Wednesday, 21 December 2011

New iPad Mini will release in March 2012



There are some latest news on the release date of iPad mini. Forbes reports that iPad Mini will probably release in March 2012. 

The possible delay in iPad mini is because Apple is trying to fix all loop holes before delivering the best product for its customers. 

Apple is currently working on the retina display foriPad 3 and want to give their customer the tablet with great resolution – for both of their products iPad Mini and iPad 3, but definitely iPad mini is going to make this easier before the final launch of iPad 3.

latest New 3D Transistors now in IT World Coming Soon In 2012



Researchers from Purdue and Harvard universities have created a new type of transistor made from a material that could replace silicon and have a 3-D structure instead of conventional flat computer chips. These new 3d transistors promising future chips, lighter laptops.
The approach could enable engineers to build faster, more compact and efficient integrated circuits and lighter laptops that generate less heat than today’s. The transistors contain tiny nanowires made not of silicon, like conventional transistors, but from a material called indium-gallium-arsenide.
The device was created using a so-called “top-down” method, which is akin to industrial processes to precisely etch and position components in transistors. Because the approach is compatible with conventional manufacturing processes, it is promising for adoption by industry, said Peide “Peter” Ye, a professor of electrical and computer engineering at Purdue.
A new generation of silicon computer chips, due to debut in 2012, will contain transistors having a vertical structure instead of a conventional flat design. However, because silicon has a limited “electron mobility” — how fast electrons flow — other materials will likely be needed soon to continue advancing transistors with this 3-D approach, Ye said.
Indium-gallium-arsenide is among several promising semiconductors being studied to replace silicon. Such semiconductors are called III-V materials because they combine elements from the third and fifth groups of the periodic table.

New Technology "Cool iPad Case with Portable Speakers"



If you want a cool iPad case along with portable speaker system, then iMainGo XP can be a great buy. iMainGo XP case not only covers your precious iPad but also gives you stereo sound with 4-speaker system.

Securely fit your iPad with iMainGo XP case to ensure protection. The iMainGo XP case is great for music lovers. iMainGo XP comes with a wall charger, foldable stand, and two 3.5 mm jacks.

New Nokia X2-02 with Specifications



Nokia X2-02 Features:
Nokia has announced the Nokia X2-02 mobile phone this month. It is a dual SIM mobile phone that comes with a 2.2 inch QVGA TFT display with a resolution of 240 x 320 pixels, a built in FM radio and an MP3 player.









Nokia X2-02 Specifications:
  •    General 2G Network GSM 900 / 1800 – SIM 1 & SIM 2
  •    Announced 2011, December
  •    Status Coming soon
  •    Size Dimensions 113 x 50 x 15 mm, 125.5 cc
  •    Weight 71 g
  •    Display Type TFT
  •    Size 240 x 320 pixels, 2.2 inches (~182 ppi pixel density)
  •    Sound Alert types Vibration, MP3 ringtones
  •    Loudspeaker Yes
  •    3.5mm jack Yes
  •    Memory Phonebook Yes, Photocall
  •    Call records Yes
  •    Card slot microSD, up to 32GB
  •    Data GPRS Class 12 (4+1/3+2/2+3/1+4 slots), 32 – 48 kbps
  •    EDGE Class 12
  •    3G No
  •    WLAN No
  •    Bluetooth Yes, v2.1 with A2DP
  •    USB Yes, v2.0 microUSB
  •    Camera Primary 2 MP, 1600×1200 pixels
  •    Video Yes
  •    Secondary No
  •    Features Messaging SMS, MMS, Email, IM
  •    Browser WAP 2.0/xHTML
  •    Radio Stereo FM radio with RDS; built-in antenna, FM 
  •    Games Yes
  •    Colors Bright Red, Dark Silver, Orange, Violet, Ocean Blue
  •    GPS No
  •    Java Yes, MIDP 2.1
  •    Dual SIM
  •    SNS applications
  •    MP4/H.263 player
  •    MP3/AAC+ player
  •    Organizer
  •    Voice memo
  •    Predictive text input
  •    Battery Standard battery, Li-Ion 1020mAh (BL-5C)
  •    Stand-by Up to 443 h
  •    Talk time Up to 9 h 50 min







Wednesday, 30 November 2011

What is DTE & DCE and its Definition?


