark032-20" /&gt;&lt;/a&gt;&lt;img alt="" border="0" height="1" src="http://www.assoc-amazon.com/e/ir?t=internmark032-20&amp;amp;l=bil&amp;amp;camp=213689&amp;amp;creative=392969&amp;amp;o=1&amp;amp;a=B00006HY3Q" style="border: none !important; margin: 0px !important; padding: 0px !important;" width="1" /&gt;&lt;a href="http://www.amazon.com/RJ45-Black-Strain-Relief-Boots/dp/B000I21Z5E?ie=UTF8&amp;amp;tag=internmark032-20&amp;amp;link_code=bil&amp;amp;camp=213689&amp;amp;creative=392969" imageanchor="1" target="_blank"&gt;&lt;img alt="RJ45 Black Strain Relief Boots (50 Pcs Per Bag)" src="http://ws.amazon.com/widgets/q?MarketPlace=US&amp;amp;ServiceVersion=20070822&amp;amp;ID=AsinImage&amp;amp;WS=1&amp;amp;Format=_SL160_&amp;amp;ASIN=B000I21Z5E&amp;amp;tag=internmark032-20" /&gt;&lt;/a&gt;&lt;img alt="" border="0" height="1" src="http://www.assoc-amazon.com/e/ir?t=internmark032-20&amp;amp;l=bil&amp;amp;camp=213689&amp;amp;creative=392969&amp;amp;o=1&amp;amp;a=B000I21Z5E" style="border: none !important; margin: 0px !important; padding: 0px !important;" width="1" /&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: 'Courier New';"&gt;&lt;a href="http://www.amazon.com/TRENDnet-RJ-11-RJ-45-Crimp-TC-CT68/dp/B0000AZK4G?ie=UTF8&amp;amp;tag=internmark032-20&amp;amp;link_code=bil&amp;amp;camp=213689&amp;amp;creative=392969" imageanchor="1" target="_blank"&gt;&lt;img alt="TRENDnet RJ-11/RJ-45 Crimp/Cut/Strip Tool TC-CT68 (Blue)" src="http://ws.amazon.com/widgets/q?MarketPlace=US&amp;amp;ServiceVersion=20070822&amp;amp;ID=AsinImage&amp;amp;WS=1&amp;amp;Format=_SL160_&amp;amp;ASIN=B0000AZK4G&amp;amp;tag=internmark032-20" /&gt;&lt;/a&gt;&lt;img alt="" border="0" height="1" src="http://www.assoc-amazon.com/e/ir?t=internmark032-20&amp;amp;l=bil&amp;amp;camp=213689&amp;amp;creative=392969&amp;amp;o=1&amp;amp;a=B0000AZK4G" style="border: none !important; margin: 0px !important; padding: 0px !important;" width="1" /&gt;&lt;a href="http://www.amazon.com/100ft-Cat5E-Certified-Light-cable/dp/B00168DS5E?ie=UTF8&amp;amp;tag=internmark032-20&amp;amp;link_code=bil&amp;amp;camp=213689&amp;amp;creative=392969" imageanchor="1" target="_blank"&gt;&lt;img alt="100ft Cat5E Certified Light Grey bulk cable - solid core" src="http://ws.amazon.com/widgets/q?MarketPlace=US&amp;amp;ServiceVersion=20070822&amp;amp;ID=AsinImage&amp;amp;WS=1&amp;amp;Format=_SL160_&amp;amp;ASIN=B00168DS5E&amp;amp;tag=internmark032-20" /&gt;&lt;/a&gt;&lt;img alt="" border="0" height="1" src="http://www.assoc-amazon.com/e/ir?t=internmark032-20&amp;amp;l=bil&amp;amp;camp=213689&amp;amp;creative=392969&amp;amp;o=1&amp;amp;a=B00168DS5E" style="border: none !important; margin: 0px !important; padding: 0px !important;" width="1" /&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: 'Courier New';"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: 'Courier New';"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: 'Courier New';"&gt;Note that the odd pin numbers are always the white with stripe color.&lt;/span&gt;&lt;/div&gt;&lt;div class="MsoNormal"&gt;&lt;span class="Apple-style-span" style="font-family: 'Courier New';"&gt;&lt;span style="color: black;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class="MsoNormal"&gt;&lt;span class="Apple-style-span" style="font-family: 'Courier New';"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;br /&gt;
&lt;div align="center"&gt;&lt;table border="1" cellpadding="0" class="MsoNormalTable" style="mso-cellspacing: 1.5pt; width: 71.0%;"&gt;&lt;tbody&gt;
&lt;tr&gt;   &lt;td style="padding: .75pt .75pt .75pt .75pt;"&gt;&lt;div class="MsoNormal"&gt;&lt;span style="color: black;"&gt;S&lt;b&gt;traight   Through Cable&lt;/b&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;   &lt;td style="padding: .75pt .75pt .75pt .75pt;"&gt;&lt;div class="MsoNormal"&gt;&lt;span style="color: black;"&gt;Color   Code&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;  &lt;/tr&gt;
&lt;tr&gt;   &lt;td style="padding: .75pt .75pt .75pt .75pt;"&gt;&lt;div class="MsoNormal"&gt;&lt;span style="color: black;"&gt;Pin   1&amp;nbsp; &lt;br /&gt;
Pin 2 &lt;br /&gt;
Pin 3 &lt;br /&gt;
Pin 4 &lt;br /&gt;
Pin 5 &lt;br /&gt;
Pin 6 &lt;br /&gt;
Pin 7 &lt;br /&gt;
Pin 8&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;   &lt;td style="padding: .75pt .75pt .75pt .75pt;"&gt;&lt;div class="MsoNormal"&gt;&lt;span style="color: black;"&gt;white   orange &lt;br /&gt;
orange &lt;br /&gt;
white green &lt;br /&gt;
blue &lt;br /&gt;
white blue &lt;br /&gt;
green &lt;br /&gt;
white brown &lt;br /&gt;
brown&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;  &lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;&lt;/div&gt;&lt;div align="center"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div align="center"&gt;&lt;div align="center"&gt;&lt;table border="1" cellpadding="0" class="MsoNormalTable" style="mso-cellspacing: 1.5pt; width: 71.0%;"&gt;&lt;tbody&gt;
&lt;tr&gt;   &lt;td style="padding: .75pt .75pt .75pt .75pt;"&gt;&lt;div class="MsoNormal"&gt;&lt;span style="color: black;"&gt;&lt;b&gt;Cross   Over Cable&lt;/b&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;   &lt;td style="padding: .75pt .75pt .75pt .75pt;"&gt;&lt;div class="MsoNormal"&gt;&lt;span style="color: black;"&gt;Color   Code&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;  &lt;/tr&gt;
&lt;tr&gt;   &lt;td style="padding: .75pt .75pt .75pt .75pt;"&gt;&lt;div class="MsoNormal"&gt;&lt;span style="color: black;"&gt;Pin   1&amp;nbsp; &lt;br /&gt;
Pin 2 &lt;br /&gt;
Pin 3 &lt;br /&gt;
Pin 4 &lt;br /&gt;
Pin 5 &lt;br /&gt;
Pin 6 &lt;br /&gt;
Pin 7 &lt;br /&gt;
Pin 8&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;   &lt;td style="padding: .75pt .75pt .75pt .75pt;"&gt;&lt;div class="MsoNormal"&gt;&lt;span style="color: black;"&gt;white   green &lt;br /&gt;
green &lt;br /&gt;
white orange &lt;br /&gt;
blue &lt;br /&gt;
white blue &lt;br /&gt;
orange &lt;br /&gt;
white brown &lt;br /&gt;
brown&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;&lt;/div&gt;&lt;div align="center"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style="text-align: center;"&gt;&lt;img alt="" border="0" height="1" src="http://www.assoc-amazon.com/e/ir?t=internmark032-20&amp;amp;l=bil&amp;amp;camp=213689&amp;amp;creative=392969&amp;amp;o=1&amp;amp;a=B0000AZK4G" style="border: none !important; margin: 0px !important; padding: 0px !important;" width="1" /&gt;&lt;/div&gt;&lt;/div&gt;</description><link>http://informationstechnology.blogspot.com/2011/03/rj-45-standard.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5503046232652716232.post-8938264663071879079</guid><pubDate>Mon, 21 Mar 2011 05:18:00 +0000</pubDate><atom:updated>2011-03-22T21:07:46.186+08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Computer Security</category><title>Spyware Beware</title><description>Spyware and Adware are not only an ever increasing nuisance for computer users everywhere, but also a booming industry. According to Webroot Software, Inc., the distribution of online advertisements through spyware and adware has become a $2 billion industry.&lt;br /&gt;
&lt;br /&gt;
The aggressive advertising and spying tactics demonstrated by some of these programs, require an equally aggressive response from a seasoned eradicator. Sunbelt Software is such a company. A leader in Anti-Spyware, Anti-Spam, Network Security and System Management tools, they gave consistently remained on the cutting-edge of anti-spyware programming since 1994.&lt;br /&gt;
&lt;br /&gt;
One of their more notable software applications is CounterSpy 1.5. CounterSpy is designed to detect and remove spyware that is already in your computer system. Additionally, it provides real-time protection while preventing browser hijacking and changes to your computer’s Registry.&lt;br /&gt;
&lt;br /&gt;
&lt;iframe align="left" frameborder="0" marginheight="0" marginwidth="0" scrolling="no" src="http://rcm.amazon.com/e/cm?t=internmark032-20&amp;amp;o=1&amp;amp;p=8&amp;amp;l=bpl&amp;amp;asins=B0046ED0HG&amp;amp;fc1=000000&amp;amp;IS2=1&amp;amp;lt1=_blank&amp;amp;m=amazon&amp;amp;lc1=0000FF&amp;amp;bc1=000000&amp;amp;bg1=FFFFFF&amp;amp;f=ifr" style="align: left; height: 245px; padding-right: 10px; padding-top: 5px; width: 131px;"&gt;&lt;/iframe&gt;&lt;br /&gt;
&lt;strong&gt;Other notable features include:&lt;/strong&gt;&lt;br /&gt;
&lt;br /&gt;
• Detection and Removal of Tracking Cookies – while it is true that applications like Microsoft AntiSpyware Beta are free, they do not include the ability to detect and remove tracking cookies like CounterSpy does.&lt;br /&gt;
• History Cleaner - erases any traceable trails left on your computer as you surf the Internet.&lt;br /&gt;
• Secure File Eraser - a powerful deletion tool that can completely eliminate all files you want removed from your computer including images, music, movies and applications.&lt;br /&gt;
• PC Explorer - allows you a look into files and areas that are normally inconvenient to access, such as your startup programs, browser helper objects, and ActiveX programs that are being downloaded or used.&lt;br /&gt;
• Support for Older Operating Systems – includes Windows 98SE, Windows ME, and Windows NT.&lt;br /&gt;
&lt;br /&gt;
Recommended by PC World, ConsumerSearch, and Dell, CounterSpy holds one of the highest effective ratings for spyware removal. It also received high marks from TopTenReviews (2006) for ease of use, customization/installation, and help/support. For only $19.95 per machine, users can receive a one year subscription with updates, upgrades, and technical support from real live humans. CounterSpy definitely provides ease of use and affordability for just about any computer user from the novice to the expert.</description><link>http://informationstechnology.blogspot.com/2008/01/spyware-beware.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5503046232652716232.post-6463519315720762184</guid><pubDate>Sun, 20 Mar 2011 13:27:00 +0000</pubDate><atom:updated>2011-03-22T21:44:34.894+08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Raid</category><title>Understand of RAID</title><description>&lt;b&gt;RAID&lt;img alt="" border="0" height="1" src="http://www.assoc-amazon.com/e/ir?t=internmark032-20&amp;amp;l=btl&amp;amp;camp=213689&amp;amp;creative=392969&amp;amp;o=1&amp;amp;a=" style="border: none !important; margin: 0px !important; padding: 0px !important;" width="1" /&gt;: A Comparison of Different Modes&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;RAID 0: Striping&lt;/b&gt;&lt;br /&gt;
Technically speaking, mode 0 doesn't adhere to the principles of a RAID, given the fact&lt;br /&gt;
that an important factor, data redundancy, does not exist. Hence RAID 0 offers no&lt;br /&gt;
advantages in terms of security - in fact, on the contrary. All of the data are evenly&lt;br /&gt;
distributed to all of the existing drives; this array is called a stripe set. This process can&lt;br /&gt;
best be described with the "zipper method." The benefits are clear: because the data&lt;br /&gt;
stream can be allocated to all the different drives, the data transfer rate is multiplied by&lt;br /&gt;
the number of drives. Here the upper limits are the maximum transfer rate per channel&lt;br /&gt;
Search Amazon.com  for server&lt;img alt="" border="0" height="1" src="http://www.assoc-amazon.com/e/ir?t=internmark032-20&amp;amp;l=btl&amp;amp;camp=213689&amp;amp;creative=392969&amp;amp;o=1&amp;amp;a=" style="border: none !important; margin: 0px !important; padding: 0px !important;" width="1" /&gt;(max. 100 MB/s for UltraATA/100), or the maximum bandwidth of the controller on the&lt;br /&gt;
PCI bus (266 MB/s at 66 MHz / 32-bit PCI). However, in reality this very drastic&lt;br /&gt;
performance boost comes at the price of higher fault vulnerability. Instead of one, now all&lt;br /&gt;
of the RAID drives must work error-free. If even one of those drive crashes, all of the&lt;br /&gt;
stored data will be lost.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;RAID 1: Mirroring&lt;/b&gt;&lt;br /&gt;
Mode 1 is basically the complete opposite of RAID 0. The goal here is not to boost&lt;br /&gt;
performance, but to ensure data security. When reading or writing data, all drives of the&lt;br /&gt;
array are used simultaneously. Hence, data is written synchronously to two or more&lt;br /&gt;
drives, which is equivalent to a perfect backup copy - perfect because the data is always&lt;br /&gt;
100% up-to-date.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;RAID 2: Striping&lt;/b&gt;&lt;br /&gt;
Striping is based on the same principle as RAID 0: the stripe set distributes the data to all&lt;br /&gt;
drives, though not in block form, but, rather, on a bit level. This is necessary because an&lt;br /&gt;
Error Correcting Code (ECC) is implemented in all transaction data. Additional hard&lt;br /&gt;
drives are necessary to store the resulting additional volume. If you wanted to guarantee&lt;br /&gt;
complete data security, you would have to deploy at least ten data disks and four ECC&lt;br /&gt;
disks. The next level would entail 32 data disks and seven ECC disks. This explains why&lt;br /&gt;
RAID 2 never caught on.&lt;br /&gt;
On top of that, performance is only mediocre as multiple access is not possible in bit&lt;br /&gt;
stripe sets. The higher the number of accesses, and the shorter they are, the more lethargic&lt;br /&gt;
RAID 2 gets.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;RAID 3: Data Striping, Dedicated Parity&lt;/b&gt;&lt;br /&gt;
Level 3 incorporates prudent error correction. Data is allocated byte by byte to several&lt;br /&gt;
hard drives, while the parity data is stored in a separate drive. This is exactly the&lt;br /&gt;
disadvantage of RAID 3, as the parity drive has to be accessed with every access. So the&lt;br /&gt;
advantage of RAID, bundling the disk performance by distributing access, is partially&lt;br /&gt;
offset. RAID 3 needs a minimum of three drives.&lt;br /&gt;
&lt;br /&gt;
This mode requires quite a complex controller, which is why RAID 3, similar to levels 4&lt;br /&gt;
and 5, never caught on in the mass market.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;RAID 4: Data Striping, Dedicated Parity&lt;/b&gt;&lt;br /&gt;
The technology of RAID Level 4 is similar to that of level 3, except that the individual&lt;br /&gt;
stripes are not written in bytes, but in blocks. In theory, this should speed things up, but&lt;br /&gt;
the parity drive still remains the bottleneck.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;RAID 5: Distributed Data, Distributed Parity&lt;/b&gt;&lt;br /&gt;
RAID Level 5 is generally considered the best compromise between data security and&lt;br /&gt;
performance. Not only the data, but also the parity information, is distributed to all the&lt;br /&gt;
existing drives. The resulting advantage is that RAID is really only a bit slower than&lt;br /&gt;
RAID 3. However, failure safety is limited, as only one hard drive can safely crash. At&lt;br /&gt;
least three hard drives are required in each case.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;RAID 6: Distributed Data, Distributed Parity&lt;/b&gt;&lt;br /&gt;
With RAID 6, you're really only talking about RAID 5 - except that twice the amount of&lt;br /&gt;
parity information is stored. Though this cuts down on performance a bit, it allows up to&lt;br /&gt;
two hard drives to crash. It does require, however, a minimum of five drives.&lt;br /&gt;
