Saturday, February 21, 2009

Analog: The Herman Miller Embody Chair


It may not have an accelerometer. Or an OLED. Or lasers. Or image-stabilization. You can't even plug it in to an electric socket. But the Herman Miller Embody chair has got its back (and yours) covered with meticulous engineering. The thing is adjustable to Asperger's levels of obsession; controls exist to cradle your lumbar, hips and neck. Plus the multilayered seat absorbs even the most microscopic shifts in weight, cupping your derriere no matter how much (or little) you move. It's the greatest breakthrough in ass-to-comfort technology since, well, the Aeron chair.

Herman Miller has followed up the Aeron office chair with the Embody, a new ergonomic chair that looks to take over the cubicle. Embody is a chair that supports your body while you are moving around. And, much like the Aeron, it lets you adapt your working posture throughout the day.

Herman Miller sums it up well, "Embody lets your body move and keeps you well supported, because your mind works best when you move freely and stress is minimized on your muscles, bones, and tissues. Blood circulates better, heart rate goes down, more oxygen flows to the brain, and there is no distracting discomfort or physical constraint. That's critical in our idea economy where innovation drives success and people get paid for their thoughts and creativity."

Wednesday, February 18, 2009

Touch Screen Eee PC & Eee Keyboard PC


Meet the new best keyboard ever. The official Eee Keyboard. It features wireless HDMI, and it’s a “fully functional PC” with full QWERTY and an awesome mini secondary touchscreen.

Asus is mum about if and when we’ll actually see the Eee Keyboard come to market (It looks like a very real product), but if it’s a concept for a home theater PC, it is an amazing one. With wireless HDMI you could probably make any television into your monitor without having a huge PC taking up space.

We have no idea about the rest of the specs, but it sure has a ton of ports.

We spotted some Asus keyboards last week, but none were nearly as potentially awesome as the official Eee Keyboard. Featuring wireless HDMI, it's a "fully functional PC" with full QWERTY and a mini secondary touchscreen. Asus was vague as to if/when we'll actually see the Eee Keyboard come to market (though we're pretty sure it's a semi-real product), but it's a fantastic concept for a home theater PC if we've ever seen one. Through wireless HDMI you could potentially make any television into your monitor (complete with audio playback) without having some huge PC taking up space.

As one of the few tablet lovers here, I'm going crazy waiting for the Eee tablet netbook. Maybe instead, I ought to just make my own out of Eee 900HA like these guys.

A member who claims to have “very little knowledge on computer things” managed to take about his 900HA and turn it into a touchscreen notebook. All you need is a screwdriver, some tape, a plastic card, a solderless touchscreen kit and some extra wires.

Pretty neat, if it works! A 900Ha is only $320-ish on Amazon and this method doesn't seem to add more than another $100 to the cost. Maybe if Asus hasn't released the T91 in the next month, it'll be time for me to get my screwdriver out.

Tuesday, February 17, 2009

Iomega eGo Portable Hard Drive


Who knew file storage could be so chic? The 160 GB eGo has enough room to hold up to 640,000 digital photos, 2,900 hours of music or 240 hours of video (depending, of course, on the compression rate). A new dual-interface version works over USB or FireWire and comes with both types of cords. If you accidentally knock the eGo off your desk, the shock-absorbing case will protect the important documents and precious media stored inside.

Overview

Enjoy your digital life! Easily share and access photos, videos and music between your home computers with the Iomega® Home Media Network Hard Drive. This device provides easy-to-use, yet powerful, network storage for the home user and the three step setup is a breeze, even if you've never used a network drive before. Save all your digital files to one central location and share them between computers on your network. Then play back your pictures, videos and music from digital media adapters such as game consoles, digital picture frames or networked TVs. Built-in iTunes support automatically feeds music into iTunes® for easy playback. Easily share one printer over the network. Control which family members have access to certain folders. Plus, secure your memories and backup automatically with award winning EMC® Retrospect® software (PC/Mac) and for extra protection backup online with MozyHome™ Online Backup service with 2GB free.

