วันอังคารที่ 30 กันยายน พ.ศ. 2551

Cisco CCNA Certification: An Illustrated Guide To Ethernet CSMA/CD

When you're studying for your CCNA exams, you're going to study the theory of technologies we basically take for granted in networking. CSMA/CD is one of those technologies. It works beautifully and you don't even have to configure it. But to be an effective network troubleshooter (and to pass the 640-811, 640-801, and 640-821 exams), you have to know Ethernet inside and out, and that means knowing CSMA/CD.</p><p>The first Ethernet standards were 10Base5 and 10Base2. Network devices such as hubs, repeaters, and switches weren't in the picture yet. The sole physical components were the Ethernet cards in the computers and coaxial cable. The cable made up a bus that all the connected devices would use. (This type of bus is referred to as a shared bus.)</p><p>If only one of the hosts on this network wanted to send data, there would be no problem. When two hosts would send at the same time, though, a collision would occur. When the signals would collide, both would be rendered unusable. A standard had to be created that would have the hosts follow rules relating to when they could send data and when they could not. This standard is Carrier Sense Multiple Access with Collision Detection, referred to as CSMA/CD.</p><p>If two of the three computers on this segment send data at the same time, a collision occurs.</p><p>To avoid this, CSMA/CD forces computers to &quot;listen&quot; to the Ethernet before sending in order to make sure that no other host on the wire is sending. When the Ethernet segment is not busy, the device that wants to send data can do so. The sender will then continue to listen, to make sure that sending the data didn't cause a collision.</p><p>If a collision is heard, both of the senders will send a jam signal over the Ethernet. This jam signal indicates to all other devices on the Ethernet segment that there has been a collision, and they should not send data onto the wire. (A second indication of a collision is the noise created by the collision itself.)</p><p>After sending the jam signal, each of the senders will wait a random amount of time before beginning the entire process over. The random time helps to ensure that the two devices don't transmit simultaneously again.</p><p>In a separate tutorial, we'll discuss more Ethernet fundamentals and values you should know for your CCNA exams and to be a more effective network troubleshooter.</p><p>To your success,</p><p>Chris Bryant<Br> CCIE #12933</p><p>Chris Bryant, CCIE #12933, is the owner of The Bryant Advantage. The Bryant Advantage offers dozens of FREE CCNA and CCNP tutorials and articles. The Bryant Advantage sells the world's most comprehensive CCNA Study Guide, and my exclusive Binary Math and Subnetting Mastery book. My $299 CCNA Online Fast Track is the world's fastest-growing CCNA course.</p><p>Visit <a target="_new" href="http://www.thebryantadvantage.com">http://www.thebryantadvantage.com</a> today!

Easy to Execute!

Plug and play equipment or hardware solves the problem of driver installation, re-starting routines, and generally speaking, &quot;hassle&quot;, for those who are not technically proficient.</p><p>If your computer supports &quot;Plug and Play&quot;, then, as the name suggests, you simply plug it in and play. For people who are &quot;word perfect&quot;, plug and play might sound somewhat misleading. Peripherals, such as your mouse, keyboard, monitors, scanners, network adaptors, or printers are included in this.</p><p>This long awaited technology is made possible via your U.S.B. port. U.S.B. is an abbreviation for UNIVERSAL SERIAL BUS. Using this port, your computer detects such peripherals, and after detection, configuration is automatic, in so far as you have no further input.</p><p>Prior to &quot;plug n play&quot;, you would have to insert a floppy disc or cd, to supply and install the necessary software or &quot;driver&quot;. To put it simply, your computer cannot see or indeed smell or intuitively know what a device, its properties, requirements and priorities are.</p><p>Most computers have two USB ports, usually situated on the back of your unit. A U.S.B. &quot;hub&quot; will effectively increase this number. Basically, it is like an electrical adaptor which allows up to seven devices to be connected to it. If you are a big &quot;gadget&quot; fan, you can simply plug another hub into the first one, and so on.</p><p>U.S.B. is classified as Serial communication, as opposed to parallel communication.</p><p>This means that it transmits data/info/signal, if you like, one &quot;bit&quot; at a time. Conversely, it receives it in a similar fashion. This is done or executed, in one wire or cable.</p><p>Did you ever notice the &quot;big&quot; or &quot;wide&quot; ends on your cables? These cables are parallel and transmit/receive data/info/signals, many &quot;bits&quot; at a time. Therefore, parallel communication needs many cables/wires and consequently more connections, at its port.</p><p>U.S.B. ports and cables are smaller. Just pop around to the back of your P.C., and you will immediately notice the difference. On the machine that I am currently working on, I noticed that the printer has both types of ports and that the parallel port and cabling is the option that the technician used. The serial option would have worked just the same, at this level, where transmission speeds are of little relevance.</p><p>In summary, Plug 'n Play is welcomed and embraced by everyone and is a major step towards &quot;user-friendly&quot; computing.</p><p>About The Author</p><p>Seamus Dolly is the webmaster of <a href="http://www.CountControl.com" target="_new">http://www.CountControl.com</a> His background is in engineering and analogue electronics. His studies include A+, Net+ and Server+.</p><p><a href="mailto:seamus@countcontrol.com">seamus@countcontrol.com</a>

Thin Clients Benefits are Excellent Options for Computer Homeschools... Just a Suggestion

Wireless Consulting and Solution Providers have always been important to african american small businesses and now after several years of having the most technologically advanced homes in our neighborhood, we are beginning to realize that our neighbors could benefit from the same technology in educating our children. With the future our african american children are facing being dependent on computers and broadband access it is critical to have the proper tools for our children to have the confidence necessary to face the future.</p><p>Psyche. There is a very good friend that is a Wireless Solution Provider in Chicago, whose wife "suggested" that he share his expertise with a neighbor who had been visiting his family's computer homeschool. Well after one thing led to another he finally enabled about 18 african american computer homeschools in the Chicago area, thus becoming a african american homeschool resource for wireless.</p><p>This little story is related because while I myself was working in Chicago for 4 years, he came to me for assistance in selecting a networked computer system that would be affordable for his clients. I had success with using thin client computers before with african american owned small businesses, networking them through a small server and then upgrade them to an additional firewall for full strength protection. He tried this with one family and for around $1700 they received 2 thin pc's and a server, they were excited to say the least. The thin pc benefits kept working for him and his clients over and over again when creating a computer homeschool.</p><p>Now I begin to work in North Texas and my sister "suggests" to me that I consult for a african american single mom in Dallas. *Side note... for those who perhaps may be uninformed about my use of the word "suggest" let me share with you how an african american woman "suggests" anything to men. First she will begin by asking you to handle a certain situation and if you don't respond correctly (never have, never will, women are smarter) the next level of the speech will be at a volume that will make the suggestion clear.</p><p>Back to the benefits of thin client and how they make an excellent option.</p><p>Thin clients have no CD drive, floppy drive, and don't look for a hard drive because it's on the server the actual workhorse of the network. The point is that it is 'thin' and most of the really hard work is done by another computer with all the bells and whistles as it needs them to 'manage' the thin pc's. That alone saves you money, and when it comes time to upgrade (and you know it's coming), all your processing power is actually in the server that manages your network.</p><p>Even if you do have to replace one of your thin pc's, it costs $500 or less and a full blown fat desktop starts at $900 on up. Installing thin client networks are a breeze, setup the server and load it with the software you need to use, plug in the wireless thin client pc's and go for it! Lower upfront costs, easy to upgrade and install makes this a better option for today's computing homeschool.</p><p>Daviyd Peterson: 10-year consultant, instructor, trainer<br> Helps african american homeschools bridge the digital divide by becoming computer homeschools. Free article on "Computer Homeschooling" and other related articles <a target="_new" href="http://www.homeschoolwireless.com/homeschoolwireless.htm">http://www.homeschoolwireless.com/homeschoolwireless.htm</a></p><p>

