Saturday, August 09, 2008

Now that we have come to the end of this composition on motherboard, we do hope that you enjoyed reading it as much as we enjoyed writing it._

motherboard Items For Viewing
3Com Switch 5500-EI - Switch - 48 ports - EN, Fast EN - 10Base-T, 100Base-TX + 4


The 3Com Switch 5500-EI 52-Port is a premium stackable 10/100 switch with Enhanced Image software for businesses running the most demanding network applications requiring the highest "five 9s" network uptime. 48-ports operate at 10/100 while four additional SFP-based ports operate at Gigabit speeds. Supports distributed, resilient 3Com XRN stacking technology and advanced Layer 3 (RIP / OSPF) routing, Layer 2-4 QoS, and rate limiting features. Includes extensive security features - SNMP v3, SSH, network login. Runs 3Com Operating System common to 3Com premium switches.


Price: 2082.53



IBM - Power cable (220-240 VAC) - IEC 309 - 14 ft


As a global leader in the PC market, IBM develops, manufactures and markets cutting-edge, reliable, high-quality PC products and value-added professional services that provide customers around the world with smarter ways to be productive and competitive.


Price: 204.38



Intel PRO/1000 PT Desktop Adapter - Network adapter - PCI Express x1 - EN, Fast


For PCs with PCI Express (PCIe) slots, the Intel PRO/1000 PT Desktop Adapter offers the newest technology for maximizing system performance and increasing end-user productivity. Specifically, the Intel PRO/1000 PT Desktop Adapter uses auto-negotiation to allow the adapter to run at the highest available network speed (10, 100 or 1000 Mbps), and it maintains full bandwidth capacity with the dedicated 2.5-Gbps bandwidth of a PCI Express input/output (I/O) bus to provide connectivity you can count on.


Price: 41.95



Processor upgrade - 1 x Intel Dual-Core Xeon 5160 / 3 GHz ( 1333 MHz ) - LGA771


Intel Xeon processors give your enterprise the power to evolve in manageable ways. Now with dual-core technology, servers based on Intel Xeon processors provide the built-in standards, stability, and scalability your infrastructure needs to move your business forward. Intel Dual-Core Xeon processors help protect investment in existing applications and infrastructure through increased performance headroom and scalability to the most widely deployed 64-bit server platforms.


Price: 1265.97



Raritan Cat5 Reach - Repeater - 100Base-TX - external


Cat5 Reach enables you to locate a CPU or multiple servers connected to a KVM switch from a remote location. The remote user console (keyboard, monitor, and mouse) can be up to 1,000 feet (300 meters) from a CPU or KVM switch. In addition, a local user console (keyboard, monitor, and mouse) can be connected. Each Cat5 Reach is a kit that includes a transmitter and receiver pair for use with your Enhanced Category 5 UTP cable. Just plug a keyboard, monitor, and mouse into the receiver and operate. Automatic Video Tuning (AVT) adjusts the video quality automatically - no manual adjustments to make - the receiver does all the work.


Price: 475.71



JABRA JX10 /w Bluetooth Hub - Headset ( over-the-ear ) - wireless - Bluetooth


World-renowned Danish designer, Jacob Jensen, designed this state-of-the-art Bluetooth headset where style is the operative word. The result is uncompromised design - the perfect fusion of function and form.


Price: 144.38



Cables Unlimited - RF cable - RF - F connector (M) - F connector (M) - 6 ft - co


These high quality coaxial cables are perfect for connecting VCR's, Satellite receivers, and other equipment that uses coaxial cables.


Price: 2.59



EMC Insignia Retrospect Professional - ( v. 7.5 ) - upgrade package - 2 clients,


EMC Retrospect is automated, reliable, cost-effective backup and recovery software for small and medium business (SMBs), the distributed enterprise, and home offices. Retrospect protects millions of computers worldwide, providing enterprise-class data protection for file servers, desktops, notebooks, and business-critical applications. Retrospect automatically adjusts backup operations to protect all computers with minimal manual intervention. Designed for home and home offices, Retrospect Professional Edition protects a single Windows desktop or notebook, or a small network of Windows, Macintosh, and Linux desktops and notebooks.


