Tuesday 29 November 2011

Desire - pretty high-tech gadgets

Desire is a 3G smart phone that supports high-tech mobile phone is a perfect blend of style and function of the view. This stylish mobile phone, Android version 2.2 (frozen yogurt) version 2.1 can switch to Android (Eclair) and is powered by. HTC Desire has a touch screen 3.7 inch AMOLED capacitive 480 × 800 pixels resolution in the results of the display of objects up to 16 million colors. This amazing device touch screen, easy navigation, with a particular characteristic of the user interface HTC sense for an optical trackpad with the method of multi-touch. In addition, it is also clear each accelerometer and proximity sensor for automatic rotation and user interface automatically. Phone black, brown, silver, measuring 119 × 60 × 11.9 mm and is available in white casing weighs 135 grams.

HTC Desire is to specify the options GPRS and EDGE-enabled, you can get Internet connectivity, with the help of a Wi-Fi ® wireless LAN technology to enable high-speed connectivity with 3G HSDPA & HSUPA. In addition, the mobile phone, or shared with other compatible devices, you have the option of Bluetooth and micro USB port to transfer data or files. In addition, mobile phones, Google search, Gmail ™, Twitter, Flickr ™ integration with Facebook ™ on YouTube ™, are compatible with.

To refresh the mind of the user, are chummed around with users’ desire stereo FM radio MP3 and MP4 players RDS.The desire, the device is supported by Google Maps and digital compass integration.This more than with the help of GPS navigation, you can have a circulation of satellite navigation is to provide beautiful images for years 2592 × 1944 pixels, autofocus, a 5 megapixel camera with LED flash function, good quality video direct WVGA @ 15fps or 720p @ 30fps Pull quality. Desire has been installed in ROM with 512 MB memory card that can be extended to external microSD ™ GB to 32 GB of RAM and 4576 MB.

Moreover, it has a battery internal standard provides impressive talk time of up to 40 minutes to 6 hours with 2G and 3G.

Asus SABERTOOTH 990FX Motherboard

Asus SABERTOOTH 990FX Motherboard (AMD Socket AM3+, 990FX/SB950, ATX, 32GB DDR3)

Sunday 27 November 2011

Latest knowledge of computer field

In today life we have to keep in touch with the latest knowledge of computer. Computer is becoming part of our daily life. All kind of people use computers like children, student, teachers, doctors, receptionist, and professional people. With the invention of internet it is now easy to get knowledge of different fields of computer. For example if you are programmer then you aim is to search for coding problems. If you have mobile or iphone then you want to get latest news about the software and unlock your mobile sets. By day to day websites are increasing and finding website that gives you accurate information is difficult. So I suggest you to download alexa.com toolbar from their website and install in your browser. You can first check what is the ranking of website you currently viewing. If the ranking is good then the information is that website is more accurate than the websites with very low ranking.

google.com is good resource of finding what you want. There is new feature in google search. All websites you search in google have alexa ranking bar with their links. If the ranking of that site is good then that mean its knowledge is better. You have to also keep up-to-date with processor of your computer. For example intel core i7 is new processor nowadays. If you not afford the high price processor then go for dual core 2 processors. I have dual core 2 processor and it supports both 32 bit and 64 bit. If you have good processor in you pc then you find yourself easy to use your pc as it has high speed. Also use high ram if you want to increase speed of your computer. If you have very low speed of computer then it is impossible for you to open 3 or 4 sites at the same time and also you are unable to open two applications same time.

If you are keen to use new mobile sets then you have to keep in touch with the latest technologies coming in mobile world. For example nowadays 4G and 5G is coming with latest mobile sets. You also have good searching techniques on internet. For example in google search if you want to find only specific words then you can enclose the words in double quotes. Let’s say you want to find iphone features then you write “iphone features” in search. If you want to find only results from some specific site then you can put iphone features:sitename.com

Don’t use old books and magazines; go for new books and magazines. Also visit online computer magazine sites to get latest information about IT world. Also visit tech blogs on net daily for latest information. For example visit mashable.com and techcrunch.com. These sites update daily with something new in it.

If you are programmer like wordpress, joomla, drupal, java, oracle, .net then visit the official sites of them and get latest information about their software. Also visit forums of that sites to see what other programmer are facing problems.

Wireless Sensor Network Components

The NI Wireless Sensor Network (WSN) system is built on an IEEE 802.15.4 wireless mesh network. The 802.15.4 radio in each NI WSN device provides for low-power communication of measurement data across a large network of devices. NI-WSN software builds on top of that to provide network configuration and reliable communication from the host PC or Programmable Automation Controller (PAC) to the NI WSN-32xx node devices.



A wireless sensor network (WSN) is a wireless network consisting of spatially distributed autonomous devices that use sensors to monitor physical or environmental conditions. These autonomous devices, known as routers and end nodes, combine with a gateway to create a typical WSN system. The distributed measurement nodes communicate wirelessly to a central gateway, which acts as the network coordinator in charge of node authentication, message buffering, and bridging from the IEEE 802.15.4 wireless network to the wired Ethernet network. where you can collect, process, analyze, and present your measurement data. Figure 1 shows a typical NI Wireless Sensor Network, in which the three WSN measurement nodes are configured as end nodes.