Wireless Networking, Part 2: Setup and Security

The first installment in this two-part series of Tech Tips provided an introduction to the basic capabilities and hardware involved in wireless networking. In the final installment of this two-part series, we will look at some of the basic setup and security considerations that should be addressed. The physical installation of a wireless network may be easier than a wired network, but the more difficult part is setting up the software and security to make sure everything stays up and running without incident.</p><p>Although this Tech Tip is by no means an exhaustive resource on configuring a wireless network, it will provide information and pointers that can be applied to most typical installations. Many of these tips are general enough that they may provide some good advice for those utilizing wired networks as well.</p><p>For the sake of this article, we will assume that the hardware has been successfully installed physically, and that the user is now prepared to set up and secure the system through software. Wireless devices, especially routers / access points, generally include a web-based configuration utility that allows the user to customize the hardware to meet their needs. The hardware will most likely work with minimal configuration, but to make it work so that the integrity of the network is protected may take a few more steps.</p><p>In addition to the configuration interface provided with the wireless networking hardware, Microsoft has integrated a &quot;Wireless Network Setup Wizard&quot; with the release of Windows XP Service Pack 2 that will lead a user of any expertise through the installation of their network. In addition, the &quot;Microsoft Broadband Network Utility&quot; will help them monitor and maintain the network just as easily once it is set up.</p><p>Change Default Password</p><p>Routers, whether wired or wireless, require a password for configuring the various settings, and all of them ship with extremely simple default passwords. The first step taken in setting up the router should be to change the default password to something more difficult to guess. Longer passwords that use a combination of letters and numbers are preferable as they make hacking attempts that much more difficult.</p><p>Change Router IP Address</p><p>Most routers ship with a default IP (Internet Protocol) address, something like 192.168.1.1, which is utilized by the user for accessing the configuration utility interface, as well as by the network itself for negotiating the LAN and WAN connections. The configuration utility of most routers will include a page that will allow for the default IP address to be manually changed by the user. Although changing the default IP address doesn't provide a great amount of security since it can easily be discovered anyway, it may deter intrusion by local users that may be casually scanning the network.</p><p>Configure Router or Access Point Use</p><p>In the first part of this series of Tech Tips, I mentioned that almost all routers intended for home use can also double as wireless access points, and this is generally accomplished by clicking a check box within the control panel software. If a wireless router is being added to a network with an existing router and broadband connection, the new device needs to be set to access point mode. Otherwise, there could be a conflict as the network may not know where to expect the internet connection, since it will now have two routers that both want to serve as the gateway. If the wireless router is replacing an existing router, or is the only one on the network, this should not be an issue as these devices generally ship configured to operate as a router by default.</p><p>Broadcasting the SSID</p><p>The SSID, or Service Set Identifier, is basically the name assigned to a particular wireless network. The user can choose just about any name they want, as long as it is less than 32 characters long, and they just need to be sure that all computers on the network are configured to use the same name. Two steps related to the SSID can be taken to help improve the security of the network:</p><p>First, change the default SSID to a unique name that includes a combination of letters and numbers that doesn't reveal anything personal about you or your network. Second, disable the broadcast of the SSID once all of your computers are successfully connected, even if your router / access point recommends broadcasting it. I have used a few wireless routers, and all of them have a check box in the control panel for enabling/disabling the broadcast of the SSID, and they have all recommended leaving broadcasting enabled. Broadcasting the SSID allows new computers to easily find your network, and then all they have to do is access it given the proper credentials. Broadcasting your SSID puts it out there for anyone within range to see, and it just allows would-be hackers to get one step closer to compromising your security. In a home environment, there are probably few computers that need to access the network, and if more are ever added, you can temporarily enable the broadcast to get them set up.</p><p>DHCP Server</p><p>The DHCP (Dynamic Host Configuration Protocol) Server is a feature of most routers that makes adding new computers extremely simple. Whenever a new computer connects to the network, the router will assign an IP address to it, instead of the user having to assign an IP address to each manually while sitting at that particular computer. This makes configuring a network very easy, but it also leaves the network vulnerable, as any new computer detected will be welcomed to the neighborhood and assigned an IP address automatically. Two different approaches can be taken to improve security, as related to the DHCP server:</p><p>One method, and the best as far as security is concerned, is to disable the DHCP server. This will require that all computers that are authorized to connect to the network be configured manually, but it will prevent unauthorized computers from obtaining an IP address. The second method, which doesn't provide bulletproof security, is better than doing nothing. In general, a DHCP server can support up to 250 computers, and by default leaves a range of addresses readily available for that many to connect. If disabling the DHCP server doesn't seem convenient for a user, they can limit the DHCP server to only provide as many IP addresses as they know they need. If you know there will never be more than five computers connected, limit the range of available IP addresses to a total of five within the configuration utility.</p><p>Different Levels of Encryption</p><p>All wireless components support some sort of encryption, which simply scrambles the information being sent across the network so that it can not easily be read by anyone else connected to the network. There are different types and levels of encryption, and a brief overview is provided for them below:</p><p>WEP, or Wireless Equivalency Protocol, was the first format of encryption available on wireless networks. WEP allows the network administrator to assign an encryption string to be shared by all computers authorized to access the wireless network. The encryption through WEP is either 64bit, 128bit, or 256bit, where the higher number represents greater encryption, and the strings can be generated by the administrator as a series of letters and numbers.</p><p>WPA, or &quot;Wi-Fi Protected Access,&quot; is an improvement over WEP that starts off with a similar master encryption string and then mathematically derives encryption keys to keep the security dynamic. WPA continually changes the encryption keys used for each packet of data, and due to the extra processing required to support this protocol the overall throughput of the connection may suffer slightly. Despite the potential for decreased speed, WPA is considered to be far more robust than WEP, and should be implemented where possible. In some instances, WEP encryption has actually been defeated, making WPA all that more appealing.</p><p>Although most components support both of these encryption formats, and users can select the type they wish to use from within the control software, not all do. All devices on the network must be set to operate at the same level of encryption, which may mean that some devices will force others to be less secure than they are capable of. For example, a wireless network setup around this router (http://www.geeks.com/details.asp?invtid=DI-824VUP&cat=NET) could support either WEP or WPA encryption. When two computers are added to this network using one of these network adaptors (http://www.geeks.com/details.asp?invtid=WN-4054P&cat=NET) in one case, and one of these network adaptors (http://www.geeks.com/details.asp?invtid=PBW006-N&cat=NET) in the other case, things change. Note that the second adaptor does not support WPA; therefore the whole network must now be configured to use WEP to accommodate it.</p><p>Router Position</p><p>As discussed in the first part of this Tech Tip, wireless devices can have a range of up to a few hundred feet in free space. When installed inside a home, this range may decrease greatly due to walls, floors and other obstructions, but the signal may still be strong enough to carry beyond the confines of the dwelling. A simple step that may help reduce the strength and reach of the network signal outside the house is to position the router / access point as close to the center of the house as possible. The potential for someone to detect the network from outside the home when positioned like this is now much less than if the router was placed near a window, for example.</p><p>Final Words</p><p>There are definitely additional issues that could be considered when setting up a wireless network, but covering these basics will make a wireless network much more secure than it was straight out of the box. Many people are confident that no one would be interested in their home network and feel security is just one more headache of technical mumbo-jumbo that they would rather not deal with. Whether a hacker wants access to personal files on the network or to simply gain unauthorized access to the Internet, a few simple steps are worth the peace of mind to know you are as secure as possible.</p><p>Jason Kohrs<br> <a target="_new" href="http://www.geeks.com">Computer Geeks</a> <a target="_new" href="http://www.geeks.com/pix/techtips.htm">tech tips</a> and <a target="_new" href="http://www.geeks.com/pix/techtips.htm">computer help</a>.

