Tuesday, November 04, 2008

Under what category would you grade this article on electronic components? informative? Productive? Inspiring? Give a thought to this!

electronic components Items For Viewing
Lenovo L11 - Charging tip


This tip is intended for Nokia Phones : 1200, 1208, 1650, 2135, 2310, 2630, 2760, 3152, 3155, 3250, 5070, 5200, 6070, 6080, 6085, 6086, 6101, 6102, 6103, 6111, 6125, 6126, 6131, 6133, 6136, 6151, 6152, 6155, 6233, 6263, 6265, 6267, 6268, 6270, 6280, 6282, 6288, 6290, 6300, 6555, 7360, 7370, 7372, 7373, 7390, 2865i, 3109 Classic, 3110 Classic, 3155i, 3250 Xpress Music, 3500 Classic, 5300 XpressMusic, 5310 XpressMusic, 5500 Sport, 5610 XpressMusic, 6102i, 6120 Classic, 6121 Classic, 6131 NFC, 6155i, 6165i, 6233 Music Edition, 6265i, 6275i, 6500 Slide, 7500 Prism, 770 Internet Tablet, 8800 Sirocco Edition, 8800 Sirocco Gold Edition, E50, E61, E61i, E62, E65, E90 Communicator, N70, N70 Music Edition, N71, N72, N73, N73 Music Edition, N75, N76, N77, N80, N800 Internet Tablet, N80ie, N810 Internet Tablet, N90, N91, N91 8GB, N91 WCDMA, N92, N93, N93i, N95, VI-3155i.


Price: 8.18



Kingston - Memory - 1 GB - DIMM 184-pin - DDR - 266 MHz / PC2100 - registered -


Kingston, the world's largest independent memory manufacturer, has over 2,000 memory products. In today's performance-driven environment, memory upgrades provide an easy, economical alternative to increase system performance. Every memory product Kingston offers is designed to help you get maximum performance at the best price to you. This memory is designed for Acer Altos G300 Series. For a complete compatibility list please refer to the original manufacturer's web site.


Price: 175.99



Rose UltraView Pro - KVM switch - 8 ports - 1 local user


UltraView represents the latest state-of-the-art technology in KVM switching. UltraView Pro is today's solution for server farm management. For anyone managing two or several hundred computers, the simple-to-use Advanced Visual Interface (AVI) on-screen display of the UltraView Pro provides fast and easy access to any computer. Available in PC/UNIX or multi-platform, the UltraView Pro comes in small, medium, and large chassis sizes. The large chassis models can be expanded with cards up to 16 ports. Regardless of your KVM needs, you will find a chassis that meets your system growth requirements. When time comes to add more computers, rest assured that the UltraView Pro is easy to expand by chaining the units together. When using the 16-port units, you can expand the UltraView Pro to 256 computers. With its Advanced Visual Interface, built-in security, flash memory, easy expansion, front panel controls, and other features you're beginning to get a sense of the UltraView Pro advantage.


Price: 883.78



Xerox - Toner cartridge - 1 x magenta - 10000 pages


The quality of your documents communicates your image to the world and to your customers. Xerox formulates every supply product to match the performance specifications of your Xerox equipment.


Price: 270.00



Maxell - DDS-4 - 20 GB / 40 GB - storage media


As a charter member of the Digital Data Storage Group (DDS), Maxell's 4mm data cartridges feature the Media Recognition System (MRS), which allows the drive sys-tem to detect the presence of data grade tape. Maxell uses only the finest quality magnetic media to meet the strictest specifications for a minimal dropout rate. Maxell then processes this media in a Class 10 clean room where it is certified for data recording purposes. To protect the fine metal particles in the magnetic layer of the tape, Maxell invented the ceramic coating process. Maxell's ceramic coating acts as a protective armor against heat, humidity and eventual oxidation. The result is a tape durable enough to withstand at least 2, 000 passes with an archival life of up to 30 years. All Maxell 4mm data cartridges feature Maxell's unique Safe-T-Lock, a hub-locking mechanism that ensures proper tape tension and prevents misthreading during the initial loading stage.


Price: 10.23



Case Logic SLRC 1 - Case for camera - nylon - black


Ultra-protective SLR camera case with impact-resistant base protects your hardware from moisture and toppling over. Durable nylon exterior is tear and moisture resistant.


