Link Pendukung

Kamis, 10 Juli 2008

DVD Recorders: Getting Started

IMO, these sd work 'like a VCR' as far as recording and playback. There are models w/ harddrives, VHS players, etc. built in, but to me that's overboard.

Bells and Whistles

The VHS option is not bad, but you most likely already have one you can plug into the inputs of the DVD recorder.

I have a DVD recorder for archiving TiVo shows as opposed to accessing my TiVo from my PC. This is nice because it means I can also archive VHS tapes, camcorder tapes, etc. w/no extra work.

I do have a TV card in my PC so I can do this, but using the DVD recorder is easier.

My motto is: buy what you WILL use and not what you CAN use.

I've bought lots of things that CAN do a lot, but in reality I don't use all the extra features. Not in all cases, but in this case, I say pass on the bells and whistles.

Again, there are models w/ all types of features, but if you buy one that is a DVR, DVD recorder, VCR, TV tuner all in one and one part breaks, it's all broke.

Realize Something About Technology

Remember - this is new technology and will only get better and cheaper. If you buy the top of the line today, it's going to be out of date and/or cheap tomorrow. Test the waters w/ a 'good' model and upgrade when the time is right.

Editing Your Recordings

Chances are - you won't. It's a pain for the most part and usually requires DVD-RAM or DVD-RW discs to do it and they're more expensive. If you have a lot of free time for this, you're a rare person.

I was looking for this type of solution in getting ready for having a baby and I knew I wasn't going to be sifting through and editing hours of video.

If you're really interested in editing, look in to PC options. Pinnacle, ArcSoft, Adobe, etc. - they have good solutions for that.

DVD+R, DVD-R, DVD-RAM, DVD-RW

DVD+R and DVD-R are like VHS and Beta: they're both ok right now, but eventually we'll probably land on one or the other. It seems to be leaning towards DVD-R which tend to be less expensive also.

Many recorders and players do both, but cost more. I say save some money, pick one (probably DVD-R) and move on. If you pick the wrong one, chances are in a couple years you'll be buying a new one anyway. Moreover, you'll probably be able to get a cheap one w/ a built in converter or two trays to duplicate one to the other.

DVD-RAM and DVD-RW are the rewritable types. They're more expensive and for my purposes aren't worth worrying about.

My Recommendation

I got the Panasonic DMR-E55K:

It records to DVD-R like a VCR. I don't use it to record live TV so I don't use VCR+, but it has it. Also, it has TimeSlip which lets you watch something while it's recording (start recording "24" at 8pm and start watching it from the begining at 8:20 to speed thru commercials like a TiVo). Again, I don't use this, but it has it.

Plain and simple, it records my TiVo, camcorder, digital camera (RCA cable output), VCR, etc. to DVD - that's what I want it to do and that's what it does. It's easy, creates a good menu w/ thumbnails and my chosen titles, it's a name brand w/ good reviews and was fairly cheap (there was a rebate at the time).

Also, it plays CDs and mp3 CDs w/ a good interface so not only does it replace a CD player, but since you can put so many songs on one CD, it replaces a CD changer.

An interesting trick: If you have a digital camera w/ RCA cable output, you can hook it directly into the dvd recorder and create a quick slide-show dvd. Many cameras even have a slide show function built in! You can use the sound from a music channel, CD, etc.

Summary

If you're going gung-ho into all the nitty gritty about DVD recorders, you're either just starting here or haven't bothered to read this far. If you're looking for a good, relatively cheap solution to digitize your tapes, archive TiVo, etc., I recommend the Panasonic DMR-E55K.

By Bear Cahill


Recordable DVD Formats Explained

Picking your way through the ton of information available on recordable DVD formats can be a nightmare. To help you out, we've done our best to distill it into this summary.

There are five recordable versions of DVD; DVD-R for General, DVD-R for Authoring, DVD-RAM, DVD-RW, and DVD+RW. None of the formats is fully compatible with the other although there are drives which will read, and in some cases write to more than one format.

DVD-R for General and DVD-R for Authoring are essentially DVD versions of CD-R. And DVD-RW is a DVD version of CD-RW. All three formats can be read in standard DVD-ROM drives and in most DVD video players. The difference between DVD-R for General and DVD-R for Authoring is that DVD-R for General is a format intended for widespread consumer use and doeasn't support 'professional' features such as piracy protection or duplication in mass duplicators. The Pioneer DVD-RW drive which is the most popular PC device for writing to DVD uses the DVD for General format. And as as the case with CD, DVD-RW is essentially the same as DVD-R except that it can be erased and written to again and again.

DVD-RAM is slightly different as it is a sector based disc which mounts on the desktop of a PC when inserted into a drive. Files can then be copied to it in the same way as any other mounted media. Some single-sided DVD-RAM discs can be removed from their caddy and inserted in a DVD-ROM drive which will then be able to read the content of the disc.

There are DVD video recorders which use the DVD-RAM format. This enables themn to pull off clever tricks like timeshifting - where you can watch the beginning of a programme you have recorded while you are still recording the end on the same disc.

DVD+RW is the newest format and not supported by the DVD Forum, the body which sets the standards for DVD. However, it is supported by some of the biggest electronics and computer manufacturers, and is therefore likely to stick around.

It is also the format used by Philips in its DVD video recorders. Despite not being authorised by the DVD Forum, DVD+RW is claimed by its supporterd to be compatible with more DVD video players than DVD-R and DVD+RW writers are found in PCs from quite a few manufacturers.

In early 2006, things are set to get even more complicated with the introduction of two new formats, HD-DVD and Blu-ray, but that's a whole other story...

By Kenny Hemphill


Video Encryption

What is Video Encryption?

Video Encryption is an extremely useful method for the stopping unwanted interception and viewing of any transmitted video or other information, for example from a law enforcement video surveillance being relayed back to a central viewing centre.

The scrambling is the easy part. It is the un-encryption that's hard, but there are several techniques that are available. However, the human eye is very good at, spotting distortions in pictures due to poor video decoding or poor choice of video scrambling hardware. Therefore, it is very important to choose the right hardware or else your video transmissions may be un-secure or your decoded video may not be watchable.

Some of the more popular techniques are detailed below:

Line Inversion:

Method: Whole or parts of the signal scan lines are inverted. Advantages: Simple, cheap video encryption. Disadvantages: Poor video decrypting quality, low obscurity, low security.

Sync Suppression:

Method: Hide/remove the horizontal/vertical line syncs.

Advantages: Provides a low cost solution to Encryption and provides good quality video decoding.

Disadvantages: This method is incompatible with some distribution equipment. Obscurity (i.e. how easy it is to visually decipher the image) is dependant on video content.

Line Shuffle:

Method: Each signal line is re-ordered on the screen.

Advantages: Provides a compatible video signal, a reasonable amount of obscurity, good decode quality.

Disadvantages: Requires a lot of digital storage space. There are potential issues with video stability. Less secure than the cut and rotate encryption method (see below)

Cut & Rotate:

Scrambling Method: Each scan line is cut into pieces and re-assembled in a different order.

Advantages: Provides a compatible video signal, gives an excellent amount of obscurity, as well as good decode quality and stability.