Dusting Your Computer - Keeping it Cool

My mother always told me to dust, but I never did, mostly because I was lazy, but also because I couldn't find any tangible benefit to dusting. I just didn't see how I'd benefit from my room or my things being less dusty. Well now I've gotten a bit older, and I finally found a reason to dust - a cooler running computer. I'm going to give some background on my own system and circumstances first, then run tests before and after dusting, as well as explain how and what I used to dust. Be sure to take a look at this article - with pictures and graphs - plus a whole lot more, at aworldofhelp.com.</p><p>I've had the computer in question for a little over two years, a dual AMD Athlon MP workstation that while no longer the top of the line, is still plenty fast enough for what I do. The computer is running at standard speeds and specifications, and has always been very stable - but not 100%. When the system was about a year old I had been getting by with the occasional, roughly once weekly lock up. At that point, I finally spent the time to try and diagnose the problem.</p><p>To be perfectly clear, I'm talking about a lock up, where everything stops responding, the screen freezes and I have to reboot, not simply an application crash, which I can usually just blame on Microsoft. My initial thought was that the computer was overheating, specifically the CPUs. I was a little hesitant though because I was running AMD retail processors at standard specifications with AMD retail heatsinks and fans, and I figured that should have been a fine setup. But I've had CPUs overheat before when I was sure that was the problem and this just felt like it now. I did some research online and it looked like the AMD cooling solutions were somewhat underwhelming performers, so I broke down and bought new heatsinks and fans. These still weren't top of the line, but they reduced my CPU temperatures immediately by about 20%.</p><p>In unscientific testing I'd say my computer was absolutely more stable after the reduction in temperature. I estimate the weekly lockup became a monthly or even every other monthly lockup. This clearly isn't perfect for a system that really should be 99.99% stable, but it was a big improvement, and I let the problem go for a while. I will note that as many of you many assume, this computer is always on, twenty-four hours a day, seven days a week.</p><p>Anyway now it's another year later and my computer is increasingly unstable again. I'm not going to go out and get better heatsinks and fans again, as I'm sure the improvement would be less than before. My next though was about how dusty the whole system is. I know I should have dusted it once in the last two years, but I never got around to it. I'd say I live in an average environment in terms of dustiness, not especially better or worse, and I just never thought it would make a very significant difference in my CPU temperature. As you'll see, I was completely wrong - which incidentally might make my mother right.</p><p>Almost all users should really consider the results of both tests, possibly giving more weight to the one which most closely matches your typical computing. Even if you run predominantly business applications, you'll almost certainly occasionally do something that falls under this content creation test, editing pictures or an occasional home movie, for example. So consider all the tests, don't just focus on one graph.</p><p>Should you dust your computer? Yes, why not, it can't hurt. But really, there are tangible benefits of cleaning your computer, even if it seems stable right now.</p><p>Computers and electronics in general don't like heat. Dust blocks fans in your case, which generally cool you CPU, video card and motherboard components. Dust also blocks fans and their airflow into and out of your case. Cool air needs to be brought into a case, and then the host air dispelled. If the airways are blocked, system temperature can rise quickly. If your computer is stable but the CPU is running too hot, you cut down on its lifespan, potentially quickly.</p><p>More important to many people though, may be the result of that first heat related computer lock up. Even if it's never been a problem before, if your computer crashes at the wrong time it can be catastrophic. Usually mine just locks up when I'm away from it, or overnight, and I just turn it back on and restart Firefox and haven't lost anything important. But last week it locked up with unsaved graphs for my last article and Excel chose no to auto save. I spent the hour it took to redo them considering ways to eliminate these lock ups.</p><p>Of course, reducing heat is also always a priority for people who overclock their CPU. For those that don't know, overclocking is running a CPU at a higher frequency than it was sold to run at. For example, you could take your Intel Pentium 4 that is running at a "clock" rate of 2 GHz, and try to run it at 2.1 GHz, 2.5 GHz, faster speeds, or anywhere in between. I have an old dual CPU system that was supposed to run at 366 MHz. Instead I ran the chips at 500 MHz each, which was a huge performance gain. Overclocking is actually a great way to get more "free" performance out of a system, as long as you can maintain stability. Usually the single biggest factor for success is reducing heat as much as possible.</p><p>Another thing to note is that while it is very important to keep CPU heat to a minimum, hard drives, video cards, and other components all need to be kept cool as well. In fact, I don't really know for sure that my CPUs are the current problem. I think they are, but my next guess (if I'm correct that it's a heat problem) would be my video card, since I've checked, and it runs really hot.</p><p>Consider this as well, if my CPU were to actually stop working because it was too hot, it would probably be a gradual process, and I could fix the situation by purchasing a replacement. If my hard drive crashes and ultimately loses data, that could be a much more problematic situation. I could replace the drive, but recovering the data could be far more difficult than just replacing a CPU.</p><p>I opened up the system and saw more dust than computer. All the fans were covered in dust, and their airflow was totally blocked. I put the case back on and took temperature readings of my computer both idle and when working. The tests are all run are on the following system:</p><p>CPU - Dual AMD Athlon MP 2000+ (1.67 GHz) Motherboard - AMD K7-D RAM - 1024 MB RAM (2 x 512 MB registered DDR 2100) Video Card - Matrox Parhelia AGP 128 MB HD - Segate 5400 rpm- st320410a Windows XP SP2</p><p>I picked that unexciting hard drive because it was the only one I had that reports temperature.</p><p>For the idle readings the computer was freshly booted into Windows. To get the computer running at full load I ran two instances of Prime95, a math application that will max out a CPU (2 copies running, one each for 2 CPUs), and copied 2 GB of Music on the hard drive to another folder on the same drive. The entire process took about half an hour.</p><p>Without anything to compare them to, those numbers for the most part aren't terribly interesting. My only reaction was that 63 degrees Celsius seems pretty hot, and the idle CPU temperatures aren't too wonderful either. Remember, each CPU type has a different recommended temperature range. 63 degrees may be too hot for mine, but could be either acceptable, or perhaps way too hot for your own. Regardless, you hopefully will notice a relative reduction in temperature after dusting.</p><p>Dusting the computer</p><p>As I said, I've never dusted a computer before, but I came up with what ended up being a reasonable plan. I bought compressed air and a small brush from staples for $7 total and used a rag I have here. I made sure to unplug my computer, grounded myself to discharge static electricity by touching something metal other than my computer, opened up the case and was ready to go.</p><p>As long as you make sure your computer is unplugged, don't get anything wet, and are gentle while you have it opened, you really shouldn't damage anything. For the most part, the inside of your computer is delicate, but it isn't brittle. The most notable exception is your CPU. If you were to disconnect it and pull it out of the motherboard you would expose pins on the bottom that are in fact extremely delicate.</p><p>You could do a really thorough job by taking everything apart and getting all the dust out, but I didn't want to spend that much time doing it and I figured if I left everything connected their was less chance I'd mess something up. So I used the air, brush and rag and got the dust off the computer, taking the most time to clean the fans and the holes they blow out of.</p><p>I ran the same tests again, and the results were dramatic.</p><p>Idle, CPU 1 saw an 18% reduction in temperature, while CPU 2 is 10% cooler. That's very important, as all those hours my computer is sitting doing very little it's going to be considerably cooler.</p><p>At full load, CPU 1 is 21% cooler and CPU 2 is 12% cooler. These are again very impressive results, and very important as well. I have had lock ups when video encoding and doing other CPU intensive tasks, and now the chips should be running cooler while doing those.</p><p>It's interesting that originally CPU 1 was hotter than CPU 2, and after the cleaning they switched. An important fact is that the temperature reporting on this type of dual AMD Athlon system is generally uneven. That said, CPU 1 was easier to dust around because the DVD drives were in the way of CPU 2, so I probably did a better job cleaning the former and there is still likely room for improvement in cooling the latter.</p><p>One other note, I kept track of the fan speeds before and after cleaning, and I saw about a 2% increase in the CPU fan speeds after I dusted. I wasn't expecting this at all, and certainly can't be certain that this will always result from dusting, but it could be very interesting for overclockers trying to eak out every last bit of fan performance.</p><p>The hard drive temperature saw a 9% improvement while idle after dusting, and again a 9% improvement at full load. It's a nice temperature reduction for a mechanical component that will be grinding away for thousands of hours over the life of your computer.</p><p>The case temperature stayed the same throughout all the tests.</p><p>Conclusion</p><p>All in all I was surprised the results were so dramatic. I expected few degrees for the CPUs and maybe one for the hard drive, but to see a 20% reduction in temperature is just great. There is defiantly room for improvement as well. The CPU fans have covers that I could have taken off and gotten more dust out, and as I mentioned reaching one of the CPUs was harder than the other. Further, I'd say I got most of the dust inside my computer, well over 90%, but I still saw some that proved more challenging to clean that I was willing to bother with. Taking all the cards out and thoroughly cleaning the whole system would have no doubt led to even better results.</p><p>My system has maintained the cooler temperatures so far, a week after the cleaning, and I haven't had a lock up since. I can't be certain I've solved the lock up problem, but it does appear I have for now. At the very least, I can be sure CPU heat is not the problem, as now they are running at very acceptable temperatures. Your own results will vary, and may not be as dramatic if your computer wasn't as dusty as mine. Regardless, you should see some reduction in component temperature after cleaning your system.</p><p>All in all I recommend you take a look around and inside your computer to see how it looks. If it's dusty, $7 and an hour of your time seems like a good investment to increase the life of your computer and prevent system lock ups. I suspect many people suffer the occasional heat caused lock up, it just isn't obvious what the problem is, and they don't occur often enough to be a serious concern. But remember, even if you only have one heat caused lock up in the entire life of your computer, it could come at the worst time, or cause permanent damage.</p><p>Steve Perlow is the founder of <a target="_new" href="http://aworldofhelp.com">aworldofhelp.com</a>, where you can find the aworldofhelp Top Picks in desktop and notebook systems. Visit aworldofhelp.com to get answers from real people to your questions about technology, travel and more.

วันจันทร์ที่ 29 กันยายน พ.ศ. 2551

Correctional Institution Preventive Maintenance Software

There is a great need for preventive maintenance in correctional institutions. The public would be at risk if penal facilities waited to solve problems until after they manifested themselves. Correctional institution preventive maintenance software is necessary to ensure that life in the facility runs smoothly and none of the prisoners escape. As the governments and other organizations allot revenues for correctional facilities, there may be debate about the costs of such maintenance. Although the software is expensive, it is both effective and necessary.</p><p>The best way to implement preventive maintenance software in correctional institutions is to integrate it in facilities statewide. This provides a uniform plan for all of the penal institutions and makes it easier for such facilities to work together if need be. This also assures that all of the institutions will be equally maintained and none will be in worse condition than the others. As with many other large institutions, standardization of correctional facilities is of paramount importance.</p><p>There are many goals of correctional institution preventive maintenance software, including maintaining of the prison, reducing or eliminating emergency repairs, and systematically updating the information database. The need to maintain the physical facility is obvious ? the safety of the public and the living conditions of the inmates depend on the prison being well-maintained. The need to avoid emergency repairs is parallel to the maintenance of the facility. The integrity of the facility would be disturbed if the building suddenly needed to be repaired, creating a breach in the orderly pattern of operations. Finally, the creation of a comprehensive database makes it easier to keep accurate records and to share information between facilities.</p><p>Correctional institution preventative maintenance software streamlines the operations of the facilities and minimizes unpredictable events. In the long run, it saves the taxpayers' money by making the institutions more efficient.</p><p><a target="_new" href="http://www.e-preventivemaintenancesoftware.com">Preventive Maintenance Software Info</a> features detailed information on preventive maintenance software for health care and correctional institutions, computer hardware, and personal assets, as well as reviews of preventive maintenance software companies. Preventive Maintenance Software Info is the sister site of <a target="_new" href="http://www.e-fleetmaintenancesoftware.com">Fleet Maintenance Software Web</a>.

Your Business versus Mother Nature

Business Consultants earn hundreds of thousands of dollars every year showing businesses how to improve their productivity. All business consultants in the Information Technology area agree that the biggest threat to business survival is data loss.</p><p>There are many different data backup solutions available on the Internet today. Unlike years past there are not only different providers but also many different methods of data backup. Some solutions are &quot;on-site&quot; based methods. These include tape drives or other magnetic storage media, DVD-R and CD-R based methods and NAS (network attached storage) methods of creating local (within the LAN) backups of critical data. These methods of data backup are definitely better than nothing, and can provide protection against user error, data corruption, and in some cases even computer theft (that is if the data backup equipment itself isn't also stolen) and many of the other pitfalls associated with digital media.</p><p>But what about protection against the most powerful of all forces, Mother Nature?</p><p>Hurricanes, tornados, earthquakes, and other natural disasters are a serious potential threat to the crucial data you have stored within your computer network. Add into the equation the collateral damage of flooding and fire that often comes along with Mother Nature's wrath and you have a recipe for some serious data loss in the unfortunate event that one of these uncommon, but critically devastating, events occur. In most cases your existing backup solution would be useless and would suffer the same peril as your original data.</p><p>The answer is simple: Have a complete, up-to-date copy of your data stored at a different location. You should back up your data using an offsite data backup service. Offsite data backups allow you to store mission critical digital files in a secure, remote location. When you store data in an offsite location you are doubling the protection of your most import data files and enabling a level of security that even the best on-premises data backup solutions can't provide.</p><p>Your data is encrypted and backed up over your existing internet connection to a secure server. You can set it up to perform backups at any frequency you wish. You can even set up the system to schedule backups while the office is empty on weekends and evenings, or when the computers are idle for a certain period of time (great for those systems that need to be accessed 24/7 and cannot afford the potential downtime that may be incurred due to backup procedures being run at the time).</p><p>Mother Nature is a concern for the integrity of your critical data. All smart businesses understand this.</p><p>Your DATA is your LIFE. Protect it!</p><p>Harald Anderson is a freelance writer and webmaster for <a target="_new" href="http://www.online-remote-data-backup.com">http://www.online-remote-data-backup.com</a> an online backup service. Experience the Digital Peace of Mind that safe, secure, encrypted online data backups can offer. <a target="_new" href="http://www.online-remote-data-backup.com">Online Backups</a>

