July 28, 2009

“Chipping” Away at Computer Jargon

Tech tips 212

Chipping Away at Computer Jargon

By Bryan Lambert – Sunday, April 5, 2009

To know the computer, you need to be the computer; or at least know the jargon of the computer. If you’ve ever been looking for a computer or computer parts such as monitors or speakers, then it is certain that you've run across certain terms that can be collectively referred to as computer jargon.” Many often wonder if some of these terms and phrases are meant to confuse rather than clarify your buying decision. We here at Tech Tips can assure that this is precisely the case; but knowing that an informed buyer is an empowered buyer we’ll endeavor to try to clear up some of the mystery of computer jargon.

In this Tech Tip, we’ll be specifically looking briefly at some of the jargon placed directly on a computer, computer monitor and computer speaker sets.

A Plethora of Stickers

One thing that you may notice is that there seems to be no end to the stickers affixed to a computer. Whether it is a run down of features that you’ll use, or simply a statement that a computer has “Intel inside”, there seems to be a sticker for everything. Well, one sticker may inform you that the computer contains a “Radeon HD” or “ATi” while another touts “nVidia PureVideo HD”. These pretty little stickers are simply trying to inform you that the computer (more than likely) has a discreet graphics chip rather than “integrated graphics” one built into the general chipset. 

Another thing a laptop computer sticker will proudly proclaim is the processor contained within the computer. It may say “Intel Core 2 Duo inside” or “AMD Turion X2 Ultra 64” or something similar. While it may look nice, really you need to get past this generality to dig into the specs to see precisely what processor the computer has in it (in a previous Tech Tip we covered some specific things to look for when choosing a processor). Some Intel based computers may also have a Centrino sticker of some sort, but the Centrino is not a processor, it is a marketing gimmick that Intel came up with to sell more parts. Centrino simply means that the computer has the parts needed to get the sticker (usually a type of Intel processor, an Intel motherboard chipset and an Intel wireless chipset – different versions of the Centrino have different requirements that they need to meet to get the Centrino sticker).

You may also see cheap female viagra a sticker listing the type of operating system the computer was “designed for” such as “Windows Vista” or “Windows XP”.  Note that some systems that have been downgraded from Windows Vista to Windows XP at the factory may still have a Windows Vista sticker on it.  Another sticker you can run across is on touting “lightScribe” which is simply letting you know that the computers optical drive can write a disc label directly to a lightscribe compatible disc.  Others may state that the computer is “Energy Star” compliant and maybe even an ergonomic warning about using the keyboard and mouse.  Sometimes manufacturers get carried away with these stickers but not to fret – they are easily removed.

When a “Watt” is not a Watt

Some other phrases you may run across are ones such as “High Def” and “Full HD.”  You may be familiar with what they kind of mean when speaking flat panel televisions, but what about computers?  High Def usually means that a screen can meet a minimum resolution of “1280 x 720” (many computer screens will exceed this) and Full HD means that it exceeds the 1080p specs (1920 x 1080).  While many computers screen will exceed the 720p spec and be called “Hi Def”, not too many will meet or exceed the 1080p spec.  If the screen is 1080p compatible, you may hear that (if it has a DVI or HDMI input) it is HDCP compliant.  If it does, it means that the screen can play protected content (think Blu-Ray discs) at their full resolution. Also when a monitor that touts it is “widescreen” is simply stating that it can display a picture in a widescreen format ratio (the most popular on computers being a 16:9 or a 16:10 ratio).

Also bandied about are some fantastic claims about the amount of power put out by a set of speakers.  You may see a tiny set of speakers boasting that it has “1000 Watts (PMPO) of Power!”  That PMPO moniker means that this is a “Peak Music Power Output” Wattage rating.  Really though, this type of rating always has to be taking with a grain of salt; a truer measure of the power output of a speaker set is the RMS Wattage rating.   You also may see “2.0”, “2.1” “4.1” etc on a speaker box as well.  This is simply telling you how many speakers that the set has (for example, a 2.1 speaker set has two satellite speakers and one sub-woofer).

Be Aware and Informed

It is our hope that this Tech Tip helped to clean up some of the marketing hype and confusion surrounding the various computer jargon tossed around that you may encounter when looking for a computer or computer component. By being “aware and informed” of the jargon used you can make a better, more informed buying decision.

Permalink • Print • Comment

April 3, 2009

Computer Terms

Q:
It seems like every computer term has an acronym to go along with it and half the time, I have no idea what it means. Can you help by giving me some examples?