7 Easy Steps to secure your wireless router

When you buy a wireless router is not secure and its default configuration will to users who are not allowed in the vicinity of the router to connect to the internet and "steal" Wi-Fi router. They could also access your PC and steal files and data folders. Manufacturers leave the configuration "open" so that the user can configure the router and are getting running quickly. However, there is a risk if the router is not secure.

Access Open a web browser and type either:
http://192.168.1.1 or
http://192.168.2.1/

1) Change the admin password
Most wireless routers ship with a blank password. It is essential that this person will change a potential hacker could enter the settings of your router and block that out of their own hardware.

2) Changing the network name (aka SSID)
The default network name is usually composed of the name or model of your wireless router. This information gives a head start for a hacker and makes it easier for them to enter your network. Do not change the name to something like his surname or house name as this unnecessarily exposes personal information. Change the name to a string – this can take up to 32 characters long.

3) Turn off SSID broadcasting
By default, the SSID is broadcast a wireless router so anyone in the vicinity of your wireless router can see that. SSID broadcasting can be off with your wireless router almost invisible.

4) Enabling encryption
This is disabled by default. There is an option WEP, WPA and WPA2. Currently the-art method of encryption is WPA2 so use this possible. Both the router and wireless adapter Wireless computer must be configured to use the same encryption.

5) Mac Address Control
All hardware has a unique address MAC associated with it, including PC card adapter. This MAC address can be added to the list of access control in the wireless router. Only devices added to the list of router access control that can be connected.

6) Update router firmware
It is recommended that the latest firmware the router is downloaded from the manufacturer's website and installed on the router. Hopefully this will fix any errors that have content matching your router and also help with any known security flaws in the router itself.

7) configuration backup
Finally, backup all settings router. If you reset the router back to factory defaults for any reason, your configuration can later be easily and quickly restored back in the router.

To read more tips and techniques like the ones in this article, go to: http://www.setupwirelessrouter.com/

How to Access Wireless Router Settings

A wireless router is a device that wirelessly connects multiple computers and devices to the Internet. Wireless routers’ design and capabilities vary and they drastically range in price, but are used for the same function. Wireless routers are usually very easy to setup and many provide the user with built-in security methods such as data encryption or a firewall. As a result, wireless routers allow users to easily setup a wireless network that all of the computers and devices in a home, office, or other building can connect to.

How a Wireless Router Works
A wireless router produces a wireless network by converting digital information from a computer or another device into radio waves and vice versa. A wireless router serves as an access point for multiple devices and can bridge those devices to an Internet connection that a modem provides. When a wireless computer broadcasts its own digital information in the form of radio waves, a nearby wireless router can receive those radio waves and convert them back into digital information that can be sent through the modem to a website, server, or other location. As a website responds to the user by sending data back, the modem forwards the data to the wireless router where it is converted into radio waves. The wireless computer then receives those signals and converts them back into digital information that the user can access.

How to Access Wireless Router Settings
All wireless routers include a control panel that allows the user to modify how a wireless router is setup, change security features, and control which devices are allowed to access the router. Generally, a wireless router’s control panel can be accessed by typing 192.168.1.1 into a browser’s address bar. This displays a login window that asks for a username and password. If the user has not already changed his/her username or password, the default username is usually “admin” or “user” and the default password is usually “password,” “1234,” or “0000.” If the user changed his/her username or password, then forgets either or both, the wireless router can be reset by pressing the small reset button on the device.

Applications
Once a user has access to a wireless router’s control panel, he/she can change how the router is configured. For example, a user can allow or deny specific devices from accessing the router by inputting each device’s MAC address. A user can also setup a wireless network, setup encryption or firewall settings, and even control specific times when the router broadcasts a signal.

Wireless Modem

A wireless modem is a network device which connects to a wireless network. Modems are frequently associated with telephone systems, but wireless modems are used with computers to connect to the Internet. Connecting a wireless modem to the computer will directly connect to your wireless ISP (Internet Service Provider).

Wireless modems operate at speeds comparable to dialup modems, not anywhere near the speed of broadband Internet connections.


Types of Wireless Modem Interfaces

Some wireless modems attach directly to your notebook computer or PDA. Wireless modem interfaces include PCMCIA, Compact Flash, USB and Serial Port. Other wireless modems connect to your mobile telephone and turn it into a wireless modem.

The major factor in making any modem function is whether it supports the Hayes command set, which is the standard technique for managing the controls in a modem. There are three major types of wireless modems available in the market. Cell phones or PDA's are frequently implemented as a wireless access point for the consumers. The cell phone can be connected to a computer and work as a peripheral modem using Point-to-Point (P2P) Protocol on the consumer’s service provider.

A range of FireWire, Serial, and USB modems can be used to access a Wi-Fi network. They function on microwave frequencies to access a computer network. The sizes are available in huge boxes to little flash drives. Until lately, the most widespread wireless modems were PCMCIA cards that would connect into a port on a computer and could offer a consumer with access to a network or the Internet.

