Showing posts with label Electronics. Show all posts
Showing posts with label Electronics. Show all posts

July 4, 2009

0

Apple iPhones Shut Down in Summer Heat

  • July 4, 2009
  • anand
  • Some news tell that i-phones get overheated. Apple has taken them gravely enough to divulge the presence of a temperature warning screen for the iPhone 3G and 3GS.

    HT1871_1

    A very small number of iPhones have been affected by overheating, some white iPhone 3GSes have allegedly turned pink too.

    Apple has issued what some might call a "common sense" warning:, a support document that warns users not to keep the iPhone in an environment where temperatures can exceed 112 degrees Fahrenheit.

    Actually using the iPhone in temperatures over 95 degrees can also activate the temperature warning. "Low- or high-temperature conditions might temporarily shorten battery life or cause the device to temporarily stop working properly," Apple warns.

    That will prompt the device to activate the temperature warning above, only emergency calls is allowed while iPhone is locked

    Summer temperatures in many locations top 95 degrees

    Apple also says that the iPhone 3G and 3GS should not be stored where the temperature can fall under -4 degrees Fahrenheit, or used in less in temperatures under 0 degrees F.

    It is said by apple that if the phone exceeds those temperatures the iPhone may stop charging, its display might dim, a weak cellular signal may be experienced, and the temperature warning screen above may also appear

    If that happens, Apple says, you'll need to let the iPhone cool down before you use it again, although the phone may be able to place emergency calls during that time.

    How long will the cool down process take? It cant be said still

    Technorati Tags: ,
    read more

    June 23, 2009

    2

    Using Disk Defrag on Windows XP

  • June 23, 2009
  • anand
  • Accessing Disk Defragmenter

    • Start | All Programs | Accessories | System Tools | Disk Defragmenter
    • Start | Run | and type dfrg.msc in the Open line.

    Click OK
    • Start | Administrative Tools | Computer Management. Expand Storage and select Disk Defragmenter
    The first two methods take you to a standalone window containing Disk Defragmenter. The last method opens Microsoft Management Console and displays Disk Defragmenter as one of the snap-in modules. In all cases, a window similar to the one below will be displayed.

    1

    When Disk Defragmenter first opens you'll see a list of the hard drives displayed at the top of the screen. The Estimated Disk Usage Before Defragmentation and Estimated Disk Usage After Defragmentation will be blank until a drive is selected and the Analyze button is clicked. In the screen shot above, I've already analyzed the drives as evidenced by the Session Status showing as Analyzed and the Estimated Disk Usage Before Defragmentation area containing a graphical representation of the drive fragmentation.

    disk_defragmenter_03_02

    After the Analyze button has been clicked and the process completes the window shown above (Fig. 02) opens with a brief recommendation of what action Disk Defragmenter thinks should be taken regarding the drive. It's important to note that this is just a recommendation based on the percentage of fragmented files to total files and doesn't prevent the drive from being defragmented if you feel it needs to be done and might improve system performance. If you want to go ahead and defragment without more information, click the Defragment button. If you're in agreement with their recommendation and don't want to defragment, click the Close button. Click the View Report button to view a more detailed drive analysis.

    An Analysis Report contains quite a bit of additional information about the selected drive. The report shown above (Fig. 03) details the File Fragmentation status of drive New Volume (D:). The top pane provides Volume information, and as you can see there are 3,851 fragmented files. This may not seem like many fragmented files, but consider that this is only a 29GB drive, which is very small by today's standards, and that 97% of the total drive space is currently unused. Look at the Average Fragments Per File number of 1.04 and this tells you that approximately 4% of the files on the drive are in two or more pieces. My experience has been that when this number reaches 1.05 the message in the quick analysis window (Fig. 02) will recommend defragmenting the drive. The bottom pane, Most Fragmented Files, lists the files in descending order that are the most fragmented.

    Click on Defragment button to Defrag the drive.

    7

    You can see the status of Defragmentation in the status bar.

    5

    Disk defragmentation is now complete, click on View Report button to view the Defragmentation Report.

