Tuesday, September 30, 2008

Now that we have come to the end of this composition on computers parts, we do hope that you enjoyed reading it as much as we enjoyed writing it.

computers parts Items For Viewing
Linksys ProConnect Compact KVM Switch - KVM switch - 4 ports - 1 local user


Linksys' ProConnect KVM Switches allow you to instantly toggle between two PS/2-equipped desktop or notebook PCs while using a single monitor, PS/2 keyboard, and PS/2 mouse. Switch between two PCs with the press of a button. Plug your notebook PC into the KVM Switch and control it from your desktop PC's monitor, keyboard, and mouse. Built to last and ready to run directly out of the box, Linksys's ProConnect Compact KVM Switches eliminate cable swapping while saving you desktop space and hundreds of dollars of hardware costs. Because they don't use software, the ProConnect Compact KVM Switches are compatible with all major desktop and note-book computers. They're the perfect choice for the home, the office, or anywhere else you manage multiple PCs.


Price: 76.93



McAfee Active VirusScan - License + 1st year PrimeSupport Priority Plus - 1 node


Safeguard your desktop computers and file servers. McAfee Active VirusScan automatically updates to help you stay one step ahead of the latest virus threats. Plus, McAfee ePolicy Orchestrator actively implements and enforces your protection. Integrate best-of-breed components, regardless of vendor, into a single, powerful, and flexible solution. Implement and enforce a proactive anti-virus policy that fits your business. Get clear, concise enterprise-wide reporting for continuing visibility, which ensures that all desktops and servers are updated and properly configured. Protect desktop computers from threats, and scan for viruses introduced via e-mail, Web browsers, CDs, and floppy disks. Depend upon the industry's leading virus detection and cleaning to safeguard your network, 24 hours a day. Detect infected files transmitted to and from your servers, and automatically clean, quarantine, or delete them. Viruses change weekly and even daily. The McAfee Security AutoUpdate patented incremental updating tool downloads the latest changes in the anti-virus database, whenever you are online. Your solutions will stay current, with minimal impact on network bandwidth.


Price: 14.14



3M PF500 XL - Display privacy filter - white


3M offers you this privacy/anti-glare/anti-static filter. Eliminating glare on your monitor screen makes it more comfortable and easier to read information displayed on the screen. Privacy viewing feature allows only the operator seated directly in front of the screen to read the displayed information. It prevents static charge/dust build-up. No assembly required! This model is intended for 16" - 18" monitors.


Price: 125.74



Linksys Wireless-G PCI Card WMP54GS with SpeedBooster - Network adapter - PCI -


The Linksys Wireless-G PCI Card with SpeedBooster installs in most desktop and tower PCs, and lets you put your computer almost anywhere in the building without the cost and hassle of running network cables. Now you don't have to drill holes in your walls and climb through the attic or cellar to get connected to the network. Once you're connected, you can keep in touch with your e-mail, access the Internet, use instant messaging to chat with friends, and share files and other resources such as printers and network storage with other computers on the network. The Wireless-G PCI Card with SpeedBooster incorporates the next generation of Wireless-G. In standard Wireless-G (802.11g) mode, the Card can connect to wireless networks at an incredible 54Mbps. With theSpeedBooster technology enabled, your "real-world" wireless network performance increases by up to 35%! Unlike other speed-enhancing technologies, SpeedBooster is 802.11 compliant, fully compatible with standard Wireless-G, and a "good neighbor" to other wireless devices and technologies, using a single 2.4GHz channel as specified by the official wireless standard. And, unlike other technologies, with SpeedBooster you'll see an overall speed improvement even when running a mixed network of SpeedBooster and regular Wireless-G devices. For added versatility, it can also interoperate with all the 11Mbps Wireless-B (802.11b) products found in homes, businesses, and public wireless hotspots around the country. In any mode, your wireless communications are protected by 128-bit encryption, so your data stays secure. So don't hassle with running cables through your house - get your desktop connected the easy way with the Linksys Wireless-G PCI Card with SpeedBooster.


Price: 60.00



HP - Plain paper - Roll A1 (24 in x 150 ft) - 90 g/m2 - 1 roll(s)


Use HP Inkjet Paper to produce high-contrast colors and sharp text. This high-quality and cost-effective bright white paper is an ideal solution for technical drawings and presentations.