Disadvantages: Can have complex timing control and requires specialized scrambling equipment

The cut and rotate video encryption method is probably the best way of achieving reliable and good quality video encryption, an example of a good implementation of this system is in the Viewlock II

Implementing vice scrambling

The video scrambling hardware, in particular the decoder should function correctly even if there is a noisy (for example having what are commonly known as 'snow' on the screen. 'Snow' is when there are flecks on your TV screen, often seen in poor reception areas) or unstable signal. If the link to the encrypted signal should stop working then this should not be a problem. The link between the video encoder and video decoder should be regained and the decryption quickly continued.

The very nature of security camera systems is that they are often outdoors as so must be able to withstand the rigours of the weather. The video encryption hardware should be stable under or protected from the effects of rain, sunlight, extreme heat and cold. It should not be damaged if there is a power spike in the supply. In these systems the video encoder emits a wireless signal to the video decoder unit before it is viewed, it obviously must be the case that the very act of broadcasting the signal does not effect the video encoding hardware and likewise the video encoding hardware should not effect the radio transmitter.

The most important item is that the video scrambling system should be secure, else why bother? It is amazing how some encryption methods can easily be cracked. For example certain cable television stations 'encrypt' their channel broadcasts via a relatively un complex method, which can easily be decoded using a number of cheap bits of electronics from radio shack. That would obviously be illegal! The cable TV's method of encryption is very crude, they usually just dynamically alter the vertical sync signal so that your TV cannot get a proper lock on it and so it scrolls randomly.

The other extreme is to scramble the transmitted video signal too much so that it is costly both in equipment and time to the video at the receiver. Remember that this is a 'live' video scrambling broadcast followed by a 'live' video decryption display. ANY electronics can be copied, given enough money and time, but making this process as hard as possible is of benefit as it at least delays the time when illegal copies will be available.

Finally and most obviously each user must have a unique encryption key so that other users of the system cannot view the transmitted video by accident or purpose without the key owners knowledge. The total number of possible user keys must be such that it is highly unlikely for someone to guess the correct key.


Basics of RAID

A couple of the recent Tech Tips from www.geeks.com have made mention of RAID, but the level of detail required in those tips didn't shed much light on what RAID actually is. The number of e-mail responses and comments in the Readers Digress section was convincing enough that an introduction to the basics of RAID would be an appropriate Tech Tip, so here it is.

Introduction

The word RAID sounds like it might describe something Marines conduct in Fallujah, or a can of what all roaches fear, but it is simply an acronym that stands for Redundant Array of Independent (or Inexpensive) Disks. Depending on who you talk to, the letter "I" can stand for either independent or inexpensive, but in my opinion independent is more appropriate, and far less subjective.

RAID generally allows data to be written to multiple hard disk drives so that a failure of any one drive in the array does not result in the loss of any data, as well as increasing the system's fault tolerance. I say RAID generally does this, as there are several RAID configurations that provide different approaches to redundancy, but some RAID configurations are not redundant at all. Fault tolerance refers to a system's ability to continue operating when presented with a hardware (or software) failure, as should be experienced when a hard drive fails in one of the redundant configurations of RAID.

The Hardware

The basic hardware required to run RAID includes a set of matched hard drives and a RAID controller.

RAID can be run on any type of hard drive, including SCSI, SATA, and ATA. The number of hard drives required is dependent on the particular RAID configuration chosen, as described later. I mention the need for matched hard drives, and although this is not absolutely necessary, it is recommended. Most arrays will only be able to use the capacity of the smallest drive, so if a 250GB Hitachi drive is added to a RAID configuration with an 80GB Hitachi drive, that extra 170GB would probably go to waste (the only time that this doesn't apply is in a RAID configuration called JBOD (Just a Bunch Of Disks); which really "isn't a RAID configuration" but just a convenient thing that a RAID controller can do - see "Basic RAID Configurations" below for more information). In addition to matching capacities, it is highly recommended that drives match in terms of speed and transfer rate as the performance of the array would be restricted by the weakest drive used. One more area that should be considered while matching is the type of hard drive. RAID controllers are generally for either SCSI, SATA, or ATA exclusively, although some systems allow RAID arrays to be operated across controllers of different formats.

The RAID controller is where the data cables from the hard drives are connected, and conducts all of the processing of the data, like the typical drive connections found on a motherboard. RAID controllers are available as add on cards, such as this Silicon Image PCI ATA RAID controller, or integrated into motherboards, such as the SATA RAID controller found on the Asus K8V SE Deluxe (http://www.geeks.com/details.asp?invtid=K8VSE-DELUXE). Motherboards that include RAID controllers can be operated without the use of RAID, but the integration is a nice feature to have if RAID is a consideration. Even for systems without onboard RAID, the relatively low cost of add on cards makes this part of the upgrade relatively pain free.

Another piece of hardware that is not required, but may prove useful in a RAID array is a hot swappable drive bay. It allows a failed hard drive to be removed from a live system by simply unlocking the bay and sliding the drive cage out of the case. A new drive can then be slid in, locked into place, and the system won't skip a beat. This is typically seen on SCSI RAID arrays, but some IDE RAIDS cards will also allow this (such as this product manufactured by Promise Technology: http://www.promise.com/product/product_detail_eng.asp?productId=92&familyId=7).

The Software

RAID can be run on any modern operating system provided that the appropriate drivers are available from the RAID controller's manufacturer. A computer with the operating system and all of the software already installed on one drive can be easily be cloned to another single drive by using software like Norton Ghost. But it is not as easy when going to RAID, as a user who wants to have their existing system with a single bootable hard drive upgraded to RAID must start from the beginning. This implies that the operating system and all software needs to be re-installed from scratch, and all key data must be backed up to be restored on the new RAID array.

If a RAID array is desired in a system for use as storage, but not as the location for the operating system, things get much easier. The existing hard drive can remain intact, and the necessary configuration can be made to add the RAID array without starting from scratch.

Basic RAID Configurations

There are about a dozen different types of RAID that I know of, and I will describe five of the more typical configurations, and usually offered on RAID controller cards.

RAID 0 is one of the configurations that does not provide redundancy, making it arguably not a true RAID array. Using at least two disks, RAID 0 writes data to the two drives in an alternating fashion, referred to as striping. If you had 8 chunks of data, for example, chunk 1, 3, 5, and 7 would be written to the first drive, and chunk 2, 4, 6, and 8 would be written to the second drive, but all in sequential order. This process of splitting the data across drives allows for a theoretical performance boost of up to double the speed of a single hard drive, but real world results will generally not be nearly that good. Since all data is not written to each disk, the failure of any one drive in the array generally results in a complete loss of data. RAID 0 is good for people who need to access large files quickly, or just demand high performance across the board (i.e. gaming systems). The capacity of a RAID 0 array is equal to the sum of the individual drives. So, if two 160GB Seagate drives were in a RAID 0 array, the total capacity would be 320GB.

RAID 1 is one of the most basic arrays that provides redundancy. Using at least two hard drives, all data is written to both drives in a method referred to as mirroring. Each drive's contents are identical to each other, so if one drive fails, the system could continue operating on the remaining good drive, making it an ideal choice for those who value their data. There is no performance increase as in RAID 0, and in fact there may be a slight decrease compared to a single drive system as the data is processed and written to both drives. The capacity of a RAID 1 array is equal to half the capacity of the sum of individual drives. Using those same two 160GB Seagate drives from above in RAID 1 would result in a total capacity of 160GB.