RAID: Who with Whom?&lt;br /&gt;
So far, we've talked about several hard drives, but haven't gone into detail. You should&lt;br /&gt;
principally set up all RAID modes with similar hard drives, as only then will you get&lt;br /&gt;
maximum performance.&lt;br /&gt;
&lt;br /&gt;
However, you can also combine different drives, with the smaller or slower drive being&lt;br /&gt;
the determinant drive for the entire array. For example, one 30 GB and two 40 GB hard&lt;br /&gt;
drives in RAID 0 will give you a total capacity of 90 GB, which is three times the&lt;br /&gt;
capacity of the smallest hard drive.&lt;br /&gt;
The same applies to the combination of an old 40 GB hard drive with 5,400 rpm with a&lt;br /&gt;
new model with 7,200 rpm. If you were to use two of the slower drives, the performance&lt;br /&gt;
level would be the same. Replacing the older disk with a second and faster one would&lt;br /&gt;
increase the performance.&lt;br /&gt;
&lt;br /&gt;
If you want to use several different hard drives together, you have the option of creating&lt;br /&gt;
what is known as a span array. Another term is JBOD (just a bunch of drives). Here, the&lt;br /&gt;
hard drives are simply hooked up in series, which results in a useable total capacity, but&lt;br /&gt;
without, however, an increase in performance or data security.&lt;br /&gt;
Another unsettled point is the question of which drives should be hooked up to which&lt;br /&gt;
IDE channel. If possible, every drive should be connected to its own channel as a master.&lt;br /&gt;
&lt;br /&gt;
On a dual channel controller card, you'd be able to hook up a mere two hard drives.&lt;br /&gt;
Though using four hard drives (master and slave per channel) drastically increases&lt;br /&gt;
performance, you'd get even more out of a four channel controller with four master drives.&lt;br /&gt;
Another important fact is that only a few of the currently available IDE RAID controllers&lt;br /&gt;
support the ATAPI protocol. CD-ROM or DVD-ROM drives will not necessarily work&lt;br /&gt;
with a RAID controller (don't even bother trying in RAID mode).&lt;br /&gt;
Disk Drive Crash! Now What?!&lt;br /&gt;
If you had opted for a RAID level before a disk crash, assigning highest priority to&lt;br /&gt;
security, then you're in good shape. If you're using RAID Level 1, 3, 4, 5 or 6, the crash&lt;br /&gt;
of a single hard drive will not affect your existing data. Depending on the controller&lt;br /&gt;
you're using, the procedure will vary.&lt;br /&gt;
Most RAID controllers today notify the user of a crash with a beep and by e-mail (of&lt;br /&gt;
course, this does not apply to the RAID levels with the system partition, which do not&lt;br /&gt;
offer any crash protection).&lt;br /&gt;
&lt;br /&gt;
Older or very simple RAID controllers require the computer to be shut down and the&lt;br /&gt;
defective drive to be replaced. After restarting the system, the user has to go into the&lt;br /&gt;
BIOS of the RAID controller to initiate the rebuild process.&lt;br /&gt;
Practically all of the RAID controllers on the market today - including the simple models&lt;br /&gt;
- now master the exchange of defective hard drives without a need to shut down the&lt;br /&gt;
system, a process called hot swapping. Rebuild takes place automatically, too - you really&lt;br /&gt;
don't have to do anything yourself anymore.&lt;br /&gt;
A clever feature is the hot-spare function. Many RAID controllers support an additional&lt;br /&gt;
drive, which is labeled as a hot spare. If one of the array drives refuse to work, it will be&lt;br /&gt;
removed from operation and the hot-spare drive will be connected automatically.&lt;br /&gt;
In the event that you were using RAID 0 or JBOD and have lost important data, you'll&lt;br /&gt;
probably never want to use this mode again. Though there's almost always a way to&lt;br /&gt;
restore your data, it is horrendously expensive. Companies dedicated to data recovery&lt;br /&gt;
(such as, for example, OnTrack) are able to take hard drives apart and restore most of the&lt;br /&gt;
data, even after a head crash, fire damage or other catastrophic events. But be warned:&lt;br /&gt;
restoring RAID arrays is disproportionately harder than the effort that goes into restoring&lt;br /&gt;
one single hard drive, which is enormous enough.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Conclusion: Only a Backup is Truly Safe!&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Chart-Topping Capacity for a Song&lt;/b&gt;&lt;br /&gt;
It's not just aspects like performance and data security that should be considered; in many&lt;br /&gt;
cases, enormous amounts of data must be managed and stored - the right approach to&lt;br /&gt;
tackling this problem is a RAID array with large hard drives. Because expensive SCSI&lt;br /&gt;
RAID adapters and SCSI hard drives were the only available options just a few years ago,&lt;br /&gt;
high-capacity arrays were feasible only for very few individual users or companies.&lt;br /&gt;
Today, the prices for IDE hard drives with a capacity of 100 GB have dropped to a few&lt;br /&gt;
hundred dollars - a downright bargain. It takes only $500 to set up arrays with a capacity&lt;br /&gt;
of 300 to 400 gigabytes. The introduction of new hard drives with up to 200 GB will&lt;br /&gt;
make RAID arrays with up to 1 terabyte (5x 200GB) affordable for the first time ever.&lt;br /&gt;
Muddle Makes Trouble&lt;br /&gt;
&lt;br /&gt;
No matter which RAID array you're using - for the operating system, it's ultimately a&lt;br /&gt;
drive just like any other, and therefore it needs to be maintained accordingly.&lt;br /&gt;
You should defragment it at least a few times a year; for more heavily frequented drives,&lt;br /&gt;
once a month. Ideally, you'll enter the defragmentation program in your task planner and&lt;br /&gt;
have this pesky operation performed during acceptable times.&lt;br /&gt;
If one of your drives ever begins to snarl (louder operating noise, reduced performance or&lt;br /&gt;
other conspicuities), don't hesitate. You should back up all of your important data,&lt;br /&gt;
especially if you're using RAID 0. If the operating system is on the RAID array as well,&lt;br /&gt;
you might want to try and mirror the drive in question on another computer with an&lt;br /&gt;
identical hard drive. Otherwise, you'll have no choice but to reinstall everything.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;RAID Controllers: A Large Selection&lt;/b&gt;&lt;br /&gt;
When purchasing a RAID controller, you need to differentiate between two types. Simple&lt;br /&gt;
consumer models can be found everywhere, and they're often also integrated on&lt;br /&gt;
motherboards. They offer two channels and support RAID modes 0, 1 and 10 (striping&lt;br /&gt;
and mirroring), but most of the time they can also be used as simple ATA controllers.&lt;br /&gt;
More sophisticated models have their own RISC processors (e.g., i960) and can&lt;br /&gt;
additionally be outfitted with extra cache. Thanks to the processor, you can also run more&lt;br /&gt;
lavish RAID modes like Level 3 or 5 - assuming that you have enough hard drives.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Adaptec&lt;/b&gt;&lt;br /&gt;
Adaptec has the reputation of manufacturing high-quality SCSI hardware. But it has been&lt;br /&gt;
offering some products in the IDE sector for quite some time, too.&lt;br /&gt;
&lt;br /&gt;
Two channel UltraATA/100: ATA RAID 1200A&lt;br /&gt;
RAID 0, 1, 10, JBOD, hot swap, e-mail notification&lt;br /&gt;
&lt;br /&gt;
Four channel UltraATA/100: ATA RAID 2400A&lt;br /&gt;
RAID 0, 1, 3, 10, JBOD, hot swap, e-mail notification&lt;br /&gt;
&lt;br /&gt;
HighPoint&lt;br /&gt;
You'll find HighPoint controllers less often in computer stores than on numerous&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;motherboards:&lt;/b&gt;&lt;br /&gt;
Two channel UltraATA/133: RocketRAID133&lt;br /&gt;
RAID 0, 1, 10, JBOD, hot swap, e-mail notification&lt;br /&gt;
Four channel UltraATA/133: RocketRAID404&lt;br /&gt;
RAID 0, 1, 10, JBOD, hot swap, e-mail notification&lt;br /&gt;
&lt;br /&gt;
&lt;a href="http://www.amazon.com/SAS9260-8I-Raid-8PORT-sata-512MB/dp/B002IT4YG2?ie=UTF8&amp;amp;tag=internmark032-20&amp;amp;link_code=bil&amp;amp;camp=213689&amp;amp;creative=392969" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;" target="_blank"&gt;&lt;img alt="SAS9260-8I Sgl Raid 8PORT Int 6GB Sas/sata Pcie 2.0 512MB" src="http://ws.amazon.com/widgets/q?MarketPlace=US&amp;amp;ServiceVersion=20070822&amp;amp;ID=AsinImage&amp;amp;WS=1&amp;amp;Format=_SL160_&amp;amp;ASIN=B002IT4YG2&amp;amp;tag=internmark032-20" /&gt;&lt;/a&gt;&lt;b&gt;LSI Logic&lt;/b&gt;&lt;br /&gt;
&lt;img alt="" border="0" height="1" src="http://www.assoc-amazon.com/e/ir?t=internmark032-20&amp;amp;l=bil&amp;amp;camp=213689&amp;amp;creative=392969&amp;amp;o=1&amp;amp;a=B002IT4YG2" style="border: none !important; margin: 0px !important; padding: 0px !important;" width="1" /&gt;Two channel UltraATA/100: Mega RAID IDE 100 (formerly AMI)&lt;br /&gt;
RAID 0, 1, 10, JBOD, hot swap, e-mail notification&lt;br /&gt;
Four channel UltraATA/100: Mega RAID i4&lt;br /&gt;
RAID 0, 1, 5, 10, JBOD, hot swap, e-mail notification&lt;br /&gt;
Hardly for home use: the SuperTrak SX6000 from Promise masters RAID 5 and supports&lt;br /&gt;
up to 128 MB cache.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Promise&lt;/b&gt;&lt;br /&gt;
Promise places equal focus on integration and retail sales:&lt;br /&gt;
Two channel UltraATA/133: FastTrak TX2000&lt;br /&gt;
RAID 0, 1, 10, JBOD, hot swap, e-mail notification&lt;br /&gt;
Five channel UltraATA/133: FastTrak TX2000&lt;br /&gt;
RAID 0, 1, 3, 5, 10, JBOD, hot swap, e-mail notification&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;RAID Without RAID&lt;/b&gt;&lt;br /&gt;
RAID modes 2 to 6 can be implemented only if the appropriate hardware RAID&lt;br /&gt;
controller is available. On the other hand, RAID 0 and 1 are offered directly by Windows&lt;br /&gt;
2000 or Windows XP - as long as there are several hard drives.&lt;br /&gt;
Under disk administration of the computer administration console, you can, among other&lt;br /&gt;
things, change partitions and drive letters. You can also connect two or more hard drives&lt;br /&gt;
to form a software RAID.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;There Are Limits&lt;/b&gt;&lt;br /&gt;
RAID arrays are certainly an excellent approach to solving chronic performance deficits&lt;br /&gt;
and improving your sense of security. Let us mention, though, that they are not able to&lt;br /&gt;
perform miracles, and do not absolve the user or the administrator from backing up his or&lt;br /&gt;
her data periodically.&lt;br /&gt;
For example, a RAID controller cannot withstand short circuits or lightning, meaning that,&lt;br /&gt;
in the worst case scenario, your data could be toast. Therefore, an uninterruptible power&lt;br /&gt;
supply (UPS) is part of the required equipment in productive or otherwise critical systems.&lt;br /&gt;
Furthermore, a RAID array only offers protection from technical errors - the human&lt;br /&gt;
factor, however, should not be underestimated. Most users have had to live with lost data&lt;br /&gt;
because they carelessly deleted or hastily clobbered them - the same holds true with the&lt;br /&gt;
RAID.&lt;br /&gt;
&lt;br /&gt;
The chapter on human-related causes also includes malicious attacks on the existing data,&lt;br /&gt;
or acts of the "powers that be." These involve attacks on software (deleting, formatting,&lt;br /&gt;
renaming, software bugs), as well as physical threats (theft, vandalism, arson, floods,&lt;br /&gt;
etc.).&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Don't forget - only a backup is truly safe.&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Setting Up a RAID Array&lt;/b&gt;&lt;br /&gt;
Setting up a RAID array usually doesn't take much time. Especially for modes 0 and 1, it&lt;br /&gt;
will suffice to select the drives to be included in the array in BIOS of the controller.&lt;br /&gt;
Lastly, after the system has rebooted, the new drive must be formatted (it may be&lt;br /&gt;
necessary to activate the RAID controller with its driver under Windows).&lt;br /&gt;
In RAID 3 or RAID 5 arrays, the controllers often run an initialization process that can&lt;br /&gt;
take up to several hours.&lt;br /&gt;
Though RAID Level 0 is the fastest option of all, it is also the most precarious by far. For&lt;br /&gt;
example, using four hard drives will push the data transfer rate far beyond 100 MB/s, but&lt;br /&gt;
fault tolerance will be virtually non-existent. A hard drive is a mechanical component that&lt;br /&gt;
will age and wear out after a while. Mechanically-induced defects are therefore really&lt;br /&gt;
only a question of time. But even an electronic error or a minor production error may&lt;br /&gt;
result in a catastrophe.&lt;br /&gt;
&lt;br /&gt;
For this reason, RAID 0 is not recommended for long-term storage data, but primarily for&lt;br /&gt;
setting up fast drives with temporary data, such as file or database servers. And if the&lt;br /&gt;
system has to be mirrored on short notice, RAID 1 is your best choice. If you have a hot&lt;br /&gt;
swap cabinet, you can remove the hard drive while the system is running in order to&lt;br /&gt;
mirror it to a different drive of the same size on a different computer. Then the drive is&lt;br /&gt;
reinstalled in the computer, while the copy can be saved once again with a RAID 1 when&lt;br /&gt;
connecting it to a RAID controller.&lt;br /&gt;
&lt;br /&gt;
RAID Level 1 does nothing other than mirror a hard drive's data (in special cases, also&lt;br /&gt;
those of any array) to another hard drive in real-time. People are inclined to believe the&lt;br /&gt;
misleading proposition that RAID 1 does not offer any improvement in performance.&lt;br /&gt;
Though write operations really aren't any faster than with only one hard drive, when&lt;br /&gt;
reading data, it is possible, in theory, to have a data transfer rate equivalent to that of an&lt;br /&gt;
analog RAID 0. This is only logical, since data can be read simultaneously from all the&lt;br /&gt;
drives in the array. In practice, however, there are differences, as the data to be read are&lt;br /&gt;
not available in cleanly split stripes as they are with RAID 0; instead, the controller has to&lt;br /&gt;
perform this division itself based on specific patterns.&lt;br /&gt;
&lt;br /&gt;
Using RAID 1 makes sense if your main focus is on maximum data security and&lt;br /&gt;
minimum recovery efforts (e.g., simple servers). Most RAID controllers are able to&lt;br /&gt;
perform the recovery procedure independently after a hard drive has been exchanged.&lt;br /&gt;
You can do this on the fly only if the hard drives are housed in hot swap cabinets.&lt;br /&gt;
RAID Level 3 is losing more and more of its popularity because RAID 5 offers the same&lt;br /&gt;
advantages with fewer disadvantages. With RAID 3, parity data is written to one or&lt;br /&gt;
maybe even several hard drives. The big advantage is in the distribution of the actual data&lt;br /&gt;
stock to several drives, in the form of stripe sets, actually allowing a significantly higher&lt;br /&gt;
data rate - and at the same time protecting against a hard drive crash. Its disadvantage,&lt;br /&gt;