Price: 13.61



Unotron M30 SteriMax 3 Button Washable Optical Mouse - Mouse - optical - 3 butto


The UNOTRON M30 SteriMax Washable 3 Button Optical Mouse uses patented SpillSeal Technology and has been tested to the international standards of IP66 and Nema4X. The M30 SteriMax Washable Mouse is a 3 button mouse with soft-clicking buttons, smooth optical tracking and tough rubber overmolded plastic construction. This high specification design makes it suitable for a variety of environments such as Hospital Surgeries where hygiene and cleanliness is paramount. The M30 SteriMax Washable 3 Button Optical Mouse can be easily sterilized in a variety of detergents and anti-bacterial agents to help keep the mouse clean and prevent the spread of disease. UNOTRON M30 SteriMax Washable 3 Button Optical Mouse fulfils the Hygiene demands of many applications: Healthcare, Government, Education, Financial.


Price: 50.21



Belkin Pure AV Digital Camera Cable - Data cable - Hi-Speed USB - 4 pin USB Type


Designed for high-end digital devices, this PureAV Digital Camera Cable provides superior performance with portable devices such as MP3 players, digital cameras, and digital camcorders. It offers an ideal way to connect media devices to digital receivers and video recorders for media-on-demand services such as music downloads and streaming video.


Price: 35.00



Lexmark MarkNet N7000e - Print server - Hi-Speed USB - EN, Fast EN - 10Base-T, 1


The MarkNet N7000e provides secure, manageable network printing to a single USB printer or multifunction product in a medium to large workgroup. The MarkNet N7000e connects a USB printer to your corporate network. With Fast Ethernet networking and a single USB 2.0 Hi-Speed capable port, the MarkNet N7000e offers high performance printing to your entire workgroup. Install your printer on the network without a technical degree thanks to an easy to use setup wizard and plain text LCD operator panel. Secure the link between your workstation and printer with built-in IPsec security. Prevent unauthorized device access with 802.1x authentication. ThinPrint support for use in Citrix MetaFrame and Microsoft Windows Terminal Services Environments.


Price: 238.45



LG 32LC7DC - 32" LCD TV - widescreen - 720p - HDTV - high-gloss black


LG Electronics is one of the world's largest electronics manufacturers, producing a large range of consumer electronics and IT products. LG has created reputation for progressive technology and innovation with the latest technological developments in consumer electronics, home appliances and IT products. PRODUCT FEATURES: 32" HDTV Integrated TV; Public Display Settings; LG SimpLink; TV-Link Loader Compatible.


Price: 716.69



Cisco Catalyst Express 520-8PC-K9 - Switch - 8 ports - EN, Fast EN - 10Base-T, 1


The Cisco Catalyst Express 520 Switch is a component of the Cisco Smart Business Communications System. This integrated system of voice, security, and wireless networking products provides an affordable, comprehensive communications solution that is easy to deploy and use while allowing for business growth. With the Cisco Smart Business Communications System, even smaller organizations can provide employees and customers with secure anywhere, anytime access to the information they need to communicate and interact more effectively. The solution is complemented by award-winning support and flexible-financing options delivered through local Cisco partners. The Cisco Catalyst Express 520 Switch is a fixed-configuration, managed Ethernet switch that provides 8 ports of 10/100 Power over Ethernet (PoE) optimized for integration with the Cisco Smart Business Communications System. The Cisco Catalyst Express 520 Switch is designed for ease of deployment and ships with a predefined software configuration to work immediately with the Cisco Unified Communications 500 Series for Small Business.


Price: 871.04



IBM System x3650 7979 - Rack - 2-way - 1 x Quad-Core Xeon X5365 / 3 GHz - RAM 2


IBM System x3650 servers feature fast Intel processors, which provide greater system performance. With a compact 2U footprint, the rack-optimized System x3650 servers help save valuable rack space and resources. It is packed with highly integrated, advanced server features designed for compute-intensive, web-based, or enterprise network applications, where space is a primary consideration.


Price: 3717.40



HP - Network adapter - USB - 802.11b, 802.11a, 802.11g


Marketing description is not available.