RAID 0+1, as the name may imply, is a combination of RAID 0 and RAID 1. You have the best of both worlds, the performance boost of RAID 0 and the redundancy of RAID 1. A minimum of four drives is required to implement RAID 0+1, where all data is written in both a mirrored and striped fashion to the four drives. Using the 8 chunks of data from the example above, the write pattern would be something like this? Chunks 1, 3, 5, and 7 would be written to drives one and three, and chunks 2, 4, 6, and 8 would be written to drives two and four, again in a sequential manner. If one drive should fail, the system and data are still intact. The capacity of a RAID 0+1 array is equal to half the total capacity of the individual drives. So, using four of the 160 GB Seagate drives results in a total capacity of 320GB when configured in RAID 0+1.

RAID 5 may be the most powerful RAID configuration for the typical user, with three (or five) disks required. Data is striped across all drives in the array, and in addition, parity information is striped as well. This parity information is basically a check on the data being written, so even though all data is not being written to all the drives in the array, the parity information can be used to reconstruct a lost drive in case of failure. Perhaps a bit difficult to describe, so let's go back to the example of the 8 chunks of data now being written to 3 drives in a RAID 5 array. Chunks one and two would be written to drive one and two respectively, with a corresponding parity chunk being written to drive three. Chunks three and four would then be written to drives one and three respectively, with the corresponding parity chunk being written to drive two. Chunks five and six would be written to drives two and three, with the corresponding parity chunk being written to drive one. Chunks seven and eight take us back to the beginning with the data being written to drives one and two, and the parity chunk being written to drive three. It might not sound like it, but due to the parity information being written to the drive not containing that specific bits of information, there is full redundancy. The capacity of a RAID 5 array is equal to the sum of the capacities of all the drives used, minus one drive. So, using three of the 160GB Seagate drives, the total capacity is 320GB when configured in RAID 5.

JBOD is another non-redundant configuration, which does not really offer a true RAID array. JBOD stands for Just a Bunch Of Disks (or Drives), and that is basically all that it is. RAID controllers that support JBOD allow users to ignore the RAID functions available and simply attach drives as they would to a standard drive controller. No redundancy, no performance boost, just additional connections for adding more drives to a system. A smart thing that JBOD does is that it can treat the odd sized drives as if they are a single volume (thus a 10GB drive and a 30GB would be seen as a single 40GB drive), so it is good to use if you have a bunch of odd sized drives sitting around - but otherwise it is better to go with a RAID 0, 1 or 0+1 configuration to get the performance boost, redundancy or both.

Final Words

Implementing RAID may sound daunting to those unfamiliar with the concept, but with some of the more basic configurations it is not much more involved than setting up a computer to use a standard drive controller. But, the benefits of RAID over a single drive system far outweigh the extra consideration required during installation. Losing data once due to hard drive failure may be all that is required to convince anyone that RAID is right for them, but why wait until that happens.


TiVo: An Introduction for the Few Who Dont Know Yet

TiVo will change your life... for the better. Plain and simple: record shows by telling TiVo to record them (not when, what channel, how long, etc.), record all new episodes of X, record all movies w/ so-and-so in them, etc.

High Points:

Most people know the basics of the concept. Here's the low-down on the things I'm asked most...

1. You can record one thing and watch something else already recorded.

2. You can get a dual tuner TiVo, but you'll need two SEPARATE feeds to the TiVo (i.e., two lines from your satellite dish). Then you can record 2 things at once or watch one/record another. These are more expensive, but you can get a DirecTiVo w/ dual tuner cheaper and then the monthly TiVo fee is about half normal.

3. Pause live TV - if you don't realize the value of this, I can't explain it. :)

TiVo has many different versions which all some slight variations. If you want to go beyond 'average guy' level, check out this forum.

Comparison to ReplayTV:

TiVo seems to have a better interface from what I've seen and what others have said. It's easier to use. However, ReplayTV is more easily hackable - you can access it from the web and the PC easier to convert/archive shows, etc. I have a DVD recorder for this which is another post for another time.

Both can be made to do mostly the same things, but you get the idea.

My Suggestion

I recommend the DirecTiVo Hughes HDVR2 (dual tuner) w/ the Triple LNB dish (this is the oval dish w/ 4 lines from it and it's HDTV ready). It's got the satellite converter box built in so it's only one box to deal w/, the TiVo monthly fee is less and it's dual tuner.

This model isn't as hackable as some TiVo's, but it can do some and if you want to go beyond the basics than you probably haven't read this far.

.

By Bear Cahill


Expert Guide to DVD Camcorders

Thinking about a mini DVD camcorder? You're not alone, it's a rapidly growing sector of the camcorder market, with Hitachi, Sony and Panasonic all making more than one mini dvd camcorder.

These camcorders differ from regular digital video cameras in one important way - they record video onto mini DVD discs, rather than DV tape. This has a number of advantages. DVD discs are more robust than tape and won't get chewed up in the camera. Although this is thankfully a rare occurance, it scares me every time I here a strange noise coming from my camcorder, so it's with bearing in mind.

The second advantage is that DVD discs are random access, compared to tape on which everything is recorded sequentially. This means that there's no need to rewind and fast forward to find the clip you're after, just select it from the menu. Some cameras even allow you to perform basic editing functions on-camera. An additional side-benefit is that a mini DVD camcorder doesn't have tape heads to get worn or dirty as happens in regular mini DVD cameras.

And thirdly, you can easily watch your home movies by removing the DVD from the camera and playing it in practically any DVD player.

However, there are negative factors to. The most siginificant one is that video is encoded as MPEG-2 on a mini DVD camcorder, as opposed to DV format. This means that it needs specialist software to edit - you can't just use your regular video editing program (unless it specifically supports MPEG-2). And if a Mac user you're out of luck, as there are no MPEG-2 editing applications for the Mac.

Also, mini DVD camcorders tend to cost more than similarly specified mini DV cameras. And the media is also more expensive. However, if you don't intend editing your movies and don't mind the extra cost, a mini dvd camcorder does offer extraordinary convenience.

By Kenny Hemphill


Laptop Computers Instigate Classroom Revolution!

Have you noticed that laptop computers are beginning to dictate what happens in the classroom? Additionally, mobile technology is changing where learning takes place. This is especially true as laptops are entering the educational arena in ever increasing numbers.

Yet not all educators are quick to jump on the notebook bandwagon. They are waiting to see if laptop use is truly changing learning for the better. That's why schools such as Framingham State College in Boston and the Myron B. Thompson Academy in Honolulu are being scrutinized. Both schools have elected to use laptop computers as a major resource in their curriculum.

It must be noted that simply having laptop computer access does not change the learning process - the entire curriculum must change and merge technology with academics. Using a laptop is more than replacing paper and pencil with electronics. The entire relationship between the teacher and students must change. Teachers are no longer merely dispensers of knowledge but become facilitators in a learning process that takes place with additional tools for communication with students. This encourages greater student involvement, long recognized as a key to learning.

Professors actively engaged in education via technology see laptops as a way to give real life experiences to otherwise insipid theories. For instance, physics students can witness the breakdown of radioactive materials, math students can apply their knowledge of logic to projects that use spreadsheets, and english majors can evaluate peers' poetry and prose. With laptop availability in the classroom, access to additional information and knowledge is readily available.