วันอาทิตย์ที่ 28 กันยายน พ.ศ. 2551

LCD Monitors: A Catching-On Technology

If you've been in the market for a new computer monitor fairly recently, you might have noticed just how many more LCD monitors you see in the stores now.</p><p>It's obvious that the main benefit that's being pushed about computer LCD monitors is that they're flat, and you can put them almost anywhere, but you might be curious about just what you're giving up by going LCD. To tell you the truth, an LCD monitor can be a worthwhile investment to your home computer system if you're not hung up on the budget models, and if you can truly benefit from the added space.</p><p>Alright, first thing's first. LCD monitors will never be as good as CRT's (cathode ray tube monitors, the big box made like a TV), although when you get far up in the price range with LCD's, you may have a hard time telling the difference. But 90% of the time, the graphics and animation that can be produced by a tube are far and away better than anything you'll see from an LCD. You really notice this with moving pictures. This is because LCD's are a chemical reaction technology. Pictures run and bleed across the screen because the reaction is only going to be so fast, and there's no real way to speed it up.</p><p>You might notice, however, that more expensive models are smoother than budget models. That's because the budget models do not reflect the full capability of the LCD reaction, even though it is limited.</p><p>Just for a little background, LCD monitors started making their way into the stores in the mid 90's. Usually, they were black and white, and built-into part of those old pre-laptop portable computers.</p><p>The ones that then came out as standalones were never really able to grab a big part of the mass market, mainly because they weren't any good for much other than word processing. The picture would bleed horribly across the screen no matter what you were doing. Forget moving graphics of any kind. Sure, they were flat, but this wasn't really seen as a benefit at the time because people had been used to heavy, bulky monitors taking up the space.</p><p>Oh, not to mention the price. If you think some of the more high-end LCD monitors now are expensive, try back then. With all these factors put together, I'm a little surprised they caught on at all.</p><p>Of course, just walk into any major home electronics retailer and you'll see just how far LCD monitors have come. Cutting edge companies like Sony continue to churn out more and more precise video reproduction from LCD. Today with the better LCD's, you can get still images as sharp as CRT's, and graphics animation nearly as smooth.</p><p>The 20&quot; Sony that I have is not made for you to sit with you face right in front of the screen. Like most of the larger ones, it's meant to be viewed from a few feet back. And when you do that, you seriously cannot tell the difference between that and a CRT.</p><p>The true quality of CRT's still cannot be questioned. You can get a sharp, crisp picture, that blows away the cheap LCD's and is only a little better than the nice LCD's, but you'll always need a ton of desk space (and help carrying it in) if you want to go with a CRT.</p><p>Size and weight are another issue. There's a screen size limit that CRT's actually don't get larger than solely because after you hit about 28&quot;, they become ridiculously heavy. Of course, LCD's, being light, and flat, now allow for computer monitors to be made in some interesting sizes.</p><p>As far as brands go, Dell's &quot;Ultrasharp&quot; LCD monitors are great. Sony's always been known as a prime quality name, and visual technology pioneer. 15&quot; and 17&quot; LCD's will serve the purpose, but you really see what these monitors have to offer when you move up in the sizes, like 20&quot; and up. I'd stay away from the budget names. You'll know them when you see them because you'll see them at your major home electronics retailers, but you've never heard of them before.</p><p>Whether you're looking for some extra desktop space, or looking for the high-end PC graphics experience from a larger monitor, it's no doubt that the LCD monitors of today can more than meet your needs.</p><p>Phil Moyers, owner of Build-Your-Own-Computer-Plan.com shows computer novices how to save a ton of money by putting together fast, high performance PC's of their own with handpicked, quality parts.</p><p><a href="http://www.build-your-own-computer-plan.com/lcd-monitors.html" target="_blank">Computer LCD Monitors</a>

USB Key Drives - Useful Tool

There are many different names for these drives, just so we are all on the same wavelength about what I'm talking about, here are a few of the other names:</p><p>USB Key Drives, Thumb Drive, USB Pen, Key Drive, Microdrive, Flash Drive.</p><p>These drives, regardless of what you call them, are an extremely handy tool for anyone who uses computers at different locations. USB drives are great because they are very small, and fit in your pocket, necklace, or keychain. They give you anywhere from 32 MB to 4 GB in storage, and require no software! You just plug it in to the USB port on a computer and boom, instance storage and transfer device.</p><p>These drives save you a lot of time and money. It's a quick way to transfer personal documents, projects, pictures from home to the office and reduces the waste of burning CD's, or using diskettes. We moved away from the paper based office to the electronic office, now we are enhancing that more, my using reusable data transfer devices with much higher capacity and life span.</p><p>USB drives provide a quick transfer between your devices, you don't need to waste money on blank CD's, DVD's, Diskettes, you just transfer it over, probably much faster than you could burn a CD, and you are good to go!</p><p>These drives give us a low cost, environmentally friendly, high capacity, fast, and cross platform compatible device. With all these great reasons for having one, I can't see why more people don't use them! The prices are constantly dropping on this form of media and almost every computer used today supports USB devices.</p><p>By the way, did I mention they look cool?</p><p>Ken Dennis <a target="_new" href="http://KenDennis-RSS.homeip.net/">http://KenDennis-RSS.homeip.net/</a>

วันเสาร์ที่ 27 กันยายน พ.ศ. 2551

How To Buy A Printer That Won?t Break The Bank

OK I confess I've bought at least 10 inkjet printers in the last 5 years and finally found one that I really like. I'm not going to mention the brand here but I will tell you what the must have features are for me.</p><p>After years of refilling HP-like inkjet cartridges where the Cyan, Magenta and Yellow tanks were all mixed together in one unit I decided to buy a printer that allowed you to change each color tank individually. Although a minor change this affected how much it cost to print a colored output page in a huge degree. I never liked the concept of having all of the colors in one cartridge to start with. Every time I went to replace an empty cartridge I wondered how much ink was left in the other two colored ink tanks. If you didn't notice they were always a dark color making it impossible to tell how much was actually in the tank.</p><p>My new unit seems to use the Yellow cartridge (black aside) more than any other color which makes me curse the days where I envisioned myself throwing money in the toilet by only using half of the colored ink in a multi color ink jet cartridge. This backs up my initial thought process and confirmed all suspicions.</p><p>Since I'm a small business owner and penny pinching is always a must, I continuously test how much mileage that I get out of a cartridge. As you well know the little pop up window tells you when your cartridge is running low and it seems like it's there to annoy you and serves no other purpose. Being the cheapo that I am I decided to ignore the warnings and bells and whistles that normally go off and run a cartridge to the end of its tank.</p><p>It was tense, a sense of childlike mischief came across my mental state. I was actually defying the printing gods by defying their warnings of certain doom, nefariously clicking the cancel on every warning message. Surely something spectacular would happen at the end of the life of this inkjet cartridge! I had gotten about a thousand messages warning me of the peril that was coming my way. I envisioned scenes from nuclear war footage and big things happening like the printer exploding or perhaps the printer cartridge police showing up at my house and arresting me for such gross disrespect for printer law. Whatever happened this would be BIG!</p><p>Well after running the cartridge for about a month I got a harmless message that the cartridge was now out. No big light show, no explosion no nothing, what a disappointment! Anyway, I installed a new cartridge, realigned the thing using the printing utility and was up and running in about five minutes.</p><p>The point of the whole ordeal was to figure out how many more print jobs that I could do without changing the ink. Thus, saving me some extra cash. Well a month of printing is nothing to scoff at and it ended up saving me around $5.00 by using the cartridge down to the last drop.</p><p>Will it work on your printer? I don't know.. But you should check out the manual for your printer to ensure that you won't damage it by running the cartridge dry.</p><p>But friend I choose to live life on the edge. =)</p><p>Alexis Allen is a self-described consumer advocate in the Home Electronics Industry. You can check out her latest articles on the cost of printing at <a target="_new" href="http://www.cheap-toner-cartridges.com">http://www.cheap-toner-cartridges.com</a>

Dell Inspiron 600m Notebook Computer

After twelve years of owning desktop computers, I finally opted for a laptop so I would no longer be chained to my desk. After months of research and weighing various makes and models, I settled on the Dell Inspiron 600m Notebook Computer. This particular model has exceeded all of my expectations and at a price that is hundreds of dollars lower than many competing brands.</p><p>For several months I agonized over my next computer purchase. I knew I needed to be more mobile and only a notebook computer would permit me to take my "show on the road." Still, the decision making process was not easy as the number of different makes and models out there is mind boggling. Ultimately, I settled on a Dell in part because of previous good experience with the company as well as affordability of their product line.</p><p>The model I chose was the Inspiron 600m. As with almost everything that Dell builds, it is a "new" model; at least the 600m designation is. That is one of the confusing things about Dell and some other manufacturers: every month Dell introduces new models and you need a scorecard to compare one model with all the others. Fortunately, Dell's website allows you to do just that.</p><p><b>Key features of the Inspiron 600m include:</b></p><p>Lightweight: Just over five pounds.</p><p>Mobile Centrino Technology is standard.</p><p>14.1 inch screen</p><p>Pentium M 725 Processor</p><p>24X CD Burner/DVD Combo Drive</p><p>256MB DDR SDRAM 1 Dimm Memory</p><p>Wireless Network Card</p><p>Extended Battery</p><p>Microsoft Windows XP Home Addition</p><p>WordPerfect Productivity Pack</p><p>I kept my computer fairly basic but I did opt for the latest version of Norton Security, a surge protected cable, a wirless router, and a wireless mouse. I selected the wireless mouse as I thought the keyboard's mouse would be difficult to use. After two days I quit using the wireless mouse as I quickly got used to the built in one.</p><p>The screen is bright and the keyboard is solid. The mouse keys, however are noisy, almost clunky; you wonder if Dell could have used a quieter spring for each key.</p><p>The battery lasts at least four hours without recharging and when I do need to recharge I can go from nearly dead to fully charged in less than one hour.</p><p>For the price -- I paid just over $1100. for everything including shipping and local taxes -- the Dell cannot be beat. I haven't had to call customer service yet, so I cannot comment on that although in years past your call would be routed to a technician in India. This model comes with a standard one year limited warranty; I avoided a later sales pitch over the phone to get a three year warranty. Their top of the line warranty sends a technician to your house to fix your computer, so it can be option for those of you who do not want to ship -- and thereby lose the use of -- your computer back to Dell for repairs.</p><p>You will find the Inspiron 600m to be adequate for standard business work. Check out their myriad of other models if you do plenty of graphic design or if you need a larger screen. I am happy with the 14.1 screen, but you may prefer their 17" model.</p><p>Matt Keegan is <b>The Article Writer</b> who writes on a variety of topics including: aviation, business, customer service, health, marketing, product review, sales, technology, and more. Please visit <a target="_new" href="http://www.thearticlewriter.com">http://www.thearticlewriter.com</a> to review his portfolio online.