A:
Sure, that's no problem! There are tons of terms that usually only go by certain letters and it can be hard to keep them all straight. There are obviously too many to put into one tip, so below is a list of some of the more common used acronyms, along with their real meanings. Here we go!

ATA – Advanced Technology Attachment

ATM – Asynchronous Transfer Mode

BIOS – Basic Input/Output System

BMP – Bitmap

CD – Compact Disc

CGI – Common Gateway Interface

CPU – Central Processing Unit

DBMS – Database Management System

DLL – Dynamic Link Library

DNS – Domain Name System

DSL – Digital Subscriber Line

DVD – Digital Versatile Disc

FTP – File Transfer Protocol

JPEG – Joint Photographic Experts Group

LAN – Local Area Network

MPEG – Moving Picture Experts Group

P2P – Peer To Peer

POP3 – Post Office Protocol

RGB – Red Green Blue

TCP/IP buy viagra sydney – Transmission Control Protocol/Internet Protocol

USB – Universal Serial Bus

WiFi – Wireless Fidelity

WWW – World Wide Web

Did you learn something? I sure hope so!

Permalink • Print • Comment

March 3, 2009

Creating a productive workspace: An IT consultant’s office essentials

Chip Camden advises IT consultants to spend less on sprucing up their office for clients and take more time on making their office a productive space. He also discusses what to keep in mind if you’re setting up a home office.

—————————————————————————————————————

For a corporation, the physical office space serves as a location for at least two activities: to work and entertain visitors (especially prospects). For the independent consultant, most clients never see our workplace (we usually meet at their offices or not at all), and we hardly ever entertain visitors. (In almost 18 years of consulting, I have only met 42% of my clients face-to-face — the rest of my business has been conducted solely over the Internet –and I’ve only had three clients visit my office.) So it’s pointless to spend a lot of money making your physical address ostentatious or even presentable — focus instead on making your office a productive space for accomplishing work.

Here is a list of the office features that are important to keeping me productive. I also offer tips on what to keep in mind if you’re considering working from home.

The essentials

A good Internet connection
This is critical. But I’ve found that a telephone isn’t as important. You need to be able to use a telephone while at your computers (a speaker phone to keep your hands free is a good idea), but you don’t want it to always be ringing in your face so the telemarketers can break your concentration 82 times a day.

A room with a view
Regardless of whether your office is in your home or not, it needs to be your private cave where you can get into the Zone. That means, for one thing, that you need a window with a view. Not an overly distracting view like Wrigley Field (although that would be awesome in many ways) — calm and fairly predictable would be best: the ocean, the mountains, or the woods are my favorites. Why do you need this? You want to be able to stare outside while you’re thinking over a problem that has hit an impasse, rendering further review of the situation on a monitor frustratingly fruitless. If you don’t have a view from your office, you’re going to have to get up and leave in order to achieve the same result.

More than one monitor
You need plenty of space for all your gear and space on your desk for all your monitors and input devices. Yes, I said monitors — plural. My first 10 years of consulting were conducted with a single monitor connected to one workstation/server, but I shudder to think of all the productivity I lost during those years just from not having a second screen. How often do you need to switch between an editor session, a command prompt, and a requirements specification? If you can keep all three up and visible at once, how much needless window twiddling have you eliminated? Maybe you don’t need six monitors (though that is truly awesome), but two monitors are a huge improvement over one. I currently have four monitors wired to three systems, and I use Synergy to direct all four with the same keyboard and mouse. One of those monitors is my laptop, which allows me to travel with an abridged form of my setup.

Multiple systems
You also need more than one system, even if some of those machines are virtual. If you try to do all of your work on a single system, it will get completely overgrown with crap in no time. Even though I have separate machines for my private server and two workstations, I still use VMware to create individual virtual machines for testing purposes. Not only does this prevent conflicts between software-in-testing and my production systems, it also insures that my testing is performed in a clean, controlled environment. If you’re going to run virtual machines, you need enough horsepower in terms of CPU and memory to avoid bringing the whole thing to a thrashing crawl.

Lighting
The right lighting makes a huge difference. Windows with a southern exposure can create too much glare — a northern exposure works best, because no matter where the sun is in the sky or how brightly it shines, you only get it indirectly so it’s more consistent. Artificial lighting needs fine control. My office has ceiling-mounted track lighting with a dimmer switch, so I can control both the intensity and direction of each light source.