So what do students think of the laptop trend? Well most find it invigorating. Rather than dealing with one dimensional lectures, teachers can engage the internet to show relevancy to daily life. Out of date, static texts can be set aside for breaking news stories - and so much more.

As schools show the link between laptops and learning effectiveness, the trend for laptop use will certainly grow. For those opposed to the technological revolution taking place in today's classrooms, perhaps the words of Maria Montessori should be heeded.

".....If education is always to be conceived along the same antiquated lines of a mere transmission of knowledge, there is little to be hoped from it in the bettering of man's future....."


You Can Prevent Computer Slowdowns & Issues

Most people understand preventive maintenance like changing the oil in your car will help your car run better and last longer. The same principle holds true for your PC. Based on the computer repair services we do on computers in Cincinnati, we believe 80% of computer slowdowns and problems can be prevented!

The purpose of this article is to help you understand how you can prevent computer slowdowns and other issues.

The top 10 ways you can prevent computer slowdown are?

1. Ensure antivirus software is installed, automatically checking for updates, and automatically scanning all incoming files. If there is a virus associated with a new file it will automatically be repaired or quarantined. New viruses come out daily. Because of this, the anti-virus software needs to be configured to automatically updates it's self. McAfee and Norton's are the most popular anti-virus software and what we recommend.

2. Run antispyware/antiadware software. Spyware and adware are hands down the most common cause of PC slowdowns. This software is critical if you are surfing the Internet. Spybot Search & Destroy or Ad-aware are the two most common free anti-spyware/adware packages. We recommend a more proactive packages like Spy Sweeper which proactively scans your system and cost less than $30. A combination of Spy Sweeper and Ad-aware provides very good coverage today.

3. Install a hardware firewall to keep hackers out. Hackers have automated tools that are looking for any PC connected to the Internet without a firewall. To give you an idea, at the time of this writing, my home PC was scanned 158 times in the last 24 hours. This means it was scanned an average of every 9 minutes. If you're connected to the Internet but don't have a firewall, hackers (criminals) will be in your PC. Beyond stealing your information they can install programs that can damage or slow your PC down. A hardware firewall to protect all the PCs on the local area network provides the best protection. Recommended hardware firewalls are Linksys, Netgear, and D-link. Hardware firewalls are easier to set up and maintain than software firewalls.

Software firewalls work but we don't recommend them because they are complicated to maintain and often cause other confusion and issues.

4. Microsoft Windows is constantly releasing updates for their operating system. Most of these updates are repairing security holes in their software. You want to configure your machine to automatically check for and download critical updates as they become available.

5. Delete your Internet temp files monthly. This will keep your system cleaner and allow it to run faster.

6. Defrag your hard drive quarterly. This is not the issue it was but there are still benefits to defraging your hard drive on a regular basis.

7. Read the terms and conditions before signing up for or downloading anything for free on the Internet. Free downloads like Kazaa (music), games, toolbars, and coupons often come with adware or spyware. The terms and conditions of downloads explain adware will be installed on the persons machine in exchange for the free software, music, pizza or whatever. Of course, few people read these terms and conditions.

8. Don't open e-mails from strangers. Don't open attachments from people you know if your not expecting it. Call the person and ensure they sent it. If they did not, don't open it. E-mail from strangers and unexpected attachments may contain adware or spyware waiting to install on your computer. It probably won't install if you don't open the e-mail or attachment. (Note: If you're using e-mail software with a mail "Preview Pane" like Microsoft Outlook, previewing the mail is the same as opening it. You should turn this feature off. Unselect "Preview Pane" under the "View" drop down list in Outlook.)

9. Use the Firefox web browser from www.mozilla.org. It is more secure and less vulnerable to popup ads, viruses, computer slowdowns, etc. It also has some additional tab and other options not available with other browsers.

10. We've talked about preventive maintenance but issues still happen. Hard drives fail. Computers are stolen, etc. Because of these risk, it's important to backup your data on a regular basis. The best backups are stored off site. This can be done with an Internet service or store the data to a CD and take it to another location on a regular basis.

In summary, we guarantee regular preventive maintenance will keep your computer running better. We suggest doing these things yourself or schedule a computer professional to proactively perform and ensure these preventive maintenance steps are in place and working on a monthly basis. This will prevent computer slowdowns and issues!

By John Daniell


5 Ways To Backup Your Data...

The data on your hard drive is the most critical item inside your computer, and the only item which can not be replaced. It may be an unwanted hassle and expense to replace a defective memory module, monitor, or processor, but there is no replacing data once lost.

In addition to the possibility of a simple hard drive failure, the threat of internet borne worms and viruses has become an increasing risk to data loss or corruption. Although you may not be able to provide absolute protection to your hard drive, there are various ways that you can ensure that the data on your hard drive is protected. Five methods of backing up your data are summarized below?

1. USB Flash Drives

Although I am not recommending that flash drives be used for the actual data storage, they are a convenient means of transferring data from one computer to another. Important files can be quickly loaded onto a device such as the MINIDISK-512-DGRY-CS USB 2.0 Flash Drive, and transported to another computer for safe keeping. Installation and operation is extremely simple, and other than perhaps having to install a software driver, the use of a USB flash drive is a matter of having an available USB port on your computer. Just about every computer produced over the last several years has USB ports included, with more modern systems supporting the USB 2.0 standard. USB 2.0 allows for data transfer rates of up to 480 MB/s, which is a tremendous improvement over the original USB speed limit of 12 MB/s, and allows a user to fill their drives with data in a relatively short period of time.

Although the storage capacity of flash drives has increased greatly over the last year or so, users are still limited to common sizes of 512MB and 1GB. Mass storage is obviously not an option, but even 512MB may be enough to backup your "My Documents" folder, several albums of MP3s, or other important files to be stored elsewhere.

2. CD and DVD Writers/Re-Writers

The falling prices of CD and DVD writers/re-writers have made them a staple of just about every modern computer. These devices can typically be found installed in a computer case, but external devices supporting USB 2.0 or Firewire are available for greater flexibility and ease of installation.

A combination drive, such as the NU Technology DBW-521, will provide the user a high speed CD reader/writer, as well as a DVD reader, for under $40. The extremely low price of the drive (and the blank media) makes for an inexpensive means of creating data backups, and the re-writable media increases the convenience by allowing the same disc to be erased and reused many times. The main limitation of using a CD writer for data backups is that the discs are generally limited to a capacity of 700MB per disc. Not nearly enough for a full backup, but adequate for archiving key files.

The popularity of DVD writers/re-writers has surged thanks to dropping prices, and they are pushing the stand alone CD burner towards extinction. DVD media affords the user far more storage capacity than a CD, and DVD burners can generally burn CDs as wells as DVDs. The recent availability of double layer DVD burners, such as the Sony DW-D22A-DO-N, represents a large boost in the capacity of writable DVDs, taking the previous limit of 4.7GB per disc and nearly doubling it to 8.5GB.

With proper storage, CD/DVD media can provide long term storage that can not be jeopardized by hardware failure. The data on a CD or DVD can easily be read by just about any computer, making it a good choice for archiving files that aren't excessively large.