DVD Media

DVD is an optical disc storage media format that can be used for storing data, including movies with high video and sound quality. DVDs resemble compact discs: their physical dimensions are the same-12cm or the mini 8cm-but they are encoded in a different format and at a much higher density. Unlike CDs, all DVDs must contain a file system. This file system is called UDF, and is an extension of the ISO 9660 Standard used for Data-CDs.</p><p>DVDs are made from a 0.6 mm thick disc of polycarbonate plastic coated with a much thinner (reflective) aluminium layer. Two such discs are glued together to form a 1.2 mm double-sided disc. The basic DVD disc is thinner than a CD to make it possible to use a lens with a higher numerical aperture.</p><p>A single-layer DVD can store 4.7 Gbyte, which is around seven times more than a standard CD-ROM. By employing a read laser at 650 nm (was 780 nm) wavelength and a numerical aperture of 0.6 (was 0.45), the read-out resolution is increased by a factor 1.65. This holds for two dimensions, so that the actual physical data density increases by a factor of 3.5. DVD uses a more efficient coding method in the physical layer. CD's error correction, CIRC, is replaced by a powerful Reed-Solomon product code, RS-PC; Eight-to-Fourteen Modulation (EFM) is replaced by a more efficient version, EFMPlus, which has the same characteristics as classic EFM. The CD subcode is removed. As a result, the DVD format is 47% percent more efficient with respect to CD-ROM, which uses a 'third' error correction layer.</p><p>DVD Media can contain:<br> DVD-ROM (read only, manufactured by a press) <br> DVD-R/RW (R=Recordable once, RW = ReWritable) <br> DVD-RAM (random access rewritable; after-write checking of data integrity is always active.) <br> DVD+R/RW (R=Recordable once, RW = ReWritable)</p><p>Two DVDs with different bottom sides.The disc may have one or two sides, and one or two layers of data per side; the number of sides and layers determines the disc capacity.</p><p>DVD-5: single sided, single layer, 4,704,317,440 bytes, 4.7 gigabytes (GB), or 4.38 gibibytes (GiB)</p><p>DVD-9: single sided, double layer, 8.5 GB (7.92 GiB)</p><p>DVD-10: double sided, single layer on both sides, 9.4 GB (8.75 GiB)</p><p>DVD-14: double sided, double layer on one side, single layer on other, 13.3 GB (12.3 GiB)</p><p>DVD-18: double sided, double layer on both sides, 17.1 GB (15.9 GiB)</p><p>The capacity of a DVD-ROM can be visually determined by noting the number of data sides, and looking at the data side(s) of the disc. Double-layered sides are usually gold-colored, while single-layered sides are silver-colored, like a CD. One additional way to tell if a DVD contains one or two layers is to look at the center ring on the underside of the disc. If there are two barcodes, it is a dual layer disc. If there is one barcode, there is only one layer.</p><p>Each medium can contain any of the above content and can be any layer type. Double layer DVD+R discs are already on the market.</p><p>Provider Info:<Br> Cdrdvdrmedia.com<Br> Tel: 1-626-854-2145<Br> Toll Free: 1-888-813-5667<Br> Fax: 1-626-854-6553<Br> Website: http://www.cdrdvdrmedia.com</p><p>Profile about DVD Media(http://www.cdrdvdrmedia.com)</p><p>Cn Rambler<br> <a target="_new" href="http://www.Cdrdvdrmedia.com">Cdrdvdrmedia.com</a>

Wireless Notebooks: What You Need To Know About Going Wireless!

It's not exactly breaking news that our world is becoming increasingly wireless. Many of our daily activities that once needed a wired connection can now be done wirelessly!</p><p>The cell phone craze was probably the first revolution that seemingly happened overnight. The convenience of being constantly connected or plugged in to the your business, friends, or family was an undeniable need that was quickly met. For many people it has become a necessary in their daily lives.</p><p>Wireless computers, notebooks or laptops may just be the second wave in our struggle to becoming a totally wireless world. The ability to be constantly connected to your business and/or loved ones is revolutionizing the way we use computers and the Internet.</p><p>The ultraportable, versatile little notebook computer, will no doubt play a major leading role in our wireless struggle to be constantly connected. It's the 'portability' of the notebook or laptop computer that holds the most appeal and is its major selling point. And its popularity is growing.</p><p>It is estimated that over 42 million computer notebooks will be produced this year in 2005. The market for laptop and notebook computers is growing at a rate of 20% each year according to Taiwanese notebook makers. And they should know -- they make 70% of these notebooks or their components for such major players as Dell, Hewlett-Packard and Gateway.</p><p>But it's the portability and wireless communication these devices offer that's increasing their popularity among most users.</p><p>Just how is this wireless communication accomplished by the notebook or laptop you ask?</p><p>Wireless notebooks uses three major wireless data standards in order to transfer data. The one that is probably most common is 802.11b, also called Wi-Fi which stands for Wireless Fidelity.</p><p>Wi-Fi or 802.11b transfers data wirelessly at a maximum rate of 11Mbps for up to 150 feet. It uses the 2.4GHz radio spectrum and although it says 11Mbps, you will probably only get around 4-6Mbps in actual use. But this is enough bandwidth for high speed Internet, gaming and most file transfers.</p><p>The 802.11a is another standard that uses the 5GHz radio spectrum, so it has 8 channels available instead of only 3 that's available with 802.11b. The 'A' version also permits a larger transfer, at a maximum of 54Mbps.</p><p>The other standard, 802.11g, is a hybrid of 'A' and 'B' -- its also capable of 54Mbps but it uses the 2.4 GHz spectrum and is compatible with 802.11b devices. Some notebooks like the Fujitsu LifeBook N6010, have a tri-mode 802.11a/b/g wireless system that uses all three forms! The next technology in Wireless Communication is 3G EV-DO! Sounds like one of those funny robots from Starwars -- but it stands for evolution-data optimized. This new technology will change how we view and use the world wide web.</p><p>Verizon Wireless 3G EV-DO began commercial operations in Oct. of 2003 and is now expanding to over 125 million US consumers by the end of 2005. With download speeds of 400 to 700 kbps and bursts up to 2 Mbps, 3G has really given us wireless Internet this time. It has or will turn the Internet into a truly wireless system that's devoid of any cables or lines. It will be everywhere -- no space within our biosphere will be without the Internet very soon.</p><p>Of course, it should be kept in mind, that any group of computers can be made wireless by using a wireless router and a wireless network adaptor for each computer. Also, many notebooks and computers come with a Bluetooth module, which allows for wireless communication between any sort of electronic devices -- from cell phones to computer to stereos to headphones.</p><p>However, if you're setting up a wireless network or if you're using your wireless notebook or laptop at hotels and airports -- security will be a concern. Anyone within distance, possessing the right equipment and a little ingenuity may get access to this wireless system. For major corporations or the lowly homeowner; safeguards need to be taken to prevent unwanted visitors from interrupting your peaceful wireless universe.</p><p>There are usually two basic methods of securing wireless networks, WEP and MAC address filtering. The MAC (Media Access Control) is the physical address or unique hardware identifier given to each device in the network. Then you manually enter a list of addresses that can use or access your wireless network.</p><p>The other filtering process is more secure, WEP or Wireless Encryption Protocol requires a shared key between the users and then using this key to encrypt and de-encrypt data that's transmitted between your network users.</p><p>Many major hotel chains and other businesses are now offering 'Wi-Fi' services as an added convenience to their patrons. These 'hot spots' are popping up everywhere, even at some gas stations. You may need to sign in or get a password or key to access these services.</p><p>But like your cell phone conversations, any radio transfer or transmission will not be as secure as a wired connection. Keep this in mind if privacy is a major concern for you. But don't let it stop you from enjoying the convenience, portability and practicality of your wireless notebook or laptop.</p><p>It's a wireless world after all.</p><p>For More Information on Computer Notebooks and Laptops Click Here: <a target="_new" href="http://www.bizwaremagic.com/notebook-online-buyers-guide.htm">Computer Notebook Guide</a></p><p>Copyright ? 2005 Titus Hoskins of <a target="_new" href="http://www.bizwaremagic.com">http://www.bizwaremagic.com</a></p><p>This article may be freely distributed if this resource box stays attached.