Price: 61.58



Zebra - Label rewinder


Looking for answers? Look no further than Zebra. Customers in a wide range of industries and government programs depend on Zebra for their unique requirements. Zebra's industry solutions are drawn from innovative thinking and from proven experience. In fact, Zebra solutions help thousands of companies, in more than 95 countries, operate more efficiently and improve the way they serve their customers.


Price: 352.09



Cables To Go RapidRun PC/Video UXGA Runner Cable - Plenum Rated - Video / audio


Imagine a VGA cable you can pull through a " conduit with a 90 degree sweep with no soldering of the HD15 connector! Or having the option of switching the installed cable from VGA to Component Video with Audio in less than a minute! With RapidRun, you can easily do this and more. No cabling solution on the market will do more to make your installations easier or more versatile! RapidRun's revolutionary design provides the greatest flexibility and ease of installation without loss of signal quality. Two styles of Runner base cables, a 3-Coax with 4 twisted pairs and a 5-coax version, allow this unique interconnect system to be configured for UXGA, Component, Composite and/or Digital/Analog Audio Signals. The key to this RapidRun is the proprietary MUVI (Multi-Use Versatile Interconnect) connector design, which features a locking mechanism that connects to either a Break-Away pigtail or Wallplate. The MUVI connector also enables you to pull the Runner base cable through a " conduit then terminate with your pigtail or wallplate.


Price: 144.88



NETGEAR FVS318 ProSafe VPN Firewall - Router + 8-port switch - EN, Fast EN


Want the utmost in network security for your office? NETGEAR's FVS318 ProSafe VPN Firewall provides business-class protection at a NAT router price. This completely equipped, broadband-capable Virtual Private Network (VPN) firewall is a true firewall and provides it all - Denial of Service (DoS) protection and Intrusion Detection using Stateful Packet Inspection (SPI), URL access and content filtering, logging, reporting, and real-time alerts. It initiates up to 8 IPSec VPN tunnels simultaneously, reducing your operating costs and maximizing the security of your network. With 8 auto-sensing, Auto Uplink switched LAN ports and Network Address Translation (NAT) routing, up to 253 users can access your broadband connection at the same time.


Price: 89.00



Microsoft Windows XP Professional w/SP2 - Upgrade package - 1 user - CD - Englis


Microsoft Windows XP Professional is the next version of the Windows operating system, which is designed for businesses of all sizes, and for individuals who demand the most from their computing experience. Windows XP Professional goes beyond the benefits of Windows XP Home Edition with advanced capabilities designed specifically to optimize productivity using the latest advancements in the digital world. Built on the solid foundation of Windows 2000, Windows XP Professional provides improved reliability, security, performance and ease of use, setting the new standard in efficient and dependable computing. Microsoft Windows XP Service Pack 2 (SP2) provides an enhanced security infrastructure that defends against viruses, worms, and hackers, along with increased manageability and control for IT professionals and an improved experience for users.


Price: 203.95



Kingston ValueRAM - Memory - 128 MB - DIMM 184-pin - DDR - 400 MHz / PC3200 - CL


Kingston, the world's largest independent memory manufacturer, has over 2,000 memory products. In today's performance-driven environment, memory upgrades provide an easy, economical alternative to increase system performance. Every memory product Kingston offers is designed to help you get maximum performance at the best price to you. This memory is designed for the following systems: ABIT IC7-G Motherboard; AOpen AX4C Max, AX4C Pro, AX4C-G Motherboards; ASUS P4C800, P4C800 Deluxe Motherboard; ChainTech 9CJS ZENITH; DFI LANPARTY PRO875; Epox EP-4PCA3+ Motherboard; FIC P4-875 MAX Motherboard; Gigabyte GA-8IK1100 Motherboard; Gigabyte GA-8KNXP, GA-8KNXP Ultra Motherboards; Intel D875PBZ Motherboard; MiTAC P410CX Motherboard; MSI 875P Neo, 875P Neo-LSR, 875P Neo-FIS2R (MS-6758); SOYO SY-P4I875P DRAGON 2; Tyan Computers Trinity i875P (S5101). For a complete compatibility list please refer to the original manufacturer's web site.