Wireless Modem Networks

Each wireless modem is designed to access a specific wireless network. Networks which support wireless modems include:
  • CDPD
  • GPRS
  • EDGE

Friday 25 November 2011

iPad 3: super-high-res displays a go, but yields will be low by By Jon Phillips





By all accounts, the screen in the upcoming iPad 3 should be two times more spectacular than the display in the iPad 2, shown here.



It’s the most definitive assurance yet that Apple’s next iPad will include a screen with a near “retina display”-quality resolution: DisplaySearch analyst Richard Shim has told CNET that “production has started” for 2048x1536, 10-inch-class tablet screens, and three manufacturers—Samsung, Sharp and LGD—are supplying parts to Apple.

“It takes a couple of weeks for the production to go to the [the manufacturers],” Shim told CNET. “Then the manufacturer puts them in the housing. Then, that goes off to shipment. We could start seeing finished devices produced in December. And then being ready to be shipped in January. With volumes gearing up in February and March.”

Shim’s words bear a confidence that’s been missing from most discussions concerning the iPad 3’s display aspirations.

Just three weeks ago, when I directly asked DisplaySearch Senior Vice President Paul Semenza if he thought Apple would be able to deliver an iPad 3 with a 2048×1536 screen resolution by the first quarter of 2012, he told me, “We don’t have a forecast on it, no. But I wouldn’t be surprised if they don’t get there. They’re dealing with a lot of new technologies.”

Indeed, producing relatively small, ultra-high-resolution displays is still a significant manufacturing challenge. The display industry’s manufacturing infrastructure hasn’t been optimized to deliver this type of display, and the fabrication machines— or “fabs” —that would produce the displays in mass volume have been slow to go online.

What’s more, because their pixels are so small, and packed together so densely in such small physical spaces, it’s very difficult for a manufacturer to maintain high production yields (a problem exacerbated by the slow roll-out of appropriate manufacturing machinery). Multiple displays are fabbed on a single poly-silicon wafer, and for every perfect display a fab produces, it may have to junk another.

“We know there are yield issues. This is certainly a huge step up as far as pixel format, and every time you do that, there will be yield issues. But this is going forward,” said Rhoda Alexander, director of tablet and monitor research for the research firm iSuppli.

So what’s a “yield issue” anyhow? It’s a term that’s been casually tossed around anytime the iPad 3’s super-high-res display is discussed—but what does it really mean?

“There are a number of reasons why a panel would be rejected—a dead pixel, a pixel stuck on, a pixel stuck off. You may get issues where luminescence is inconsistent from edge to edge, and all manner of other problems,” Alexander says.

Yield issues notwithstanding, industry analysts now seem confident that Apple is moving forward with a super-high-resolution iPad for sale in the new year, and if history tells us anything, the company is willing to pay high manufacturing prices up front for the promise of delivering a high-impact product that no other company is shipping.

In fact, says Alexander, Apple has been down this road already with the original iPad.

“When we look at the iPad 1,” says Alexander, “when it was first released, the yield issues were down around 50 percent. For every 100 panels made, 50 didn’t make spec. This is not an unusual situation, and this is at the point when the iPad 1 was released. So, while yields may be low, [the display manufacturers] can still produce acceptable products. But they will improve their yields and at a faster pace than you would expect them to. Panel prices go down over time, and Apple will realize efficiencies over an entire product cycle.”

It should be noted that if the iPad 3 arrives with a 9.7-inch, 2048×1536 display, that screen’s pixel density would still be 264 pixels per inch—far short of the 300 pixels per inch that Apple defines as “retina display” quality (“a pixel density so high that the human eye is unable to distinguish individual pixels,” according to Apple marketing claims).

Whether Apple’s retina display claims are valid—when the iPhone 4 launched, one of the world’s pre-emininent display experts told us they’re not—the new iPad 3’s screen should still be spectacular. The current iPad 2’s display bears a pixel density of just 132 pixels per inch, so a purported 264 pixels per inch in the iPad 3 should be dazzling.

Perhaps even more dazzling: Shim told CNET that Apple is interested in making a smaller iPad with a 7.85-inch screen and late 2012 launch date. “If there’s demand, there’s no reason they wouldn’t build a 7.85-inch iPad,” Shim said.

Right. No reason save the fact Steve Jobs was vehemently opposed to smaller tablet form factors. Seeing
Tim Cook scuttle the mandate of Steve Jobs post-mortem would be a spectacle indeed.
 

Jim Merithew

Tissue Box Spy Camera

The Tissue Box Spy Camera is a self recording hidden camera built into a real tissue box.  With a 2GB flash drive you can record hours of color video and audio with a simple click from the included remote control!  No power required the tissue box spy camera has a built in lithium ion battery for hours of use!



Technical Specs
Video compression:AVI video format,352*288
Vioce recording:Yes
Internal memory:Yes
Flash:2GB
Video file size:>500KB per min`
Recording mode:continuous recording until memory is full or manually off
Adaptor type:USB adaptor charging cable
Battery type:Lithium-ion

Thursday 24 November 2011

Wireless Spy Camera Pen - Included Solar Charger


Wireless Spy Camera Pen - Included Solar Charger. Fully functioning and normal looking pen with completely inconspicuous built in wireless mini spy camera, and also coming with an included solar charger for quick and easy recharging of the pen cameras built in Li-ion battery. For fun or for some serious spying, just whip out the pen, twist the cap to start the wireless transmission, have the included wireless receiver with 3~5 meters, and you can view and record everything that your spy camera pen sees. This is a seriously fun spy gadget, with many practical and not so practical uses, and available direct from the Chinese manufacturer to you.