3. External Hard Drives

As the name might imply, external hard drives are generally the same type of drive you might find inside your system, but housed in a smaller, external enclosure of its own. The enclosure will feature at least one data interface (such as Firewire, USB, or Ethernet), and the capacity is only limited by the size of hard drives presently available and the user's budget.

The Ximeta NetDisk is an example of an external hard drive that provides a user the option of connecting an additional 80GB, 120GB, or 160GB of storage to their system by using either a USB 2.0 or Ethernet connection. Installation for such a device is rather simple, and may involve the installation of some basic software, as well as making the necessary connections between the computer and the external enclosure.

The capacity of external hard drives makes them ideal for backing up large volumes of data, and many of these devices simplify the process by including software (or hardware) features to automate the backup.

For example, some Seagate External drives feature a "one-button" backup option right on the case.In addition to being a convenient method of backing up large volumes of files locally, most external hard drives are compact enough to be portable. The inclusion of a common data transfer interface, such as USB, allows an external hard drive to be connected to just about any modern computer for data transfer, or for more than one computer to share the external hard drive as a back up.

4. Additional Hard Drives

By simply adding an additional hard drive to you system, you can protect yourself from data loss by copying it from your primary drive to your secondary drive. The installation of a second hard drive isn't difficult, but does require a basic understanding of the inner working of a computer, which may scare off some users. We do offer a "how-to" section on our site for many tasks such as installing a hard drive into a computer system.

To take the installation of a second hard drive to another level of security and reliability, the hard drives may be installed in a RAID array. RAID stands for a Redundant Array of Independent (or Inexpensive) Disks, and can be configured in several manners. A thorough discussion of RAID and all of its variations would be an article all by itself, but what may be of interest to this discussion is what is known as RAID 1. A RAID 1 array requires two hard drives of equal size to be installed on a RAID controller, which will then mirror one drive to the other in real time. Many motherboards now come with RAID controllers onboard, but the addition of a PCI slot controller card, such as the Silicon Image Sil0680, is an inexpensive purchase that will add RAID to any system. With a RAID 1 array in place, if one hard drive should ever fail, the system won't miss a best by continuing to run on the remaining good drive, and alert the user that one drive may need to be replaced.

5. Online Storage

Online services, such as Xdrive, allow users to upload their files to a server for safe keeping. Although it may be convenient to have the data available wherever an internet connection is available, there are a few limitations.

The services generally charge a monthly fee relative to the amount of storage space required. At Xdrive, for example, 5GB of storage costs $9.95 per month, which can quickly add up to more than one would spend on any of the other options discussed.

Security is supposed to be very tight on these services, but no matter how secure it may seem, it is still just a password keeping prying eyes from your potentially sensitive documents.

The speed of your internet connection will also weigh heavily on the convenience of your backup, and no matter what type of connection you have; it can't compete with local data transfer rates.

Final Words

Although not a comprehensive list of options available for backing up your data, the five items listed provide some simple and relatively affordable means to ensure that your data is not lost. Data loss is an extremely frustrating and potentially costly situation, but one that can be avoided.


By Jason Kohrs


At War With The Internet

When it comes to sales of technology products over the Internet, there are now two factors that potential buyers must consider as possibly 'too good to be true'. In the past, there was only price to worry about. If the price was too low, buyer beware. But now a second factor has emerged, in the form of a new kind of company for web surfers to consider as possibly also 'too good to be true'. For if this company is 'good', then a new revolution on the web is about to occur. Because if this company is 'true', then the cleansing of the internet of corruption and lies has finally begun in earnest, with one company willing to police itself.

Enter TheHonestCompany.com, a website where its founder posts his experiences with internet fraud and his motives for fighting back against a corrupt web right on their home page. A trip to this companies 'about us' page serves to quickly establish their position as the anti-fraud internet company, numbering abusive tactics used by hoaxsters and detailing their humble beginnings from an LA area backyard garage to a B2B powerhouse that now offers almost 100,000 computer related items from a network of 23 distribution centers nationwide.

This may someday be 'made for the movies' stuff if it's true. Move over Microsoft, Apple, and HP - here's what could (hopefully) be the beginning of another rags to riches story with an 'honest' plot twist! An honest reseller bashes Internet scammers, preferring to do business the hard way - the honest way. Are we dreaming? Could this be real? Could the days when 'The Customer is King' be making a comeback in of all places, the web?

TheHonestCompany.com expects to earn a significant portion of the home and SMB computing technology markets web-based sales over the next few years.

"Top-tier technology resellers like CDW and CompUSA will not bother us as we will not impact them. They have decent reputations, loyal customers, and higher prices. It's the second-tier, priced-based 90% of their smaller competitors that we are fighting," says the founder of TheHonestCompany.com, David Johnston, "Those guys have corrupted the Internet and seriously hurt honest companies like ours. Every-time some scam web company rips off a customer, somewhere else a real person at a real company gets hurt too. By using honesty as a weapon, we intend bring the web consumer something they are starving for by making the web a better place to shop - it's a dirty job that no other company was willing to be the first to start doing."

According to David, Internet technology consumers have no idea of the great extent that fraud permeates the web. He says that if every web consumer knew what he knew about the extent of internet fraud, they'd pick one or two honest, technology web sales companies to do business with and lay low for awhile, because he says he's got some serious mud to start slinging as his company gears up for an upcoming advertising and marketing blitz. "There's a massive pack of internet companies pretending to be real when they are not. Most other legitimate web companies have been acting rather sheepish. I intend to kill wolves by exposing them as what they really are to the Internet public."

David is a man on a mission, passionate and articulate in his vision of his companies place on the web and their future. He leaves no doubt about this as he summarizes his company's identity.

"TheHonestCompany.com is transforming the web purchasing experience by providing web shoppers with a trusted, reliable source of technology products along with prices far below those of most traditionally recognized web retailers. With a staff of top-notch industry professionals at its core, offering prompt and full service to each and every customer, The Company encourages phone calls from any customer with questions or comments before, during, and after a purchase. TheHonestCompany.com does not outsource, does not spam, and does not sell or share its customer's personal information. The company operates as a safe-haven for the price conscious customer leery of unbelievable prices from no-name websites, restoring confidence in buying over the web. This is business done right." Bravo, David. Honestly, it's about time!

By Derek Kadonaga


Your Business versus Mother Nature

Business Consultants earn hundreds of thousands of dollars every year showing businesses how to improve their productivity. All business consultants in the Information Technology area agree that the biggest threat to business survival is data loss.

There are many different data backup solutions available on the Internet today. Unlike years past there are not only different providers but also many different methods of data backup. Some solutions are "on-site" based methods. These include tape drives or other magnetic storage media, DVD-R and CD-R based methods and NAS (network attached storage) methods of creating local (within the LAN) backups of critical data. These methods of data backup are definitely better than nothing, and can provide protection against user error, data corruption, and in some cases even computer theft (that is if the data backup equipment itself isn't also stolen) and many of the other pitfalls associated with digital media.

But what about protection against the most powerful of all forces, Mother Nature?

Hurricanes, tornados, earthquakes, and other natural disasters are a serious potential threat to the crucial data you have stored within your computer network. Add into the equation the collateral damage of flooding and fire that often comes along with Mother Nature's wrath and you have a recipe for some serious data loss in the unfortunate event that one of these uncommon, but critically devastating, events occur. In most cases your existing backup solution would be useless and would suffer the same peril as your original data.