Price: 18.72



Belkin - Serial cable - DB-25 (F) - DB-9 (F) - 6 ft


There was a time males were males and females were females. But no more! Belkin offers every DB9 and DB25 to release their inner female - or male and enjoy more connection options. This adapter converts a DB9 or DB25 male serial port to a DB25 or DB9 female port. PRODUCT FEATURES: State-of-the-art-wiring design ensures 100% compatibility with all devices 100% of the time; Gold plated copper contacts provide maximum conductivity and keep data loss to a minimum; 28 AWG stranded tinned copper conductors are individually insulated in polypropylene to minimize cross talk, ensuring high-speed, error-free transmission; PVC premold encapsulates individual conductors to ensure electrical isolation and relieve stress; Ground indents provide excellent conductivity and retention with mating connector 5; Aluminum undermold shielding helps to meet FCC requirements on EMI/RFI interference.


Price: 4.85



Cirque Cat Touchpad Smart - Touchpad - 4 button(s) - wired - PS/2, serial - whit


Smarter than a mouse with one-touch vertical & horizontal scroll, plus zoom! No mouse can do all this! Cirque Smart Cat sets a higher standard of performance and comfort with the new generation of GlidePoint technology. That old mouse or trackball can't compete with effortless control like this... Intelligent software you can personalize, one-touch scroll and zoom in most applications, distinctive sounds for each operation, and more make the Cirque Smart Cat the most precise, easy-to-use pointing device in its class.


Price: 45.72



Memory Upgrades - Memory - 1 GB - SO DIMM 200-pin - DDR - 333 MHz / PC2700


This Laptop memory is compatible with most PCs. Double Data Rate (DDR) SDRAM memory is a product built upon the foundation of older PC100/PC133 memory technology. DDR SDRAM memory can do two operations per clock cycle, unlike SDRAM memory which only supports one operation per the computer's clock cycle. By having DDR technology, you are doubling the memory bandwidth over the corresponding single-data-rate SDRAM. Give your computer a boost by adding more memory!


Price: 69.40



Epson - Print cartridge - 1 x magenta - 2100 pages


This replacement magenta ink cartridge is for the Epson Stylus Color 3000 inkjet printer. It has a print life of 2100 pages.


Price: 48.98



SimpleTech Premium Brand - Memory - 1 GB - DDR - 333 MHz / PC2700 - unbuffered


SimpleTech provides one of the most complete offerings of performance memory solutions in the industry, unsurpassed in quality, performance, and price. With over a decade of design and manufacturing expertise, SimpleTech knows what it takes to build quality and reliability into every memory solution. SimpleTech takes the complexity out of choosing the right solution for your system. With support for hundreds of desktop, notebook, workstation, server, and printer models, it offers thousands of memory upgrades made for your system.


Price: 46.04



HP - Photo paper - Roll A1 (24 in x 100 ft) - 158 g/m2 - 1 roll(s)


Hewlett Packard takes great care of its customers and supplies them will a wide range of accessories needed today and tomorrow to satisfy most sophisticated needs.


Price: 88.64



EDGE Digital Media Premium - Flash memory card - 2 GB - CompactFlash


The EDGE Digital Media line is a comprehensive collection of digital media products for digital cameras, MP3 players, PDAs and cell phones. These products truly enhance the user experience by providing a significant increase in storage capacity for digital consumer devices. More pictures, more music, more information, with one simple add-on! Available in CompactFlash, Multimedia, Secure Digital and SmartMedia formats, these digital media cards are consumer-friendly and come in an attractive retail package. The EDGE Digital Media line also includes USB readers for CompactFlash, SmartMedia, Memory Stick, MultiMedia and Secure Digital formats. The line is rounded out with CompactFlash and SmartMedia PCMCIA Adapters as well as a FlashPath SmartMedia Floppy disk adapter. With EDGE Digital Media you are guaranteed a superior product that insures fast recording times, is easy-to-use and is 100% compatible with every make and model of digital camera on the market.


Price: 21.21



APC SurgeArrest Personal - Surge suppressor ( external ) - AC 120 V - 7 output c


Lightning and power surges can permanently ruin your electronic equipment. Changes in voltage cause lockups and loss of work. This unit will protect your equipment from the threat of bad power. The Personal SurgeArrest series offers affordable surge protection ideal for small office and home equipment such as home PCs, printers and modems.


