Category Archives: IT

8 Gadget ever been popular on his era and his fate now

inet.detik.com – Preaching the few gadgets that were once popular in his day, and now all been replaced with a single tool capable gadget pass all functions in one gadget. The following information gagdet ever popular devices:

261116_021. Ipod, digital music players like iPod used to be cool. But now the demand is getting lower and Apple even never again spawned a new version of the iPod

261116_03

2. GPS, GPS device is a stand-alone latter being abandoned. The grounds are practical and cheaper, the driver would prefer using a smartphone alone

261116_04

3. Game Console, a kind of handheld console PlayStation Vita not seheboh once again in popularity, as more sophisticated mobile devices outbreak sort of PlayStation Vita

 

261116_05

4. Smartphone small screen, 4 inch down, it seems increasingly less attractive. Users prefer a widescreen for watching video or photos with more fun.

261116_065. Telephone cables, both public phones or at home more and not sold because of the outbreak of the phone in all societies.


261116_07
6. Mobile feature phone is not equipped with a camera the more tragic fate this time, although there may still be using it as a second phone for betrainya durable.

261116_087. Voice recorder or voice recorder now maybe not so salable. The reporters, for example, simply use the phone for voice recording.

261116_09
8. The pocket camera is not so attractive as sophisticated smartphone camera.

The battery calibration

What the battery calibration?

Batteries included hardware function to save power. With the battery, devices like cell phones and laptops may have the power to perform its functions. The battery also has the capacity. The battery capacity can not be seen directly. The operating system takes a certain software, such as drivers, to read the battery level so that we can see how the remaining battery level. Ranging from 0% to 100%.

batrey_calibatrion

Need some Calibatrion

In theory, with the passage of time then the software will not be for accurately displays the percentage of battery. Perhaps the level of accuracy is reduced only slightly, but if continuously will decrease accuracy. It could be the original battery level is still 70% only read 45% on the screen. Therefore, calibration is necessary to restore the level of accuracy of the battery level readings.

How to do it?

Actually, there has never been a standard of the vendor or manufacturer of the battery to calibrate. The most common way is as follows:

Use the device until the battery is depleted and the device turns off by itself.
Charge the battery to 100%. Not to break up the filling.
After 100%, allow up to 1 hour.
finished
There may still be other versions of how to calibrate the battery, such as repeated several times such measures even have to reset the device. But whatever it is, basically there is no specific standard battery calibration way.

What effect?

The expected effect is the measurement of the battery level becomes more accurate. For example the original battery level is still 80% yes 80% legible on the display device.

Takes your network against hacker attacks

Foxnews.com – There’s a gadget in your home that you don’t give much thought to until it stops working and you discover you’re lost without it. Then you curse it, reboot it and watch it spring back to life — or not.

It’s your router, your lifeline to the internet, an essential component in your household and business. And much as your operating systems, software and apps are constantly updated to thwart security threats, your router runs 24/7 and receives its share of updates, too.

Unfortunately, router update notifications don’t hit us over the head. There is no red exclamation mark that alerts you to an issue, no message that pops up asking if you’d like to apply an update. But this mini-computer that directs traffic over networks sits vulnerable unless you take action. (By the way, router updates are called firmware because they are embedded into a piece of hardware.)

Consider what you’ve connected to your network. For starters, there are your computer, tablet, phone and television. Add the surge in internet-connected you-name-its: cameras, light bulbs, refrigerators … even a Wi-Fi-ready slow cooker.

Your family uses the network, and your guests do, too. (Speaking of security, not too many people know you can share your Wi-Fi without giving guests your password.

Hackers are continually looking for targets, and all they need to get to the personal files and devices on your network are your router’s IP address and your administrative password. A simple Google search is all it takes to find both for just about any router make and model.

Once hackers have this information from a router that hasn’t been updated, they can steal your files, peek through your webcam or worse. They can start sniffing data that’s passing to and from your router. They can record all your online activity, including usernames and passwords. They can even reroute your traffic to fake websites.

Routers can also be taken over to perform illegal activities, such as denial of service attacks or piracy. The scary part is you might not even know your router is compromised and being used for nefarious deeds.