Features

  • Simple to use—Three step set-up - simply plug into your router, power on, and install the software CD. Friendly web screens for easy management.
  • Sharing—Access files from any networked Windows PC or Apple computer for easy file sharing.
  • High Performance—Gigabit Ethernet connectivity combined with a high performance processor.
  • UPnP™ AV Media Server—Compatible with DLNA® certified media players, able to stream photos, audio content and videos to a variety of media devices like game consoles, audio bridges, DMAs (digital media adapters), picture frames and more.
  • iTunes™ Server—Store your audio content in one central location and share it across your iTunes players.
  • Network File Protocols Supported—CIFS/SMB (Microsoft), AFP (Apple), HTTP 1.1
  • Expandability—Add storage capacity by connecting external USB Hard Disk Drives. Supports FAT32 and NTFS formatted hard drives.
  • Network Discovery—Automatic network discovery by Apple Bonjour and Microsoft Windows Rally devices.
  • Data Protection—Touch-free professional-level backup for all your critical data with EMC® Retrospect HD backup software. Effortlessly back up files on a pre-set schedule.
  • Print Server—Intelligent network print sharing capability for one USB printer directly attached to the HomeMedia drive

What You Get

  • Iomega® Home Media Network Hard Drive
  • One Ethernet Cable
  • External Power Supply
  • Quick Install Guide
  • One Iomega StorCenter Network Hard Drive Solutions CD
  • EMC® Retrospect® Express Backup and Disaster Recovery
  • Service & Support: one year standard service. Extended Silver service is available.

Dual Screen Laptops



We have earlier told you about some innovative notebooks including the Fujitsu’s Turntable PC, the dual-display Asustek notebook and the One-On-One dual LCD display, called ‘Tenbuno.’ And, this Dual Touch Screen Laptop from Canova is another ultimate notebook design meant for the creative mind. The notebook features dual display with touch-sensitive screens, sketch pad, music score, graph paper, an electronic pen and a dedicated hardware for its smooth functioning.

There’s a new dual screen laptop on the block and it comes courtesy of gScreen Corp. The two screens on the G400 are of equal size – both 15.4 inch backlit LEDs, so you can work seamlessly on a very spacious canvass. The G400 also comes with up to 8 GB of RAM, up to 500GB hard drive, 6 USB 2.0 ports, Intel Core 2 Duo 2.8 GHz T9600 or P8400 2.26-GHz and the Quadro FX 2700M or GeForce 9800M GT from Nvidia.

Not too shabby. Of course, the double vision does mean that it’s a bit on the heavy side. The G400 weighs in at 3.49kg and is due to be released on 25th February. No word on price yet but we’ll keep you posted.

When it comes to computer displays, bigger is almost always better.

Many desktop computer users are now turning to ever larger monitors, using the bigger screens to display more panels of information. Some workers even turn to using multiple monitors to display complex data.

Now, a computer technology company in Harrisburg, Pa., wants to break the visual barrier with portable computers. For the last four years, Estari Inc., has been working on a laptop that could be considered a true "eye-catcher."

Estari's 2-VU machine is similar to other conventional laptop machines. With a low-power Intel microprocessor, 30 gigabyte hard drive and 256 megabytes of memory, the 2-VU even runs standard computer software such as Microsoft's Windows XP or Windows 2000.

But the real gem of the 2-VU is what it doesn't have. Instead of a keyboard, the 2-VU places a second LCD display screen in its place.

Robert Carberry, chief operating officer for Estari, says the idea is to provide mobile PC users a machine that gives them a wide view of computer data.

"There are a lot of industries where the workers use two monitors [with their desktop PCs] at the same time to multi-task," says Carberry. "The idea is to provide the power and benefit of dual screens in a mobile version."

Smart, But Pricey Machine

Both of the 2-VU display panels are touch-sensitive and are controlled by software and hardware created by Estari. Users can move "windows" of computer information — say, a Web page — between the two screens or stretch them across the displays as if they were one screen.

The software is also "smart" enough to know when the computer is in "portrait" mode, as if it was being used like an electronic book, or in "landscape" mode as in a traditional laptop computer.

Since the laptop lacks a "real" keyboard or mouse, Estari worked with other companies to develop software that understands notes and commands written on the screen using a plastic stylus. Users can also choose to have the computer display a virtual keyboard on one screen or connect an actual keyboard.

Monday, February 16, 2009

The Digital Shield Golf Glove


There are a few golfers like Fred Couples who don't use a glove on either hand. And there are a few golfers like Tommy "Two Gloves" Gainey who wear gloves on both hands.

And then there are the rest of us, who wear one glove, on our top (or leading) hand; that is, the hand that is on top when we take our grip (the left hand for right-handed golfers). But what about that bottom (or trailing) hand? Doesn't it deserve some protection, too?