Price: 41.19



ACP-EP Memory USB 2.0 Burton SnowDrive Flash Drive Vapor Model - USB flash drive


ACP-EP Memory has teamed up with the best snowboard companies in the industry to create the first and only authentic USB Flash Drive Snow boards. This innovative design is combined with the graphics from actual Burton Snow boards like their legendary versatile Custom Model and the most technologically refined, all-terrain Vapor Model. Now you can get your favorite snowboard graphics and transfer files in style.


Price: 16.81



Kingston - Memory - 512 MB - DIMM 240-pin - DDR II - 800 MHz / PC2-6400 - unbuff


Marketing description is not available.


Price: 25.90



Cherry Advanced Performance Line TouchBoard G80-11900 - Keyboard - AT, PS/2 - to


Lots to do, not much space? That's where Cherry's G80-11900 19-inch compact keyboard comes into its own - particularly where there's no room for a mouse. A high-quality integrated touchpad takes on all the mouse functions.


Price: 133.49



Tripp Lite BC BCPERS450 - UPS ( external ) - AC 120 V - 450 VA - 3 output connec


Tripp Lite's BCPERS450 standby UPS system offers surge suppression and long lasting battery support for personal computers, internetworking equipment and other sensitive electronics. Internal UPS circuits support entry-level PC systems for up to 15 minutes during power failures and brownouts so that connected equipment can be shutdown without data loss. It includes 3 UPS supported outlets. Built-in set of 3 front panel LEDs indicate line power, battery power and battery low/replace status. 450VA / 280 watt power handling ability supports entry-level PCs, point-of-sale equipment, small business phone systems and audio/video components. It offers 5 minutes battery runtime with a full load of 450VA and 17 minutes with a half load of 225VA, and also supports user battery replacement via built-in access panel.


Price: 79.33



Seagate Barracuda ES - Hard drive - 750 GB - internal - 3.5" - SATA-300 - 7200 r


Barracuda ES is a new family of high-capacity enterprise drives, providing 50 percent more storage space than comparable drives in the same system form factor. Barracuda ES drives leverage unparalleled Seagate enterprise technology to deliver the industry's highest 7200-RPM reliability for 24x7 business-critical applications.


Price: 274.89



OKI - Memory - 256 MB


OKI is committed to creating superior solutions and providing excellent information and communications services nationally and internationally to meet the diversified needs of customers in the digital age. OKI is working to develop optimum solutions for each type of user in the coming e-society.


Price: 167.33



Antec EarthWatts EA 380 - Power supply ( internal ) - ATX12V 2.2 - AC 100-240 V


Do your part for the environment with EarthWatts power supplies. The earth is the most valuable resource and protecting and preserving it for future generations is of utmost importance. EarthWatts is 80 PLUS certified, a new standard in power supply efficiency. And that means that using EarthWatts will save you money on your electrical bill. Fully equipped with universal input, EarthWatts automatically works on any power grid in the world. And the built-in Active PFC makes EarthWatts the ideal way to reduce electrical waste and protect the environment.


Price: 44.46



Cherry G80 11900 - Keyboard - PS/2 - 104 keys - touchpad - gray - English - US


Lots to do, not much space? That's where Cherry 19-inch compact keyboard comes into its own - particularly where there's no room for a mouse. A high-quality integrated touchpad takes on all the mouse functions.


Price: 127.37



NEC SP4020-4620 - Left / right channel speakers


NEC aims to provide optimal solutions to its customers. Innovation is the key to its ongoing success. After all, the company has been at the cutting edge of research and development in its field for over a century. NEC is committed to serving the specific needs of its various customers. In order to remain the leading solutions provider for broadband networking and mobile Internet, it is focusing on two key domains - IT-Network integrated solutions and semiconductor solutions. In the process, NEC's customers are empowered to unleash creativity, seize new opportunities and achieve their goals.