    6

    7

    In spite of the recommendation not to defragment this particular disk, I went ahead and clicked the Defragment button. The results of that choice are shown above (Fig. 04) in the Estimated Disk Usage After Defragmentation section. The graphical representation clearly shows that not only have the red lines depicting fragmented files been eliminated, many of the contiguous files indicated by the blue have been repositioned toward the beginning of the drive, reducing the amount of searching the drive heads have to do to locate a file. The drive in this example is not a system drive, nor does it have a paging file which would be indicated by the lime green Unmovable Files color.
    After the defragmentation process completes, clicking the View Report button will bring up the Defragmentation Report (Fig. 05). It takes the exact same form as the Analysis Report (Fig. 03) but shows the post defragmentation results. The Total Files and Average File Size remain identical, but notice that Total Fragmented Files and Total Excess Fragments have been reduced to zero (0) and the Average Fragments Per File is now 1.00, indicating most or all of the files are contiguous. In addition, there are no files listed that did not defragment.

    read more

    June 22, 2009

    0

    ATM Tips

  • June 22, 2009
  • anand

  • ATM?


    There is no such defined formula that can assurance you about the security of the ATM selection. Therefore, the ATM user needs to exercise some carefulness when selecting an ATM.

    There are some steps to fellow:

    • Always go for banking in daylight hours and specially avoid to visiting ATM at weekend night.

    • lways choose ATM location which you are most familiar, most nearest point from your home or heavily traveled areas.

    • First observe the surroundings of ATM before make any transaction, if there are any person looking you then tries to avoid using ATM this time.

    • The best practice is that always go for ATM with any family member or with your best friend.

    • Avoid using if you find any other machine or code reader attached with the ATM machine.

    • Always select the ATM that is monitored by bank security or with security camera.



    ATM Tips

    Using an ATM
    • Be careful when any strangers offer to help you at an ATM, even if your card is block by machine or you are experiencing difficulty with the transaction.

    • Check your surrounding any other person in the queue keep an acceptable distance from you.

    • Stand very close to the ATM and shield the keypad with your hand when keying in your PIN code otherwise any other person can guess your number.

    • Press the Cancel key on keyboard when you find the ATM is not working properly and withdraw your card. Avoid force your card into the card slot.

    • Always keep your printed transaction record so that you can compare your ATM receipts to your monthly statement.

    • If your card jammed in ATM, report this immediately to the bank.


    ATM Tips

    Manner to use your ATM

    • Try to memorize your PIN code and avoid writing it down on public access book, doing so on secret book.

    • Never tell your PIN to any third person, whether to family member, office staff.

    • Avoid using easily guessable numbers for your PIN code for example your date of birth, your phone number and others.

    • Change your PIN code on weekly basis.

    • Weekly check your account balance and bank statements if you find any problem, contact to your bank immediately.
    read more

    June 20, 2009

    0

    Smart Card

  • June 20, 2009
  • anand
  • What is a Smart Card?

    A smart card resembles a credit card in size and shape, but inside it is completely different. First of all, it has an inside -- a normal credit card is a simple piece of plastic. The inside of a smart card usually contains an embedded microprocessor. The microprocessor is under a gold contact pad on one side of the card. Think of the microprocessor as replacing the usual magnetic stripe on a credit card or debit card.

    Smart cards are much more popular in Europe than in the United States. In Europe, the health insurance and banking industries use smart cards extensively. Every German citizen has a smart card for health insurance. Even though smart cards have been around in their modern form for at least a decade, they are just starting to take off in the United States.

    Magnetic stripe technology remains in wide use in the United States. However, the data on the stripe can easily be read, written, deleted or changed with off-the-shelf equipment. Therefore, the stripe is really not the best place to store sensitive information. To protect the consumer, businesses in the U.S. have invested in extensive online mainframe-based computer networks for verification and processing. In Europe, such an infrastructure did not develop -- instead, the card carries the intelligence.

    The microprocessor on the smart card is there for security. The host computer and card reader actually "talk" to the microprocessor. The microprocessor enforces access to the data on the card. If the host computer read and wrote the smart card's random access memory (RAM), it would be no different than a diskette.

    Smarts cards may have up to 8 kilobytes of RAM, 346 kilobytes of ROM, 256 kilobytes of programmable ROM, and a 16-bit microprocessor. The smart card uses a serial interface and receives its power from external sources like a card reader. The processor uses a limited instruction set for applications such as cryptography.

    The most common smart card applications are:

    • Credit cards

    • Electronic cash

    • Computer security systems

    • Wireless communication

    • Loyalty systems (like frequent flyer points)

    • Banking

    • Satellite TV

    • Government identification

    Smart cards can be used with a smart-card reader attachment to a personal computer to authenticate a user. Web browsers also can use smart card technology to supplement Secure Sockets Layer (SSL) for improved security of Internet transactions. Visa's Smart Card FAQ shows how online purchases work using a smart card and a PC equipped with a smart-card reader. Smart-card readers can also be found in mobile phones and vending machines.

    read more

    Subscribe