Definition: DTE & DCE

DTE

DTE is acronym for Data Terminal Equipment.
Examples of DTE is computers, printers & terminals.

DCE

DCE is acronym for Data Communication Equipment.
Examples of DCE is modems.

Wiring

Wiring a cable for DTE to DCE communication is easy. All wires goes straight from pin x to pin x.
But wiring a cable for DTE to DTE (null modem) or DCE to DCE requires that some wires are crossed. A signal should be wire from pin x to the opposite signal at the other end. With opposite signals I mean for example Transmit & Send.
Contributor
Source: ?
Please send any comments to
DCE equipment is typically a modem or other type of communication device. The DCE sits between the DTE (data terminal equipment) and a transmission circuit such as a phone line. Originally, the DTE was a dumb terminal or printer, but today it is a computer, or a bridge or router that interconnects local area networks. In an IBM mainframe environment, a communication controller and a link-attached cluster controller are examples of DTEs.
A DCE provides a connection for the DTE into a communication network and back again. In addition, it terminates and provides clocking for a circuit. When analog telephone lines are the communication media, the DCE is a modem. When the lines are digital, the DCE is a CSU/DSU (channel service unit/data service unit).
DTE and DCE interfaces are defined by the physical layer in the OSI (Open Systems Interconnection) model. The most common standards for DTE/DCE devices are EIA (Electronic Industries Association) RS-232-C and RS-232-D. Outside the United States, these standards are the same as the V.24 standard of the CCITT (Consultative Committee for International Telegraphy and Telephony). Other DTE/DCE standards include the EIA RS-366-A, as well as the CCITT X.20, X.21, and V.35 standards. The later standards are used for high-speed communication over telephone lines.
DTE and DCE devices send and receive data on separate wires that terminate at a 25-pin connector. It is useful to know that DTE devices transmit on pin connector 2 and receive on pin 3. DCE devices are just the opposite-pin 3 transmits and pin 2 receives.

Computer Hardware Tutorials


Computer Hardware Tutorials

PC Computer Notes  has been designed as a free introductory level, online computer training course, providing tutorials on computer hardware, software, operating systems, and basic troubleshooting.

If you just want to learn more about your computer's hardware, software and the overall system, here's a good place to start! Read the tutorials, then try the exercises provided. If you have trouble with the review questions, go over the tutorials again. You'll be surprised at how much you learn!

The computer hardware tutorials, labs and review questions may also be helpful for those preparing for Comp TIA A+ A plus Certification exams If you're looking for study material for your Comp TIA A+ A plus computer technicians exam, PC Computer notes' tutorials can be used as a source for pre-exam study.

Although the review questions may not be exactly what's on the test, they are designed to cover the information provided in the tutorials and emulate the type of questions that you'll find on the A plus exam. I do still have companies offering software for evaluation. I also have some interest from former subscribers that are interested in writing articles. So, I may make an attempt to get the News Letter back up, with perhaps a different format, if there is enough interest. Check back this summer! New subscriptions will not be accepted before that. Until then, a few of the old are still available.

My Computer
Aside from a little information on binary and hexadecimal numbers, this section deals mainly with the parts of your computer you can see at your desk.

Starting with the computer case, we'll discuss it's role concerning the actual expandability, protection, and lifetime of your system. We'll go on to include the different types, sizes, and form factors available and what you need to know before you purchase.

Next, you'll learn about some of the peripherals such as monitors, keyboards and the mouse. Different kinds, how they work, care and maintenance and possibly some simple troubleshooting methods are covered.
Before learning a little about binary and hexadecimal numbering systems, we'll look at the different ports and connectors on the back of your computer. What's a DB-9 connector? What's a Parallel Port connector? What's it used for? It's not that difficult! It just seems a little intimidating at first. Just click on the link below to start your tutorial.

Inside the computer case

Some people get a little excited when they look inside a computer and see all the different electrical components and circuit boards. All the wires, connectors and data cables inside tend to be a little intimidating. Yet, all of today's computer repairs, replacements, upgrades and installations are getting easier and easier.