Price: 382.74



McAfee Gold Technical Support - McAfee PortalShield for Microsoft SharePoint 1 n


You rely on your information systems to complete the transactions critical for business success. Because it is your job to make sure your information systems run smoothly, you select the best products. Network Associates' PrimeSupport program is essential for making the most of your investment in Network Associates' products. This program gives you the technical support that's necessary to ensure that your product is installed correctly and is working properly. PrimeSupport Priority Plus provides customers priority telephone access to Network Associates experienced technical support team. After business hours, telephone access is available for emergency product assistance when critical operations are affected.


Price: 7.74



Cables to Go - VGA extender - HD-15 (M) - HD-15 (F) - 6 ft


CTG's cable and computer related solutions are geared to meet the growing demands placed on today's systems. Cables to Go values the dynamic needs of its customers and offers a bright variety of high-class cable solutions for the best of your business.


Price: 12.92



Processor - 1 x AMD Second-Generation Opteron 2216 HE / 2.4 GHz - Socket F (1207


With advances like high-performing, low-power DDR2 memory and hardware-assisted AMD Virtualization, Second-Generation AMD Opteron processors with Direct Connect Architecture are designed to advance AMD's performance-per-watt capabilities, extend the leadership in x86 virtualization, and enable seamless upgradeability to quad-core computing, while maintaining the same thermal infrastructure and helping you leverage existing investments.


Price: 353.06



Palm - Headset adapter - sub-mini phone stereo 2.5 mm (M) - mini-phone stereo 3.


Enjoy your favorite music in full stereo sound with this adapter and your own stereo headphones. This adapter works with standard 3.5mm headphones and is perfect for listening to your favorite MP3s.


Price: 5.90



motherboard For Your Reading Pleasure
Solving Crime with Computer Forensics


Computer Forensics is the scientific study of computers or computer related data in relation to an investigation by a law enforcement agency for use in a court of law. While this technology may be as old as computers themselves, the advances in technology are constantly revising the science of computer forensics.

In the technological old days, computer forensics was mostly related to data dumps, printing out every keystroke that had been logged on a computer in a series of eight digits, all of them zeroes and ones. Literally cases of paper would be used for the printing of the materials. Systems analysts would then have to convert all of the data into hex and then translate the value into whatever the actual keystroke was. In this way, it was possible to go over all of the data and figure out at what point the computer and the corresponding program crashed. Like computers and technology, Computer forensics has evolved by leaps and bounds since those days of old.

While all computer language still ultimately boils down to ones and zeroes or binary and then hex, the means by which programs are created, run and utilized has changed drastically. Computer forensics has done well to keep up with the task at hand. Now hard drives can be wiped clean. However, without an unconditional format (and in rare cases, even with the unconditional switch) the data can still be retrieved. It takes an expert in computer forensics however. It takes someone who is familiar with the technology of the computer and the science of computer forensics to reconstruct all of the data that has been wiped off of the hard drive.

Computer forensics can be used to track emails, instant messaging and just about any other form of computer related communications. This can be necessary, especially in the world today. Computer forensics experts have even advanced the technology to the point that they can track data real time, or while it is actually being sent and received. This is a mind-numbing task when you think about the billions of communications going on around the globe at any given time, but the science of computer forensics is constantly advancing every bit as quickly or sometimes even faster than the technology they are responsible for investigating.

Computer forensics is an interesting aspect of technology that is often overlooked. Computer forensics have been used to solve many crimes and should be considered a viable tool in many ways. The study of computer forensics is constantly growing along with technology.

Forensics HQ forensicshq.com/ investigates the world of forensics and crime scene investigation.



History Of The Computerflip-Flops - A Basic Counter


Flip-Flops - A basic counter



We looked at the Binary system, and basic computer logic elements, in previous articles, "It's a binary world - how computers count" and "How computers add - a logical approach".



Now we can combine two parts of these articles to look at a counter. Another common logic element in a computer is a counter or timer. This can b to count items going past a sensor on an assembly line, or possibly a count-down timer. For example, if you have a late model washing machine it will have a simple computer using a count down timer to give 10 minute wash cycle, etc.



There are several types of counter, nearly all of which use a basic element of electronics, the Flip-Flop. And you thought they were rubber shoes English people wear to the shower or the beach. (At this point Australians say "I thought they were called thongs").