however, is the fact that the parity data is written to only one drive. This cuts down on&lt;br /&gt;
write performance considerably.&lt;br /&gt;
&lt;br /&gt;
RAID 3 is usually deployed in servers with mostly static data or servers that require&lt;br /&gt;
&lt;img alt="" border="0" height="1" src="http://www.assoc-amazon.com/e/ir?t=internmark032-20&amp;amp;l=bil&amp;amp;camp=213689&amp;amp;creative=392969&amp;amp;o=1&amp;amp;a=B00006HOWV" style="border: none !important; margin: 0px !important; padding: 0px !important;" width="1" /&gt;better performance than RAID 0 can provide, without foregoing data security. This is a&lt;br /&gt;
simple way to keep the low write performance from carrying too much weight.&lt;br /&gt;
RAID Level 5 dominates in today's high-end server segment. If you're using four to&lt;br /&gt;
seven drives, such an array is a real performer and, if the drives are large, allows&lt;br /&gt;
&lt;a href="http://www.amazon.com/HP-P3410A-160Mbps-Ultra3-Controllers/dp/B00006HOWV?ie=UTF8&amp;amp;tag=internmark032-20&amp;amp;link_code=bil&amp;amp;camp=213689&amp;amp;creative=392969" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;" target="_blank"&gt;&lt;img alt="HP P3410A 160Mbps Ultra3 SCSI Net RAID Array Controllers" src="http://ws.amazon.com/widgets/q?MarketPlace=US&amp;amp;ServiceVersion=20070822&amp;amp;ID=AsinImage&amp;amp;WS=1&amp;amp;Format=_SL160_&amp;amp;ASIN=B00006HOWV&amp;amp;tag=internmark032-20" /&gt;&lt;/a&gt;accordingly large partitions. Unlike RAID 3, the parity data are integrated in the stripes&amp;nbsp;on all drives and are distributed in a way that will have a positive impact on performance.&lt;br /&gt;
Consequently, RAID 5 offers a high level of performance for all kinds of applications.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;The Sky's the Limit: Nested RAID&lt;/b&gt;&lt;br /&gt;
If the data transfer rate of an array with several drives is still not enough, you can&lt;br /&gt;
combine and nest RAID arrays any way you like. These configurations are called Nested&lt;br /&gt;
RAID (multiple RAID levels), but you'll encounter them very rarely - and no wonder,&lt;br /&gt;
because "conventional" arrays are generally fast enough.&lt;br /&gt;
As far as we know, controllers supporting Nested RAID are not yet available in the IDE&lt;br /&gt;
sector (with the exception of RAID 10). For SCSI, be prepared to quickly dish out several&lt;br /&gt;
hundred to some thousand dollars if you want to set up an elaborate RAID solution.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;RAID Level 0+1&lt;/b&gt;&lt;br /&gt;
The most popular Nested Raid is probably 0+1. You'll need an even number of hard&lt;br /&gt;
drives for this, but at least four. Use half of the hard drives to create a stripe set (RAID 0),&lt;br /&gt;
while the resulting construct is simply mirrored (with RAID 1). You will then get almost&lt;br /&gt;
four times the read performance and about twice the write performance relative to a&lt;br /&gt;
single hard drive.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;RAID Level 50 (5+0)&lt;/b&gt;&lt;br /&gt;
The performance of a RAID 5 with several drives is not good enough for you? Then&lt;br /&gt;
simply create a stripe set consisting of two identical RAID 5 arrays. Though data security&lt;br /&gt;
is no longer a given now (an array is to be considered a drive in this case), performance&lt;br /&gt;
can theoretically be doubled once more. In reality, you'll now be faced with the limits of&lt;br /&gt;
what PCI and network connections will allow.&lt;br /&gt;
Naming is an important factor in Multiple or Nested RAID configurations. While RAID&lt;br /&gt;
0+1 works on the lower level with stripe sets and mirrors only on the upper level, with&lt;br /&gt;
RAID 10 it's exactly the opposite. As the latter does not really make sense, the wrong&lt;br /&gt;
nomenclature would be less grave in this case.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Nested RAID and Security: It's All or Nothing&lt;/b&gt;&lt;br /&gt;
Now, a few words on the cascaded application of RAID arrays, even though most of you&lt;br /&gt;
will probably never be in a situation to have to worry about linked drives like this.&lt;br /&gt;
Combining several RAID arrays is efficient and prudent, but perfect data security can be&lt;br /&gt;
achieved only if each array is just as safe in and of itself. A RAID 5 consisting of&lt;br /&gt;
multiple RAID 0 arrays is not secure, because if one of the drives of a secondary array&lt;br /&gt;
crashes, its data cannot be recovered.&lt;br /&gt;
&lt;br /&gt;
RAID Levels: Security and Performance at a Glance&lt;br /&gt;
RAID Number of drives Data security Availability Capacity Performance Cost&lt;br /&gt;
0 1+ unsatisfactory bad 100% very good very low&lt;br /&gt;
1 2 good good 50% satisfactory low&lt;br /&gt;
3 3+ satisfactory good (x-1) / x satisfactory medium&lt;br /&gt;
5 3+ satisfactory good (x-1) / x good medium&lt;br /&gt;
0+1 4,6,8... good good 50% good medium&lt;br /&gt;
The Key to Success: Block Size&lt;br /&gt;
&lt;br /&gt;
In RAID arrays, the block size generally also determines the stripe size (not in RAID 1).&lt;br /&gt;
The principles concerning block size and wasted memory space apply equally to RAID&lt;br /&gt;
configurations: if, for example, the blocks have a size of 64 KB, then at least 64 KB are&lt;br /&gt;
written at all times - even if there's only a text file with 2 KB. So, the smaller the average&lt;br /&gt;
file size, the smaller the block size should be.&lt;br /&gt;
&lt;br /&gt;
But block size is also significant in terms of the performance to be expected, as the&lt;br /&gt;
&lt;a href="http://www.amazon.com/Netgear-ReadyNAS-Desktop-Network-Attached/dp/B0013FW8XS?ie=UTF8&amp;amp;tag=internmark032-20&amp;amp;link_code=bil&amp;amp;camp=213689&amp;amp;creative=392969" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;" target="_blank"&gt;&lt;img alt="Netgear ReadyNAS Duo 2-Bay 1 TB (1 x 1 TB) Desktop Network Attached Storage RND2110" src="http://ws.amazon.com/widgets/q?MarketPlace=US&amp;amp;ServiceVersion=20070822&amp;amp;ID=AsinImage&amp;amp;WS=1&amp;amp;Format=_SL160_&amp;amp;ASIN=B0013FW8XS&amp;amp;tag=internmark032-20" /&gt;&lt;/a&gt;smallest unit also determines when a file can be distributed to two or more drives. This&amp;nbsp;would mean that with a block size of 64 KB, files with less than 64 KB would be written&amp;nbsp;to only one hard drive. This does not happen any faster in a RAID array than on a single&amp;nbsp;hard drive.&lt;br /&gt;
&lt;img alt="" border="0" height="1" src="http://www.assoc-amazon.com/e/ir?t=internmark032-20&amp;amp;l=bil&amp;amp;camp=213689&amp;amp;creative=392969&amp;amp;o=1&amp;amp;a=B0013FW8XS" style="border: none !important; margin: 0px !important; padding: 0px !important;" width="1" /&gt;&lt;br /&gt;
On the other hand, a file with 150 KB would be distributed to three hard drives (if&amp;nbsp;available): 64 + 64 + 22 KB. The controller is now able to read from all three drives&amp;nbsp;simultaneously, which reduces the read operation immensely.</description><link>http://informationstechnology.blogspot.com/2011/03/understand-of-raid.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5503046232652716232.post-7654500962442281251</guid><pubDate>Sat, 19 Mar 2011 13:14:00 +0000</pubDate><atom:updated>2011-03-22T21:23:18.081+08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Battery</category><title>How to prolong lithium-based batteries</title><description>Battery research is focusing heavily on lithium chemistries, so much so that one could&lt;br /&gt;
presume that all portable devices will be powered with lithium-ion batteries in the future.&lt;br /&gt;
In many ways, lithium-ion is superior to nickel and lead-based chemistries and the&lt;br /&gt;
applications for lithium-ion batteries are growing as a result.&lt;br /&gt;
Lithium-ion has not yet fully matured and is being improved continuously. New metal&lt;br /&gt;
and chemical combinations are being tried every six months to increase energy density&lt;br /&gt;
and prolong service life. The improvements in longevity after each change will not be&lt;br /&gt;
known for a few years.&lt;br /&gt;
&lt;br /&gt;
A lithium-ion battery provides 300 to 500 discharge/charge cycles. The battery prefers a&lt;br /&gt;
partial rather than a full discharge. Frequent full discharges should be avoided when&lt;br /&gt;
possible. Instead, charge the battery more often or use a larger battery. There is no&lt;br /&gt;
concern of memory when applying unscheduled charges.&lt;br /&gt;
Although lithium-ion is memory-free in terms of performance deterioration, engineers&lt;br /&gt;
&lt;a href="http://www.amazon.com/Energizer-L91BP-8-Lithium-Battery-8-Pack/dp/B0000DC4EL?ie=UTF8&amp;amp;tag=internmark032-20&amp;amp;link_code=bil&amp;amp;camp=213689&amp;amp;creative=392969" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;" target="_blank"&gt;&lt;img alt="Energizer L91BP-8 Lithium AA Photo Battery (8-Pack)" src="http://ws.amazon.com/widgets/q?MarketPlace=US&amp;amp;ServiceVersion=20070822&amp;amp;ID=AsinImage&amp;amp;WS=1&amp;amp;Format=_SL160_&amp;amp;ASIN=B0000DC4EL&amp;amp;tag=internmark032-20" /&gt;&lt;/a&gt;often refer to "digital memory" on batteries with fuel gauges. Short discharges with&lt;br /&gt;
subsequent recharges do not provide the periodic calibration needed to synchronize the&lt;br /&gt;
fuel gauge with the battery's state-of-charge. A deliberate full discharge and recharge&lt;br /&gt;
every 30 charges corrects this problem. Letting the battery run down to the cut-off point&lt;br /&gt;
in the equipment will do this. If ignored, the fuel gauge will become increasingly less&lt;br /&gt;
accurate.&lt;br /&gt;
&lt;br /&gt;
&lt;img alt="" border="0" height="1" src="http://www.assoc-amazon.com/e/ir?t=internmark032-20&amp;amp;l=bil&amp;amp;camp=213689&amp;amp;creative=392969&amp;amp;o=1&amp;amp;a=B0000DC4EL" style="border: none !important; margin: 0px !important; padding: 0px !important;" width="1" /&gt;&lt;br /&gt;
&lt;br /&gt;
Aging of lithium-ion is an issue that is often ignored. lithium-based batteries have a&lt;br /&gt;
lifetime of two to three years. The clock starts ticking as soon as the battery comes off the&lt;br /&gt;
manufacturing line. The capacity loss manifests itself in increased internal resistance&lt;br /&gt;
caused by oxidation. Eventually, the cell resistance will reach a point where the pack can&lt;br /&gt;
no longer deliver the stored energy, although the battery may still contain ample charge.&lt;br /&gt;
&lt;br /&gt;
The speed by which lithium-ion ages is governed by temperature and state-of-charge.&lt;br /&gt;
Figure 1 illustrates the capacity loss as a function of these two parameters.&lt;br /&gt;
Figure 1: Permanent capacity loss of lithium-ion as a function of temperature and charge level.&lt;br /&gt;
High charge levels and elevated temperatures hasten permanent capacity loss. Improvements in chemistry&lt;br /&gt;
have increased the storage performance of lithium-ion batteries.&lt;br /&gt;
2&lt;br /&gt;
There are no remedies to restore lithium-ion once worn out. A momentarily improvement&lt;br /&gt;
in performance is noticeable when heating up the battery but the high internal resistance&lt;br /&gt;
will revert to its former state with normal temperature.&lt;br /&gt;
&lt;br /&gt;
If possible, store the battery in a cool place at about a 40% state-of-charge. This reserve&lt;br /&gt;
charge is needed to keep the battery and its protection circuit operational during&lt;br /&gt;
prolonged storage. The most harmful combination is full charge at high temperature. This&lt;br /&gt;
is the case when placing a cell phone or spare battery in a hot car. Running a laptop&lt;br /&gt;
computer on the mains has a similar temperature problem. While the battery is kept fully&lt;br /&gt;
charged, the inside temperature during operation rises to 45•C (113•F).&lt;br /&gt;
&lt;br /&gt;
In spite of the high operating temperature and the harm inflicted to the battery during the&lt;br /&gt;
use in a laptop, removing the battery when running on fixed power poses some risk to the&lt;br /&gt;
laptop and manufacturers caution against it. There are issues of dust and moisture&lt;br /&gt;
accumulating inside the battery casing that could cause damage to the unit. By not&lt;br /&gt;
removing the battery, a replacement may be needed a little sooner but the battery&lt;br /&gt;
manufacturers and dealers are happy to provide a new pack.&lt;br /&gt;
&lt;br /&gt;
A large number of lithium-ion batteries for cell phones are being discarded under the&lt;br /&gt;
warranty return policy. Some failed batteries are sent to service centers or the&lt;br /&gt;
manufacturer, where they are refurbished. Studies show that 80%-90% of the returned&lt;br /&gt;
batteries can be repaired and returned to service.&lt;br /&gt;
&lt;br /&gt;
&lt;iframe align="left" frameborder="0" marginheight="0" marginwidth="0" scrolling="no" src="http://rcm.amazon.com/e/cm?t=internmark032-20&amp;amp;o=1&amp;amp;p=8&amp;amp;l=bpl&amp;amp;asins=1441922342&amp;amp;fc1=000000&amp;amp;IS2=1&amp;amp;lt1=_blank&amp;amp;m=amazon&amp;amp;lc1=0000FF&amp;amp;bc1=000000&amp;amp;bg1=FFFFFF&amp;amp;f=ifr" style="align: left; height: 245px; padding-right: 10px; padding-top: 5px; width: 131px;"&gt;&lt;/iframe&gt;&lt;br /&gt;
Some lithium-ion batteries fail due to excessive low discharge. If discharged below 2.5&lt;br /&gt;
volts per cell, the internal safety circuit opens and the battery appears dead. A charge&lt;br /&gt;
with the original charger is no longer possible. The Cadex battery analyzers feature a&lt;br /&gt;
boost function that reactivates the protection circuit of a failed battery and enables a&lt;br /&gt;
recharge. However, if the cell voltage has fallen below 1.5V/cell and has remained in that&lt;br /&gt;
state for a few days, a recharge should be avoided because of safety concerns. To prevent&lt;br /&gt;
failure, never store the battery fully discharged. Apply some charge before storage, and&lt;br /&gt;
then charge fully before use.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Simple Guidelines&lt;/b&gt;&lt;br /&gt;
• Avoid full discharges; recharge lithium-ion more often. Repetitive random charge does&lt;br /&gt;
not harm the battery. There is no memory.&lt;br /&gt;
• Keep the lithium-ion battery cool but do not freeze. Avoid a hot car. For prolonged&lt;br /&gt;
storage, keep the battery at a 40% charge level.&lt;br /&gt;
• If your laptop runs without a battery and fixed power is used most of the time, remove&lt;br /&gt;
and store the battery in a cool place.&lt;br /&gt;
• Avoid purchasing spare lithium-ion batteries for later use. Observe manufacturing date.&lt;br /&gt;
Do not buy old stock, even if sold at clearance prices.</description><link>http://informationstechnology.blogspot.com/2011/03/how-to-prolong-lithium-based-batteries.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5503046232652716232.post-1595661600086319254</guid><pubDate>Sun, 26 Dec 2010 13:56:00 +0000</pubDate><atom:updated>2010-12-26T21:56:57.613+08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Software</category><title>Bing Maps 3D</title><description>Bing Maps 3D brings you another step closer to knowing "what it is like out there". You can search, browse, and organize local information viewed in three dimensions, just the way it exists in the real world.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;u&gt;System Requirements&lt;/u&gt;&lt;/b&gt;&lt;br /&gt;