A technician could spend hours (at outrageous prices) to search for a specific chip or failed solder connection that's causing a particular problem. Repairs aren't done at the chip level anymore. Everything is very modular. It's quicker, easier, and much more economical to have the technician pop in a whole new video card or motherboard.

It's still important to know some of the different components and what they do. It can give you an insight as to which particular module may need replacement, and aids in the troubleshooting process.

It may only take 5 minutes to replace a particular FRU (Field Replaceable Unit), but it might require a lot more time to troubleshoot the problem and discover which module needs replacement.

Even if you don't plan on becoming A+ (A Plus) Certified, if you've come this far you must have an interest in computers. This is a great place to learn about what's inside that case.

Start this section with ESD (Electrostatic Discharge) precautions and work your way through in order. Once you understand ESD and the precautions you should take, go ahead and open the case. See if you can find the different components, connectors, and devices discussed. When you do, try and discover everything you can about it. What kind of chip is it? What does it do? What kind of socket does it fit into? How much data can it move at once? How fast is it?

If you have room on your desk, you can run your computer with the cover off * so you can look inside as you read (keep your hands out).

*Note: Only run your system with the cover off for a short period of time. Contrary to popular belief, leaving the cover off can interrupt the airflow, actually contributing to overheating in some cases. For short periods of time it should be OK. In fact, its often necessary when troubleshooting hardware. Its also a good time to make sure the CPU fan is working properly!

By the time you're done, you'll be removing and reinstalling some of the devices inside.
Look around for an old 286 or 386 computer. They can be picked up for less than 50 dollars, in working condition. Whether it's working, or not, you can learn an awful lot by taking it apart and putting it back together

Operating System
The Operating System (OS) is an integral part of your computer. It acts as an interpreter between the different application software programs and your computer. The OS can understand the data, information and commands used by different programs because those programs are written or coded specifically for that Operating System's interface, using it's standard rules, commands and protocols. It then translates the many commands and information into procedures the computer can understand. Computers are not of much use without an operating system.

Just a quick note on Operating Systems. As I said before, your computer will not work without one. The accepted practice in most stores is to sell computers with operating systems.

Recently, I was buying a computer for a customer and one particular store had prices considerably lower than others. Of course, there were the usual price cutting features, smaller hard drive, cheaper video card, less RAM, etc..., but it would serve the purpose. They offered the choice of Windows98 or 2000, which was really nice of them... considering the fact that you had to buy it off the shelf!

If you wanted an Operating System with your computer, it was going to cost you extra!
Make sure of what you're getting

Tips & Tricks
Tips & Tricks can often be an interesting, fun and fast way of learning a particular software. As far as understanding the computer and its operating system, everybody is at a different level. And everyone is always learning. There's so many different ways of performing the same function in a single operating system that its impossible to know them all. The OS has become so huge and intricate that even a person considered an expert couldn't possibly be aware of all the capabilities of today's Operating Systems (let alone the thousands of applications out there).

Many of the Tips & Tricks presented on this Site may be fairly basic, but as I said before, everyone is at a different level. Other tips may not be so common. I'll continue to add them when I have time or as they come up.

The Tips & Tricks found on this site are gathered from experience, magazine articles, e-zincs, other websites and reader submission. If you have a favorite that you'd like to share with other readers, please send it to us.



Network Services
In this lecture we study computer networks.
We use a top-down approach, starting with applications. We present an overall picture, which will enable you to understand the layered model of networking  software. Then in the following chapters, we will study the various components  (called “layers”), one by one.

What are computer networks used for ?
Computer networks allow people and machines to communicate, using a number of services. The slide shows a small subset of services.

Network Infrastructure
A computer network is made of two distinct subsets of components- distributed applications are programs running on interconnected computers; a web server, a remote login server, an e-mail exchanger are examples. This is the visible part of what people call “the Internet”. In this lecture we will study the simplest aspects of distributed applications. More sophisticated aspects are the object of lectures called “Distributed Systems” and
“Information Systems” the network infrastructure is the collection of systems which are required for the interconnection of computers running the distributed applications. It is the main focus of this lecture.