Price: 21.90



HP StorageWorks FC2243 - Network adapter - PCI-X - 4Gb Fibre Channel - 2 ports


The HP StorageWorks FC2243 dual-channel 4 Gb PCI-X 2.0 HBA for Windows now supports customers with Integrity and ProLiant Servers that have PCI-X I/O slots in them. It is the first 4 Gb HBA to support this I/O bus architecture. This product now gives customers the ability to use the higher performance PCI-X 2.0 I/O bus to connect to their HP StorageWorks arrays. The FC2243 is high performance, enterprise class host bus adapter that combines the backward compatibility and high bandwidth of 266 MHz PCI-X 2.0 with exceptional 4 Gb/s Fiber Channel performance. Emulex HBA employs a firmware-based architecture and a unique Service Level Interface (SLI) that enable new features and other upgrades without costly adapter hardware changes. Emulex technology also allows for a single set of drivers and management tools across HBA product families. This kind of technical flexibility and investment protection is critical when working with evolving technology.


Price: 1808.47



Da-Lite Model B - Projection screen - Matte White


Da-Lite's wide selection of tripod and wall screens gives the presenter a professional solution for any projection application or situation. All screens incorporate Da-Lite's exclusive Camlok roller system that prevents the screen from being accidentally pulled from the roller. All screens come with black masking borders as standard. Model B is perfect for classroom and meeting room facilities. Its easy pull-down system locks at intervals to fit a variety of projection formats. Nylon bearings provide smooth quiet operation for the life of the screen. Case design allows for hanging from a ceiling or flush mounting to a wall.


Price: 109.60



Digi - Network splitter ( DTE ) - HD-68 (M) - DB-9 (F)


Digi International is the world's leading supplier of multi-function adapters for server-based communications systems. Digi's products, including its DataFire digital adapters and AccelePort multi-port serial adapters, are an integral part of server-based communications systems for remote access, fax, routing, computer telephony and Internet points of presence. Digi International also offers various cabling solutions.


Price: 33.70



Micro Connectors - Keyboard cable - 6 pin PS/2 (F) - 6 pin PS/2 (M) - 6 ft


Micro Connectors PS/2 keyboard extension cable features gold plated contacts for maximum conductivity, 28 gauge standard conductors for excellent signal transmission and Milar shielding for EMI/RFI protection.


Price: 2.89



Maxtor Shared Storage II - NAS - 1 TB - HD 500 GB x 2 - RAID 1 - Gigabit Etherne


Simply share storage and automatically backup computer files, photos, music and digital videos to one location on small office and home networks with Maxtor Shared Storage II. Easy user interface provides backup scheduling of networked computers, data restoration, and media playback to networked media/ entertainment systems without being tied down to a dedicated computer host.


Price: 405.65



Zebra - Printer cleaning card kit


Zebra offers a variety of accessories to meet the needs of multiple applications. Use Zebra accessories to add to the convenience, durability, and efficiency of your printing applications. This Cleaning Card Kit consists of 4 print engine cards & 4 card feeder cards.


Price: 16.84



Belkin - Patch cable - RJ-45 (M) - RJ-45 (M) - 7 ft - ( CAT 5e ) - blue


Belkin Components is the preeminent technology leader in connectivity solutions for the computer and consumer electronics user. Producing the highest-quality cabling products has always been the key to success. Always ahead of the rest, Belkin supports the latest technologies. Belkin, the leader in the cable industry, has the cable you need!


Price: 2.83



electronic components For Your Reading Pleasure
How Really Power Surges Destroy Your Computer and How to Avoid



Power surge are one of the most feared incident on electronic devices. Same as computer, they are really susceptible to power surges. Even though surges usually last only milliseconds (and are somewhat filtered by the transformer in the power supply), that high voltage can exceed the withstand voltage of the insulating layers inside the integrated circuit chips and burned everything inside your computer.

The power delivered to your electronics devices and computer is stable and constant, in theory of course. In real life, it doesn't work that way. Often power surge occurs when the normal flow of electricity is interrupted, and then started again, or there was an occurrence that something sends excess electrical energy into the system. Any number of events, from lightning strikes to power failures, can cause power surges. Even your own electrical devices and computer can cause them. Refrigerators and air conditioners, for example, have motors that turn on and off, diverting electricity to and from other appliances and producing low-level power surges. On computer, internal peripheral can cause small surges that can reduced your computer lifespan or even destroy it completely.