Supported Operating Systems:Windows Vista;Windows XP&lt;br /&gt;
Microsoft Internet Explorer 6, Windows Internet Explorer 7 or later, or Firefox 2.0 or later&lt;br /&gt;
250 MB or more hard disk space&lt;br /&gt;
A 1 GHz processor (2.8 GHz or faster recommended)&lt;br /&gt;
256 MB of system memory (1 GB recommended)&lt;br /&gt;
32 MB video card (256 MB recommended) that supports Microsoft DirectX 9&lt;br /&gt;
A high speed or broadband Internet connection&lt;br /&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;iframe allowfullscreen='allowfullscreen' webkitallowfullscreen='webkitallowfullscreen' mozallowfullscreen='mozallowfullscreen' width='320' height='266' src='https://www.youtube.com/embed/0TOqikZTBMY?feature=player_embedded' frameborder='0'&gt;&lt;/iframe&gt;&lt;/div&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;a href="http://www.microsoft.com/downloads/en/details.aspx?FamilyID=e9298080-50c4-4f2e-9fc4-4009074996ba&amp;amp;displaylang=en"&gt;Add realistic 3D capabilities&lt;/a&gt;</description><link>http://informationstechnology.blogspot.com/2010/12/bing-maps-3d.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5503046232652716232.post-2332791024879615801</guid><pubDate>Wed, 04 Mar 2009 10:54:00 +0000</pubDate><atom:updated>2009-03-04T18:56:17.181+08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Windows</category><title>Multi pointer in one windows one machine</title><description>&lt;object width="425" height="344"&gt;&lt;param name="movie" value="http://www.youtube.com/v/QW3c1QHvSqc&amp;hl=en&amp;fs=1"&gt;&lt;/param&gt;&lt;param name="allowFullScreen" value="true"&gt;&lt;/param&gt;&lt;param name="allowscriptaccess" value="always"&gt;&lt;/param&gt;&lt;embed src="http://www.youtube.com/v/QW3c1QHvSqc&amp;hl=en&amp;fs=1" type="application/x-shockwave-flash" allowscriptaccess="always" allowfullscreen="true" width="425" height="344"&gt;&lt;/embed&gt;&lt;/object&gt;&lt;br /&gt;&lt;br /&gt;&lt;a href="http://www.microsoft.com/downloads/details.aspx?FamilyID=a137998b-e8d6-4fff-b805-2798d2c6e41d&amp;DisplayLang=en"&gt;Microsoft Windows MultiPoint Software Development Kit (SDK)&lt;/a&gt;</description><link>http://informationstechnology.blogspot.com/2009/03/multi-pointer-in-one-windows-one.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5503046232652716232.post-8253190564629180218</guid><pubDate>Fri, 01 Feb 2008 12:05:00 +0000</pubDate><atom:updated>2008-02-01T20:06:37.197+08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Computer Security</category><title>Fighting Spam</title><description>How prevalent is Spam?  According to Scott McAdams, OMA Public Affairs and Communications Department (www.oma.org):&lt;br /&gt;&lt;br /&gt;“Studies show unsolicited or “junk” e-mail, known as spam, accounts for roughly half of all e-mail messages received. Although once regarded as little more than a nuisance, the prevalence of spam has increased to the point where many users have begun to express a general lack of confidence in the effectiveness of e-mail transmissions, and increased concern over the spread of computer viruses via unsolicited messages.”&lt;br /&gt;&lt;br /&gt;In 2003, President Bush signed the  “Can Spam” bill, in December of 2003 which is the first national standards around bulk unsolicited commercial e-mail.  The bill, approved by the Senate by a vote of 97 to 0, prohibits senders of unsolicited commercial e-mail from using false return addresses to disguise their identity (spoofing) and the use of dictionaries to generate such mailers. In addition, it prohibits the use of misleading subject lines and requires that emails include and opt-out mechanism. The legislation also prohibits senders from harvesting addresses off Web sites. Violations constitute a misdemeanor crime subject to up to one year in jail.  &lt;br /&gt;&lt;br /&gt;One major point that needs to be discussed about this:  spam is now coming from other countries in ever-greater numbers. These emails are harder to fight, because they come from outside our country’s laws and regulations.  Because the Internet opens borders and thinks globally, these laws are fine and good, but do not stop the problem.&lt;br /&gt;&lt;br /&gt;So what do you do about this?  Her are the top 5 Rules to do to protect from spam.&lt;br /&gt;Number 1:  Do what you can to avoid having your email address out on the net.   &lt;br /&gt;There are products called “spam spiders” that search the Internet for email addresses to send email to.  If you are interested, do a search on “spam spider” and you will be amazed at what you get back.  Interestingly, there is a site, WebPoison.org, which is an open source project geared to fight Internet "spambots" and "spam spiders", by giving them bogus HTML web pages, which contain bogus email addresses&lt;br /&gt;&lt;br /&gt;A couple suggestions for you:  &lt;br /&gt;&lt;br /&gt;a) use form emails, which can hide addresses or also b) use addresses like sales@company.com instead of your full address to help battle the problem. &lt;br /&gt;&lt;br /&gt;c) There are also programs that encode your email, like jsGuard, which encodes your email address on web pages so that while spam spiders find it difficult or impossible to read your email address.&lt;br /&gt;&lt;br /&gt;Number 2:  Get spam blocking software.  There are many programs out there for this.  (go to www.cloudmark.com or www.mailwasher.net for example).  You may also buy a professional version.  Whatever you do, get the software. It will save you time.  The software is not foolproof, but they really do help.  You usually have to do some manual set up to block certain types of email.&lt;br /&gt;Number 3: Use the multiple email address approach.&lt;br /&gt;There are a lot of free email addresses to be had.  If you must subscribe to newsletters, then have a “back-up” email address. It would be like giving your sell phone number to your best friends and the business number to everyone else.&lt;br /&gt;&lt;br /&gt;Number 4:  Attachments from people you don’t know are BAD, BAD, BAD.&lt;br /&gt;A common problem with spam is that they have attachments and attachments can have viruses.  Corporations often have filters that don’t let such things pass to you.  Personal email is far more “open country” for spamers.  General rule of thumb:  if you do not know who is sending you something, DO NOT OPEN THE ATTACHMENT.  Secondly, look for services that offer filtering. Firewall vendors offer this type of service as well.&lt;br /&gt;&lt;br /&gt;Number 5:  Email services now have “bulk-mail” baskets.  If what you use currently does not support this, think about moving to a new vender.  The concept is simple.  If you know someone, they can send you emails.  If you don’t know them, put them in the bulk email pile and then “choose” to allow them into your circle.  Spam Blocking software has this concept as well, but having extra layers seems critical these days, so it is worth looking into.</description><link>http://informationstechnology.blogspot.com/2008/02/fighting-spam.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5503046232652716232.post-3344725666752440288</guid><pubDate>Thu, 31 Jan 2008 13:55:00 +0000</pubDate><atom:updated>2008-01-31T21:55:40.193+08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Computer Security</category><title>Fighting off Viruses:  Advancements in Antivirus Software Suites</title><description>Protecting your computer from a virus is getting harder and harder each day. While it may border on the paranoid, it goes without saying that you can’t leave your guard down for one second. Even corporate giant Microsoft has found its own systems compromised on more than one occasion.&lt;br /&gt;&lt;br /&gt;Remember the “good old days”, before the advent of the Internet and downloadable programs? Life was simple then in terms of computer viruses. With the primary way in which a virus could be transmitted being limited to floppy disks, the ability to catch and eradicate the virus was a lot easier. By today’s standards, it used to take quite a while before a virus was able to infect a computer and slow down the system. The antivirus software of that time was typically able to identify and eradicate viruses before they caused too much damage. Additionally, computer users were pretty savvy on how to protect themselves in terms of scanning all floppy disks before copying them to our desktop.&lt;br /&gt;&lt;br /&gt;The Internet helped change all that. The Internet provided a conduit by which viruses could move from host to host with lightening speed. No longer could a computer user just worry about floppy disks as points of entry, but they now had to worry about email, email attachments, peer-to-peer file sharing, instant messaging, and software downloads. Today’s viruses can attack through multiple entry points, spread without human intervention, and take full advantage of vulnerabilities within a system or program. With technology advancing everyday, and the convergence of computers with other mobile devices, the potential of new types of threats also increase.&lt;br /&gt;&lt;br /&gt;Protecting Your Computer&lt;br /&gt;Luckily, the advancement of antivirus software has kept pace with current virus threats. Antivirus software is essential to a computer’s ability to fend off viruses and other malicious programs. These products are designed to protect against the ability of a virus to enter a computer through email, web browsers, file servers and desktops. Additionally, these programs offer a centralized control feature that handle deployment, configuration and updating.&lt;br /&gt;A computer user should remain diligent and follow a few simple steps to protect against the threat of a virus:&lt;br /&gt;&lt;br /&gt;1. Evaluate your current computer security system.&lt;br /&gt;With the threat of a new generation of viruses able to attack in a multitude of ways, the approach of having just one antivirus software version has become outdated. You need to be confident that you have protected all aspects of your computer system from the desktop to the network, and from the gateway to the server. Consider a more comprehensive security system which includes several features including antivirus, firewall, content filtering, and intrusion detection. This type of system will make it more difficult for the virus to penetrate your system.&lt;br /&gt;2. Only install antivirus software created by a well-known, reputable company.&lt;br /&gt;Because new viruses erupt daily, it is important that you regularly update your antivirus software. Become familiar with the software’s real-time scan feature and configure it to start automatically each time you boot your computer. This will protect your system by automatically checking your computer each time it is powered up.&lt;br /&gt;3. Make it a habit to always scan all new programs or files no matter from where they originate.&lt;br /&gt;4. Exercise caution when opening binary, Word, or Excel documents of unknown sources especially if they were received during an online chat or as an attachment to an email.&lt;br /&gt;5. Perform regular backups in case your system is corrupted. It may be the only way to recover your data if infected.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Recommended Antivirus Software&lt;/strong&gt;&lt;br /&gt;&lt;br /&gt;There are numerous applications available to consumers. With a little research, you can pick the program that is right for you. Many programs provide a trial version which allows you to download the program and test its abilities. However, be aware that some anti-virus programs can be difficult to uninstall. As a precaution make sure to set up a System Restore point before installing.&lt;br /&gt;&lt;br /&gt;Here are a few programs which typically receive high marks in terms of cost, effectiveness, ease of use, and customer service.&lt;br /&gt;&lt;br /&gt;The Shield Pro 2005™ provides virus protection and hacker security through ongoing support and updates. When a virus breaks out, The Shield Pro 2005™ promises to provide a patch within 2-3 hours and a fix for the virus within 5 hours. You can set your computer to update viruses weekly and run a complete virus scan.&lt;br /&gt;&lt;br /&gt;BitDefender 9 Standard provides antivirus protection, as well as Peer-2-Peer Applications protection, full email protection, and heuristics in a virtual environment. This provides a new security layer that keeps the operating system safe from unknown viruses by detecting malicious pieces of code for which signatures have not been released yet.&lt;br /&gt;&lt;br /&gt;Kaspersky Anti-Virus Personal 5.0 program is simple to install and use. The user only needs to choose from three levels of protection. It allows updates as frequently as every hour while promising not to disrupt your computer. The program also offers a two-tier email protection feature and round-the-clock technical support.&lt;br /&gt;&lt;br /&gt;PC-cillin Internet Security combines antivirus security and a personal firewall—for comprehensive protection against viruses, worms, Trojans, and hackers. It also detects and removes spyware and blocks spam. It even guards against identity theft by blocking phishing and pharming attacks.&lt;br /&gt;&lt;br /&gt;AVG Anti-Virus Free Edition is a free downloadable antivirus program that has received high marks for its reliability. In the past, free downloadable antivirus programs have been viewed skeptically because of issues relating to its reliability. However, AVG from Grisoft, remains one of the best-known free anti-virus programs available. While AVG can not be installed on a server operating system and there is no technical support, it still makes a good choice for many home computer users. The best part is that since it is free, you can try it with no further obligation necessary.</description><link>http://informationstechnology.blogspot.com/2008/01/fighting-off-viruses-advancements-in.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5503046232652716232.post-2469802929246029755</guid><pubDate>Wed, 30 Jan 2008 14:30:00 +0000</pubDate><atom:updated>2008-01-30T22:31:25.572+08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Computer Security</category><title>Department of Defense Crackdown on Security</title><description>The top commander of the department of Defense network operations just ordered a crackdown on security. According to a recent article by NetworkWorld on January 16,2006, Lt. General Charles Croom is quoted as saying, “The attacks are coming from everywhere and they’re getting better.” His talk was the keynote address at the Department of Defense Cyber Crime Conference held on January 9 - 14, 2005 in Clearwater, Florida. The event is sponsored by the Defense Cyber Crime Center and the Joint Task Force. Over 500 computer crime specialists from the FBI and the military attended the event.&lt;br /&gt;&lt;br /&gt;The crackdown was related to a recent arrest of a “Computer Virus Broker” named Jeanson James Ancheta. On further investigation, a Department of Justice press release from Nov 3rd, 2005 offered the following information on this incident, “In the first prosecution of its kind in the nation, a well-known member of the “botmaster underground” has been indicted on federal charges for profiting from the use of “botnets” – armies of computers that are under the control of the botmaster and are used to launch destructive attacks or to send huge quantities of spam across the Internet.