Ergonomics
Ergonomics are extremely important. You’ll be sitting in that same chair, staring at that same set of monitors, and manipulating those same input devices all day long every working day of the year. All of your chairs should be comfortable and arranged to promote good posture. It’s also important to have all of your equipment (monitors, keyboards, and mice) positioned to promote good posture. If the monitor is too low, for instance, then I’m hunched over no matter how ergonomic my chair is.

Storage space for equipment and media
You should have a closet or other enclosed space where you can keep all your spare gear, cables, manuals, media, and books; otherwise, they end up all over the desk and floor. I don’t have the neatest office in the world, but I do avoid permanent clutter. Anything that is meant to stay in my office has an assigned place therein.

Music
Some people work better in silence, but I’m more productive with the right music playing. Not too loudly, though. Jazz seems to work best for me — it’s not overly intense, and it easily fades into the background. But, occasionally, an entire day of J.S. Bach will help me to make the stunningly complex amazingly comprehensible.

Close proximity to coffee and bathroom
The bathroom and the coffee pot (or beverage generator of your choice) should be readily accessible. If you have to traverse a significant portion of the building for either one, expect to get side-tracked on your way.

Be realistic when setting up your home office

While you certainly don’t alternatives to viagra need to rent a high-priced office space in order to create a “presence” for your clients, you do need to consider whether working out of your home is right for you. (Check out my post, Four issues to consider before becoming a remote IT consultant.) Sure, it’s convenient to have a 50-foot commute from the breakfast table to your desk without even needing to stop by the shower on your way, but you must impose some boundaries between home and work. If you allow yourself to be interrupted frequently by non-work-related activities, your productivity will suffer. I’ve found that I need to be able to at least close a door and enforce the rule that it shall not be opened or knocked upon unless someone is bleeding, or the house is on fire.

It also helps to have some physical distance between your office and the rest of your house. This not only curbs interruptions, but it also blocks noise from your family members. My office is currently at the end of a hall beyond all of the bedrooms and that’s just about the minimum amount of space required, as far as I’m concerned. A separate structure would be ideal — like above a garage, for example. In one house we rented, the lower floor was completely separate from the upper floor; you had to go outside to get from one to the other. The landlord planned to rent the floors out separately, but we rented both and I made the lower floor my office. I’ve often considered renting office space away from home purely for the separation factor, but that’s a big expense for what it buys you.

TechRepublic member Glen Ford recently mentioned that “being with the family while working is sometimes helpful.” I haven’t found it to be so, unless by “helpful” he means “helpful to the family.” In my corporate days, I never had to break away from a big project in order to unclog a toilet. But if you want to be able to work close to your family members at times, I suggest setting up a wireless LAN and roaming with a laptop. That’s also nice for a change of scenery, like working outside on a pleasant day.

Permalink • Print • Comment

February 21, 2009

More email security tips

    side effects cialis class=”postData”>

  • Date: November 11th, 2008
  • Author: Chad Perrin

Email security is about a lot more than just using a good password on your POP or IMAP server. Perhaps the most important part of email security is ensuring you don’t shoot yourself in the foot.


In February this year, I listed five basic email security tips that everyone should employ. The following is a list of five more good pieces of email security advice:

  1. Turn off automated addressing features. As communication software accumulates more and more automated convenience features, we’ll see more and more cases of accidentally selecting the wrong recipients. A prime example is Microsoft Outlook’s “dreaded auto-fill feature“, where it is all too easy to accidentally select a recipient adjacent to your intended recipient in the drop-down list. This can be particularly problematic when discussing private matters such as business secrets.
  2. Use BCC when sending to multiple recipients. It’s a bad idea, from a security perspective, to share email addresses with people who have no need for them. It is also rude to share someone’s email address with strangers without permission. Every time you send out an email to multiple recipients with all the recipients’ names in the To: or CC: fields, you’re sharing all those email addresses with all the recipients. Email addresses that are not explicitly meant to be shared with the entire world should, in emails addressed to multiple recipients, be specified in the BCC: field — because each person will then be able to see that he or she is a recipient, but will not be able to see the email addresses of anyone else in the BCC: field.
  3. Save emails only in a safe place. No amount of encryption for sent emails will protect your privacy effectively if, after receiving and decrypting an email, you then store it in plain text on a machine to which other people have access. Sarah Palin found out the hard way that Webmail providers don’t do as good a job of ensuring stored email privacy as we might like, and many users’ personal computers are not exactly set up with security in mind, as in the case of someone whose MS Windows home directory is set up as a CIFS share with a weak password.
  4. Only use private accounts for private emails. Any email you share with the world is likely to get targeted by spammers — both for purposes of sending mail to it and spoofing that email address in the From: field of the email headers. The more spammers and phishers spoof your email address that way, the more likely your email address is to end up on spam blocker blacklists used by ISPs and lazy mail server sysadmins, and the more likely you are to have problems with your emails not getting to their intended recipients.
  5. Double-check the recipient, every time — especially on mailing lists. Accidentally replying directly to someone who sent an email to a mailing list, when you meant to reply to the list, isn’t a huge security issue. It can be kind of inconvenient, though, especially when you might never notice your email didn’t actually get to the mailing list. The converse, however, can be a real problem: if you accidentally send something to the list that was intended strictly for a specific individual, you may end up publicly saying something embarrassing or, worse, accidentally divulging secrets to hundreds of people you don’t even know.
Permalink • Print • Comment