Tuesday 22 November 2011

Store Your Mind

You are the proud owner of a huge capacity hard disk. One terrabyte would be enough for you. But what do you do when you want to take some music, films or games and carry them easily from one place to another? Are you going to get that fragile new HDD of yours out of the PC and put it back in each time you want to transport data? Hell no! You got CDs & CO. for all these transport-involving situations. Right, so today, we are going to analyze a bit these storage media and the optical drives that allow you to read and write data on them.

Discs flying all over

First of all, let us see what a CD is. A Compact Disk (CD) is a storage medium primarily composed of Polycarbonate - a transparent hard plastic - onto which additional incredibly thin layers of metal and plastic are added to reflect laser light and protect the data surface of the CD. Wait a minute, did I say laser there? That's right, CDs are read and written with the help of a laser lens assembly.

Now you probably are more familiar with music CDs. These are, after all, the first type that appeared on the market. These music CDs are also known as "stamped CDs" and are produced by injection-molding the polycarbonate plastic into a die which contains a tiny pattern of raised bumps along the surface. These bumps ('pits'), and the flat areas between them ('lands') are the means by which the data is read from the finished CD by a concentrated laser. The surface is then coated by a thin layer of metal (usually silver or aluminum) to provide a reflective surface on the 'top' of the disk (the label side) so that light can be reflected back through the reading side of the CD. A thin layer of plastic tops this metal layer, followed by the label, silk-screened onto the top.

PC CDs (CD-ROM) have to work digitally. In this case, if the laser shines onto one of the molded bumps, which as the CD is read from the bottom, appear as 'pits,' it will be reflected at an angle and not picked up by the sensor. The laser inside a PC optical drive has to be precisely synchronized with the speed at which the CD spins, and thus, as the laser moves over the surface of the CD, the internal hardware calculates positive reflections as values of '1' and non-reflections as values of '0.' Keep in mind that Data on a CD is stored on concentric, spiral-like tracks.

CD-R disks, or recordable CDs, work in a similar way, with one major exception. Being blank until imprinted with data, they are not 'stamped' or injection-molded by default. Rather, a thin layer of dye is added between the polycarbonate and the reflective metal layer. The CD writer drive has a moving laser assembly, just like an ordinary CD player. But in addition to the standard "read laser," it features a "write laser." The write laser is more powerful than the read laser, so it interacts with the disc differently: the disc dye is completely clear until the more powerful writing laser of a CD-R drive is used to darken it, covering the reflective metal underneath. By selectively darkening minuscule sections of this dye layer, a reflective/non-reflective pattern is created which can be read in exactly the same fashion as a conventional non-recordable CDs.

CD Surface with pits and lands

CD Tracks

Laser Lens Mechanism

Laser beam

DVD Surface



CD-RW disks, or rewritable CDs which allow you to write, delete and rewrite data, use yet another system. In place of the dye layer used by recordable CDs, they use a special compound which reacts to the various levels of heat provided by the 'write' or 'erase' lasers of a CD-RW drive. When activated, the dye becomes crystalline and transparent/melted (default state) or amorphous and non-reflective (when heated by the 'write' laser). The melted, non-crystalline areas signify a binary '0' while the crystalline, transparent areas allow the read laser to reflect off the metal underneath and signify a binary '1.' Unlike recordable CDs, whose dye layer cannot be reused once it has been written to, passing a laser over the CD-RW surface at a certain intensity will cause the melted compound to retake its crystalline form and regain its transparency, effectively erasing all the data on the disk.

CD-Rs and CD-RWs are easily available in 650MB/74min and 700MB/80min sizes, and they can achieve transfer rates of around 7 MB/s. These transfer rates can only be achieved at the highest read/write speeds, which, for CDs is of 52X.

DVDs (Digital Versatile Discs) are considered to be the direct successors of the CDs and are formed using a similar process to 'stamped' CDs, except that multiple thin layers of polycarbonate are molded, one for each data 'layer' of the disk. A DVD can have up to two layers on each side of the disk, for a total of four. In order to read multiple tracks on a single side, the DVD incorporates a semi-transparent gold film as the reflective material for the first layer of data on a two-layer DVD, while the second one is a fully reflective aluminum layer. In this way, the reading laser can be modulated to pass through or reflect from the gold layer, depending on whether data from the first or second layer is desired. The tracks of data on a DVD are considerably smaller and tighter packed than on a CD however, enabling DVDs with a considerably higher data capacity.

How writing lasers work

Recordable DVDs (DVD-R) can have only a single data layer on each side of the disk, making for capacities of 4.7 GB single sided and 9.4 GB double sided. The maximum data transfer rate is situated around 20 MB/s, achieved at speeds of 16X (or improved transfer rates at newly-introduced 20X speeds). DVD-R disks can be played back on most commercial DVD players and drives.