If you’re not regularly updating your router with new firmware, you’re ripe for attack. Fortunately, updating isn’t hard. The procedure depends on your router, but you typically access an administrator page by simply typing the default IP address of your router in a browser’s address bar.

Common IP addresses for popular routers are 192.168.1.1 for Linksys and D-Link, 192.168.0.1 for Netgear, and 192.168.2.1 for Belkin.  Should none of these addresses work for you, there’s a free app called Fing that can help.

Fing is a network tool that belongs in your tech arsenal, even if you know your router’s IP address. Through it, you not only can learn your router’s IP address, but you can see all devices connected to your network, check your internet connectivity, monitor the network and detect intruders.

Once you’re on the router’s administrator page in a browser, you will have to enter a username and password to log in. Remember when I said that passwords were readily available online?

Once logged in, find an area called “Advanced” or “Management” to check for firmware updates. Usually, you will have the option to check, review, download and install your router’s new firmware on the same page.

But network security is more than firmware updates. In this Komando Flash Tip video, you can see the steps necessary to secure your network in less than 60 seconds

Router firmware updates require a restart, so make sure you do not have ongoing activities that require a network connection when you apply them. Make an appointment now in your calendar. You should check for router firmware updates at least once every three months.

Fortunately, some newer routers don’t require human intervention for updates. The updates are applied automatically, helping to keep our files and digital lives safe from harm.

Projectors are needed in many areas of business

The need for a projector for business purposes is not in doubt. White board, is still needed. But if we show the report or display data layout details, then needed a medium that can transform the look of a computer monitor or notebook display board visible to many people, so it takes the projector. Very helpful in the delivery of information in forums or meetings.

Not only for the sake of deploying only the projector is used. As in the world of entertainment, now many are used. Showing ads, for watching movies and much more using entertainment media projector display.
The form of a thin and lightweight projector is now more sought after, because with light and thin makes it easy to carry mobile. Powered by a long lasting battery capability, which allows it to be used in the location that is not covered with electrical switches. Compare with the old model projectors that looks big and heavy, and requires a great power, so it becomes a burden to carry a mobile and easily damaged.

Many models and types of projectors, that are popular right now is short throw projectors. Has many advantages, which are able to display large images even though they remained within the narrow room, and without you having to worry about image ghosting. And the light that issued the projector will not be blinding for the presenter.
Models such as this projector is now sought, by having excess ratio throw the picture is very short, so the distance between the projector and the screen longer or short no effect anymore, and facilitate the auto focus of the projector to the screen. The shortcomings of this model projector is limited flexibility and zoom features that do not exist. So the position of the projector placement during installation to be precise.

Whether it’s active and passive speakers?

Basically the active and passive speakers that have a similarity in function is the same – the same sound. However, the sound emitted by the speakers have different qualities. In this article we will discuss, whether the description of the active speaker and the passive speaker?

Many say the general characteristics of the active speaker is more compact appearance, speakers and power into one. In contrast to the passive power speakers and separate speaker so that the way the installation is also in need of calculations, because if the power strength and power of the speaker is out of sync, then sound may not come out or the sound emitted is not pleasant to hear (Noice). Active speakers price is also different depending on the features and quality provided.

While the general characteristics of passive speaker is the speaker not seen the appearance of compact, it still requires additional equipment and installation requires the proper setting to produce a sound that is pleasing to the ear.

The advantages of active speakers approximately as follows:
1. look more compact, speakers and power has become one
2. No need for power and speaker settings, because it was the setting of the factory
3. Due to the strength of power and speakers are measured by the manufacturer, so it is rarely damaged or overload

Disadvantages active speakers more or less as follows:
1. Since the speaker settings and power together, in case of malfunction of one of them, then the speaker can not be used
2. Prone damaged if exposed to water and sunlight
3. Difficult to at expand

Excess passive speakers is as follows:
1. Setting the speakers only need one cable
2. Do not vulnerable if exposed to water, or hot sun for power and speaker cables can be arranged to be placed in a secure location (On and Off panels is on operator room)
3. Easy to expand
4. If either the power or the speaker is damaged, it can still be used, or look for a replacement

Passive Speaker shortcomings are as follows:
1. Carefully calculate the forces of power and the power of the speaker, if not happen: the sound does not come out, broken voice, could even damage the power or speakers.
2. Requires a lot of equipment or not concise.