Basic e-mail security tips

  • Date: February 25th, 2008
  • Author: Chad Perrin

There’s a lot of information out there about securing your e-mail. safe cialis Much of it is advanced and doesn’t apply to the typical end user. Configuring spam filters such as SpamAssassin, setting up encrypted authentication on mail servers, and e-mail gateway virus scanner management are not basic end-user tasks.

When one can find end-user e-mail security tips, they’re usually specific to a single mail client or mail user agent such as Microsoft Outlook, Mozilla Thunderbird, or Mutt. This sort of information is of critical importance to many users of these applications, but there are few sources of more general security information for e-mail users that aren’t specific to a given client application.

The following is a short list of some important security tips that apply to all e-mail users — not just users of a specific application. They are listed in the order one should employ them, from the first priority to the last. This priority is affected not only by how important a given tip is, but also by how easy it is to employ; the easier something is to do, the more likely one is to actually do it and move on to the next tip.

  1. Never allow an e-mail client to fully render HTML or XHTML e-mails without careful thought. At the absolute most, if you have a mail client such as Microsoft Outlook or Mozilla Thunderbird that can render HTML e-mails, you should configure it to render only simplified HTML rather than rich HTML — or “Original HTML” as some clients label the option. Even better is to configure it to render only plain text. When rendering HTML, you run the risk of identifying yourself as a valid recipient of spam or getting successfully phished by some malicious security cracker or identity thief. My personal preference is, in fact, to use a mail user agent that is normally incapable of rendering HTML e-mail at all, showing everything as plain text instead.
  2. If the privacy of your data is important to you, use a local POP3 or IMAP client to retrieve e-mail. This means avoiding the use of Web-based e-mail services such as Gmail, Hotmail, and Yahoo! Mail for e-mail you wish to keep private for any reason. Even if your Webmail service provider’s policies seem sufficiently privacy-oriented to you, that doesn’t mean that employees won’t occasionally break the rules. Some providers are accused of selling e-mail addresses to spamming “partners.” Even supposedly security-oriented Webmail services such as Hushmail can often be less than diligent in providing security to their users’ e-mail.
  3. It’s always a good idea to ensure that your e-mail authentication process is encrypted, even if the e-mail itself is not. The reason for this is simple: You do not want some malicious security cracker “listening in” on your authentication session with the mail server. If someone does this, that person can then send e-mails as you, receive your e-mail, and generally cause all kinds of problems for you (including spammers). Check with your ISP’s policies to determine whether authentication is encrypted and even how it is encrypted (so you might be able to determine how trivial it is to crack the encryption scheme used).
  4. Digitally sign your e-mails. As long as you observe good security practices with e-mail in general, it is highly unlikely that anyone else will ever have the opportunity to usurp your identity for purposes of e-mail, but it is still a possibility. If you use an encryption tool such as PGP or GnuPG to digitally sign your e-mails, though, recipients who have your public key will be able to determine that nobody could have sent the e-mail in question without having access to your private key — and you should definitely have a private key that is well protected.
  5. If, for some reason, you absolutely positively must access an e-mail account that does not authorize over an encrypted connection, never access that account from a public or otherwise unsecured network. Ever. Under any circumstances.

Be aware of both your virtual and physical surroundings when communicating via e-mail. Be careful. Trust no one that you do not absolutely have to trust, and recognize the dangers and potential consequences of that trust.

Your e-mail security does not just affect you; it affects others, as well, if your e-mail account is compromised. Even if the e-mail account itself is not compromised, your computer may be if you do not take reasonable care with how you deal with e-mails — and that, in turn, can lead to affecting both you and others adversely as well.

Don’t be a victim.

Permalink • Print • Comment
« Previous PageNext Page »
Made with WordPress and a healthy dose of Semiologic • Sky Gold skin by Denis de Bernardy