Printer Cartridge Economics -- Four Ways To Make Your Ink Last Longer

Printer cartridge overheads can be a major expense for any busy office -- and even if you're working at home, it's important to factor in the amount you spend on your printer ink when assessing the cost of running a home-based business. And what you spent on that bargain-priced printer may turn out to be only a fraction of what you pay annually in printer supplies.</p><p>A family household may have several printers on the go, each requiring its own specialist cartridges. The kids are doing their homework, researching information online and printing off reference material before drafting and printing homework papers. Digital photography is great, but grandma doesn't have a computer (let alone an e-mail account!), so you're making high quality prints of your son's graduation ceremony to mail to her. And you have to proofread some important work documents by tomorrow -- and you know you can't check text accurately from the computer monitor, so ...</p><p>If you're anything like me, you can't imagine working without the support that a personal printer provides. But while the search for reliable but cheap printer ink never ends, there are some strategies you can adopt to economize on ink use and lower your budget for replacement cartridges.</p><p><li>Use draft print quality where you can. Go to File -- Print to open the box that lists the settings for your printer. Click 'Properties' to bring up the various options available. You'll probably find different choices under the heading 'Paper/Quality' that allow you to select draft quality printing. Your document will print at a lower resolution but that may not matter for reference material that you will likely discard later.</li></p><p><li>Choose black and white printing over color when possible. Depending on your printer, you may have the option to select grayscale printing using the black ink cartridge only. If you're not doing presentation quality work, chances are you won't need the other colors.</li></p><p><li>If you're dealing with a long document, print two sheets to a page if you can. Your printer may allow you to print two pages side by side in 'landscape' orientation -- and you'll save on paper costs too.</li></p><p><li>Modern personal printers can produce high quality photographs, particularly if you use specialist photo paper. But printing high quality digital shots can use a lot of ink -- so think about outsourcing your photo printing to a local print center. Many services allow you to order your prints online and can mail them to you if you can't collect them yourself. You can often have your photos printed on calendars, mouse mats or greeting cards, if you wish.</li></p><p>Reduce your inkjet or toner costs by economizing on ink when you can -- and keep your ink supplies ready for those occasions when high quality presentation counts.</p><p>Nigel Patterson is a business writer and the publisher of <a target="_new" href="http://printer-ink-2u.com">Printer-Ink-2u.com</a>.</p><p>His many articles provide useful tips and advice for online purchasers of <a target="_new" href="http://www.printer-ink-2u.com/ink-cartridges.shtml">inkjet cartridges</a> and <a target="_new" href="http://www.printer-ink-2u.com/laser-toner.shtml">laser toner</a>, as well as other printer supplies.

Do You Have Dead Pixels?

Take a good look at your notebook computer screen. Do you find some tiny dark spots? You could have dead pixels. One of the most expensive parts of your notebook computer is the LCD screen.</p><p>LCD's are highly sensitive and any amount of pressure, touching or handling may damage it. As such, dead pixels aren't an uncommon thing. Apparently, some degree of dead pixels is to be expected. Still if you have a lot of them, it would be classified as a defective screen. So, how do you determine if you have dead pixels?</p><p>Before we go there, make sure it's not just dust. Clean your screen first. The best way to do that is to use a soft cotton cloth - no rags or paper towel as they can scratch your screen easily. Moisten the cloth with plain old water and wipe the screen gently.</p><p>Side note: I've also tried maintaining my screen dust free with a Swiffer Duster. These are inexpensive, very soft and they pick up the dirt not just re-distribute it. It has worked well. Of course, this will not take care of smudges or dried on dirt. So you'll still have to use the cotton cloth and water combo sometimes.</p><p>Once you've cleaned it, you can run a quick check with a free software called Dead Pixel Buddy. It's basically a very simple file that will rotate your screen through all the basic colors. This way you can tell if a pixel on your screen is not displaying properly. One tip, you might want to get a help of a friend. Two sets of eyes are better than one especially since pixels tend to be miniscule.</p><p>You can also do a low tech way by changing your desktop's background color to black, white, red, green blue and yellow, checking the screen each time you change the colors. This is of course not fool proof especially if you have tons of icons on your desktop but it's a good 'backup' check if you don't have Internet access to download the file or whatever the case may be.</p><p>If you do find dead pixels, don't panic yet, as mentioned earlier, a small amount of dead pixels could be inevitable but if you have a lot of them and your notebook computer is still under warranty, this may be a good time to call up the manufacturer and ask for assistance.</p><p>Related Resources:<br> 5 Days To A Healthier Notebook Computer<br> http://www.notebook-computer-infocenter.com/5days-to-a-healthier-notebook.html</p><p>Dead Pixel Buddy<br> http://www.laptopshowcase.co.uk/downloads.php?id=1</p><p>Lynn Chan helps new owners learn proper notebook care and use. Take care of your investment, find out how at <a target="_new" href="http://www.notebook-computer-infocenter.com">http://www.notebook-computer-infocenter.com</a>

Tips To Select Proper Motherboard

Selecting motherboard is really simple. As name suggests "Motherboard" acts as a protective mother of CPU, RAM and other add on cards since these components stand firmly on motherboard.</p><p>Number of devices have been integrated on motherboard over a period of time. Now a days motherboard with onboard features is more popular in Branded PCs. Onboard integrated peripherals are offered by many branded PC manufacturers to provide you latest technology if you buy a system from a big computer manufacturer recently.</p><p>It is recommended to select motherboard with maximum number of ports preferably with 2 serial, 1 parallel and 4 USB ports. Most of the recent devices have USB port. Also check the upgradation options such as memory support and number of available PCI slots etc.</p><p>Technology changes so rapidly that manufacturers add the new features such as serial ATA, USB 2.0 and RAID on the motherboard to stay ahead of the competition. Many manufacturers even provides FM radio on the motherboard to survive in the race making it fully entertainment machine.</p><p>Important Motherboard Tips:</p><p>1) Do the survey by reading the reviews on motherboards and then look for either same motherboard or compare it with it's competitors product in the market.</p><p>2) Don't buy the costliest motherboard if you are not going to use additional features. Always check cost to benefit ratio and make the selection just by assessing the utility value.</p><p>3) If you are dedicated gamer or fan of overclocking, verify whether the space around CPU is spacious enough for you to install a larger heat sink-fan combination for cooling. Go for motherboard, which has the facility to overclock FSB in steps of 1 MHz and core voltage adjustment.</p><p>4) Confirm that chipset on the motherboard is compatible with the speed of the processor and speed of FSB. It is very important to check the compatibility to improve the system performance.</p><p>5) Select feature rich motherboard for future up gradation. Also ensure that it has enough PCI and memory slots for future expansion.</p><p>6) If planning for expensive motherboard go for the motherboard with onboard video chipset and an AGP slot. Don't forget to check whether AGP slot supports latest transfer rate.</p><p>7) Also see whether motherboard has onboard sound and integrated Ethernet.</p><p>8) Check the type of memory that supports motherboard.</p><p>9) DDR RAM is the most popular option today. Most motherboards have at least two slots. But expensive motherboards have 4 slots. The total amount RAM you can install is also dependent on the motherboard chipset.</p><p>10) The smooth transfer of data without errors is the most important function of the chipset. This function of the chipset decides overall performance of the system. That is why the maximum speed a processor that the chipset supports is very important. In case of future upgrades you will need to change only the processor. This will save your time and money.</p><p>Krishna Pai is a webmaster and a writer. Get Computer Tutorials, reviews, Hardware & Software Tips, How to guides at <a target="_new" href="http://www.cheapest-computer-hardware-software.com/">http://www.cheapest-computer-hardware-software.com/</a></p><p>For more Computer tips join his "Build Computer ezine" at <a target="_new" href="http://www.cheapest-computer-hardware-software.com/build_computer_ezine.html">http://www.cheapest-computer-hardware-software.com/build_computer_ezine.html</a>

How to Save Money With Cheap Computers

We all know that computers change more then any other type of technology. There constant changing can also leave are wallets completely empty. But do we really need all that expensive hardware? Probably not. Lets take look at how you can cut some corners when buying a new computer.</p> <p>For the average computer user you really wont need anything more that a basic computer package. You see most people use there PC to do Internet, email, word processing, and a few other basic tasks. Running these sorts of applications don't require much computer power.</p> <p>Now of days just about any new machine that you can buy will handle those sorts of tasks with ease. Even a machine for $500 or less will get the job done. Many of these sub $500 dollar PC's even come with 1 year warranties. You cant go wrong with a deal like that!</p> <p>I know many of you are probably thinking; "What if you do more then just those basic tasks?"</p> <p>You should still be able to get a very affordable computer. Expect to pay up to a thousand if you would like to take on some digital pictures and video. This type of work will require bigger hard drives, more CPU power, and gobs of memory. You should be able to get a machine that can handle these tasks for $1000 and maybe even less.</p> <p>Here are some specs of you should be able to get in a cheap computer system:</p> <p>2GHz CPU or faster</p> <p>256-512 of DDR RAM</p> <p>60GB hard drive</p> <p>17' CRT Monitor</p> <p>CD RW (CD burner)</p> <p>Any machine that resembles the specs that you see here will get the job done for most computer users. You will need to decide what you want to do with your computer and then decide just how much computer power you will really need.</p><p>Tyler Casselman runs the site <a target="_new" href="http://www.cheap-computers-4u.com">Cheap Computers 4U</a>

วันศุกร์ที่ 26 กันยายน พ.ศ. 2551

Toner Cartridges - How They Work

"content-type" content="text/html;charset=utf-8">
<TITLE>302 Moved

Expansion Cards Part 2: AGP

"content-type" content="text/html;charset=utf-8">
<TITLE>302 Moved

วันพฤหัสบดีที่ 25 กันยายน พ.ศ. 2551

What to Do Once You Are Infected with Spyware, Ad-ware or Viruses

"content-type" content="text/html;charset=utf-8">
<TITLE>302 Moved

Video Encryption

"content-type" content="text/html;charset=utf-8">
<TITLE>302 Moved

Correctional Institution Preventive Maintenance Software

"content-type" content="text/html;charset=utf-8">
<TITLE>302 Moved

How To Upgrade Your PC

"content-type" content="text/html;charset=utf-8">
<TITLE>302 Moved

How To Backup Your Hard Drive

"content-type" content="text/html;charset=utf-8">
<TITLE>302 Moved

วันพุธที่ 24 กันยายน พ.ศ. 2551

Selecting a Laptop

"content-type" content="text/html;charset=utf-8">
<TITLE>302 Moved

Lock Workstation Fast

When you work in an office, it is important to lock the workstation each time they step away from your computer. Pain, but a security measure. You do not want someone to send a malicious program in its e-mail, right? Here is a faster way to unlock a workstation without going through the CTRL + ALT + DELETE road. On the desktop (Windows + M), right-click an empty area and select New&gt; Shortcut. Copy and paste the following text in the Location: rundll32.exe user32.dll, WorkStation Lock name for the shortcut Blocking work , or whatever you prefer and click Finish. Click on this link and your PC is in use until he comes back and enter the correct password. Information: rundll32.exe is already on the road. A reader wrote in First of all, I am not sure how to create an icon is easier than you CTRL + ALT + DELETE option. Press the buttons and then press space, I would say it is more often then not going to be faster than searching on your desktop and clicking on an icon. But if you're looking for a faster way to unlock the machine. Maybe I should try Windows + L. I responded by saying that CTRL + ALT + DELETE requires the election to block the work. Given that we have to block our work so often seems to me that you click on an icon faster. But the Windows key + L for the fans. But I checked in Windows + L and does not work on my team.
http://www.meryl.net/ Meryl K. Evans
is content Maven http://www.meryl.net/blog/ Meryl behind http://www.internetviz.com 's Notes / Newsletters and Le Journal de remediators Security Digest. It is also a PC Today columnist and a tour guide to inform. It is equipped to handle the editing, writing, content and requirements. Texas living in Plano, Texas, a heartbeat north of Dallas, and not to use a cap of 10 gallons or Cowboy boots.