OK back on topic. The flip-flop is as old as electronics, and is a classic example of the binary system. It has two possible stable states, A or B, and can be 'toggled' from one state to the other, just like a 'push-on, push-off' switch. It was originally made with two vacuum tubes (or one, for example a double triode).



It normally has two outputs, one being the complement of the other. That is,if one output(A) is a logic 0, the other(B) is a logic 1, and vice-versa. The input, or Toggle(T) is at logic 0 until a pulse from a sensor, for example, comes along. This pulse takes the logic state to 1, then back to 0. The toggle effect, causing the Flip-Flop to flip, is actually the CHANGE from 0 to 1.



In logic terms the flip-flop is made up using AND and OR gates, in logic cicuitry it is just a 'black box' labelled FF. Several FFs may be grouped into yet another black box, a counter, timer, or multivibrator.



We can make up a Truth Table, which we have used before. If you recall, a truth table tells you what the Output will be for all possible Inputs.



TRUTH TABLE for Flip Flop - Toggle (C)hange,- Outputs A and B.



INITIAL STATE

T B A

0 1 0 'A' output is 0



PULSE #1

T B A

C 0 1 'A' output is 1



PULSE #2

T B A

C 1 0 'A' output is 0



Now we string some flip-flops together to make a counter. Say we have a sensor on a beer bottling machine, which has to count 5 bottles before switching the feed, we need to count up to 5, or 101 in Binary. We will need 3 flip-flops, for binary bits 0,1 and 2, corresponding to decimal bit value of 1,2 and 4.



We will take the A output of the 3 flip-flops to a decoder black box, which we can use to detect when we get to 5, then switch the feed. The B output of flip-flop 0 is passed to the toggle input of flip-flop 1 via an AND gate, so the next pulse from the sensor (which goes to all 3 flip-flops) at this AND gate will toggle the flip-flop, depending on the value of the B output, 0 or 1. Similarly the B output of flip-flop 1 goes to the toggle of flip-flop 3 via an AND gate.



Our 3 Flip-Flops now come up with a truth table like this:-



INITIAL STATE

FF2 FF1 FF0

TBA TBA TBA

010 010 010 'A' outputs 000 - 0



PULSE #1

FF2 FF1 FF0

TBA TBA TBA

C10 C10 C01 'A' outputs 001 - 1



[The (C)hange flips FF0 (always). FF1 & FF2 are blocked by the AND gate which needs a 0 input from the previous FF 'B' output AND the pulse change.]



PULSE #2

FF2 FF1 FF0

TBA TBA TBA

C10 C01 C10 'A' outputs 010 - 2



[The (C)hange flips FF0 (always). FF1 flips beacause the 'B' output from FF0 is a 0 when the Pulse arrives. FF2 is blocked as before.]



PULSE #3

FF2 FF1 FF0

TBA TBA TBA

C10 C01 C01 'A' outputs 011 - 3



[FF0 flips, FF1 is blocked again,as is FF2.]



PULSE #4

FF2 FF1 FF0

TBA TBA TBA

C01 C10 C10 'A' outputs 100 - 4



(FF0 flips, FF1 flips, FF2 flips.)



PULSE #5

FF2 FF1 FF0

TBA TBA TBA

C01 C10 C01 'A' outputs 101 - 5 count complete!



[FF0 flips, FF1 and FF2 are blocked.]



This counter can count up to 111, 7 decimal, it then resets to 0. A couple of interesting points to note are:-



1. FF0 flips every pulse. FF1 flips every 2 pulses. FF2 flips every 4 pulses etc. These facts can be used to make up a divider, which can be cascaded. For example the 4 pulse output can go to a second counter which also gives a 4 pulse output, totalling 16. This can be expanded to make up a decadic counter by decoding a count of 1010 (10 decimal) and using this to toggle the next counter, etc. What about 60 and 12 for your digital watch?



2. Look at the 'B' outputs from the counter. In sequence the values are:- 111, 110, 101, 100, 011, 010 (7,6,5,4,3,2 decimal). See the pattern? That's right - a countdown timer! We'll be using this in a later article.