On computer a switching power supply is designed to convert AC into various DC voltages. The internal transformers on power supply that do this, the capacitors to bridge over dips in the line power, all these are rated to handle a certain amount of energy at any given time. If you go outside of range of that certain amount, you overload the parts. Maybe marginal parts fail and die. Maybe they let through more energy than they should. In some cases, maybe things catch on fire. Like things you saw on fried chips due to extreme overclock. Cheaper Power Supply Units will be using cheaper components - the upshot of this is the components have weaker tolerances, and don't handle going outside their tolerances as gracefully.


To prevent it you need a good UPS (Uninterruptible Power Supply) to protect your computer and another electronic appliance. However no UPS can withstand power of nature. Even a good UPS cannot tolerate extreme power of lighting. During storm or rain situation you might want to consider turn off you computer and unplug it. Also unplug phone lines and another line like coaxial cables that are being used for cable TV and broadband connection, since they are susceptible to lighting strike. Power surges caused by lighting are seldom to happen though there are possibilities.


On computer you will face another problem. Internal surges that can't be prevent from external UPS. This caused simply by turn it on and off your computer. So every time you turn on and off your computer, you actually decreased life span of your computer and adding possibility to destroy the component completely. And there is no way to avoid this matter for now. Since there is no data how it will affect your computer. I suggest that you scheduled your computer to be use as efficient as possible.--FA


--------------------------------
Fresh Daily Computer News - Digital Binary

About the Author


I run a blog contain interesting information about Information Technology. You may find another article and news in my website Digital Binary

Computer Security Ethics and Privacy



Today, many people rely on computers to do homework, work, and create or store useful information. Therefore, it is important for the information on the computer to be stored and kept properly. It is also extremely important for people on computers to protect their computer from data loss, misuse, and abuse. For example, it is crucial for businesses to keep information they have secure so that hackers can't access the information. Home users also need to take means to make sure that their credit card numbers are secure when they are participating in online transactions.


A computer security risk is any action that could cause lost of information, software, data, processing incompatibilities, or cause damage to computer hardware, a lot of these are planned to do damage. An intentional breach in computer security is known as a computer crime which is slightly different from a cypercrime. A cybercrime is known as illegal acts based on the internet and is one of the FBI's top priorities. There are several distinct categories for people that cause cybercrimes, and they are refereed as hacker, cracker, cyberterrorist, cyberextortionist, unethical employee, script kiddie and corporate spy.


The term hacker was actually known as a good word but now it has a very negative view. A hacker is defined as someone who accesses a computer or computer network unlawfully. They often claim that they do this to find leaks in the security of a network. The term cracker has never been associated with something positive this refers to someone how intentionally access a computer or computer network for evil reasons. It's basically an evil hacker. They access it with the intent of destroying, or stealing information. Both crackers and hackers are very advanced with network skills.


A cyberterrorist is someone who uses a computer network or the internet to destroy computers for political reasons. It's just like a regular terrorist attack because it requires highly skilled individuals, millions of dollars to implement, and years of planning. The term cyperextortionist is someone who uses emails as an offensive force. They would usually send a company a very threatening email stating that they will release some confidential information, exploit a security leak, or launch an attack that will harm a company's network. They will request a paid amount to not proceed sort of like black mailing in a since.


An unethical employee is an employee that illegally accesses their company's network for numerous reasons. One could be the money they can get from selling top secret information, or some may be bitter and want revenge. A script kiddie is someone who is like a cracker because they may have the intentions of doing harm, but they usually lack the technical skills. They are usually silly teenagers that use prewritten hacking and cracking programs. A corporate spy has extremely high computer and network skills and is hired to break into a specific computer or computer network to steal or delete data and information. Shady companies hire these type people in a practice known as corporate espionage. They do this to gain an advantage over their competition an illegal practice. Business and home users must do their best to protect or safeguard their computers from security risks.