Price: 16.95



OKI - Print ribbon - 1 x black - 4 million characters


Quality OKI accessories and supplies are the perfect match for OKI printers and fax machines because they are developed by the same engineers and manufactured to OKI strict specifications.


Price: 13.87



OKI Microline 186 - Printer - B/W - dot-matrix - 240 dpi x 216 dpi - 9 pin - up


Whatever the need or the workload, the ML186 sets an impressive pace. Select any of four speed settings and get a quality product in less time. Fastest is the blazing 375 cps "Super Speed" Draft mode, followed by the 333 cps High-Speed Draft, 250 cps Utility, and the Near-Letter Quality of 62.5 cps. The printer's small footprint makes it ideal for use in your system configuration. And the operator panel control of character sets, form length, and other frequently used functions makes the ML186 quite easy to use. (The printer has a "lockout" feature to prevent unauthorized setting changes.) Demand only the best. Put the rugged, affordable MICROLINE 186 to work in the shop or behind the counter. Today.


Price: 257.47



Belkin - Patch cable - RJ-45 (M) - RJ-45 (M) - 6 ft - ( CAT 5 ) - yellow


Having trouble finding the right cable for your PC system configuration? Let Belkin help you find the right cable for you. Belkin manufactures a wide variety of Category 5 patch cables in an array of colors. Belkin's Category 5 patch cables are available with molded strain reliefs or "snagless" molded strain relief boots for hassle free network installations.


Price: 9.85



Epson - Print ribbon black


Epson supplies quality ribbons for all its dot matrix printers. Considerable research and development has gone into the production of Epson original ribbons. Epson manufacture all their ribbons to the highest possible specification to ensure the maximum efficiency of the Epson printer. This black ribbon is specially designed for use with EPSON LQ-2500 /LQ2550/LQ670/LQ860 Dot-Matrix printers


Price: 13.57



Kensington SmartSockets Premium Strip - Surge suppressor ( external ) - AC 120 V


Kensington Technologys SmartSockets adapter is loaded with many new user-friendly features. Color-coded rings with matching stickers give you easy and safe cord management. The innovative Adapter Model features widely spaced outlets for six AC adapters. And the recessed push-button switch helps prevent accidental system shutoff --a leading cause of data loss, computer and disk damage. SmartSockets' telephone, modem, and fax protection prevent surges due to nearby lightning strikes from reaching your computer. A bi-color light warns you of improper grounding, and the right-angle plug saves space by hugging the wall. These devices are available in two form factors: strip (1x6) and adapter (2x3).


Price: 18.98



DYMO - Diskette labels - black on white - 2.13 in x 2.75 in - 400 label(s)


Paper labels direct from the roll for simple use. Perfect for 3.5" diskettes and also a good size for temporary name badges. Print labels 1-up or in a batch.


Price: 17.05



McAfee Gold Technical Support - McAfee Active VirusScan 1 node - TSP, Silver - t


You rely on your information systems to complete the transactions critical for business success. Because it is your job to make sure your information systems run smoothly, you select the best products. Network Associates' PrimeSupport program is essential for making the most of your investment in Network Associates' products. This program gives you the technical support that's necessary to ensure that your product is installed correctly and is working properly. PrimeSupport Priority Plus provides customers priority telephone access to Network Associates experienced technical support team. After business hours, telephone access is available for emergency product assistance when critical operations are affected.


Price: 5.02



StarTech.com RS-232 Serial Ethernet IP Adapter (Device Server, Console Server) -


Take your serial peripherals to new lengths. With this one-port Ethernet-to-Remote Serial interface converter, your RS-232 serial devices can be placed anywhere on your TCP/IP Ethernet WAN/LAN and still perform as if they were right beside you. It even works over the Internet! Even at the longest distances, control of your serial devices will be right at your fingertips: the remote serial ports appear alongside your local serial ports in your Windows device manager. NETRS232 1 is designed to function seamlessly with your other serial ports for totally transparent operation. Your serial equipment - card scanners, access keypads, bar code scanners, and more - will operate as smoothly as if the serial ports were right inside your computer. For industrial automation, security, Point of Sale, or any time you need reliable, long-range serial communications, the NETRS232 1 delivers superior performance in any environment.