The network infrastructure problem has itself two aspects distance: interconnect remote systems that are too far apart for a direct cable connection meshing: interconnect systems together; even in the case of systems close to each other, it is not possible in non-trivial cases to put cables from all systems to all systems (combinatorial explosion, cable salad management problems etc.).The distance problem is solved by using a network, such as the telephone network with modems (see later). The meshing problem was originally solved easily because the terminals were not able to communicate with each other, but always has to go through a main computer. The mesh in such cases is reduced to a star network. Today this is solved by a complex set of bridges and routers.

(Physical Layer & Data Link Layer)
The objective of this and the following slides is to introduce the concept of layers. Like any complex computer system, a network is made of components.  This decomposition is, to a large extent, stable: computer networking people  have agreed on a reasonable way to divide the set of functions into what is called “layers”.

We use the term layer because the decomposition always assumes that different components can be ordered such that one component interfaces only with two adjacent components. We call “layers” the components. We start with the simplest, and the oldest network example: it is a mainframe connected to terminals. In this case, there are mainly two functions

• physical layer: translates bits into electromagnetic waves;
• data link layer: translates frames into bits.

These two functions are implemented on cables or on radio links. The physical layer has to do with signal processing and coding; it is the object of the  lecture called “Telecommunications”. The data link layer has to do with bits and bytes; we will study the data link layer in this lecture.

What is a Network
Modern networks have more than the physical and the data link layers. The  network layer is a set of mechanisms that can be used to send packets from one computer to another in the world. There are two types of networks: With packet switching, data packets can be carried together on the same link. They are differentiated by addressing information. Packet switching is the basis for all data networks today, including the Internet, public data networks such as Frame Relay or X.25, and even ATM. Packet switches have  queues. Circuit switching is the way telephone networks operate. A circuit emulates the physical signals of a direct end-to-end cable. When computers are connected by a circuit switched network, they establish a direct data link over the circuit. This is used today for modem access to a data network. Modern circuit switches are based on byte multiplexing and are thus similar to packet switches, with the main difference that they perform non-statistical multiplexing.
A network has intermediate systems (ISs): those are systems that send data to next ISs or to the destination. Using interconnected ISs saves cable and bandwidth. Intermediate systems are known under various terms depending on the context: routers (TCP/IP, AppleTalk,…), switches (X.25, Frame Relay, ATM, telephone), communication controllers (SNA), network nodes (APPN)


Rommon recovery for cisco 3620 router?



Best Answer - In 10 Steps

I'm assuming that you're looking for password recovery instructions. On just about every modern Cisco router, the process goes something like:

1. Reboot router.
2. When ROMMON is loading, send break signal on console port.
3. confreg 0x2142
4. reset
5. enable, copy start run
6. ***interfaces will be shut down!! make sure you 'no shut' them***
7. conf t, change enable secret, line con/vty/aux passwords, usernames, etc.
8. config-register 0x2102
9. ^Z, write / copy run start
10. reload, and make sure it's happy

How to setup the VEONIC CCTV Network DVR online remote viewing



How to setup Modem Router  ?

1) After streamyx is on

2) install modem DLINK DSL-504T router c/w dynamic DNS

3) Standard Router modem ip address : 192.168.1.1

4) username : admin / password : admin

5) WAN : Account name : veonic1@streamyx.com  Password : tm2006

            Connection Type : PPPoe LLC

6) make sure router is online

7) Port forwarding : to the cctv computer ip address ( 192.168.1.5)

8) Customized Rules for port forwarding.

8) DMZ  : 192.168.1.5








VPON NETWORK DVR SETUP :

1         Connecting to the network

Connect an Ethernet-capable computer to the DVR LAN port using an RJ-45 crossed UTP cable or connect both of the PC and DVR to a same hub :          

1.           The default IP address for the DVR is 192.168.10.10. Set your PC IP address to 192.168.10.xxx (where xxx is a value between 0 ~ 254). Set the subnet mask to 255.255.255.0.

2.           Reboot the PC.

3.           Use IE Web browser version 6.0 SP2 up to access http://192.168.10.10. The login dialog box will appear. If you have previously changed the administration login or password, enter the login name and password you previously set. Otherwise, enter the default login name “webmonitor” and the password “oyo” then click OK.