About the Author: Tony is an experienced computer engineer. He is currently webmaster and contributer to what-why-wisdom.com .A set of diagrams accompanying these articles may be seen at what-why-wisdom.com/history-of-the-computer-0.html .



Computer Repair Basics for Beginners


Is it possible for regular Joe's to fix their own computer without needing to call a specialist in to do the computer repair? Yes! You can do it easy, and you can learn these computer repair techniques easy in the article I have written. You will be told exactly what you need to do and know, in order to get your computer repaired and working how you want it!

There is always the option of calling upon a company like Geek Squad, from Best Buy, if you have the extra $350 to repair your computer. Let's also state here their idea of computer repair is not what you need at all, unless you are looking for someone to come to your home with the intention of selling you software you don't need, instead of repairing your computer. Later I will indulge all of you reading, my experience with this company, and how it brought amusement into my world

Going through only the computer repairing techniques we need to know, I will not waste your time with confusing nonsense about how a computer works, or how did the computer get broken in the first place where it is in need of computer repair? Who cares right? What's done is done, lets just fix the darn thing.

I will show you how to do computer repair the easiest, most simplest way possible. We care about making our current computer situation better as it exists at this exact moment, ridding it of needing computer repair.

The computer repair basics presented here and the articles that follow will be more than enough to eradicate 90% of your home computer repair problems, completely resolving them all so you don't have to search the internet anymore for "computer repair" and how to fix your computer problems.

You could be thinking, as I at one time did when I knew very little about computers or repairing them, that it will be near impossible to understand these square mysterious beeping towers or how they work none the less. It is a lot easier then you might think! You just need to know the what information is important about computer repair, discarding all the unnecessary stuff that most computer repair companies say in order to confuse you so you hire them. We do not need them! We have ourselves and by gosh darn it, we have this helpful article to guide you thought basic computer repair.

Computer repair steps are all the same.

Let's repeat, computer repairing steps are all the same, no matter if it is you doing it or a computer engineer doing it. The computer engineer goes though the basic steps while repairing a computer system, the same steps we are going to go over in this article. He might know what to do in that chance of 10% when a computer is more damaged then normal, but we are not going to worry ourselves with that odd chance.

There are not hundreds of computer gurus that develop new and innovative ways to repair computers. Computer repair techniques have already been mapped out for us, and proven, so lets just utilize other peoples work and findings about computer repair, after all its free and legal!. Think of the same situation where you look up a recipe online to cook a fancy meal, it is the same idea!

Now, I have been prepping you for too long telling you why I think you can do it. You know you can do it, you just need to believe in yourself and take computer repair one step at a time. I cannot stress that enough. Computer repair has to be done in steps...1) before 2). Yes it sounds obvious but be strict on yourself about his, especially while learning how to do computer repair, you will make it easy on yourself.

Usually when we fix something in life we have identify the problem.. blah blah. Skip identifying the problem! (not how you learned it in school huh?) Lets not even try to pinpoint a problem that needs repairing with our computer yet!

We are going to first do a few very easy computer repair basics that will solve almost all computer issues (shhh overpriced Geek Squad doesn't want you or anyone to know this).

First Guide in Computer Repair

1) Click the Start Menu, a button that is visible while hovering over the start menu is the "run" button. Click the run button and a small window in the bottom left of your screen comes up.

2) Type "msconfig" (with no quotation marks) in the box that is within the window.

3) Another window comes up, now go to the tab to the right called "start up"

4) Near the bottom of the window is a button called "disable all" click that button

5) Then click the "apply" button just below the "disable all" button.

6) X out of the window (close the window) and another window pops up. Click the "restart now" option.

And there you have it! You just taught yourself how to do a very easy computer repair technique which will solve alot of your computer repair issues.

I'm a regular guy who has recently taken interest in the computer repair field, and learned some things that can help others with their everyday interaction with computers. I remember about two years ago I knew nothing about computers, that gives me the mind set to explain in layman's terms how to help the masses who think they don't know enough to fix their home computer issues.



90% Of Personal Computers Are Infected With Spyware Or Adware Programs, Is Your Computer One?