The answer is simple: Have a complete, up-to-date copy of your data stored at a different location. You should back up your data using an offsite data backup service. Offsite data backups allow you to store mission critical digital files in a secure, remote location. When you store data in an offsite location you are doubling the protection of your most import data files and enabling a level of security that even the best on-premises data backup solutions can't provide.

Your data is encrypted and backed up over your existing internet connection to a secure server. You can set it up to perform backups at any frequency you wish. You can even set up the system to schedule backups while the office is empty on weekends and evenings, or when the computers are idle for a certain period of time (great for those systems that need to be accessed 24/7 and cannot afford the potential downtime that may be incurred due to backup procedures being run at the time).

Mother Nature is a concern for the integrity of your critical data. All smart businesses understand this.

Your DATA is your LIFE. Protect it!

By Harald Anderson


Power and Your PC

The power coming into a computer is the most critical component, and it may be one of the most overlooked. It is just taken for granted that it will always be there and working properly. A top of the line processor and ultra powerful video card do nothing if a system does not receive the ample, stable power it demands. Having quality components providing and regulating the power supplied to a computer is critical, and this brief overview looks at a few areas worth consideration.

Power Supplies

Computer power supplies take the high (110V or 220V) DC voltages from an electrical outlet and convert it to the various lower AC voltages required for a system to operate. The typical voltages required inside a computer are 3.3V, 5V, and 12V, where the 3.3V and 5V lines are generally used to power circuitry, and the 12V line provides power to run items such as hard drives, optical drives, and cooling fans.

Power supplies are sold in terms of their total power output, in terms of wattage. Choosing the correct power supply means not only finding one that will provide enough power for all of the components connected to the system, but also one that is the correct size physically, has enough connections for typical drives and fans, and if necessary, that also has special connections for things such as Serial ATA drives and modern video cards.

Choosing a power supply with enough power shouldn't be much of a problem, as having more power than you need is never a bad thing. Just because a power supply is rated for 400W, or perhaps 600W, does not imply that it is drawing that at any given time. It just indicates the total power available to the various lines inside the computer. For those interested in getting a good idea of their minimum power requirements, this Power Wattage Calculator is a convenient reference. In addition to checking out the total wattage of a power supply, looking for strong amperage ratings on the 3.3V, 5V, and 12V lines is also recommended, as power supplies with identical total power ratings may distribute the power to the various lines in different quantities.

Power supplies come in a few different physical sizes, but the most common are designed to fit the standard ATX and micro ATX (mATX) form factor cases. A typical ATX power supply, such as this Echo-Star 680W unit, measures 3.25" x 6" x 5.5" and features two cooling fans to not only cool the power supply, but to also help draw hot air out of the computer. A typical mATX power supply, such as this A-Power 320W unit, measures 2.5" x 5" x 4" and due to the smaller size features just one cooling fan. mATX cases are generally much smaller than ATX cases, and therefore have smaller power supplies, with generally lower power ratings, and fewer connectors.

The connectors on a power supply also deserve consideration. Most power supplies come with what looks to be an electric octopus of wires hanging off the back surface, and you need to make sure that somewhere in that tangled bundle are all of the connectors you need. The power supply should at least have as many connections as the number of drives, cooling fans, and other items found in the case. Up until recently power supplies had a fixed number of connections, and if you needed more, you needed to use splitters to distribute the power to all the components. Modular power supplies, such as the Ultra X-Connect 500W unit, are now available that eliminate that "electric octopus" all together, and allow the end user to connect just the cables they need. The flexibility of a modular power supply design not only lets you customize the connections to your needs, it also makes for a simple and tidy installation, since there are no extra wires dangling inside the case.

The selection of a high quality power supply may cost more money up front, but down the road it could wind up saving money. Many manufacturers now offer power supplies that consume less energy thanks to high quality internal components, advanced designs, and active power factor correction. These units are now able to provide the same power to the components in a computer, but due to increased efficiency, draw less power from the electrical outlet.

Surge Protectors

Surge protectors are intended to protect your electronics from a brief increase in voltage caused by such things as lightning, rolling blackouts, and heavy drawing electrical equipment. A surge protector reacts to divert the extra electricity to ground, and thus protects your expensive computer equipment from damage. A surge is any increase lasting three nanoseconds or longer, so a surge protector needs to react quickly. Most surge protectors also include a fuse (or breaker), and if the surge is too great to be handled without interruption, the fuse will blow. Although the fuse may be destroyed, it's a small loss compared to what it may have saved.

Surge protectors come in all shapes and styles. Some basic models can even be found at your local dollar store, but offer no more than a few outlets connected to a breaker. No serious protection is obtained, but many people just want more outlets, not protection.

More serious surge protectors will probably cost a bit more than a dollar, but will offer some peace of mind that your equipment is actually being protected. In addition to protecting from electrical surges, some devices include extra features such as conditioning to filter out line noise and ports to protect other lines such as cable television, telephone, and networking.

The Fellowes Smart Surge Power Strip protects up to 10 devices from surges, as well as offering line conditioning and ports to protect your phone line. A highly appealing feature of such a surge protector is that 4 of the ports are designed to accept bulky AC adaptors. For those with surge protectors that weren't designed to be this user friendly, there is still hope in the form of Power Strip Saver Cables. Basically just 7 inch long extension cords, these items can come in very handy when trying to connect multiple AC adaptors to a more traditional surge protector.

Uninterruptible Power Supplies

Many people familiar with Uninterruptible power supplies (UPS) know that they can keep a computer up and running during a total power failure, but don't know what else they do. Most UPSes will also provide protection from voltage surges and sags (when the voltage drops below normal), as well as protection from the possibility of a shift in the electricity's frequency.

UPSes come in two varieties, standby and continuous, although standby versions are far more common and less expensive. A standby UPS allows the devices connected to it to run from the normal electrical connection until a loss of power is detected, at which point it quickly (in a matter of milliseconds) switches to the battery backup of the UPS. A continuous UPS always has the devices connected to it running off of battery power, while the batteries are recharged by the normal electrical connection.

UPSes are sold in terms of their capacity, in terms of VA (voltage multiplied by amperage). This implies that devices connected to the UPS can draw a maximum of so much amperage at a specific voltage. A run time after a power failure is also generally specified for a UPS based on a full load being placed on the device.

Selecting a UPS needs to be based on the intended use? A smaller unit, such as the Fenton 600VA, would be adequate for powering a typical desktop computer, monitor, and smaller peripherals such as a printer and lighting for what they rate as 15-23 minutes at full load. If multiple systems need to be powered, or perhaps there are plans for future expansion that will add to the power demands, a larger unit such as the Tripp Lite 1500VA may be more appropriate. The first two units are intended to be set in close proximity to the devices to be powered, perhaps on the floor behind a desk, but if you are seeking to add a UPS to a server, there are also rackmount solutions such as the Opti-UPS 1100VA.

No matter the application, sizing a UPS may seem overwhelming. One manufacturer, APC, has created a handy UPS Selector Application which will take some of the guess work out of choosing the right UPS for any particular application.