Price: 127.81



Targus 15.4" Notebook Slip Case - Notebook carrying case - gray, black


The Targus Notebook Slip Case can be used as a stand-alone case or to compliment your existing notebook carrying case. It features a neoprene exterior, which provides protection for your notebook and soft comfortable carrying handles. This slip case accommodates notebooks with screens up to 15" and even with its compact form factor has ample space in the front and interior storage section for business cards, pens and files.


Price: 22.76



Brother TN670 - Toner cartridge - 1 x black - 7500 pages


The toner cartridge yields up to 7, 500 pages when printing at approx. 5% coverage on A4/Letter sized paper. When you see the Toner Low error message you should order a new toner cartridge to be prepared for when the toner runs out.


Price: 70.51



Belkin - Network connector - RJ-45 (M) - ( CAT 5 ) (pack of 50 )


This is a pack of RJ-45 connectors for 10Base-T Patch Cables from Belkin Components.


Price: 15.13



Impact Acoustics SonicWave - Video / audio cable - composite video / audio - RCA


Impact Acoustics SonicWave Series Component Video Interconnects achieve unsurpassed performance through advanced cable design, construction and materials. These quality cables give you maximum performance from your home theater equipment. Low-loss 75ohm silver-coated oxygen-free copper wire and Teflon insulation delivers the most accurate picture, resolution and color. CU Shielding Technology provides three layers of shielding, two 80%+ OFC copper braids and one 100% overlapped Mylar foil, which protects against unwanted noise and interference. The SplitLok connectors are 24K gold-plated with split center pins to ensure long lasting connections free from corrosion. The color-coded connectors attach to a flexible PVC jacket allowing for easy installation and identification.


Price: 76.39



computers parts For Your Reading Pleasure
History Of The Computer - Redundancy Part 1 Of 2


We have mentioned previously, in history of the computer, that mainframes are large scale devices. We have also mentioned various forms of error correction. We will be looking at that subject in more detail in another episode.



(If you are looking for information on what to do when the boss fires you, sorry - you've wasted your time! Try the job ads in the local paper.)



This time we are going to look at various ways of avoiding the consequences of errors in the system. This has been necessary because of the inherent unreliability of mechanical equipment, and early electronic devices. The large scale of systems, as well as being able to provide greater processing power, and throughput, has also made it possible to minimise, or eliminate, the effect of failures.



This philosophy is known as redundancy. By this we mean that we design the system so that there are always at least two ways to accomplish any task. In this way, in the event of a failure in one component, there is always a way around it, using another component. A complete failure is only possible if both alternatives fail at the same time. This is extremely unlikely, but has happened!



As an example, consider a disk drive. What can go wrong with this drive? We can have a write error, where the data to be written to the disk cannot be relied on, this is detected in the write logic. We can have a read error, where the data previously written on the disk has become corrupted since it was written. Also possibly caused by a failure in the mechanical read head access mechanism, or the logic.



To provide a way of preventing this problem from affecting our operation, we can attempt an internal recovery, for instance retry the read operation. If this doesn't work, our alternative could be a duplication of all data on the disk on another drive, so that data is written to and read from both devices in parallel. In the event of a failure of one device, we can still use the other. In other words, the drive is redundant.



Now we move further up the chain to the next possible source of failure. The disk drives on a large system are normally arranged in a 'string' of 8 or 16 drives. These strings are attached to a controller, which handles the writing and reading of data to and from the drives. As well as the data, it needs to have addressing capability, to select a drive, and some way of allocating the correct data to and from the drive.



Thus there are various cables between the controller and each drive. Some of these cables can be 'daisy-chained', that is they go to each drive in turn. other cables go only to a specific drive. Power cables also go to the drives from the controller.



These cables, and the logic they are connected to, present the next possibility of a failure. For example, the cables are normally run either under the cabinets, or under the false floor. There is a possibility that a cable could be disturbed, or be under stress, or connected poorly. The logic at either end of the cable could have a failure, or a plug could work loose, perhaps from being poorly positioned.



The effect of all this, as far as the system is concerned, is the same as if a drive were at fault. We have difficulty reading from or writing to, or even accessing a drive. The defect may affect just one drive, or all the drives in the string.