Emergency Response VSAT Internet Communications

In 2005 begins, there are a number of products on the market that will enable emergency response units to have an Internet connection distance disaster. The products marketed this year to sit in an emergency vehicle by the fire departments in most any kind of truck or van, trailers specially designed for the use of mobile and portable generators in boxes that can come with an X window Fed or overnight to most places in the U.S. A response team biggest challenge is to know enough about how this mobile Internet technology, the satellite working and what is the difference in the quality of transfer because the equipment is selected and services provided by the ISP via satellite. To make the right decision early in the process of purchasing mobile satellite VSAT Internet equipment will save your government thousands of dollars in the long term. How can you consider the best combination of hardware and service? Here is the process, I recommend government agencies I speak for the whole country: 1 Discover what you have to do on the Internet in an emergency. Is it necessary to send digital photos to other places? It will be necessary to establish a VPN connection to the main office? You want a camera to broadcast live on the Internet? Do you need the capacity of telephone network (VoIP) in a place far, which has no cellular connection? The need to connect multiple computers on the remote site is involved in the above activities or heavily involved in e-mail? All e-mails, but requires either a very low latency (1 / 2 seconds or less) or fast loading rates (sustained speeds between 128 kbps)? .. Some of these activities is necessary both! If you need these capabilities, it is necessary to consider seriously the company in the form of equipment available today. This is not Direcway or Star Band Powered layer! These companies are beautiful, but after all they can do, the important fact is: They do not load or not enough AC WO (a road) or low latency speed enough to work effectively in the tasks mentioned above above? period! 2. Determine the type of installation will provide its emergency response team greater flexibility in an emergency. When time is of the essence, you need a configuration that can be taken to a disaster area in a hurry and is available at a moment notice to be on the way. An assembly of autonomous vehicles is the most popular, partly because it was all that was available before 2003 and until recently, the least expensive. Many departments do not have the budget to have a vehicle to sit around waiting for a disaster. They had to use the vehicle at all times and have a legitimate concern that when the need arises, the vehicle WO will not be able to achieve a place in the time required? What? Many departments have recently chosen to speak to a trailer-mounted system in combination with a laptop or a portable device that is two or three boxes containing all the equipment needed to quickly establish a broadband connection to the Internet and can be sent by carriers of night soil, if necessary, to a remote location. In this scenario, the monthly service is a minimal cost, and when the need arises, the increase in rates to what is necessary within minutes. This can save the government that a huge quantity of years. Not only was offered by the big guys in this business who discovered how to make money with this type of service using the transponder to manage multiple accounts on what would normally be the result of frequent use. The best way to ensure that their investment in this team is wise is to contact an independent supplier who can give you a No Spin of the situation and recommend the appropriate solution for their organization. About the author: Randy Scott has been involved in two-way satellite Internet industry is like a father engineer, consultant and entrepreneur. Randy is the founder of VSAT U.S., a consulting and agent, representing the leading providers of Internet services by satellite in the U. S. For more information on products or services by mobile satellite VSAT VSAT current offers on the Internet, visit www www.vsatus.com. vsatus.com &lt;a&gt; or e-mail info@vsatus.com.

Top Three Factors to Consider While Choosing a Data Center for Your Business

Data is at the heart of the Internet. The servers on the Internet, do not call Data Centers their home. If you think about how many billions of electronic transactions that occur every day, he was surprised to learn that the final resting place of all these transactions are stored data centers. This astonishment quickly turns to panic when you think about how private data and vital data stored there. For years, Data Center technologies have evolved in a long, advanced techniques such as server virtualization and high-speed power houses. There are more than 100 factors, you should consider a Data Center against before choosing a house on their servers. In this article we will see the first three, which in turn determine the rest of factors. 1. &lt;B&gt; Security
: We have seen the amount of data stored, processed and controlled by the data. All these data are of vital importance that May or in violation of a global economy. Security features include encryption of data servers, security for the uplink or backbone network is used. It includes security mechanisms as public-key key access and the ability to store data securely and safely. At least discussed aspect is the physical security of the box and all the data center itself. We are talking about espionage and limit the inhalation of packages, but what happens if a person has only been on trips outside of a server. How many transactions by credit card details, bank information and Social Security engaged! You can have a slow, but a cause of uncertainty creates many problems in the form of trials. Select the data is excellent in all aspects of security. Ask questions pointed out, pending the right answers. 2. Reliability &lt;B&gt;
: The next important aspect is the reliability of systems and infrastructure central data itself. We're not just talking about backup machines or hard disk RAID 5. We talk about high availability of power backup systems with sufficient time at home and generators for emergencies. The second aspect is to assess the reliability of the company that provides data center and people who work for the company. You have a lot of people want to talk about their daily consumption and authentication process and if you're even a medium-sized enterprises. Recovery systems in case of disaster is crucial for the five 9 reliability is not at a standstill because a power company in California had a total stop of emergency due to an earthquake or a hurricane in Florida. You should be able to deal with other tipping sites. 3. &lt;B&gt; High Speed &lt;/ B&gt;: The third aspect is the necessary speed. It's more complicated than you think. Add a word by saying that we have high-end servers such as high-speed data minimal infrastructure. The network uplink and the Internet backbone in the center are connected, is also very important. You have to seek individual solutions technologies such as caching, balancing and designs high-end routers, switches and funds. This article applies only to these key concepts and you have to do enough research on the keywords used in this article. As I said there are 100 factors to consider before you select the correct data. Any good business owner of a Data Center opens to help you assess your infrastructure against these factors. You can find a good http://www.fastpcnet.net/datacenter.html Data Center with great capabilities in this article
fastpcnet.net
. Ask your custom solution, and how they measure against the deciding factors, and will be pleased with the reaction. The author has a master's degree in distributed computing and not freelance for many large companies via the Internet toll-free free website http://www.freelancefree.com
freelancefree.com &lt; / B&gt;.

วันอังคารที่ 23 กันยายน พ.ศ. 2551

Expansion Cards Part 1: (of a 3 part series)

PCI expansion slots available on motherboards to enable a number of improvements in a computer system, but the card has targeted a slot must be addressed before making a purchasing decision. The most common types of expansion cards for modern computer systems can be divided into three formats: PCI, AGP and PCI Express. Each of these formats will be treated separately in this series of three councils PCI. Letter to the PCI Peripheral Component Interconnect, and is the term used to describe a bus directly to the components of the system memory and processor system bus via the front. During consideration of communications on a motherboard, the concept of bus has nothing to do with the big yellow thing that takes children to school. This May, several buses of a computer, and the PCI bus, everyone is responsible for managing the flow of communications on different devices for the processor. Front side bus is a high-speed connection that controls communication processor with items such as hard drives, memory and PCI devices, and no payment processor with all the responsibility of management. First developed by Intel in early 1990, PCI has been established even before (and under), bus architectures such as ISA (Industry Standard Architecture) and VL-Bus (VESA Local), which was common in the 1980s and 1990. The original specifications for the PCI bus has a speed of 33 MHz with a 32-bit bus width, and a maximum bandwidth of 132 megabytes per second. There are a number of revisions to the PCI standard has significantly increased these specifications, taking to 66 MHz, 64-bit and 512 MB per second respectively. 32-bit and 64-bit versions have different physical properties, and most motherboards only offer 32-bit connections. The original specification of power PCI devices that operate at 5 V DC and revisions with the wine of opportunity for entities to continue to use 5 V, and to be able to operate at 3.3V DC. A simple explanation of 32-bit and 64 bit can be taken to the analogy of buses and traffic. Think of all the bit like a traffic lane on the road. Think of a 32-bit bus 32 channels for traffic and a 64-bit bus with 64 lanes for traffic. As a greater number of vehicles that can travel at the same time, on a road several channels, more data can be transferred to a bus with a little more consideration. Motherboard can support more slots to share a PCI bus, and although not particularly common, can contain more than one PCI bus. According to the form factor size motherboard, and other characteristics that take place in May on the shelf, you can expect to have six standard PCI slots in a motherboard. For example, the mATX format provides that two of the 32-bit PCI, while the ATX-six format features 32-bit PCI. A 32-bit PCI card features 124 pins mating with a slot in a system motherboard, and is a 32-bit or 64-bit slots (although the data transfer should be 32 bits in one or another type of slot). A 64-bit PCI card features 184-pin mating with a slot on the motherboard, but can usually fit into a 32-bit slot as well, as long as the functions of the motherboard does not preclude . When installed on a 32-bit slot, data transfer 64-bit card is limited to 32 bits. The STL2 Dual Socket 370 Intel Server Board W / VRM STL2 Dual Socket 370 Intel Server Board is a good reference for comparing the 32-bit and 64-bit PCI. Search the lower left corner of the map shows four 32-bit PCI slots and two 64-bit PCI. Further contributions in this series of tips will be AGP and PCI Express, each with its own physical properties. Although the format of different PCI cards can be interchangeable, PCI, AGP and PCI Express cards that do not work (or necessary) in the second slot. Most cards will be PCI 32-bit variety and range of articles that are available is quite broad. Graphics cards, sound cards, network adapters, RAID controllers, TV tuners, modems and USB / Firewire controllers are all common themes that can be added to a system using a PCI card. Many of the items listed in paragraph above, is incorporated into the modern motherboard, but a board These devices do not allow means of upgrading. PCI devices provide Plug and Play, allowing the user to install (or remove) a device at home. For example, a low-cost 2-channel sound card, can be quite good for some at first but along the way that you can decide that something like 7.1-channel Sound Blaster Audigy 2 offers sound quality that they really want . The upgrade is a question of whether to turn off the system, trading cards, restart, and install new software and drivers (OK, maybe a little more simplified). The good thing about PCI is that even if you have a table with in-feature (for example, included in above), the BIOS on the motherboard as a rule, you can disable function if you do not want to add to a map update (which the Audigy sound card mentioned in the example above), or that it can complement the function and built (as a RAID card FDI). A site that led the development of the PGA is the result of PCI-based graphics card. The demands for speed games and other graphics-intensive applications that require high bandwidth, but it was not available on the PCI bus. Since all devices on the PCI bus share bandwidth available, an even faster, dedicated bus is required to treat only the charts. PCI graphics card is still available, however, and an easy way to add a second monitor to a system currently operates in an AGP or PCI Express graphics. The last word PCI slot has been around for a while, and seems to have a place at least in the near future of computer architecture. AGP and PCI Express offers performance advantages that the standard PCI can not match, but for many applications, the performance offered by PCI is more than enough. Watch the next few tips in this series for the basics of the PGA. http://www.geeks.com http://www.geeks.com/pix/techtips.htm computer advice and help the team http://www.geeks.com/pix/techtips.htm