A little bit of history

The current CDs have suffered some modifications over the course of the years. A series of technology guidelines, called 'books' were made available to guide the way CDs handle the storage of data and deal with compatibility issues. The most representative 'books' were:
Red Book - 1980 - the inauguration of the audio CD standard. It allowed for 74 minutes of digital audio and up to 99 tracks per CD.
Yellow Book - 1983 - this is an extension of the Redbook standard to cover the use of CDs as a data storage medium (CD-ROM).
Orange Book - 1988 - this is an update for the Yellow Book standard, which introduced writable CDs (CD-Rs). It was later revised to allow multiple 'sessions' per disk each with its own table of contents, meaning that the entire disk did not have to be written at one time. This is known as multi-session writing.
Wait, table of contents? CDs are like common books? Well, not quite. Like any other method of mass storage, writeable CDs need a file-system to arrange the data that is written to them. Given the relatively rigid nature of writing to CD as opposed to a hard-disk drive, where any section can be written to or written over at will, data CDs have no need for a constantly updated catalog of the contents of the disk. Rather, they need a simple table of contents to guide the reading device. The most common tables of contents are ISO 9660 and UDF.


The next generation is here

CDs and DVDs can store quite a bit of data, but with ever increasing storage needs they have become obsolete. Industry giants understood this situation and designed a couple of storage media that would allow for improved capacities.

- HD-DVD - was designed by Toshiba to be the direct successor to the DVD format and can store roughly 3-4 times the amount of data as its predecessor. The additional capacity of HD DVD is targeted at high definition content. HD DVD has a capacity of 15 GB per layer, practically sharing the same basic disc structure as a standard DVD: back-to-back bonding of two 0.6 mm thick, 120 mm diameter substrates. The 30 GB dual-layer HD-DVDs are currently being promoted on the market, in hope that they will be embraced as the next standard.

- Blu-Ray Disc - the name "Blu-ray" is derived from the blue-violet laser used to read and write this type of disc. The blue-violets laser has shorter wavelength (405 nm) and this allows more data to be stored on a Blu-ray Disc than on the common DVD format, which uses a red, 650 nm laser. In comparison to HD DVD, which also uses a blue laser, Blu-ray Discs can store more data per layer (currently 25 GB, but test media is up to 33 GB). Sony is the creator of this format and, up to this date, 50 GB Blu-Ray discs are the proposed standard. As with the HD-DVD disc, the Blu-Ray disc is currently used to store high-definition movies. At 1.5X speed, this type of medium achieves transfer rates of 54 MB/s.

Blu-Ray Comparison

- Holographic discs - also known as Holographic Versatile Disc (HVD), is an optical disc technology still in development stage which is demonstrated to greatly increase storage over Blu-ray Disc and HD DVD optical disc systems. This technology makes use of collinear holography allowing two lasers, one red and one blue-green, to be merged into a single beam. The blue-green laser reads data encoded as laser interference fringes from a holographic layer near the top of the disc, while the red laser is considered to be the reference beam, reading servo information from a regular CD-style aluminum layer situated at the bottom. The additional servo information is used to monitor the position of the read head over the disc, making it similar to the head/track/sector information on a conventional. Remember that, on a CD or DVD, the servo information is distributed amongst data.

In addition to the two layers mentioned above, a dichroic mirror layer between the holographic data and the servo data reflects the blue-green laser while letting the red laser pass through. Current holographic discs are said to have storage capacities of up to 3.9 terrabytes of data, which is approximately 6,000 times the capacity of a CD-ROM, 830 times the capacity of a DVD, 160 times the capacity of single-layer Blu-ray Discs, and about 20 times the capacity of standard computer hard drives as of 2006. The future 1 TB HVD will achieve transfer rates of about 1GB/s, while current proposed HVDs can store up to 300 GB and achieve a minimum transfer rate of 30 MB/s.

Holographic Disc

I think this is enough for the basics of optical drives and storage media. Tomorrow we will analyze the computer power supply so stay tuned.

Monday 21 November 2011

WiMAX Glossary


Access Point.
wireless local area network.
A device that distributes Wi-Fi signals to and from a

Base station.
a service provider broadcasts WiMAX signals. Typically mounted on towers or tall buildings.
The central radio transmitter/receiver from which

Broadband.
A general term for subscription access from an Internet Service Provider at speeds of 1 Mbps (million bits per second) or higher.

Customer Premises Equipment (CPE).
Equipment installed at a
customer’s location for fixed WiMAX deployments.

Intel® Next-Gen Wireless-N.
Advanced Intel Wi-Fi technology based on the IEEE 802.11n specification that provides up to 2x greater range and up to 5x better performance than previous 802.11 standards.

Local Area Network (LAN).
A data network that covers a relatively small geographic area, such as a building or cluster of buildings, typically measured in feet/meters. Wi-Fi is a LAN technology.

Wide Area Network (WAN).
A data network that covers a relatively large geographic area, such as a whole town, typically measured in miles/kilometers. WiMAX is a WAN technology.

Wi-Fi.
The set of local-area mobile wireless technologies based on the 802.11 standard, with range up to a few hundred feet/meters from an access point.

WiMAX.
The wide-area mobile wireless technology based on the IEEE 802.16 standard, with range up to a few miles/kilometers from a base station.