How can we avoid this situation from causing a problem? Simple - we provide an alternate path for the data and controls. We do this by running a duplicate set of cables between the controller and the drives. To eliminate the possibility of logic or connector failures, we duplicate this, both in the controller, and in each drive. We now have a redundant path between the controller and the drives. If one cable or connector fails, we can still use the other one.



In Part 2 we look further up the chain, and discuss the advantages of redundancy.


About the Author:

Tony is an experienced computer engineer. He is currently webmaster and contributor to what-why-wisdom.com . A set of diagrams accompanying these articles may be seen at what-why-wisdom.com/history-of-the-computer-0.html . RSS feed also available - use what-why-wisdom.com/Educational.xml



Fix A Slow Running Computer


Looking to fix a slow running computer? I know I am. There is nothing as annoying and frustrating as having to wait on your computer to catch up to you. And if you type like me, there is never any situation where I should be out performing my computer. And I think much of the lack of patience has also come with the age of broadband internet. We always want everything so fast, like yesterday. So when you computer is just sitting there, and you are waiting for it, we need a solution to fix a slow running computer.

The obvious way to fix your slow computer is to upgrade the memory. You should try to run your computer system with the maximum of allowed memory it will handle. And in today?s age, memory is very affordable, even for laptops. And if you have never installed memory, it is simple. This is something any computer owner can do. Just please be sure not to tough the memory cards with your bare hands. Even though I have never messed up one, the static electricity build up is supposed to be what can mess it up. And if you upgrade the memory, you will have one of the answers to fix a slow running computer.

The other method is to use software. There are certain files on your computer called registry files, or registry keys. These specific files are what tell the computer what to do. Well, if one of these files ends up missing, or gets messed up, this can cause the computer to stall, or not execute the specific command it is trying to accomplish. This is most likely the cause of your problems. Find a good registry fix, or registry cleaner, and run a scan on your computer. This will tell you if you have any errors. If you do, then just let the software fix them. And, that?s it. Now you slow computer will run at its normal speed again.

There are 2 methods of fixing a slow computer: upgrade the memory and fix the registry. I would personally fix the registry first, and the memory second. Because, even if you fix the memory, and still have registry issues, you will not speed up the computer. The registry cleaner will speed up your computer immediately, and fix a slow running computer.

Michael Baker is a Computer Optimization Technician, and recommends getting a Free Computer Scan to fix any problems such as computers freezing, locking up, restarting for no reason, and getting the blue death screen.



Home Computer Rentals


In recent years, the computer has become an indispensable part of human life. It has also tremendously influenced the activities, attitudes and the way masses think all over the world. Nowadays, most households have a computer. But, those who do not own one can get high tech computers for rental. Home computer rentals are a cost effective approach to access the latest technology for personal and professional use.

Depending on the need, you can rent any type, model, brand and number of computers for your home. There are countless companies that provide home computers for rental. Aardvark and Capital Computer Rental are two of the prominent companies dealing with home computer rentals. Most computer rental companies operate online, to meet the immediate demands of customers. Today, almost all top brands such as Intel, Dell, Compaq, Toshiba and Apple can be availed on rental for household purposes.

The main benefit of home computer rentals is that you get the opportunity to use recent models and the latest operating systems. Thus, you need not upgrade or change your home computer with the rapid changes in the market. Home computer rentals also avoid all the hassles of computer maintenance.

Depending on the need, computers can be obtained for short term and long term rentals. Rates will be based on the period and model of the rental. Generally, laptop computers are more expensive than desktop computers. The differences in rental rates are marginal from one company to another. It is always recommended to consider the duration while renting a computer for household use. Purchasing a computer will be a better option than renting it for a long period. For example, the rental cost of a Pentium 4 desktop computer is around $149 for a week; for a year or a month, the rate will be much higher. But a Pentium 4 desktop computer may be bought for around $4,000.

As the cost of new computers is drastically coming down, home computer rentals are only good for short term household purposes.

Computer Rentals provides detailed information on computer rentals, laptop computer rentals, computer projector rentals, desktop computer rentals and more. Computer Rentals is affiliated with Laptop Computer Sales.



Computer Security: How You Can Improve Yours


Computer security is a branch of information technology that relates specifically to measures taken to protect the data on computers from being corrupted or misused. Computer security comes in a myriad of different forms depending on what level of protection is required.