How to become a computer network technician

The needs of small and medium-scale industry began to large enterprises on a network computer experts who have international certificates are great. This is in line with the adoption of information technology are also increasingly widespread. There have been many small and medium companies, for example, in company furniture makers market their products throughout the world via the Internet.
These networking experts who require not only a large company, until the company was too big even begin to utilize it. for example, he wants to sell the furniture. If we try to check on Google a lot of that goes on the Internet, they have their own websites.
To become an expert on computer networks are many things that must be known. As:

  1. Mastering basic LAN network. This helps you understand the basic culture of peer to peer networks to a client server.
  2. Topology and networking scheme. Know network construction in the form of pictures and graphics. Network scheme helps us to map the computer network. To facilitate the development of the network in the future.
  3. Know the kinds and types of network devices. Many of the devices that we have to know and understand its characteristics such as: NIC, Lan-Card, Wifi-card, Router, Access Point, HUB / Switch, and others.
  4. Mechanical cabling or crimping. The way how to connect the cable socket and connect between devices in the network computer properly.
  5. Understand service network tools and techniques between the network protocol setting up a network can access the Internet. Even with understanding this concept, though network can be connected to the internet media.
  6. The use of computer networks to support the activities and support the work of human.
  7. Implementation of computer networks for personal, office, education, and others.

Once you master everything about the science of computer networks, it is worth nothing to do test your skill ability. Try to follow the online exam on computer networks such as Network+ practice test if you graduate with good grades then you can say a computer network technician with good competence.

IT Outsourcing: The Reasons, Risks and Rewards

As the owner of a small company, you have probably entertained the thought of outsourcing some aspect of your business. The benefits of outsourcing seem obvious, touted by experts across numerous industries as the answer to cutting costs for business functions ranging from information technology to accounting, marketing and human resources; it seems possible that you could run an entire company without ever hiring a single employee.

But is there more to outsourcing than the bottom line? What are the other reasons companies choose this route? What about ramifications for aspects of your business that are not so easily quantified?

In this article, we’ll discuss the 3 R’s of outsourcing: Reasons, Risks and Rewards, specifically as they relate to information technology (IT). And, as a bonus, we’ll provide some tips to help you manage successful relationships with your IT service providers (whether they are full-time staff, or outsourced).

The Reasons

According to the Outsourcing Institute’s Outsourcing Index 2000, there are many reasons why companies outsource. Here are some of the top reasons:

  1. Reduce and control operating costs. When you outsource, you eliminate the costs associated with hiring an employee, such as management oversight, training, health insurance, employment taxes, retirement plans etc.
  2. Improve company focus. It is neither practical, nor possible to be a jack of all trades. Outsourcing lets you focus on your core competencies while another company focuses on theirs.
  3. Gain access to exceptional capabilities. Your return on investment is so much greater when you outsource information technology to a firm that specializes in the areas you need. Instead of just the knowledge of one person, you benefit from the collective experience of a team of IT professionals. Outsourced IT companies usually require their IT staff to have proper industry training and certifications as well.
  4. Free internal resources for other purposes. You may have someone in your office that is pretty good with computers or accounting, but most likely these were not the jobs he or she was hired to do. If they are spending time taking care of these things, who is doing what they were hired to do? Outsourcing allows you to retain employees for their highest and best use, rather than wasting their time on things that may take them longer than someone who is trained in these specific areas.
  5. Resources are not available internally. On the flip side, maybe you don’t have anyone in your company who can manage your IT needs, and hiring a new employee is not in the budget. Outsourcing can be a feasible alternative, both for the interim and for the long-term.
  6. Maximize restructuring benefits. When you are restructuring your company to improve costs, quality, service, or speed, your non-core business functions may get pushed aside. They still need to be handled, however, and outsourcing is an optimal way to do this. Don’t sabotage your restructuring efforts by failing to keep up with non-core needs.
  7. Function difficult to manage or out of control. This is definitely a scenario when outsourcing to experts can make a big difference. But don’t make the mistake of thinking you can forget about the problem now that it’s being “handled.” You still need to be involved even after control is regained.
  8. Make capital funds available. By outsourcing non-core business functions, you can spend your capital funds on items that are directly related to your product or your customers.
  9. Reduce Risk. Keeping up with technology required to run your business is expensive and time consuming. Because professional outsourced IT providers work with multiple clients and need to keep up on industry best practices, they typically know what is right and what is not. This kind of knowledge and experience dramatically reduces your risk of implementing a costly wrong decision.