Wimax Wireless Broadband

Worldwide interpretability for Microwave Access   is a telecommunication tool that provides wireless transfer of information and data over portable and mobile access. It is fast way transfer of data up to 10Mbps. WiMax is usually deployed using OFDM and SOFDM symbols.

Last Mile Connection
WiMax is referred to as a last mile connection because it is assumed as the final strut of providing communication link to end users. It can be an expensive way of providing network connection to people living in rural areas, only when one has to take wires and cables to far off land. It is termed as first mile connectivity for the end user to the world outside his vicinity. To overcome the expense involved in building wireless infrastructure wireless broadband access is often used. The competition in the market for more WiMax products and more service providers would lower the cost of the wireless broadband connection. The development in the wireless connection as a last mile connection ha also opened new horizon of opportunities. The manufacturers of wireless products can bring more and improved digital portable devices to market at lower prices. WiMax subscription is available in both indoor and outdoor modules. The indoor units are expensive and complicated to build. In order to operate proficiently the indoor units must be close to the base stations. Where as the installation of outdoor units are simple and uncomplicated to set up just like installing a small satellite dish in a home.

Other Network Applications

WiMax is considered as a reliable substitute for GSM and CDMA mobile technologies.  Moreover it is expected that WiMax would appear more like a backhaul support for 2G, 3G and 4G technologies. The wired cellular operations are often supported by T1 connections. However the remote connections are maintained using satellite back up hold. The urban and rural wireless set up is usually based on microwave linkage. The WiMax set up provides more consistent bandwidth as compared to the bequest cellular connections. This bandwidth is further upgraded in many parts of the world like North America. The operators are deploying 34Mbps to 1 GB network setups and also support their network with fiber optic connections where possible. The WiMax set up requires a back up support from some internet backbone which involves additional cost of hardware. The difficulty to reach to the nearest inter backbone is still a challenge while deploying a network for wireless technologies like WiMax.
Limitations of WiMax

WiMax is a wireless connection which is going through the period of immense expectations like high bandwidth and less cost. However to date this wireless mode has not yet met the hope. This wireless technology is under the phase of development. It is fallacy that WiMax provides unperturbed signal strength everywhere because it operates in licensed frequency spectrum but it is also prone to obstacles like trees and walls. This wireless connection is supposed to provide a speed of 70Mbps over every 30 mile distance but this is not the case when the signal has to travel longer distance. This wireless connection can either operates efficiently with high bit rates or it can travel over longer distances with accuracy and precision. The fixed WiMax are composed of high range antennas which allow for greater signal strength and speed. Whereas the mobile WiMax set ups are usually indoor which involve the wireless mobile devices for operation, which in turn requires more support from the nearby base station. For an indoor WiMax set up it is necessary to check the nearby base station. The mere support of omni directional antenna is not enough to support WiMax.


Sunday 20 November 2011

HP X7000 WiFi Touch Mouse with Facebook Button

HP launches the X7000 WiFi Touch Mouse, a wireless mouse connects with your computer via WiFi instead of Bluetooth. The mouse features a laser sensor with adjustable sensitivity (1200 CPI default, 1600 CPI max), touch scroll wheel that lets your scroll through the web with a flick of a finger, and six programmable buttons.

AOC Aire Pro Ultra Slim IPS LED-backlit Monitor

AOC announced a new ultra slim display, the Aire Pro (model i2353Ph), LED-backlit LCD display based on IPS panel. Measuring just 9.2mm thin, the 23-inch monitor offers 1920×1080 Full HD resolution, WLED backlight, 250cd/m2 brightness, 50,000,000:1 dynamic contrast ratio, 5ms response time.

The Aire Pro comes with Screen+ technology for enhanced performance. The display includes illuminated soft-touch controls on the front of its base and a user-friendly graphical OSD menu that make adjusting settings simple. It comes with built-in stereo speakers and offers two HDMI inputs.
The AOC Aire Pro is priced at $199.

What is a 3G Network?

Based on the International Telecommunications Union standards, the 3G network is the third generation of mobile networking and telecommunications. It features a wider range of services and advances network capacity over the previous 2G network. The 3G network also increases the rate of information transfer known as spectral efficiency. Telephony has received a wider area and more range, while video and broadband wireless data transfers have also been positively affected. These criteria are identified as the IMT-2000 standard.

A 3G network provides for download speeds of 14.4 megabits per second and upload speeds of 5.8 megabits per second. The minimum speed for a stationary user is 2 megabits per second. A user in a moving vehicle can expect 348 kilobits per second.

This scheme is known as a layered system. Each transmission features three layers of information. The top layer is general service. The middle layer is a control data transmission. The bottom layer is the basic connectivity information.

There is a distinct difference from WiFi, or IEEE 802.11 technology, and this network. WiFi is basically a short range network that offers high-bandwidth designed for data transfer. 3G networks are geared towards cellular telephone technology and Internet access.

Japan and South Korea were the first countries to successfully launch this network. The Japanese company FOMA launched in May 2001 and South Korea's SK Telecom launched in January 2002. British Telecom in the United Kingdom and Monet Mobile Networks in the United States followed suit. By 2007, most countries had implemented the technology.