Final Words

A computer system is only as strong as its weakest feature, and many times that distinction falls on the power supply and related components. By choosing a quality power supply, surge protector, and perhaps a UPS, one can make sure that they have adequately strong and stable power to keep their system running now, as well as down the road when upgrades may increase the demand on their system.

By Jason Kohrs


Laptop Computers and the PVP Effect!

Roll over lumbering desktop computers, the limber laptop is here, and it's here to stay! For a while now notebooks have outstripped their ageing desktop PC siblings, easily winning the gold medal in the computer sales olympics. We will illustrate how the PVP effect has contributed greatly to the increase in popularity of notebook computers.

(P) Portability:

Firstly it may be stating the obvious, but people buy laptops because they can take them anywhere. Office workers need no more be confined to their claustrophophic cubicles. Instead those statistic charts and data reports can be compiled on a train, in the comfort of an arm chair, or even on the beach! Portability equals flexibility, but alas this hasn't always been the case. Todays ultra portable laptop computers have a come along way since the bulky, sewing machine sized machines of the late seventies and early eighties. Indeed one of the first portable computers was built by IBM, and this machine (IBM 5100) weighed in at a hefty 50lbs! Today's corridor warriors would have trouble lugging that puppy from meeting to meeting, unless of course they subjected themselves to an intensive dose of steroids :)

(V) Value:

In the seventies the aforementioned IBM 5100 would have set you back a staggering 20,000 dollars. Today a top of the range IBM Thinkpad can be bought for around 3000 dollars. Cheaper Thinkpads can often be obtained for well under a thousand dollars, especially if you don't mind purchasing a used or refurbished model.

(P) Performance:

Many laptops today come fitted with Centrino processors which offer superb performance and improved battery life. What is Centrino I hear you ask? Well this is Intel's name for their new notebook technology that combines their Pentium M processor, 855 chipset and the Intel PRO/Wireless 2100 WiFi 802.11 network interface. Laptops fitted with these processors are usually lighter because of the smaller components used.

Couple this attractive feature with wireless networking technology and you have a powerful technological package. Wi-Fi is short for "Wireless Fidelity" and it's usage is growing quickly amongst home users, office workers, even coffee shops. If you enter Wi-Fi areas with a properly equipped notebook, you can access the Internet at broadband speeds.

By Tom Fox


An Inexpensive Solution to Securing Public Access Computers

Offering secure public Internet access is not as easy as it may seem. As the IT manager for a mid-sized public library, it's become apparent to me that creating a secure network of library workstations for use by the public is more important than ever before. System administrators have the responsibility of protecting the library's networks and systems, while ensuring quality and speedy service to all patrons. Offering public Internet access requires a dynamic security plan that is constantly under revision, taking into account the technical changes of the times. Traditionally, the software options available for help in this regard come at a significant price, often forcing libraries to spend thousands of dollars securing their computer rooms.

Sold per module or license, many of these software solutions offer a variety of features, but often fall short of actually securing the workstation. Plagued with stability issues, it's not uncommon for many of these security solutions to crash and leave an administrative-level desktop open for public use. After test-driving a seemingly endless amount of pro-active protection software packages, the PC's I administrate were still accumulating spy ware, browser hijacks, and tracking cookies on a daily basis. That is, until I came across the completely free software solution that actually does what others claim to -- tightly secure any and every Windows 2000/XP Pro workstation.

The Public Access Computer Security Tool is a complete software security system designed by, and offered freely through the Bill & Melinda Gates Foundation. Designed for any public access computer that runs Windows 2000 or Windows XP Professional, it helps keep workstations secure by restricting public access to the machine, and creating customizable profile environments to meet patron needs, without compromising the ever-important administrative access to the terminal.

So how does the Public Access Computer Security Tool work? By utilizing three separate layers of pro-active security restrictions (system restrictions, profiles, and profile restrictions), patron access is limited to a desktop completely configurable by the Administrator, and locked down at the policy level. This results in a computer environment that performs flawlessly, despite the "heavy use" factor that's become synonymous with the public access computing world.

After installing and configuring the Public Access Computer Security Tool on our library's ten public access Internet machines, the days of spy ware, instant messengers, and search bars are now behind us. I'm confident our public access terminals are now properly secure. Stability is not an issue any more; the operating system itself is reconfigured to disable access to sensitive parts of the machine. There's absolutely no way for patrons to intentionally or accidentally disrupt the functioning of the computer, as they are limited to the software we've given them access to.

Best of all, libraries on the tightest of budgets can use the Public Access Computer Security Tool for every public access terminal in the building, and not owe a single dollar. The software is completely free and requires no license/registrations. As an IT administrator, if you're shopping around for public access solutions, I suggest you check out the Public Access Computer Security Tool. Further information and links to downloading the tool at available at: http://www.pacomputing.org/PACTool/pactoolhome.aspx.

By Jim Frank


Thumb Drives - Great New Technology!

The ability to easily move data from PC to PC with minimal inconvenience is just another benefit computers have brought to the current business world.

Over the past few years, the different options to save and move data have multiplied dramatically. Usually the floppy disk (with it's 1.2 MB limitation), ZIP drives, CD-R's & CD-RW's, and even tape backups are the common ways to move data on non-networked PC's.

The latest innovation, the USB Removable Flash Memory (Thumb Drive, Key Drive, Flash Drive, USB Drive, Micro Drive) brings a whole new meaning to easy transport of data. These USB compliant devices are small enough to fit on a key ring or carry in your shirt pocket.

As a way to protect sensitive information, the security of one of these drives can't be beat. It's in your pocket!

Their size belies a huge data storage volume; the current sizes start at 16MB and go up to 4GB. The pricing on these devices is steadily falling, making the purchase of one of these handy drives almost a must have item.

Check out the accessories at your local computer store or go online to get the best deal.

For very little cost you can now conveniently move data between PC's just as easily as accessing the data on your internal hard drive.


By Mike Burstein


Setting up a Network -- Wired or Wireless?

To Wire or Not to Wire

Wireless networks are en vogue, but your installation won't be successful unless you chose the right type of network and set it up properly. Wired networks require that each computer be connected via a wire to a central location, called a switch or hub. This often involves installing cables through walls and ceilings and can present a challenge for anyone.

If the computers in your home or office are all within 500 feet of each other, a wireless network might be for you. A wireless network has no cables. It can connect computers on different floors of a building or even across the street. Aside from the obvious benefit of not having wires, wireless networks are more convenient since the setup, configuration, and reconfiguration can often be done within minutes, without extensive planning.

Wireless networks, however, are not as fast as wired networks. If you play computer games or want to view streaming video or other high-speed multimedia, a wireless network might not have enough capacity. But, if you just want to check e-mail and view web pages, a wireless network is a good choice. To install a wireless network, you need a Wireless Access Point and a wireless network card for each computer. You will need to buy a wireless network card for each desktop computer, although most newer laptops come equipped with one.

Security is not a large concern in a wired network, since someone would have to physically connect to a wired network to break in. In wireless networks, a car parked outside with a laptop could easily connect to your network if you don't have proper security in place. To prevent this from happening, encrypt your wireless network connections, or set a password to access the network, or do both.