&lt;br /&gt;&lt;br /&gt;Jeanson James Ancheta, 20, of Downey, California, was arrested this morning by special agents with the Federal Bureau of Investigation. Ancheta was indicted yesterday in two separate conspiracies, as well as substantive charges of attempting to cause damage to protected computers, causing damage to computers used by the federal government in national defense, accessing protected computers without authorization to commit fraud and money laundering.”&lt;br /&gt;The press release goes on to describe more details of this scheme that clearly show why the&lt;br /&gt;&lt;br /&gt;Deparment of Defense is so concerned (for more information go to:&lt;br /&gt;&lt;br /&gt;http://www.usdoj.gov/criminal/cybercrime/anchetaArrest.htm )&lt;br /&gt;&lt;br /&gt;“Ancheta had become an affiliate of several different advertising service companies, and those companies paid him a commission based upon the number of installations. To avoid detection by network administrators, security analysts and law enforcement, Ancheta would vary the download times and rates of the adware installations. When companies hosting Ancheta’s adware servers discovered the malicious activity, Ancheta redirected his botnet armies to a different server he controlled to pick up adware. To generate the roughly $60,000 he received in advertising affiliate proceeds, Ancheta caused the surreptitious installation of adware on approximately 400,000 compromised computers. Ancheta used the advertising affiliate proceeds he earned to pay for, among other things, the multiple servers used to conduct his schemes.&lt;br /&gt;&lt;br /&gt;Ancheta used programs powerful enough to cause the infection of computers at the Weapons Division of the United States Naval Air Warfare Center in China Lake, as well as computers belonging to the Defense Information Systems Agency, a component of the United States Department of Defense. Both networks are used exclusively by the federal government in furtherance of national defense. After being arrested this morning at the FBI Field Office in Los Angeles, Ancheta was transported to United States District Court in Los Angeles. It is unclear if he will make his initial court appearance this afternoon or tomorrow. Ancheta is charged with two counts of conspiracy, two counts of attempted transmission of code to a protected computer, two counts of transmission of code to a government computer, five counts of accessing a protected computer to commit fraud and five counts of money laundering. Count 17 of the indictment seeks the forfeiture of more than $60,000 in cash, a BMW automobile and computer equipment that the indictment alleges are the proceeds and instrumentalities of Ancheta’s illegal activity.”&lt;br /&gt;&lt;br /&gt;Some recent news. Ancheta pleaded guilty to charges of conspiring to violate anti-spam and computer misuse laws, and fraud and will serve from 4-6 years in prison, under the plea agreement - plus heavy fines.</description><link>http://informationstechnology.blogspot.com/2008/01/department-of-defense-crackdown-on.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5503046232652716232.post-6639457338719095814</guid><pubDate>Mon, 28 Jan 2008 13:56:00 +0000</pubDate><atom:updated>2008-01-28T21:58:30.931+08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Computer Security</category><title>Computer Viruses that Come a Callin’</title><description>&lt;p&gt;Every day new computer viruses are created to annoy us and to wreck havoc on our computer systems. Below are ten viruses currently cited as being the most prevalent in terms of being seen the most or in their ability to potentially cause damage.   New viruses are created daily.  This is by no means an all inclusive list. The best thing you can do is to remain vigilant, keep your anti-virus software updated, and stay aware of the current computer virus threats.&lt;br /&gt;Virus:  Trojan.LodearA Trojan horse that attempts to download remote files. It will inject a .dll file into the EXPLORER.EXE process causing system instability.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Virus:  W32.Beagle.CO@mmA mass-mailing worm that lowers security setting&lt;/strong&gt;s.  &lt;/p&gt;&lt;p&gt;It can delete security-related registry sub keys and may block access to security-related websites.&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;strong&gt;Virus:  Backdoor.Zagaban&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;&lt;/strong&gt;&lt;br /&gt;A Trojan horse that allows the compromised computer to be used as a covert proxy and which may degrade network performance.&lt;br /&gt;Virus: W32/Netsky-PA mass-mailing worm which spreads by emailing itself to addresses produced from files on the local drives.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Virus:  W32/Mytob-GHA mass-mailing worm and IRC backdoor Trojan for the Windows platform.&lt;/strong&gt;  &lt;/p&gt;&lt;p&gt;Messages sent by this worm will have the subject chosen randomly from a list including titles such as:  Notice of account limitation, Email Account Suspension, Security measures, Members Support, Important Notification.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Virus:  W32/Mytob-EXA mass-mailing worm and IRC backdoor Trojan similar in nature to W32-Mytob-GH.&lt;/strong&gt;  &lt;/p&gt;&lt;p&gt;W32/Mytob-EX runs continuously in the background, providing a backdoor server which allows a remote intruder to gain access and control over the computer via IRC channels.  This virus spreads by sending itself to email attachments harvested from your email addresses.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Virus:  W32/Mytob-AS, Mytob-BE, Mytob-C, and Mytob-ER&lt;/strong&gt;&lt;/p&gt;&lt;strong&gt;&lt;/strong&gt;&lt;p&gt;&lt;br /&gt;This family of worm variations possesses similar characteristics in terms of what they can do.   They are mass-mailing worms with backdoor functionality that can be controlled through the Internet Relay Chat (IRC) network.   Additionally, they can spread through email and through various operating system vulnerabilities such as the LSASS (MS04-011).&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;strong&gt;Virus:  Zafi-DA mass mailing worm and a peer-to-peer worm which copies itself to the Windows system folder with the filename Norton Update.exe.  &lt;/strong&gt;&lt;/p&gt;&lt;p&gt;It can then create a number of files in the Windows system folder with filenames consisting of 8 random characters and a DLL extension.  W32/Zafi-D copies itself to folders with names containing share, upload, or music as ICQ 2005a new!.exe or winamp 5.7 new!.exe. W32/Zafi-D will also display a fake error message box with the caption "CRC: 04F6Bh" and the text "Error in packed file!". Virus:  W32/Netsky-DA mass-mailing worm with IRC backdoor functionality which can also infect computers vulnerable to the LSASS (MS04-011) exploit.&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;strong&gt;Virus: W32/Zafi-B&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;&lt;/strong&gt;&lt;br /&gt;A peer-to-peer (P2P) and email worm that will copy itself to the Windows system folder as a randomly named EXE file. This worm will test for the presence of an internet connection by attempting to connect to www.google.com or www.microsoft.com.  A bilingual, worm with an attached Hungarian political text message box which translates to “We demand that the government accommodates the homeless, tightens up the penal code and VOTES FOR THE DEATH PENALTY to cut down the increasing crime. Jun. 2004, Pécs (SNAF Team)”&lt;br /&gt; &lt;/p&gt;</description><link>http://informationstechnology.blogspot.com/2008/01/computer-viruses-that-come-callin.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5503046232652716232.post-953886851490093559</guid><pubDate>Sat, 26 Jan 2008 03:07:00 +0000</pubDate><atom:updated>2008-01-26T11:10:17.994+08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Bluetooth</category><title>Bluetooth And Apple</title><description>The new Apple powerbook G4 are among the first computers to offer Bluetooth technology 2.0+EDR. The 2.0+EDR technology, which still backwards compatible with 1.0, is up to three times faster than previous versions, offering maximum data rate transfers of up to 3 MBps. Being the first company to certify a system with 2.0+EDR, Apple continues to make great use of the Bluetooth technology.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Full support &lt;/strong&gt;&lt;br /&gt;&lt;strong&gt;&lt;br /&gt;&lt;/strong&gt;In addition to the powerbook G4 portables, there are other Bluetooth enabled computers available from Apple, including the iBook, iMac G5, eMac, and the Power Mac G5.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Making life easier&lt;/strong&gt;&lt;br /&gt;When you turn the Bluetooth feature on, your Mac can easily perform a file transfer or even a synchronization. From the Bluetooth selectionmenu, you can choose to either send a file or browse devices, quickly and easily. Or, you can click the sync button in iSync to update your cell phone or Palm OS handheld.&lt;br /&gt;&lt;br /&gt;The Mac and GSM/GPRS mobile phone with Bluetooth work to make each other more useful. By using iSync, you can keep your phone updated without having to type any info, as you can keep the information in the more manageable address book on your Mac instead.&lt;br /&gt;&lt;br /&gt;You can also use your Bluetooth enabled Mac to print documents and digital images to select a printer that also supports the technology of Bluetooth. Or, you can also use a headset to talk to your friends during an iChat session.&lt;br /&gt;&lt;br /&gt;Your Mac also has the ability to use Bluetooth technology to communicate with your Palm OS handheld. This way, you can perform a HotSync operation without using any cables. You can also send your business card or calendar events directly to someone else's handheld usingthe technology of Bluetooth.&lt;br /&gt;&lt;br /&gt;The implementation of Bluetooth by Apple is the latest in a series of moves that have caused great shift in the computer industry. Apple established USB as the standard interface with the launching of the first Mac back in 1998.&lt;br /&gt;&lt;br /&gt;Since then, Apple established the 802.11 wireless standard of networking with the launch of the iBook and AirPort in 1999. During 2003, Apple launched AirPort Extreme, which was based onthe new 802.11g high speed technology of wireless.&lt;br /&gt;&lt;br /&gt;Now, Bluetooth helps to further strengthen the dominant position of the Mac in wireless communications, helping to preserve Apple's reputation for being the first to market with innovative technology that integrates right into the operating system.</description><link>http://informationstechnology.blogspot.com/2008/01/bluetooth-and-apple.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5503046232652716232.post-2184239591111042111</guid><pubDate>Mon, 21 Jan 2008 15:16:00 +0000</pubDate><atom:updated>2008-01-21T23:17:00.510+08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Computer Security</category><title>Just what is Intelligent Explorer? For your safety, you really need to know</title><description>I recently hit, by mistake, what I thought was an Explorer upgrade option.  It turned out to be a pop-up appearing legitimate but really was not. It uploaded a product called Intelligent Explorer on my machine.  What a nightmare!&lt;br /&gt;&lt;br /&gt;I did some research on the web and found messages like this one from a BullGuard Antivirus Forum,&lt;br /&gt;&lt;br /&gt;"PLEASE HELP!!!  I HAVE A SPYWARE, TROJAN AND HIJACKER ON MY COMPUTER.  I HAVE RUN BULLGUARD, CWSHREDDER AND AD-AWARE.  ALL HAVE PICKED UP THE VIRUSES AND SAID THAT THEY HAVE BEEN MOVED/REMOVED BUT WHEN I LOG ONTO THE INTERNET THAT DAMN INTELLIGENT EXPLORER TOOLBAR IS SHOWING"&lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight: bold;"&gt;Another message from spywareinfo Forum goes something like this:&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;"Hey I'm having issues with something called Internet explorer toolbar - Intelligent explorer. I can’t find a way to remove it from my comp and I really don’t want to reinstall windows. I've used spybot, ad-ware, and cw shredder but nothing seems to work."&lt;br /&gt;&lt;br /&gt;It appears that Intelligent Explorer allows other software to be downloaded to your machine and this is where the problem occurs. What is even more remarkable is that by downloading Intelligent Explorer, their license grants them the right to install software add-ins on your computer at their will.  Take a look at what the software license for Intelligent Explore says (go to http://www.ieplugin.com/terms.html to read it all):&lt;br /&gt;&lt;br /&gt;"You grant to us the right, exercisable by us until you uninstall the Software or this agreement is otherwise terminated, to provide to you the Service of downloading and causing to be displayed advertising material on your computer, through ‘pop-up’ or other display while you use your browser.  You acknowledge and agree that installation of the Software may automatically modify toolbars and other settings of your browser.  By installing the Software you agree to such modifications."&lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight: bold;"&gt;The company, IBC incorporated, is incorporated in Belize.  I really can't believe this license!&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;One end user found highly objectionable pop-up advertisements generated by this software bundled with Intelligent Explorer in the form of extreme pornography.&lt;br /&gt;&lt;br /&gt;I have yet to break this.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Intelligent Explorer is a plug-in, which can create a new home page, as well as start up and endless loop of pop-ups. You can remove the view bar, but then starting up Internet Explorer will cause it to reappear.  I asked some friends to help, and no one could tell me what to do.&lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight: bold;"&gt;This is what I did:&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;   I bought a copy of a program called XoftSpy and it removed the software. It took two scans and a reboot to do it. This is not an advertisement for this product.  They advertised it was free, which it was to run, but then I had to buy it to actually fix anything. It cost me $40 and I am sure that there are freeware products out there as well, but that is what ended the nightmare for me. Other spyware products I have seen out there include spybot, NoAdware, Spyware Eliminator, Pal Spyware Remover, and Spyware C.O.P.</description><link>http://informationstechnology.blogspot.com/2008/01/just-what-is-intelligent-explorer-for.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5503046232652716232.post-7190359524339335506</guid><pubDate>Sun, 20 Jan 2008 11:25:00 +0000</pubDate><atom:updated>2008-01-20T19:27:00.882+08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Digital Camera</category><title>UNDERWATER DIGITAL CAMERA: CAPTURING MOMENTS UNDERWATER</title><description>Memories are created just about anywhere. And when I say anywhere, I mean that memories are even created underwater ?so the creation of underwater digital camera.