Latest estimates suggest that up to 90% of personal computers are infected with some form of spyware or adware program. It's important to stay alert and watch for signs of infection on your computer, because some of these programs can do some serious damage to your computer. Let's take a look at some of the main malicious software (malware) warning signs to watch for.

When you open up your browser, has your home page changed? If you go back in and change the settings back to your original choice, you may find that next time you open the browser it's changed again, usually to a different page from the last time. This is probably one of the most common indicators that you have spyware on your computer, so if this happens, get your system cleaned immediately.

Pop-ups are an annoying part of life on the Internet, but if you start getting pop-ups appearing that have your own name on them, be wary. If the pop-ups appear even when you're not connected to the Internet, or your browser is closed, then you definitely need to get your system checked.

Spyware often installs a new toolbar onto your computer system. So if a different browser or search toolbar suddenly appears, and you can't seem to get rid of it, you're most likely dealing with some form of malware at work. Even if you manage to get rid of it, chances are it will keep coming back unless you know exactly how to remove all of its files.

Perhaps you've just discovered that your Favorites list has been 'tampered' with. It may be that some new items have appeared that you don't recognize, or perhaps others have disappeared. If you delete them and they come back again, it's probably a spyware infection.

An infection of malware can often make your computer run really slowly. If you find that your system seems to run constantly at 100%, even when you have very processes operating on your computer, then it's likely your computer has been infected by spyware. Computer programs require a certain amount of free space to operate properly, so when spyware is chewing up all your resources, your computer may run at a frustratingly slow speed.

If you find you enter something into an Internet search bar, and instead of going where you expect you end up at an entirely different search engine, then it's likely malware has taken a hand.

Check your modem if you can, and see what the lights are doing when you're not actually using the Internet. If there are lights blinking, or something on your screen suggests that data transfers are occurring, be suspicious. Malware is probably sending or receiving information without your knowledge.

Unfortunately, there are also varieties of adware and spyware that don't alert you to their presence at all. So you need to check your system as a matter of routine, even if you don't observe any warnings signs of infection beforehand.

Don't let your computer become infected with spyware by visiting PC-Security-Guide.info where you will find helpful information and resources on email security, spam scams, spyware, adware and pc virus recovery tips that will keep your personal computer running virus free.



News about motherboard
DISTRIBUTOR NOTEBOOK COMPAQ TERMURAH TERLENGKAP - HARGA GROSIR

Sat, 09 Aug 2008 09:01:25 -0700
- COMPAQ EVO N610C (P4-1.8GHZ/256/30/DVD/M/L/14) @ RP. 3.6 JT, - COMPAQ HP NC6000 (CENTRINO 1.6GHZ/512/40/DVDCDRW/M/L/14) @ RP. 4.3JT, - COMPAQ HP NC4010 (CENTRINO 1.7GHZ/512/40/DVDCDRW/M/L/W/12) @ RP. 4.4 JT, - COMPAQ HP NC4200 (CENTRINO 1.73GHZ/1024/60/DVDCDRW/M/L/W/12) @ RP. 4.8 JT, HUB. ARIFIN 021-5657766/ 08161322531 ATAU DESY 021-57939564/ 08881756925 ATAU SUSANTO 021-75924186/ 08170775850

Tech Reading - MS plugs Windows worm holes

Thu, 16 Nov 2006 12:03:03 GMT
Socket AM2 Motherboard 3-way Roundup - The MSI K9N Platinum is a good motherboard overall. It performs well, it is stable and it has a wide range of options

Hands-on: GIGABYTE GA-MA78GM-S2H 780G Motherboard - Product Reviews

Sat, 09 Aug 2008 12:16:16 GMT

Hands-on: GIGABYTE GA-MA78GM-S2H 780G Motherboard
Product Reviews, UK - 13 hours ago
This is the GIGABYTE GA-MA78GM-S2H 780G motherboard, and the performance is on par with 780G boards, but its ability to overclock makes it a much better ...


RE2]: Comment by flanque - OS News

Sun, 10 Aug 2008 01:40:09 GMT

RE2]: Comment by flanque
OS News - 22 minutes ago
I seem to remember those rumours about Microsoft trying to side with CPU or motherboard manufacturers, only allowing operating systems with a digital ...


Tags: |