4.           For first time accessing DVR , you will be prompted to install Live Video ActiveX. Download and run the file to install ActiveX. Then restart IE browser, you will be able to see the videos. If you choose not to install Active X, you can view videos from the DVR by clicking on the View Video without Plugins link at the bottom of the page. At the prompt, enter the same administrator login name and password as before. This uses a Java applet to display the video.

Friday, 28 October 2011

In The IT World " The Necessity and Applications of Cloud Computing"


The Necessity and Applications of Cloud Computing
Cloud computing owes its success to two very important factors, viz. money and convenience. The network makes it very easy to store, access and even edit every bit of your data. You won’t need to install anything on your device and best of all; every program you use will be automatically updated. You are also free from having to go through any protocol when accessing your data. This is one of the biggest reasons for the popularity of cloud computing among individual and corporate users alike. The amount of money saved with cloud computing is enormous. You only pay the service provider for the storage and access to your data, thus saving money that goes into maintaining your own storage, backup and power bills. Cloud computing also helps corporates cut down on their carbon footprint while giving them high speed access to their data at affordable prices.
Cloud computing has several applications. You must have heard of private cloud computing, which is nothing but a cloud computing network that can be accessed by only a private group of computers. Amazon and Google have both set-ups their own cloud computing services for use by individuals. Cloud computing is finding resonance with more and more users as the network can be used to share not just information but also many services.

Advantages And Disadvantages of Cloud Computing


Advantages of Cloud Computing

·     Cost Reduction: A cloud does away with the need for each user to put money in softwares or stand-alone servers that need a large start-up capital but are usually inadequately-utilized most of the time. With fast-paced technological innovations the norm today, these resources become outdated soon and need to be replaced for the best working efficiency. Cloud computing dispenses with the need for such repeated investments.
·     Speed and Scalability: Companies no longer need to invest time and money in buying and installing the hardware, software and other applications necessary for the operation. Instead, they can simply scale-up or scale-down their usage of the network’s services as per their needs.
·     Innovation: With the burden of managing resources off their backs, companies can concentrate on innovations that will make them more competitive. This helps in faster development, evaluation and final validation of their products and services.
·   Location Freedom: Providers of the service can build their infrastructure in places with lower overhead costs and pass on the savings to their customers.
·   Convenience: The only thing needed by a company to use this service is high-speed internet connectivity. The need for specialised equipment or personnel is completely eliminated. Billing is on actual consumption basis only while it’s also itemised to help the customer check costs.
·        Flexibility: Users can withdraw their subscription at their will which gives a fair degree of operational flexibility. The services are provided under level agreements which ensure that the service provider is penalised for any lapse in service. The cloud network can also be accessed from any device with internet connectivity.



Disadvantages of Cloud Computing

·    Dependence on Network Connectivity: This is the most glaring disadvantage as access to the network can be completely frozen if network connectivity is hampered. A slow network will also bottleneck the work output of cloud users.
·     Legal Ownership of Information: Every service provider will have its own terms and conditions regarding the data stored on its server farms. Proper reading and understanding of the fine print is necessary as this often contains information on issues like data theft, server and backup failure, distribution rights and rules which if breached might prevent data access to a user.
·        Cost: Cloud computing is financially quite viable in the long term. However, its cost is nowhere near cheap or affordable if you are setting it up on a smaller scale. There’s still a long way to go before cloud computing becomes a good and affordable solution for small-scale users.


Latest New Technology 2011 "Motorola’s Xoom"



One of these being Motorola Mobility’s XOOM, which is the first tablet to operate on Google’s hotly anticipated Android 3.0 Honeycomb system. Released in February of this year the tablet boasts a two mega pixel front-facing camera for video chatting over the internet, as well as a back facing five mega pixel camera. It also has a 10.1 inch HD display screen, meaning you can enjoy watching HD movies and programs on this thin, light, and very sleek looking tablet. The main advantage the Motorola XOOM has over its competitors is that it offers a much higher resolution and larger display then most.
Of course tablets cannot be mentioned without speaking of the Apple iPad 2. Apple have updated their first version of the tablet to create a thinner design with faster specs. It features the new dual core A5 processor, this means that the iPad2 has graphics on par with a full laptop. It also boasts a front and rear facing camera as well as a longer lasting battery which can last up to ten hours.
Despite the dominance of the tablet in new technology 2011 thus far other gadgets have also shone a bright light. 3D has been a hit for a while now but Toshiba scored massive points by developing huge 3D televisions that don’t need specific glasses to view. 3D TV’s without the need of glasses were invented at the end of last year however only on small scale sets, not 65 inch televisions like Toshiba offer.