&lt;br /&gt;&lt;br /&gt;An underwater digital camera is not just used to capture underwater memories; some professional marine photographers also use underwater digital cameras in their business. Even marine biologists and scientists use underwater digital cameras to capture marine life and thus be able to study the life and properties of the marine life. But I think it is safe to assume that you, my reader, are neither a marine scientist nor a professional photographer. Like me, you are just some photo junkie who wants to capture underwater moments and just cant figure out how without ruining your cameras.&lt;br /&gt;&lt;br /&gt;Please listen to me when I say that even waterproof cameras cannot withstand underwater photography. To be waterproof is to resist the water in certain levels, submerging in under the water to get the perfect shot is like throwing it out of the window expecting a pick-up truck to pass by and run over it.&lt;br /&gt;&lt;br /&gt;Now if you're really serious about using an underwater digital camera to capture those wacky and funny moments underwater, I suggest that you buy specialty cameras.&lt;br /&gt;&lt;br /&gt;There are rarely underwater digital cameras, as cameras are electronic and cannot withstand water and water pressure. The closest electronics has ever got to producing underwater digital cameras are producing underwater casings for digital cameras. These casing will turn your conventional digital camera into an underwater digital camera.&lt;br /&gt;&lt;br /&gt;If you are shooting with your underwater digital camera, you need to take note of a few things to help you come up with the best images underwater.&lt;br /&gt;&lt;br /&gt;Remember that as you farther under water, light diffuses. This means that your underwater digital camera will produce images darker than those images you took while on land ?this is because of the light diffusion the red spectrum seems darker. To avoid this, use white balance come up with natural colors. Also, pictures taken underwater will come up larger than pictures taken on land with the same zoom effect. Be sure to check your underwater digital camera viewfinder to check the right picture angle and size that you want.&lt;br /&gt;&lt;br /&gt;An underwater digital camera with its built-in flash will produce marine show phenomenon. It is a phenomenon wherein your pictures come out as blurry and with white particles floating above it, to avoid this phenomenon it is advisable to use external flash for your underwater digital camera.&lt;br /&gt;&lt;br /&gt;Before using your underwater digital camera, submerge the camera in the water first for several seconds then check if there are leaks through the case. Make sure that no grain of sand or piece of hair is stuck in between the seal to make sure that water will not permeate the case and thus wet your camera in the process. It is also advisable to put silica gel or two inside the case of your underwater digital camera as long as they don disturb the camera operation. (Silica gel will keep the moisture from forming inside your camera case.)&lt;br /&gt;&lt;br /&gt;Most underwater digital cameras come with optional lenses. Don't be afraid to add these lenses to your underwater digital camera kit. Macro lenses will help you capture small things without getting too close and startling your subject.&lt;br /&gt;&lt;br /&gt;Also, remember to always wash of salt when you're used it under salt water. If the salts are not washed off, in time they will crystallize; act as sands and cause leaks for your camera case. In cases when sands seem to get into the case, they are better washed off with streams of water.&lt;br /&gt;&lt;br /&gt;Check out Sony, Nikon and Canon website for available underwater cases for your digital cameras.</description><link>http://informationstechnology.blogspot.com/2008/01/underwater-digital-camera-capturing.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5503046232652716232.post-3299569873188172625</guid><pubDate>Mon, 14 Jan 2008 12:10:00 +0000</pubDate><atom:updated>2008-01-14T20:11:19.377+08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Digital Camera</category><title>SONY DIGITAL CAMERA: EMBRACING PERFECTION</title><description>Known for producing quality electronics, Sony is also one of the pioneers and the best producers of digital camera. Truly using a Sony digital camera is embracing perfection with its many features exclusive to a Sony digital camera.&lt;br /&gt;&lt;br /&gt;Indeed, one of the best ways to capture your memories forever is thru photos and what better to do it than with a Sony digital camera. Photos are used to remember or when we reminisce of the wonderful times of our lives. And only vivid and detailed photos can help us bring back all those memories. And quality photos are exactly what a Sony digital camera offers to its consumers.&lt;br /&gt;&lt;br /&gt;Equipped with the best optics and imaging technology available, the Sony digital camera line ensures its consumers that a Sony digital camera will only capture more detail, more color and more brightness imaginable.&lt;br /&gt;&lt;br /&gt;Every Sony digital camera has an exclusive Sony technology that enhances photo capturing experience. Armed with the Real Imaging Processor (RIMP), any Sony digital camera allows high digital processing that reduces picture noise and delivers smoother and more detailed images. The RIMP is an intelligent Sony digital camera technology that allows faster shooting time, swifter burst shooting and almost simultaneous processing of your images (enables immediate display of your image) for your Sony digital camera.&lt;br /&gt;&lt;br /&gt;All Sony digital cameras are furnished with Carl Zeiss lens. Carl Zeiss lenses are world renowned for their quality brilliance, outstanding accuracy of colors and enhanced definition with almost zero distortion. With a Carl Zeiss lens, flawless imaging is truly embracing perfection with a Sony digital camera.&lt;br /&gt;&lt;br /&gt;Sony has its own Cyber-shot line of digital camera for all photo fanatics out there. One of the lower ends of their Cyber-shot series of the Sony digital camera is the DSC-L1. The L1is a 4.1 mega pixel camera with a 3x optical zoom and plays MPEG Movie Vx. It is also supplied with a Vario Tessar lens from the Carl Zeiss line.&lt;br /&gt;&lt;br /&gt;A higher version of the L1 is the Sony Cyber-shot DSC-P200. Almost same in all respect with the L1 expect this baby is a 7.2 mega pixel Sony digital camera.&lt;br /&gt;&lt;br /&gt;For those who are serious in their craft, the right Sony digital camera for you id the Cyber-shot DSC-F828. Designed for professional photographers, the F828 has a 28-200mm equivalent of a Carl Zeiss Vario Sonnar lens, which makes it excellent for action and low-light shots. An 6 mega pixel Sony digital camera, it is outfitted with 7x optical zoom and a 1.8 inch LCD screen where you can review the pictures that you just took. The DSC F828 has a four color system that includes RGB+emrald colors and enables night shot/night framing system. The F828 even allows manual exposure, zoom and manual focus controls for your customization needs.&lt;br /&gt;&lt;br /&gt;For the younger and trendier generation, the Sony Cyber-shot DSC-M1 is the right Sony digital camera for you. The M1 is a digital camera and a camcorder in one. It can record either up to five seconds MPEG 4 playback or unlimited video recording, depending on your preferred setting. Shooting with 30 frames per second, it is 5.1 mega pixel camera with a 640 x 480 maximum pixel resolution. It has 3x optical zoom and 2x digital zoom.&lt;br /&gt;&lt;br /&gt;Very lightweight at only 6.5 oz. the M1 is very portable and is only 2x1.1x4.5 inches (dimensions). A USB 2.0 compatible and with PictBridge support, the M1 makes file transferring from your Sony digital camera to your computer as easy as taking pictures.&lt;br /&gt;&lt;br /&gt;Available with accessories such as wrist strap, docking station and a 32MB memory Stick Duo, the M1 comes with an expansion slot that lets you upgrade up to 512MB of memory for further picture taking or video playback. It even has a built in features such as stereo surround, built-in mic and a 2.5inch TFT active matrix LCD display.&lt;br /&gt;&lt;br /&gt;Check out Sony's website at www.sony.com &lt;http://www.sony.com&gt; to look for other available Sony digital camera models that will fit you and your lifestyle.</description><link>http://informationstechnology.blogspot.com/2008/01/sony-digital-camera-embracing.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5503046232652716232.post-4754995416288991191</guid><pubDate>Sun, 13 Jan 2008 11:35:00 +0000</pubDate><atom:updated>2008-01-13T19:35:54.101+08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Digital Camera</category><title>OLYMPUS DIGITAL CAMERA: PROFESSIONAL CAMERAS GO DIGITAL</title><description>Olympus has always been known to produce quality cameras, either point and shoot or professional cameras. However, these days Olympus has joined the digital scene by producing their own line of digital cameras.&lt;br /&gt;&lt;br /&gt;Olympus digital cameras are best known for producing DSLR cameras. These digital cameras are the kind that professional photographers use in their craft. Although this is for a fact, this company has also produced their own line of point and shoot Olympus digital cameras.&lt;br /&gt;&lt;br /&gt;First up is an Olympus digital camera called the MJU-mini. A 4.0 mega pixel Olympus digital camera, it is cute, portable and can capture great pictures. Also, a tough Olympus digital camera, it is made with a metal frame and known for its solid weight - this is great because hands get too shaky when a camera is too light. With 2x digital zoom, a 5.8-11.6mm Olympus lens, this baby is your best bet for your personal Olympus digital camera.&lt;br /&gt;&lt;br /&gt;Another personal Olympus digital camera is the MJU 500, obviously the higher version of the MJU-mini. the MJU 500 is a 5.0 mega pixel Olympus digital camera that is easy to use and one favored by consumers who are looking for a digital camera within this particular price range. (The MJU 500 is around $400-$500). The first notable feature of the MJU 500 is its large 2.5-inch HyperCrystal LCD screen. With its 160-degree wide view range, this large LCD screen enables its users to view subjects at extreme angles (though it does not feature the flip or rotate like other LCD screens from other digital cameras). Made from durable lightweight metal with rubber gaskets in its interior and weighing only 3.0 lbs., the MJU 500 is also weatherproof. Meaning that this Olympus digital camera can withstand a few splashes here and there. (Note: it is weatherproof and not waterproof, there is a big difference between the two - splashes and not water). The MJU 500 of the Olympus digital camera line, introduces an alternative design apart from the curvy MJU series with its new flat surface and smooth and round edges. It is so compact, with its 3.9 x 2.2 x 1.2 inches dimension, it can easily fit in your handbag or the back pocket of your pants (just be careful not to sit on it). This Olympus digital camera also features 23 shooting modes, one of which will enable its users to shoot in consecutive sequences and just choose the best one later. Another one of its many features is its ability to record and playback those videos and sounds. It has an expandable memory card slot, but when you buy the package, you would have to settle with temporarily with the 32MB xD card that comes with the package. this fashionable Olympus digital camera comes in two colors - silver and blue.&lt;br /&gt;&lt;br /&gt;for a professional Olympus digital camera, the Olympus 5300 is the right DSLR for you. it is the first 8-mega pixel camera out in the market. with a 7-14mm lens, it gives the equivalent of a 14-28mm lens. also, a first for this Olympus digital camera is its side-swing mirror that doesn't need a pentaprism, giving you a smaller and sleeker camera. another unique feature is the Super Sonic Wave Filter (SSWF) that shakes off the dusts in your sensor, this way dust can never accumulate in your camera. with features like four exposure modes and 14 scene modes, this USB 1.1 compatible Olympus digital camera is one of the best DSLR cameras in the market.&lt;br /&gt;&lt;br /&gt;another Olympus digital camera is the Olympus CaMedia C-70. It is also a small and compact digital camera but equips a 7.0 mega pixel camera that gives you power and portability at the same time. Packed with 5x optical zoom and, it start up fast and auto focus even quicker than most digital cameras in the market. It has a 2.0-inch LCD screen, a xD picture card slot and furnished with a 7.9-39.5mm Olympus lens that has 5x optical zoom. The CaMedia C-70 is the perfect choice for high quality shots, good features, great build and excellent portability.&lt;br /&gt;&lt;br /&gt;Visit Olympus' website at www.olympus.com to look for other Olympus digital cameras and other Olympus products available in the market.</description><link>http://informationstechnology.blogspot.com/2008/01/olympus-digital-camera-professional.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5503046232652716232.post-7097111743582258428</guid><pubDate>Tue, 08 Jan 2008 13:19:00 +0000</pubDate><atom:updated>2008-01-08T21:20:41.100+08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Cell Phone</category><title>Samsung cellular phone, a basic phone</title><description>Cellular phones are now getting to be a necessity in this modern society.  This is not how they foresee the cellular phone future some years back.  Luckily, manufacturers are quick to recognize the booming cellular phone industry. Thus, they are able to answer the growing demands for this functional toy. Additionally, the introduction of various functional features for cellular phones by huge cellular phone companies makes cellular phones more a need to perform specialized tasks.  Because of this, the use of a cellular phone is getting to be a requirement for business executives in going about their various tasks as they go about their business.  However, not everybody needs these special functions, some only needs cellular phones for basic use like sending and receiving calls.  If you do not require these high technology functions, buying a cellular phone for basic use may only be what is necessary.  Some cellular phones are for basic use including Samsung cellular phones.  It is more reasonable to buy basic cellular phone models if you do not need to play with your cellular phone and Samsung cellular phone may be what is the best for your.&lt;br /&gt;&lt;br /&gt;Samsung cellular phones are generally of good design.  They have wide and clear display, which is beneficial especially for sending and receiving text messages.  Samsung cellular phones have good battery life compared to other cellular phone units.  As already mentioned, these cellular phones are good cellular phones for basic use.  Samsung cellular phones have beautiful designs; you may be pleased to choose one among the various models that will fit your need.  You will not despair buying a cellular phone from Samsung if you only require the basic features; beauty of the product is thus a bonus.  