Delays on the roll-out process of the 3G network impacted the growth of mobile technology in many countries. This network uses a different radio frequency than 2G, which forced many companies to build entirely new infrastructure and obtain additional licenses. Countries like China and Indonesia intentionally chose to withhold the network from its citizens for many years.

Security concerns over 3G networks have been primarily mitigated. The system uses the KASUMI block crypto encryption rather than the older A5/1 stream cipher on the 2G network. While a number of weaknesses have been identified, the system is overall secure.

Some of the challenges that continue to hinder implementation of the 3G network. A number of telecommunications companies found themselves in financial instability throughout 2007 and 2008, highlighted by the increased costs of both phones and communications towers.

Licensing agreements also vary heavily from country to country in both expense and process. This has led to a lack of interest in building 3G networks equating to a lack of customer base.

Friday 18 November 2011

TP-Link TL-MR3020 3G/3.75G Wireless N Router

TP-Link announced the new TL-MR3020, a portable 3G/3.75G wireless N router that connects to the Internet via 3G/3.75G cellular network and share the connection via WiFi. The router has a compact design, making it ideal for travel. It works with USB 3G modems, supporting UMTS/HSPA/EVDO mobile networks.

Other than serving as 3G router with USB port, the device also has WAN port for use as an ordinary wireless router. The TP-Link TL-MR3020 also offers WISP Client Router Mode, and Access Point Mode and can be used as range extender or wireless bridge. It is fully compliant with 2.4GHz-2.4835GHz wireless frequency, and is powered by USB or wall power adapter. The TP-Link TL-MR3020 is priced at $39.99 and will be available on 14 December.

TP-Link will also release the TL-WR700N 150Mbps Wireless N Mini Pocket Router that also has a sleek compact design for travelers. It supports AP, Bridge, Repeater (Range Extender), Wireless Router operation modes and offers Wireless 802.11n speeds of up to 150Mbps. It is fully compliant with 2.4GHz-2.4835GHz wireless frequency. Priced at $29.99, you can get the WR700N starting from 23 November.

Kingston DataTraveler HyperX 3.0 USB Flash Drive

Kingston is bring the HyperX performance to its DataTraveler line, introducing the new DataTraveler HyperX 3.0 high-speed USB flash drive. The new drive uses USB 3.0 interface and utilizes high-speed eight-channel architecture, offering up to 225MB/s read and 135MB/s write speeds using USB 3.0 or up to 30MB/s read/write using USB 2.0.

The DataTraveler HyperX 3.0 (DTHX30) has a solid, rugged design with a durable metal and rubberized casing for increased protection. Available in 64GB, 128GB and 256GB capacities, the HyperX 3.0 flash drive supports ReadyBoost and is backward compatible with USB 2.0/1.1 ports.

Models:DTHX30/64GB     64GB DataTraveler HyperX 3.0 USB Flash Drive     $ 193.00
DTHX30/128GB     128GB DataTraveler HyperX 3.0 USB Flash Drive     $ 377.00
DTHX30/256GB     256GB DataTraveler HyperX 3.0 USB Flash Drive     TBD

JBL Jembe Stereo Computer Speaker System

JBL’s Jembe is a set of powerful 2-piece entertainment speaker system for your computer. It features built-in power amplifier and drivers to deliver big and bold sound. With a compact design, the Jembe does not take up much space and its JBL Weave design makes it attrative.

The JBL Jembe uses 3.5mm input so you can use it with any music player or computer. The system is priced at $59.95.

IBM’s combination screw driver

An incredible new technology: IBM’s combination screw driver, level, and flashlight

Wednesday 16 November 2011

How Important is Custom Application Development for Today’s Mid-Sized Business?

Businesses have long been driven by innovation and competition. Staying current with business practices, ensuring that processes run efficiently, and making sure that employees are able to complete their jobs helps businesses to maintain an edge on both innovation and competition. In an attempt to keep up with these elements of business, many companies are seeking to find ways they can streamline processes and improve the way their businesses function.

Technology is often a driving factor in how companies fare when it comes to innovation, competition, and where they stand in the marketplace. In addition, how companies manage the data they have on hand, serve customers, and how they support productivity also has an impact on sales. Most businesses rely on technology to execute these tasks, making technology particularly important to business practices.

Because technology is often a critical aspect for how businesses manage and analyze data and make key decisions, ensuring that they have the most efficient technology on hand is important for businesses. Many large enterprises have big budgets they can devote to information technology (IT) and the development of applications they might need, as well as well-developed IT support teams to ensure their technology runs the way it should. For mid-sized businesses, however, IT budgets and IT support teams are generally much smaller. As such, when it comes to finding technology to help them run their businesses, many mid-sized companies will use off-the-shelf options with standard spreadsheet and database offerings. These off-the-shelf products are usually low-cost and can be used to create fairly generic applications to manipulate and mine data.

Data management and manipulation is critical to a business’s success. Ensuring that information is well-organized and efficient to use allows businesses to stay current, well-informed, and able to make important decisions. While low-cost, off-the-shelf options do allow businesses the option of running generic data management and manipulation programs, these are not always the best options for mid-sized businesses. With custom application development, businesses can create applications that are specific to their needs, allowing them to manage data as they need it, run reports with ease, and allow accessibility to everyone who needs it.