Do It Yourself or Call a Professional? If you decide to use a wired network, consider whether you will install it yourself or hire a professional. If you have a small number of computers that are all situated very close to one another, you may be able to buy pre-assembled network cables and connect them yourself. If you need to wire multiple floors and lay wire through ceilings and walls, you need a professional installation. If you go this route, it is best to begin with a floor plan of your office or home, determine what your current needs are, and consider how the network design can be adapted to future needs. A professional installer should be familiar with EIA/TIA standards, local wiring and electrical codes, and making custom cables. Network cabling professionals are often judged by the neatness of their work, because sloppy cabling is more apt to deteriorate over time, harder to manage, and poses more of a fire risk.

Having a wireless network or a wired network is not mutually exclusive. Many small offices have a wired network in addition to one or more wireless networks, depending on their needs. Wireless networks are continuing to get faster, more secure, and less expensive. Wired networks will continue to coexist with wireless networks, often in the same homes and offices.

By Deryck Richards


The Road Ahead

We live in an area that has begun to use Green
Bins for household waste. Our regular garbage
is picked up every other week and the only
weekly garbage collection is our green plastic
bins, to be filled with leftover food products
and other organic waste.

When the program first started, I was sure
we could never change our ways, but before
long, depositing bones and leftover food in
the bin became automatic.

Why am I telling you this? Because using the
computer will also become easy for you the
more you try. Sure, the learning curve is
steeper than remembering which container
to use for which type of garbage, but the
idea is the same. Every time you perform a
function or solve a problem on your computer,
it will be easier than the time before.

This week, I read a book written by Bill Gates
in 1996 titled 'The Road Ahead'. Gates said,
"Computers frighten almost everyone
(everyone but children), before they learn to
use them. When people spend more time with
computers, they understand them better.
You can start by playing computer games or
doing other simple things. Once you start
using them, I think you'll like them."

With the Internet, we can keep in touch with
old friends and make new ones; have virtual
experiences of flying an airplane, driving a
car, even dissecting a toad. Pilots and doctors
practice their work without worrying about
accidents. Every school can have a wonderful
library thanks to the Internet.

Gates saw then how much our world would
change because of computers. Banking and
shopping online, distance learning, the ability
to telecommute and work from home - all of
these grew as software became better and
more powerful.

Gates talked about his own futuristic house.
Anyone in the house wore an electronic pin that
told the house who and where you were. When
it got dark, the pin would turn on lights nearby
and turn them off when you went away. Music
would play near you and the phone ring nearby
only if the call was for you. A home control
console activated choices of lighting, music,
and temperature. That was in 1996, so who
knows what his home is like now!

The book ended with a cartoon showing a mutt
using a computer and saying "On the Internet,
nobody know's you're a dog." How true - on
the Internet, we are all on equal ground.

When in my 40's, the university library where I worked was computerized. The thought of using those machines at my age was so intimidating that I moved to another department. I transferred back a year later, determined to learn.

To my surprise, computers were easier to use than I imagined, and so enjoyable that I went back to school full-time.

By Carol Bremner


Coping with a Serious Data Loss from your Computer Hard Drive

Data loss is an expensive reality. It's a hard fact that it happens more often then users like to admit. A recent study by the accounting firm McGladrey and Pullen estimates that one out of every 500 data centers will experience a severe computer disaster this year. As a result, almost half of those companies will go out of business. At the very least, a data loss disaster can mean lost income and missed business opportunities.

The other side of data loss is the psychological and emotional turmoil it can cause to IT managers and business owners. Despair, panic, and the knowledge that the whole organization might be at risk are involved. In a sense, that's only fair, since human error is one of the two largest contributing factors in data loss. Together with mechanical failure, it accounts for almost 75 per cent of all incidents. (Software corruption, computer viruses and physical disasters such as fire and water damage make up the rest.)

Disk drives today are typically reliable. Human beings, it turns out, are not. A Strategic Research Corp. study done in 2000 found that approximately 15 per cent of all unplanned downtime occurred due to human error. A significant proportion of that happened because users failed to implement adequate backup procedures, either having trouble with their backups, or having no backup at all.

How does it happen that skilled, high-level users put their systems - and their businesses - at such risk?

In many cases, the problem starts long before the precipitating system error is made, that is, when users place their faith in out-of-box solutions that may not, in fact, fit their organization's needs. Instead of assessing their business and technology requirements, then going to an appropriate engineered solution, even experienced IT professionals at large corporations will often simply buy what they're sold. In this case, faith in technology can be an vice instead of a virtue.

But human intervention itself can sometimes be the straw that breaks the technology's back. When the office of a Venezuelan civil engineering firm was devastated by floods, its owners sent 17 soaked, mud-coated disks from three RAID arrays to us in plastic bags. A tough enough salvage job was made even more complex by the fact that someone had frozen the drives before shipping them. As the disks thawed, yet more damage was done. (After eight weeks of painstaking directory-by-directory recovery, all the data from the remaining fifteen disks was retrieved.)

Sometimes, the underlying cause of a data loss event is simply shoddy housekeeping. The more arduous the required backup routine, the less likely it will be done on a regular basis. A state ambulance monitoring system suffered a serious disk failure, only to discover that its automated backup hadn't run for fourteen months. A tape had jammed in the drive, but no-one had noticed.

When disaster strikes, the normal human reaction is panic. Because the loss of data signifies critical consequences, even the most competent IT staff can jump to conclusions, and take inappropriate action. A blank screen at a critical time can lead to a series of naive decisions, each one compounding the preceding error. Wrong buttons get pushed, and the disaster only gets worse. Sometimes the pressure to correct the system failure speedily can result in an attempt to reconfigure an entire RAID array. IT specialists are typically not equipped to deal with crisis modes or data recovery techniques. Just as a good physician is trained to prolong life, the skilled IT specialist is trained to keep the system running. When a patient dies, the physician turns to others, such as nurses or counselors to manage the situation. When significant data loss occurs, the IT specialist turns to the data recovery professional.

Data recovery specialists are innovative problem solvers. Often, the application of basic common sense, when no-one else is in any condition to apply it, is the beginning of the journey towards data recovery. The data recovery specialist draws on a wealth of experience, married to a "never say die" attitude, and a comprehensive tool kit of problem-solving procedures. Successful recovery outcomes hinge on a combination of innovative logistics, applied problem-solving, and "technology triage," the process of stabilizing an affected system quickly, analyzing and treating its wounds, and preparing it for surgery. The triage process sets priorities, such as targeting which files are needed first or which are absolutely vital to the functioning of the business, and establishes whether files might be recovered in less structured formats (such as text-only), which may be desirable when time is crucial.

The art and science of professional data recovery can spell the difference between a business' success or its failure. Before that level of intervention is required, though, users can take steps to ensure that the probability of a data loss disaster is minimized.

Basic to any business technology plan is a regular fire-drill procedure. Back-up routines may be in place, staff may assigned to specific roles, hardware and software may be configured - but, if the user isn't completely sure that everything works the way it should, a data loss event is inevitable. Having adequate, tested, and current backups in place is critical. A hardware breakdown should not be compounded by human error - if the malfunctioning drive is critical, the task of dealing with it should go to a data recovery professional.

Just as data loss disasters are rooted in a combination of mechanical failure and human error, so, too, the data recovery solution lies in a creative marriage of the technological and the human. The underlying philosophy of successful data recovery is that technology is something to be used by human beings, not something that uses us.



By Darryl Peddle


Hardware