However, if you are looking for functional cellular phones more than the basic sending and receiving calls and text messages, Samsung cellular phone is not the one for you.  People who want to play and require so many functions and features will not enjoy a the cellular phone from Samsung.&lt;br /&gt;&lt;br /&gt;Some basic complaints encountered with Samsung cellular phone, which happens only to very few users, are choppy calls and scratchy and distorted volume generation.  This only happens to very few users, and to ensure you will not experience this in a Samsung cellular phone, you may ask the recommendation of the friendly Samsung staff. &lt;br /&gt;&lt;br /&gt;Some who endeavor to find functionality in a Samsung cellular phone give it a nickname ery good yet slightly bad phone.  It is very good because the designs are superb and the battery life is good.  Slightly bad because some high-tech features fail in Samsung cellular phone, precisely it is a cellular phone for basic use.&lt;br /&gt;&lt;br /&gt;Do not expect Samsung cellular phone for other features rather than the basic ones, no picture transfer, no internet communication and some phone do not support blue tooth usage.  Not a techy choice indeed.  Some people who buy this phone feel that with the superb design, it should include additional feature and functionalities.  The company is on its way to developing the phone you require, researches and product development are now on the drawing board.&lt;br /&gt;&lt;br /&gt;For some who could not wait, buying Samsung cellular phone is still a neat choice because the designs are upbeat and beautiful.  The added bonus is that the battery life is longer than other cellular phones.  Enjoy the basic functions and beautiful designs with Samsung cellular phones.</description><link>http://informationstechnology.blogspot.com/2008/01/samsung-cellular-phone-basic-phone.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5503046232652716232.post-1810647219474926759</guid><pubDate>Sun, 06 Jan 2008 05:10:00 +0000</pubDate><atom:updated>2008-01-06T13:11:46.627+08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Podcasting</category><title>Downloading a Free Podcast</title><description>Its easy to find and download a free podcast. The best way to find free podcasts is probably to check a podcast directory. A podcast directory is a listing of many, sometimes thousands of different podcasts. The podcast directory will usually organize the podcasts by topic and genre, making it easy to find the type of podcast that is sought. In addition, podcast directories often allow the visitors to comment on the podcasts listed, and provide a list of the favorite podcasts on the site, making it easy for users to find the best podcasts available. These podcast directories can be used to browse through, introducing users to many different podcasts they otherwise would not have found.&lt;br /&gt;&lt;br /&gt;Once a podcast has been found that interests the user, it is necessary to download the free podcast. The vast majority of podcasts will be free, but there will be a few that may cost a small amount of money. The process to subscribe to and download the podcasts is the same in either case. First, a podcast client needs to be found and installed. There are many free podast clients available, all providing a slightly different user interface and range of options. They come with many different names, such as Podscape, or Nimiq, and searching for 'free podcast client' or something like it will turn up many possibilities. When the podcast client has been installed, inputting the feed address will allow the podcast to be downloaded. The podcast client will check the address given for a small, machine readable file called an RSS file. This file will contain information about the podcasts, perhaps some text about the individual episodes, as well as the location of the episode file. Once the podcast client has been located the file referred to in the RSS feed, it will be downloaded and stored on the users computer until the want to view it.&lt;br /&gt;&lt;br /&gt;Sometimes, of course, access to a personal computer is not available, but it is still necessary to check a certain podcast. Fortunately, many podcast directories offer built in podcast readers in the site. Not only do they often show each recent episode that is available, they may also offer a way to view or listen to those podcast episodes from within the site. By using the viewer contained within the site, it is no longer necessary to even download the podcast episodes. However, the ability to move and share the episodes after downloading is one of the wonderful things about podcasting. The files can be placed on almost and media player, ranging from iPods to the new Play Station Portable. This flexibility is one of the reasons podcasts have succeeded, despite other technologies like streaming music and video. The desire of consumers to have control over technology cannot be over estimated.</description><link>http://informationstechnology.blogspot.com/2008/01/downloading-free-podcast.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5503046232652716232.post-9043854954840789179</guid><pubDate>Thu, 03 Jan 2008 14:31:00 +0000</pubDate><atom:updated>2008-01-03T22:32:02.882+08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Digital Camera</category><title>NIKON DIGITAL CAMERA: DIGITAL SLR CAMERAS</title><description>Nikon is a camera brand, best known for producing SLR camera. As with the boom of digital cameras all over the world, Nikon joined the bandwagon by producing what they make best, thus the new era of the Nikon digital camera was born - digital SLR.&lt;br /&gt;&lt;br /&gt;One of the best in DSLR, the Nikon digital camera called Nikon D70 is 6-mega pixel Nikon digital camera. Coated with polycarbonate over its stainless steel chassis, this Nikon digital camera is furnished with a 50mm AF Nikkor lens that can combine with an 18-70mm kit lens and still be portable enough to be carried around. It has a 200-1600 ISO effective speed range, great for taking pictures both in the shade and under the sun. and why won't it be?! With its three frames per second continuous shooting rate and its 1/8000 second shutter speed, taking pictures is as easy as clicking away and having fun. this Nikon digital camera is supported with a Flash card.&lt;br /&gt;&lt;br /&gt;Another SLR from Nikon is the Nikon Coolpix 8800. An 8-mega pixel Nikon digital camera, the Coolpix 8800 has a compact body. Furnished with a 1.8 inch flip-out and swivel LCD, this baby is surely first rate SLR. This Nikon digital camera features an image stabilizer system to reduce camera shakes particularly on long shots since this gadget can zoom up to 10x (optical zoom) and can focus to up to 3cm in macro mode with its 35-350mm lens. Key controls are very user-friendly, with modes such as sensitivity, image size/quality and white balance - found directly with the mode dial. The image output quality is the middle name of this Nikon digital camera, with great detail rendition, color fidelity and saturation. a rather exceptional feature of the 8800 is the continuous shooting modes, where users can choose 1.2 or 2.3 frames per second. A bit bulky to carry around, the 8800 is perfect for shooting action and sports shots. The 8800 works with a Compact Flash card for storing up your images.&lt;br /&gt;&lt;br /&gt;Another digital SLR from Nikon is the Nikon D50. A 6.1 mega pixel Nikon digital camera, this gadget has 7 varied modes to shoot from using its AF-S DX Zoom Nikkor 18-55mm lens. These modes are Auto, Portrait, Landscape, Close Up, Sports, Night Portrait and Child. To see the images that you took, this Nikon digital camera is furnished with a 2.0 inch LCD screen. How fast can this camera shoot? It has 2.5 frames per second and with uninterrupted shooting of up to 137 frames per second. This Nikon digital camera is not too bad, especially for novice photographers. This package also includes a software for touching up, editing and sharing your pictures. The software even enables you to burn your images to VCD or DVD format.&lt;br /&gt;&lt;br /&gt;One of the first point and shoot Nikon digital cameras is the Nikon Coolpix 4800. A four mega pixel Nikon digital camera, the old school designed 4800 is equipped with a 1.8 inch LCD screen for viewing your pictures. The 4800 is an 8.3x zoom Nikon digital camera with 6-50mm Nikkor Ed lens that zooms quickly and has continuous auto focusing (a feature where your lens is always trying to keep your pictures sharp). It also allows users to shoot, record and playback short movie clips with its assist and excellent scene modes - meaning that includes providing outlines for portraits (for tweaking purposes), exposure and sensitivity settings. These features are very helpful especially for novice photographers that want to try their hands at photography. Along with that, it comes with a 13.5MB SD card and the Li-on battery pack.&lt;br /&gt;   &lt;br /&gt;Remember to check out Nikon's website at www.nikon.com.sg or www.nikonusa.com to see the latest Nikon digital cameras.</description><link>http://informationstechnology.blogspot.com/2008/01/nikon-digital-camera-digital-slr.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5503046232652716232.post-5641746183593563429</guid><pubDate>Wed, 02 Jan 2008 11:32:00 +0000</pubDate><atom:updated>2008-01-02T19:33:05.666+08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Cell Phone</category><title>Nokia cellular phones, most wanted cellular phones</title><description>Nokia being a finish firm is surprisingly gaining 20% cellular phone penetration in the United States. This success is due to the two major business concentration of the company. The two business concentrations are Nokia cellular phones and cellular phone network infrastructure. Those two make up 90% of Nokia's revenue. The company gains this success because of their commitment to quality, and their quest to provide consumers with innovative design Nokia cellular phones.&lt;br /&gt;&lt;br /&gt;Nokia is narrowly focusing on Nokia cellular phone and cellular phone infrastructure because the company sees significant growth potential in the mobile telephone industry. Nokia is poised on giving landline telephony greater challenge in the coming years. It has started and is fast becoming a threat. Although admittedly, among the three major players in the United States mobile phone industry, Nokia, with its Nokia cellular phones and cellular phone infrastructure抯, can fulfill this goal because of their strong commitment to revolutionize the bile phone industry. Bigger may be the other players but Nokia's focus on cutting edge technology to help developing countries do without land-base communications and gain speedy communication the mobile phone usage, may be possible. However, Nokia cellular phones and its exceptional technological design are facing greater challenge with respect to the fast-paced developments in the cellular phone industry. Nokia is also facing pricing challenge, more specifically, because of the downward global economic condition.&lt;br /&gt;&lt;br /&gt;These challenges, however, the company continues to focus on superior technology for its Nokia cellular phones and cellular phone infrastructure. These business areas brought their company to the stock market map and Nokia is committed to continue providing innovative technology for as long as possible. Although, they believe the economic assessments that the economic condition may not require the superior technology of their Nokia cellular phone to help them secure profitable business in the coming years, they continue to refine the technological advantages of their products because it is a commitment they stand for. This assurance will surely please consumers who love the functional features of Nokia cellular phones.&lt;br /&gt;&lt;br /&gt;This endeavor of the company to ensure technological advancement for their Nokia cellular phones and cellular phone infrastructure ensures the consumers that even with the proliferation of cellular phone in the market; one will always find the most functional and technologically advanced products in Nokia. One may actually get all the benefits of effective and speedy communication with Nokia cellular phones and its cellular phone infrastructure.&lt;br /&gt;&lt;br /&gt;Choose the best and most efficient when you need mobile cellular phones, if you know Nokia抯 promise of great technological developments, you will get all the benefits and more. This is because aside from the functional features, beautiful designs are coming out of Nokia plants to suit everybody's needs for Nokia cellular phones.&lt;br /&gt;&lt;br /&gt;Finally, Nokia cellular phones recommend users to follow telephone etiquette. This will help ensure the even while using cellular phone, keeping in mind telephone etiquette keeps you respectable. You will not bother churchgoers by turning off your phone in a place of worship. Avoid talking aloud in public in order to avoid creating nuisance and annoying people around. This is a good recommendation for cellular phone users. You do not need to flaunt your cellular phone, because Nokia cellular phones have their own personality, high-tech and functional, no need for you to brag about it.</description><link>http://informationstechnology.blogspot.com/2008/01/nokia-cellular-phones-most-wanted.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5503046232652716232.post-6300773182898819379</guid><pubDate>Tue, 01 Jan 2008 03:14:00 +0000</pubDate><atom:updated>2008-01-01T11:15:25.912+08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Computer Security</category><title>A Dream Home That’s No Longer a Dream</title><description>Who hasn’t dreamed of redesigning their current home or building their dream home?  Unfortunately, for many of us, the cost of hiring an architect just isn’t in our budget.  Now with the help of Home Designer Pro 7.0, we can easily do it ourselves.&lt;br /&gt;&lt;br /&gt;Chief Architect, Inc. is a leading developer of 3D architectural home design software for consumers, home enthusiasts, builders, designers, and architects.  In January 2006, they were recognized as the fastest growing publisher in the home design and gardening software category for 2005, making it the number one growing home design and gardening software publisher.&lt;br /&gt;&lt;br /&gt;Better Homes and Gardens software product reviewers give it two thumbs up for ease of use.  You can quickly jump-in and begin by using their pre-designed room feature or start from scratch and define your own rooms.  When you are finished outside, take a quick spin outside and try your hand at either landscaping or deck design. &lt;br /&gt;&lt;br /&gt;If you are thinking about designing your dream home from the ground up, the project-cost estimator budgeting tools provides you with a realistic idea of what you can expect to pay and the materials you will need to do the job.  Then, you can easily add-in or change features with a simple click of the mouse.&lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight: bold;"&gt;The software suite is loaded with additional features including the ability:&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;• to create a virtual walk-through of your house&lt;br /&gt;• to design and visualize using 3-D models&lt;br /&gt;• to use a complete set of CAD tools to detail your designs&lt;br /&gt;• to choose from a library of more than  4,300 design  items&lt;br /&gt;• to select 1,500 sample home plans&lt;br /&gt;• to review 30 training videos with "how to" information&lt;br /&gt;&lt;br /&gt;Not sure which of the BHG products are right for your needs?  