The Risks

Anytime you give someone else responsibility for an aspect of your business, whether a full-time new hire or an outside vendor, there is risk involved. Did I hire the right person/company to do the job? Will they do what they are supposed to do? How will they “fit” with existing employees or departments? These are the questions that nag owners of small businesses when handing over the reigns to a new employee or vendor.

According to Yvonne Lederer Anotucci in her article “The Pros and Cons of IT Outsourcing,” business owners who consider outsourcing IT functions need to be aware of the following risks:

  1. Some IT functions are not easily outsourced. IT affects an entire organization; from the simple tasks employees do everyday to the complex automated aspects. Be sure the outside vendor are qualified to take care of your greatest needs.
  2. Control may be lost. Critics argue that an outside vendor will never be as effective as a full-time employee who is under the same management as other employees. Other concerns include confidentiality of data and disaster recovery. However, a supervisor that is knowledgeable in managing an IT staff member will usually be required.
  3. Employee morale may be affected. This is particularly true if you will be laying off employees to replace their job functions with an outsourced firm. Other employees may wonder if their job is at risk, too.
  4. You may get “locked in.” If the vendor does not document their work on your network and system, or if you’ve had to purchase their proprietary software, you may feel like you can’t go anywhere else or take back your network. Many outsourced companies require you to sign a year to year contract which limits flexibility.

Most of these risks can be avoided altogether if you know what to look for in a vendor and ask the right questions. Wondering how your current or prospective IT service provider stacks up? Take Corporate Computer Service’s Support Provider Ranking Quiz at: www.corpcomputerservices.com/computer-support-quiz.php. These questions will get you thinking about what to ask and what to look for, whether you want to hire a full-time IT professional on staff, or outsource to a support provider.

The Rewards

Still not sure whether to outsource or not? According to Anotucci, who provided the list of risks outlined above, there are many rewards you can expect when you outsource your company’s IT functions as well:

  1. Access to the latest and greatest in technology. You may have noticed how rapidly software and hardware becomes obsolete in this industry. How is one staff person going to keep up-to-date with everything? Outsourcing gives you the benefit of having more than just one IT professional. And since it’s the core competency of the company, they can give you sound advice to put your IT dollars to work for you.
  2. Cost savings. Outsourcing your IT services provides financial benefits such as leaner overhead, bulk purchasing and leasing options for hardware and software, and software licenses, as well as potential compliance with government regulations.
  3. High quality of staff. Since it’s their core competency, outsourced IT vendors look to hire staff with specific qualifications and certifications. You may not know what to look for if you’re hiring someone to be on staff full-time, so you may hire the wrong person for the job.
  4. Flexibility. Vendors have multiple resources available to them, while internal staff may have limited resources and capabilities.
  5. Job security and burnout reduction for regular employees. Using an outsourced IT company removes the burden from your staff who has taken on more than he or she was hired for because “someone needs to do it.” You will establish a better relationship with your employees when you let them do what they do best and what they were hired to do.

Conclusion:

Now that you have seen the risks and rewards associated with outsourcing the IT function of your business, there is a lot to think about. Whether you choose to outsource or hire internally, one thing is certain, you must know how to manage successful working relationships with your IT service providers. Let’s face it, they’re not always the easiest people in the world to understand and deal with, right? Here are some tips:

  • Clearly form and communicate the goals and objectives of your project or business relationship.
  • Have a strategic vision and plan for your project or relationship.
  • Select the right vendor or new hire through research and references.
  • Insist on a contract or plan that includes all the expectations of the relationship, especially the financial aspect.
  • Keep open communication with all affected individuals/groups.
  • Rally support and involvement from decision makers involved.

Source : http://www.corpcomputerservices.com