RAM - What is It & Why You Need Plenty

This is the first article in the understanding of the computer in the series aworldofhelp.com. Our goal is to help people understand how his team, not just say what they have to buy or use. Once you know how the team, the right to buy or to easily update the system. The series is designed to provide valuable information for users at all levels of knowledge, so that if a part of it seems too complex or too simple for you, hope you read and learn everything I can to articles. If you have questions or comments about this article or ask in the forum! RAM - What is it and why you need a large number of image many as a team consisting of a processor - memory of the CPU - RAM Hard Disk How these three components to communicate It is important to understand how a computer, and at the end to get an understanding of why need enough RAM for their programs. Around the Internet and in magazines can be found quantities of RAM is recommended for ordinary users. You can also find plenty of RAM was proclaimed as the best performance in U.S. dollars for its modernization. I do not agree, but I want you to understand what is really RAM, and why it may be an update. I have briefly discussed this topic in Notepad aworldofhelp Buyer's Guide on page 4 The information in this article is correct, but I'll try to do things a little clearer here. The article is divided into four sections covering: 1 The functions of the three components that are to discuss their relative speed and 2 Why do you need RAM, and what he has RAM 3 Multitasking and how it improves performance of RAM 4 How much RAM you need is the CPU for Central Processing Unit. He is the brains of your computer. When you open a program like Microsoft Word, for example, CPU read the lines of computer code, and follow the instructions so you can use the software. When you play an audio file formats like MP3, the CPU has to do to decompress work while you play. When you change an image of the CPU is to perform many calculations, even for the smallest changes. One thing to note is that the processor is actually a very small amount of memory in it. It is the fastest memory in a computer system, but it is so small that it does not really affect this article. Overall, the processor does not store information that make up the program, MP3, or image, a single process. The data were placed in any part of your team, and the CPU is to find and retrieve later. That measure, the problem of finding data and how it affects their overall performance of the system is what this article. RAM RAM means Random Access Memory. This memory is very fast, and you will see in size to 256 MB, 512 MB or 1024 MB When you turn off your computer, the content is erased, except that the temporary memory. This is where the CPU is first to provide data to be processed. So if you change an image and data in RAM, memory is fast memory, change the image that will happen fairly quickly. Hard disk on the hard disk where you store all your software, music, video and all we keep on your computer. This is where the memory to store files that remain even after disabling the system. You see in all sizes, which typically range from 30 GB, hundreds of gigabytes. The cases are very slow regarding the processor and RAM, since they are mechanical. Inside the small disk, in fact, it is the readers who move to physically locate and read the data. If you change an image, the CPU will first address the RAM to see if it is, because the RAM is fast. If not, the processor will be on the hard disk and change the image. Because your hard drive is so slow, it takes much longer than if the image is in RAM. Again, CPU only put a bit of data, so you need a place to work. If the CPU available for the treatment you do it as quickly as possible, but if not, your brain in your computer just sit and hope to do nothing. Only after the lies and retrieve the necessary data to process. So ideally you want your CPU to find data in place as fast as possible. As you can see, if the data in memory, they are much better than if you are on your hard disk memory, because it is much faster. Just take a look at the chart below. Here is the time it takes to reach each type of memory in nano seconds. Clearly, the hard drive is too slow, but when you look at the figure above, and you see that the figures are based on you know that it is slow. Each of them is the nearest access time nano seconds:
CPU RAM 1 ns ns 60 ns 10000000
Hard should be clear why the bars of the CPU and RAM not even appear in this graph, the hard disk is simply too slow. So why the penalty with a hard drive? Are you sure you would think it would be great if you could simply use massive amounts of RAM instead of a hard disk. You're right, this will be a great situation, but as you can imagine, the fastest computer memory, it is more expensive. RAM prices have dropped significantly in recent years, but it costs much more in terms of hard disk space. Computers work within this limit - faster than the memory is more expensive - to watch the scene of faster information first, then go to places slower than when necessary. So if you hear the hard drive makes a noise or you see a light that shows you who is on, you know that the data are not in RAM. We now know that hard disk access is very slow, and it is therefore your CPU, and which, in turn, must wait. So now you know you have lots of RAM, at least enough for all its programs, if you do not have access to the slowness on your hard drive too often. But what really use RAM, and how can you see if your system has enough? Windows runs much RAM. Microsoft says that Windows XP on a machine with 64 MB of RAM, but recommends 128 MB or 256 MB if you have more memory than that, and I recommend you do, Windows will use some of them well. All that is charged when you start the computer also uses RAM. What these programs are actually made is to RAM, if you're tired, so they can be used with great speed. The problem is when there is not enough memory for all these programs, and the computer works very slowly. On my machine to load this software when I turn on the computer: AVG Antivirus Scanner Software Digital Camera Software alert AOL Instant Messenger and some software test server and then run after starting to use more RAM. Whatever the browser I use, for example, took the RAM. Microsoft Word is not too much, and all my programs. To see how much RAM you have and how much RAM you have, you can open the Task Manager, right-click on the Start menu and choose, it is as follows. On the right, in memory of my physical side effects section on the list. My total and available memory on the list, and you can see, only the boot on my Windows XP computer, and the burden of all the things I do, I have less than half of my RAM available for d ' other software. Your system will probably be less total RAM, but you can see how and how much is free. You can easily find out how much RAM you have, right-click on My Computer and go to properties, but it is useful to see here to understand what the Task Manager shows. You can use this tool to convert the number of K to a number of May that more comfortable with, MB . K MB on my computer, 1048040 K is 1023.4 MB, which is 1024 MB. His own system can provide a number from a few megabytes less than the real. For example, 252 instead of 256 It is normal and is the result of something else, like a video chip, using a portion of RAM. The RAM for its programs work is the number that appears in the Task Manager. In my example, I have hundreds of megabytes of RAM. Sometimes I meet RAM if I change the video or photo editing, but beyond, it is rare. It is a good thing, but remember table. If memory is full, the hard drive will be used more, and because it is so slow, grinding to a system of nearly detainees. When we look at the Task Manager, you can have a good idea of how the system is running. If you have lots of RAM, you're in good shape. But many systems that I have almost no free RAM, and that is what causes the system to use the hard drive and run slower. Note that the available RAM is usually never hit zero, but varies around a very small number if the system is out of memory. Our example to date has been simplified to show how to do something on your computer requires memory. However, the real advantage of having enough memory is multitasking. Basically, if you make more than one thing at a time, you are multitasking. If you read this article and the publication of a picture at the same time, it is multitasking. Generally, if you can switch between open applications on your system very quickly, both to be loaded into RAM. In this case, you'll probably see a lot of memory available on the Task Manager. On my computer, because I have a lot of RAM, I spend two or three browsers, Excel, PowerPoint, instant messaging, my music player, and faster. On the other hand, if you do not have enough RAM, even with only two open applications, including modification of the computer May slow significantly. The software that is changing, is not in the CPU and RAM are required to obtain information from the hard disk. To open multiple programs, the situation worsens. A Task Manager, in this case is likely to show very little memory free, very little in the fact that they are in compliance with all of its programs. How much RAM do you need? The best answer is that you have enough RAM to run all their applications and multi-task them quickly. If the system works well and that the Task Manager Audit and lots of RAM, you're probably in good shape. If the system is slow change among more than one program, check the Task Manager and see if your RAM available. If so, add the more likely that the whole system operate more quickly, simply by installing additional applications in RAM. You'll be amazed at how to resolve this problem, it will improve the overall experience. That is why so many people talk about RAM as the best upgrade older systems. If you buy a new computer with a 512 MB is a good amount of RAM for most users. If you edit images or videos, or if you can afford the upgrade, up to 1024 MB (1GB) is not a bad idea. Memory prices are much lower than where it was, and will have more memory for most programs now. For most users, the greatest benefit for more RAM is that if you keep your computer for an extended period, the additional RAM that can store an update on the road. But how much RAM is too much? So I do not slow down the system by adding RAM. Typical systems can now adjust anywhere from 512 MB - 2 GB of RAM. The problem is, once you have enough RAM, adding more really not much, if the gains in performance. In this spirit, return soon for an article comparing the performance of applications, including multitasking, with different amounts of RAM. We will test the 256 MB to 1024, and you can see how everything we have seen here have a real effect on the speed of your computer. Steve Perlow is the founder of http://aworldofhelp.com aworldofhelp.com, where you find the most sought aworldofhelp on desktop and portable systems. Visit aworldofhelp.com get answers from real people to their questions on technology, travel and more.