The objective behind the concept of computer security actually varies quite a bit depending on the use of the computer. Computer security may include the protection of specific information from corruption or theft, for example. In general this can impose specific requirements on computers in addition to most standard system requirements. There are a number of different typical approaches that can be taken when it comes to improving computer security, including the following:


- Physically limiting the access to a computer so that computer security will not be compromised by those who are granted access to use it.


- Utilizing hardware mechanisms that can create and impose rules for specific computer programs, allowing computer security to be imposed without requiring individual programs to implement it.


- Implementing operating system or OS mechanisms that are capable of creating and imposing rules that avoid having to trust programs on the computer.


- Implementing programming strategies that allow subversion to be resisted and make computer programs more dependable.


In most cases, the computer security devices that are put into place are dependent upon the application uses the computer is created for. Different computer systems require different levels of security, as the level of privacy or protection needed is going to vary significantly. Computer systems under government control, for example, require a much higher level of security than computers used by students in a university setting. The level of required computer security, then, along with what forms of security are implemented, are going to vary significantly as well.


Implementing computer security may include creating or utilizing secure operating systems, though much of the science associated with this form of security was developed several decades ago. Security architecture is another option, and involves describing how specific security countermeasures and controls are positioned to protect the information technology. Firewalls are an example of security meant to protect computers from threats that travel via the internet or peer to peer connections. Chain of trust techniques are techniques that are used to ensure that all software on a computer is certified as authentic directly from the designers of the system. Access control is used to ensure the separation of privileges, ensuring that only specified people have the right capabilities on a computer system.


There are also cryptographic techniques which transform information into something that is meant to be indecipherable by anyone but approved persons. Information can also be secured for computer security purposes using backup files which allow important files to be protected by creating copies should they ever become corrupted or destroyed.


Essentially, the primary focus of the computer security field of information technology is to protect the integrity of computers, the data contained within them, and any information that may require restricted access. Some level of computer security is needed by anyone who owns a computer, including student computers in a university setting, computers owned and operated by the governmentFeature Articles, and even the laptop that you use to check your e-mail at night.


Source: Free Articles from ArticlesFactory.com




ABOUT THE AUTHOR




Craig Thornburrow is an acknowledged expert in his field. You can get more free advice on a computer security system and computer security product at computersecurityclinic.com



Headlines on computers parts
Counting On Computers To Count The Votes (CBS News)

Tue, 30 Sep 2008 06:04:47 GMT
Some of the country's leading experts on electronic voting are worried about how Americans' ballots will be tallied this November. CBS News tech analyst Larry Magid reports.

soundblaster usb X-fi

Thu, 28 Aug 2008 11:15:30 -0700
being a big audio nut i got a nice sound card for my new laptop.i can truly say the sound quality is second to none.i get great results using a fiber optic cable run to a pioneer reciever. for anyone looking for a great usb soundcard i highly reccommend the usb X-fi. Sound Blaster X-Fi Surround 5.1 SB1090 - Sound Blaster - Better Music and Movie Sound, Made Easy

MPC In Hot Water over Alleged Contract Breaches - Circuits Assembly

Mon, 29 Sep 2008 19:30:57 GMT

MPC In Hot Water over Alleged Contract Breaches
Circuits Assembly, GA - 19 hours ago
NAMPA, ID – MPC Corp. is being sued for allegedly failing to pay nearly $350000 worth of computer parts delivered to a subsidiary. In a court filing, ...


The Entire D6 Interview With Dell Computer's Michael Dell (1 of 3) (AllThingsD Online via Yahoo! Finance)

Mon, 29 Sep 2008 16:42:16 GMT
We're posting all the interviews from the sixth D: All Things Digital conference that took place in late May. Unfortunately, due to issues too complicated to go into, we have to post all the D6 interviews in several 15-minute parts .

PopCap(R) Launches Mobile Version of Blockbuster Game Peggle(R) - PR Newswire (press release)

Tue, 30 Sep 2008 13:56:19 GMT

PopCap(R) Launches Mobile Version of Blockbuster Game Peggle(R)
PR Newswire (press release), NY - 1 hour ago
Constantly acclaimed by consumers and critics, PopCap's games are played on the Web, desktop computers, myriad mobile devices (cell phones, smartphones, ...


Labels:

0 Comments:

Post a Comment

<< Home