No problem.  BHG provides a comprehensive comparison matrix on their website at http://www.homedesignersoftware.com/pdf/Land-vs-Base-vs-Suite-vs-Deluxe-Pro.pdf.  Now, you can easily locate which of their six home design products are right for you.  Depending on your needs, you can expect to pay between $59 and $149.</description><link>http://informationstechnology.blogspot.com/2008/01/dream-home-thats-no-longer-dream.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5503046232652716232.post-5066559342928550607</guid><pubDate>Sun, 30 Dec 2007 12:25:00 +0000</pubDate><atom:updated>2007-12-30T20:26:18.569+08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Cell Phone</category><title>Life's good with LG cellular phones</title><description>The cellular phone industry is already able to stand as a functional gadget and not merely luxurious toy.  Because of this, manufacturer quickly jump into the cellular phone bandwagon, this includes the electronics companies and telephone companies.  On the electronics side, LG Electronics is getting to be a figure to watch out for in the future.&lt;br /&gt;&lt;br /&gt;LG Electronics is now focusing all its effort in making LG cellular phone an excellent and premium brand.  This is a commitment made by the LG Electronics CEO during his speech at the 2004 International Consumer Electronic Show.  To show how committed LG Electronics is to their promise, the company is poised on investing three hundred million dollars for the marketing activities of LG Cellular phone.  LG Electronics likewise set-up a brand management team that will uphold the new LG slogan that life's Good?for all its marketing efforts that will promote the premium LG cellular phone brand in the North American market.&lt;br /&gt;&lt;br /&gt;Because of this strong commitment to develop cellular phone units as a premium and superb brand of cellular phones, consumers are sure that the company will soon introduce to the market cellular phone units that will give some major manufacturers a run for their money.  This endeavor will surely benefit consumers who will find more premium brand cellular phones including LG cellular phones available in the market.  The endeavor will further alleviate the company抯 vision of sitting as one of the top three global firms by the year 2010.  This may prove to be an easy task for the company coming from its success in achieving top brand image in India, Middle East and Africa.  This endeavor of making premium brand LG cellular phones is not only a mission for it North American market but the plan includes Europe as well.  I hope that in the future, for the world, this is a vision that LG Electronics is focusing on.&lt;br /&gt;&lt;br /&gt;The campaign following the theme Life's good?offers superior lifestyle for LG cellular phone users.  The company keeps this promise by putting together a product development team that will focus on making premium LG cellular phones that will compete in the marketplace, functionality and beauty is a huge consideration.&lt;br /&gt;&lt;br /&gt;The company is seeking to achieve an ambitious sales growth of 20% by boosting its marketing efforts for the globally competitive and premium LG cellular phone brand.  To achieve all these, product development for the cellular phones units is the most important step.  Organizational restructuring and improved distribution for LG cellular phone might also be a neat strategy for the company if they are serious in wanting to achieve a hefty 20% growth from its cellular phone business.&lt;br /&gt;&lt;br /&gt;An increasing number of satisfied LG cellular phone users recognize the development as an effective way to get superior benefits from the increasing number of premium quality cellular phones with the introduction of the newly developed and innovatively designed cellular phones from LG Electronics.  They foresee this development and the company抯 endeavor to be beneficial and thus may work well to the mutual benefit of the company and its consumers.&lt;br /&gt;&lt;br /&gt;LG cellular phones are poised on competing in the functional and beautifully designed cellular phone industry, their experience in the electronics industry give them the edge against competition.  Await the development and the new LG cellular phone models to get the benefit from the company抯 commitment to quality.</description><link>http://informationstechnology.blogspot.com/2007/12/lifes-good-with-lg-cellular-phones.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5503046232652716232.post-5944398971837101144</guid><pubDate>Sat, 29 Dec 2007 05:38:00 +0000</pubDate><atom:updated>2007-12-29T13:39:35.619+08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Cell Phone</category><title>Ericsson cellular phones, top choice for those who require high performance gadgets</title><description>One of the top three market leaders in the United States cellular phone industry is the Swedish firm, Ericsson. Their entry to the top slot is due to the growing number of people requiring high performance and technologically advanced cellular phones. Although, Ericsson is in a broad-based spectrum of business units, and on the communications sector, they focus their business son the fixed-line operation and not much on the cellular phone unit developments, this notion change very recently. Of late, Ericsson is slowly realizing the greater need for technological advancement of Ericsson cellular phones because of the growing demand for this advanced design cellular phone. They are also doing this move because they can foresee the potential of profitable business in the cellular phone unit industry. Because of the wonderful and functional designs of the Ericsson cellular phones, the requirement for them is booming like a speed rocket.&lt;br /&gt;&lt;br /&gt;Ericsson cellular phones support various cellular phone plans; in fact, they are the most suited for the various functional offers of big network companies. However, if you want a pre-paid cellular phone plan, very few Ericsson cellular phone units support pre-paid cellular phones plans. It is not advisable to purchase a cellular phone from Ericsson if you do not want a traditional cellular phone plan. Ericsson cellular phone is a popular choice of people who want high performance and functional cellular phones. This is because almost all cellular phone models include features like VGA camera with video capabilities and it support high-speed edge data networking. Receiving and sending internet messages are thus possible in a cellular phone from Ericsson. Ericsson cellular phones also include color LCD and superb imaging, which includes picture editor, if you want to play along with your pictures, cellular phones from Ericsson, has the capacity for this. Additionally, almost all models of cellular phone in Ericsson support blue tooth usage, thus easy navigation.&lt;br /&gt;&lt;br /&gt;Ericsson cellular phones also support multimedia messaging and e-mail services. Technologically advanced Ericsson cellular phones are the best choice especially for corporate executives because of its functional features. This has accounted for the success of the cellular phone business of Ericsson. This is also the culprit for the high demand for cellular phones from Ericsson, thus the company endeavor to develop more advanced cellular phone units.&lt;br /&gt;&lt;br /&gt;This ensures the public that other superb and high technology features development may continue to add to the strong benefits of Ericsson cellular phones. For this reason, it is worthy for consumers to await every development and new cellular phone models coming out of Ericsson manufacturing plants.&lt;br /&gt;&lt;br /&gt;The information you get from this article may help you understand the best features of Ericsson cellular phones. This information will also help you analyze if Ericsson cellular phone is what you need. Ericsson cellular phones are getting to be the top choice because of its beauty and wonderful functional features.&lt;br /&gt;&lt;br /&gt;With or without these functional features, buying a cellular phone need intelligent assessment, knowing what you need and how you need your cellular phone will help you buy the most suited cellular phone.&lt;br /&gt;&lt;br /&gt;It may also help in the proper usage of your cellular phone if you can follow telephone etiquette. Because Ericsson cellular phones are popular to business executives, exhibiting telephone etiquette account for the respectable user. This will show how effective this modern day gadget can help in an executive's life.</description><link>http://informationstechnology.blogspot.com/2007/12/ericsson-cellular-phones-top-choice-for.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5503046232652716232.post-1208183001886284561</guid><pubDate>Wed, 26 Dec 2007 14:54:00 +0000</pubDate><atom:updated>2007-12-26T22:55:44.714+08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Web Design</category><title>Improve Usability of Your Website</title><description>No matter how brilliant your website design is, if it is hard to reach the content of your site then your site is as useful as an empty shell. Here are some tips to improve the usability of your website to ensure it serves its functions optimally.&lt;br /&gt;&lt;br /&gt;The first method is to make sure the typography of your content is suitable. If you have large blocks of text, make sure to use CSS to space out the lines accordingly. The longer a single line of text is, the greater the line-height of each line should be. Also, make sure the font size of your text is big enough to read easily. Some sites have 10-pixel-tall text in Verdana font; while that may look neat and tidy, you have to really strain your eyes to read the actual text.&lt;br /&gt;&lt;br /&gt;Make it easy for visitors to find content that they want on your site. If you have thousands of articles on your site and a certain visitor wants to find one single article from that pile, you have to provide a feasible means to enable visitors to do that without hassle. Be it an SQL-driven database search engine or just a glossary or index of articles that you have, providing such a feature will make sure your visitors can use your site with ease.&lt;br /&gt;&lt;br /&gt;Ensure that your site loads fast if you do not want to lose visitors. Most internet users will leave a website if it doesn't load completely within 15 seconds, so make sure the craede la create of your website is delivered to the visitors as soon as possible to retain their attention.&lt;br /&gt;&lt;br /&gt;Last of all, test each and every link on your site before it goes online. There is nothing more effective in tarnishing your professional image than broken links, so be very careful about that.</description><link>http://informationstechnology.blogspot.com/2007/12/improve-usability-of-your-website.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5503046232652716232.post-9005043643188833919</guid><pubDate>Tue, 25 Dec 2007 04:39:00 +0000</pubDate><atom:updated>2007-12-25T12:40:17.484+08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Digital Camera</category><title>SHARE SMILES WITH KODAK DIGITAL CAMERA</title><description>Ever since, Kodak has always been associated with photographs. Kodak is primarily known for producing quality films and photograph that capture our smiles and tender moments, so it no big surprise that Kodak ventured with camera business. Starting out with analog or conventional cameras, they finally followed suit with their line of Kodak digital cameras.&lt;br /&gt;&lt;br /&gt;One of the best and handiest Kodak digital cameras is the Kodak easy Share one. Only about $600 the Kodak easy Share one is one of the first new series of Kodak digital cameras supports wireless sharing of your photos. This new technology from the Kodak digital camera is a super-intelligent wireless (think Wi-Fi) snapper that allows users to instantly share and print photos without the hassle of using and putting up cable connections. This Kodak digital camera supports Kodak Wi-Fi card. The Wi-Fi card will enable the owner of the camera to instantly use basic web browser in sending images directly to Kodak online storage and printing service. And of course, the Wi-Fi card will also enable you to beam your images straight to a Wi-Fi printer. This amazing Kodak digital camera includes a 3x optical zoom from its C. Variogon 38-108mm equivalent lens, an extra SD card slot and a three inch fold out touch screen display.&lt;br /&gt;&lt;br /&gt;The fold out touch screen display comes with menu buttons that helps users customize their camera settings or edit their images. This Kodak digital camera also supports Video out USB and 3volts DC in adapter, just in case you want to just view through your photos while your batteries are recharging.&lt;br /&gt;&lt;br /&gt;As with all Kodak digital cameras, the easy Share one comes with a Kodak Easy Share program that further makes it easier for file transferring and editing of your images.&lt;br /&gt;&lt;br /&gt;Personally, I would recommend the Kodak dx7590. This is my ultimate dream Kodak digital camera. This is a Kodak digital camera for those who are just starting out with photography as a hobby or those who wish to pursue one as a craft. This baby is perfect for your practice shots. It is a 5 mega pixel Kodak digital camera with 10x optical zoom of a professional quality Schneider-Kreuznach Variogon lens. The dx7590 is one of the Kodak digital cameras that have the exclusive Kodak color science Image processing chip. And to check out all those amazing photos youe captured, this Kodak digital camera is furnished with a 2.2 inch high resolution indoor/outdoor display. As Ie mentioned, if youe been wanting to learn the tricks of the trade, there is a manual and custom controls that you could always experiment with. It high speed, low light auto-focus with continuous shooting and bracketing modes, so you could always get your sister, girlfriend or just about anyone to model laughing, changing poses as you click away. The dx7590 has 22 modes and color scenes, so you could always mess the images you took using your computer, making the picture come out as older or earlier that day. This amazing Kodak digital camera lets you store pictures up to 128 MB, using an SD card (that you have to buy separately). This dx 7590 comes with the Kodak easy share camera dock 6000, for recharging your batteries or transferring your photos to and from your computer. The best thing about the Kodak dx7590, this Kodak digital camera is only around $500. Now, is that a bargain or what!? An almost professional camera for the price of a lower end digital camera.&lt;br /&gt;&lt;br /&gt;Be sure to check out Kodak website at www.kodak.com &lt;http://www.kodak.com&gt; to check out their latest releases of digital cameras. The Kodak website also offers basic information regarding their products and its prices.</description><link>http://informationstechnology.blogspot.com/2007/12/share-smiles-with-kodak-digital-camera.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item></channel></rss>