Custom application development can aide businesses with data management and assessment capacities, streamlining the processes and making them much more efficient to use. When the quality of data a company has on hand can mean the difference between losing or making a sale, it is critical that the data is quality. Likewise, businesses can use custom applications to help manage their sales processes and customer service options. These elements are also critical to business. With the development of custom applications, businesses have the opportunities to ensure these critical elements are maintained and well-executed.

Businesses examining the option of custom application development can look to cloud computing services for development; they also support the applications once they have been developed. This option reduces the need for companies to have extensive infrastructure and IT departments. These types of application development options can be cost-effective and more time efficient than off-the-shelf options.

Quick access to quality data and ease of manipulation can make a significant difference for businesses looking to stay ahead in the marketplace. Custom application development can provide businesses with options to develop systems that allow them to do what they need to do in a time-efficient manner. When innovation and competition are the differences between success and failure, adopting methods that can allow you to stay on top are key. Custom application development can allow businesses to do just that.

Ten Things You Should Know About Mobile Application Development

When the iPhone came out in 2007, it was only the beginning of the smartphone revolution. Since its development, other phone manufacturers have come out with their own versions, each trying to outdo the other. With this came a new wave of application developers, who develop specifically for mobile web access. If you’re looking to get in on the action, here are ten things you should know before getting started.


1.Not all phones operate the same way
From the iPhone to the BlackBerry and now the PalmPre, the number of phones that provide full internet access in addition to additional apps continues to grow each year. Developers should keep in mind that each phone has a different foundation and capabilities, making developing apps that much harder. If you want to be able to market your app to all types of phones, make sure it will work on every environment.

2.Mobile apps aren’t the same as regular computer apps
Developing an app to integrate to an existing CRM platform is not the same as developing a mobile app. Although phones are getting stronger in their technologies, they still can’t replace a computer and are limited on capabilities.


3.You have a lot of competition
There are hundreds of startups that exist solely to develop mobile apps. The Apple app store reached over one million apps in a little over a year. If you plan to develop and market your app, be prepared to work hard! Markets for niche apps may be easier to crack, but they are still gaining competition as well.
4.All Internets are not created equal
Just as phones don’t operate the same way, neither do the Internet services they use. As the mobile phone companies continue to best each other when it comes to size, strength and speed of their networks, apps developers must work with these changes to ensure their apps will always run smoothly.

5.Know your client base
Even though someone is using a web-accessible mobile device doesn’t mean they really know how to use it. For better marketability, ensure that your apps are user-friendly for every kind of user, from beginner to advanced.

6.Is it necessary?
Don’t develop an app just for the sake of doing it. Do your research to see if the app development you’re eyeing has been done before and how successful (or unsuccessful) it was. Many app developers have come and gone because they weren’t able to actually market their application in the end. Save your time and budget for something that is really necessary.

7.Allow time to get it right
You’re probably not going to get it right on the first try. Build time into your schedule to test everything and get the bugs out. Give people a free trial on the condition they’ll provide feedback. Again, make sure it works across all platforms if applicable.

8.Come approved
Most phone companies won’t allow just anyone to get an app in their system. You need to have a proposal and get it approved before it’s even introduced to the network. Again, don’t waste your time—get your app approved.

9.Make it secure
Many apps are used for business people on the go. They do a lot of business from their phones and keep a lot of confidential information housed on their little devices. To ensure users the best possible experience, make sure your app is secure if its contents are going to deal with sensitive information.

10.Make it interactive
Phones have lots of features—camera, text message, video, voice activation, etc. By making your app interactive with one or more of these features, it will be that much more marketable (and maybe even more easy to use).

What Is Cloud Computing?

Question: What Is Cloud Computing?
 
Answer: Cloud computing consists of hardware and software resources made available on the Internet as managed third-party services. These services typically provide access to advanced software applications and high-end networks of server computers.

Types of Cloud Computing

Service providers create cloud computing systems to serve common business or research needs. Examples of cloud computing services include:
 
  • virtual IT - configure and utilize remote, third-party servers as extensions to a company's local IT network
  • software - utilize commercial software applications, or develop and remotely host custom built applications
  • network storage - back up or archive data across the Internet to a provider without needing to know the physical location of storage
Cloud computing systems all generally are designed for scalability to support large numbers of customers and surges in demand.
 

Examples of Cloud Computing Services

These examples illustrate the different types of cloud computing services available today:
Some providers offer cloud computing services for free while others require a paid subscription.

Cloud Computing Pros and Cons

Service providers are responsible for installing and maintaining core technology within the cloud. Some customers prefer this model because it limits their own manageability burden. However, customers cannot directly control system stability in this model and are highly dependent on the provider instead.
Cloud computing systems are normally designed to closely track all system resources, which enables providers to charge customers according to the resources each consumes. Some customers will prefer this so-called metered billing approach to save money, while others will prefer a flat-rate subscription to ensure predictable monthly or yearly costs.
 
Using a cloud computing environment generally requires you to send data over the Internet and store it on a third-party system. The privacy and security risks associated with this model must be weighed against alternatives.