The next part of this article will give some pointers to help protect your computer. However, one must remember that there is no one hundred percent guarantee way to protect your computer so becoming more knowledgeable about them is a must during these days. When you transfer information over a network it has a high security risk compared to information transmitted in a business network because the administrators usually take some extreme measures to help protect against security risks. Over the internet there is no powerful administrator which makes the risk a lot higher. If your not sure if your computer is vulnerable to a computer risk than you can always use some-type of online security service which is a website that checks your computer for email and Internet vulnerabilities. The company will then give some pointers on how to correct these vulnerabilities. The Computer Emergency Response Team Coordination Center is a place that can do this.


The typical network attacks that puts computers at risk includes viruses, worms, spoofing, Trojan horses, and denial of service attacks. Every unprotected computer is vulnerable to a computer virus which is a potentially harming computer program that infects a computer negatively and altering the way the computer operates without the user's consent. Once the virus is in the computer it can spread throughout infecting other files and potentially damaging the operating system itself. It's similar to a bacteria virus that infects humans because it gets into the body through small openings and can spread to other parts of the body and can cause some damage. The similarity is, the best way to avoid is preparation.


A computer worm is a program that repeatedly copies itself and is very similar to a computer virus. However the difference is that a virus needs to attach itself to an executable file and become a part of it. A computer worm doesn't need to do that. It sends copies to itself and to other networks and eats up a lot of bandwidth. A Trojan Horse named after the famous Greek myth and is used to describe a program that secretly hides and actually looks like a legitimate program but is a fake. A certain action usually triggers the Trojan horse, and unlike viruses and worms they don't replicate itself. Computer viruses, worms, and Trojan horses are all classifies as malicious-logic programs which are just programs that deliberately harms a computer. Although these are the common three there are many more variations and it would be almost impossible to list them. You know when a computer is infected by a virus, worm, or Trojan horse if one or more of these acts happen:


? Screen shots of weird messages or pictures appear.
? You have less available memory then you expected
? Music or sounds plays randomly.
? Files get corrupted
? Programs are files don't work properly
? Unknown files or programs randomly appear
? System properties fluctuate


Computer viruses, worms, and Trojan horses deliver their payload or instructions through four common ways.


One, when an individual runs an infected program so if you download a lot of things you should always scan the files before executing, especially executable files. Second, is when an individual runs an infected program. Third, is when an individual bots a computer with an infected drive, so that's why it's important to not leave media files in your computer when you shut it down. Fourth is when it connects an unprotected computer to a network.


Today, a very common way that people get a computer virus, worm, or Trojan horse is when they open up an infected file through an email attachment. There are literally thousands of computer malicious logic programs and new one comes out by the numbers so that's why it's important to keep up to date with new ones that come out each day. Many websites keep track of this. There is no known method for completely protecting a computer or computer network from computer viruses, worms, and Trojan horses, but people can take several precautions to significantly reduce their chances of being infected by one of those malicious programs.


Whenever you start a computer you should have no removable media in he drives. This goes for CD, DVD, and floppy disks. When the computer starts up it tries to execute a bot sector on the drives and even if it's unsuccessful any given various on the bot sector can infect the computer's hard disk. If you must start the computer for a particular reason, such as the hard disk fails and you are trying to reformat the drive make sure that the disk is not infected.

About the Author


Jeff Casmer is an internet marketing consultant with career sales over $25,000,000. His "Top Ranked" Earn Money at Home Directory gives you all the information you need to start and prosper with your own Internet Home Based Business.

News about electronic components
Urgent Call from Pennsylvania

Tue, 04 Nov 2008 14:03:59 GMT
DVDs Tuesday, November 04, 2008 URGENT CALL FROM PENNSYLVANIA From Mary Ann Gould: STAND FOR LAW ... STAND FOR ONE MACHINE DOWN & USE OF EMERGENCY BALLOTS IF NEEDED & Today the campaigning ends and it is the ...

PR Newswire - NTERA and GSI Technologies Sign a License and Material Supply Agreement

Mon, 27 Oct 2008 07:00:00 GMT
October 27, 2008 -- RADNOR, Pa., Oct. 27 /PRNewswire/ -- NTERA, Inc., the leader in all-printed, flexible, color change display technologies, and GSI Technologies, the...

Labels:

0 Comments:

Post a Comment

<< Home