Monday, 5 September 2011

Password Recovery Procedure for the Cisco 3600 and 3800 Series Routers


Introduction

This document describes how to recover the enable password and the enable secret passwords. These passwords protect access to privileged EXEC and configuration modes. The enable password password can be recovered, but the enable secret password is encrypted and must be replaced with a new password. Use the procedure described in this document in order to replace the enable secret password.
There are no specific requirements for this document.
The information in this document is based on these hardware versions:
  • Cisco 3600 Series Router
  • Cisco 3800 Series Router
The information in this document was created from the devices in a specific lab environment. All of the devices used in this document started with a cleared (default) configuration. If your network is live, make sure that you understand the potential impact of any command.
Refer to Password Recovery Procedures for information on how to recover passwords for related products.
Refer to Cisco Technical Tips Conventions for information on document conventions.



Step-by-Step Procedure


Follow these steps in order to recover your password:
  1. Attach a terminal or PC with terminal emulation to the console port of the router.
Use these terminal settings:
    • 9600 baud rate
    • No parity
    • 8 data bits
    • 1 stop bit
    • No flow control
Refer to these documents for information on how to cable and connect a terminal to the console port or the AUX port:
  1. If you can access the router, type show version at the prompt, and record the configuration register setting.
Note: The configuration register is usually set to 0x2102 or 0x102. If you can no longer access the router (because of a lost login or TACACS password), you can safely assume that your configuration register is set to 0x2102.
  1. Use the power switch in order to turn off the router, and then turn the router back on.
Important Notes:
    • In order to simulate this step on a Cisco 6400, pull out and then plug in the Node Route Processor (NRP) or Node Switch Processor (NSP) card.
    • In order to simulate this step on a Cisco 6x00 with NI-2, pull out and then plug in the NI-2 card.
  1. Press Break on the terminal keyboard within 60 seconds of power up in order to put the router into ROMMON.
If the break sequence does not work, refer to Standard Break Key Sequence Combinations During Password Recovery for other key combinations.
  1. Type confreg 0x2142 at the rommon 1> prompt in order to boot from Flash.
This step bypasses the startup configuration where the passwords are stored.
  1. Type reset at the rommon 2> prompt.
The router reboots, but ignores the saved configuration.
  1. Type no after each setup question, or press Ctrl-C in order to skip the initial setup procedure.
  2. Type enable at the Router> prompt.
You are in enable mode and should see the Router# prompt.
  1. Type configure memory or copy startup-config running-config in order to copy the nonvolatile RAM (NVRAM) into memory.
Important: Do not type copy running-config startup-config or write. These commands erase your startup configuration.
  1. Type show running-config.
The show running-config command shows the configuration of the router. In this configuration, the shutdown command appears under all interfaces, which indicates all interfaces are currently shut down. In addition, the passwords (enable password, enable secret, vty, console passwords) are in either an encrypted or unencrypted format. You can reuse unencrypted passwords. You must change encrypted passwords to a new password.
  1. Type configure terminal.
The hostname(config)# prompt appears.
  1. Type enable secret <password> in order to change the enable secret password. For example:
13.             hostname(config)#enable secret cisco
14.              
  1. Issue the no shutdown command on every interface that you use.
If you issue a show ip interface brief command, every interface that you want to use should display up up.
  1. Type config-register <configuration_register_setting>. Where configuration_register_setting is either the value you recorded in step 2 or 0x2102 . For example:
17.             hostname(config)#config-register 0x2102
18.              
  1. Press Ctrl-z or end in order to leave the configuration mode.
The hostname# prompt appears.
  1. Type write memory or copy running-config startup-config in order to commit the changes.