If you're a golfer who has experienced problems with your ungloved hand - blistering and chafing of the thumb, middle and index finger, for example - you may want to take a look at the Digital Shield from a company called Game Theory.

The Digital Shield glove is a streamlined, open-palm glove for your bottom, or trailing, hand. The company says the glove was designed "to protect against blistering and chafing while maximizing tactile sensitivity," and says that it conforms to USGA and R&A rules.

The Digital Shield glove is available via the company Web site, www.thedigitalshield.com

We’ve all seen the guys, Tiger Woods (and my neighbor, Frank) among them, with little bits of tape wrapped around their fingers to protect their digits (now the name makes sense) from just the sort of problems the Digital Shield, which covers your thumb, index, and middle fingers helps to prevent.

The material composition of the Digital Shield is very similar to many 5 finger models on the market. It features:

  • Cabretta leather specially engineered to remain soft to the touch and keep its shape
  • Coolmax® mesh whose wicking properties pull moisture away from the skin
  • A spandex gusset that conforms to the unique contours of your fingers
  • An unrestricting neoprene wrist band

So why the Digital Shield? Why not just wear a second glove? Although the company won’t come out and say it, I will…wearing two full gloves is stupid; dumber still if they don’t match. Yeah…I suspect you’ve seen that guy too. I hate one black, one white glove guy.

For their part, Game Theory maintains that full, or even half finger gloves (like those silly one for women that have fingernail holes), are unnecessarily hot, provide excess grip, and most importantly compromise feel. Personally I’ve never given any thought to the heat issue, but the excess grip thing sounds good (especially if you’re a club-choker like I am). Feel, of course, is extremely important, which is why 90% of us take our glove off before we putt. The other 10% do it because Tiger does it.

For those of you not willing to risk potential ridicule on the links in exchange for unblemished hands, the guys behind the Digital Shield suggest that it’s a great way to protect your hands while you beat buckets at the driving range. Imagine being able to hit a few hundred (or thousand) golf balls without having to worry about ruining your hands prior to your weekend grudge match. You have to admit, it makes more than a little bit of sense.

The Digital Shield will be available in early July for a retail price of $11.99. It will be available in men’s sizes small, medium, medium large, large, and XL. Women’s sizing eliminates the XL. Because the Digital Shield doesn’t have fingers, cadet sizes aren’t necessary.

Monday, February 9, 2009

Kaspersky Web Site Hacked With SQL Injection


A security vulnerability in Moscow-based Kaspersky Lab's U.S. Web site was made public after a hacker launched a SQL attack and posted listings of tables contained on the security company's site.

The hacker, known as Unu, posted screen shots as well as a list of tables Feb. 7 to a blog after hacking into the security company's Web site via a simple SQL injection attack that allowed information to be exposed by entering secret username and password information.

"Kaspersky is one of the leading companies in the security and antivirus market. It seems as though they are not able to secure their own databases," the hacker said on a hackerblog.org posting. "Alter one of the parameters and you have access to EVERYTHING: users, activation codes, lists of bugs, admins, shop, etc."

Roel Schouwenberg, senior antivirus researcher for Kaspersky Lab, said that upon being made aware of the breach, the company "immediately contacted the right people, shut down the vulnerable part of the Web site within 15 minutes and reinstated the old version of the support site."

Altogether, the site was vulnerable for a total of 10 days, he said.

Schouwenberg said that the U.S. Web site -- usa.kaspersky.com -- was partly developed in-house and partly developed by a third-party contractor. The Web site vulnerability was overlooked due to a processing error that led to lack of proper scrutiny, researchers said.

"We could have done more on our side to still catch the vulnerability," Schouwenberg said. "We're doing our best to improve our process further and be more strict and prevent this kind of thing from happening again."

Kaspersky researchers said that they also are conducting an external audit to determine the nature of the hack and process improvements that could prevent it in the future.

"If we had been a little bit more thorough, we could have caught this in our own way," Schouwenberg added.

However, Kaspersky security researchers maintained that while the hacker, who was found to be from Romania, did infiltrate the company's Web site, he or she was only able to lift the names of the tables.

Kaspersky researchers said that after careful inspection, they found that no other data was lifted, such as e-mail addresses or activation codes. Schouwenberg said that customer credit card information is handled by a separate third party and not contained on the site.

"He tried to get access to some of the content of these tables, and tried to get access to actual data, but he didn't get into the folders as it were," said Schouwenberg. "Truth be told, if the hacker had been more advanced, he could have gotten access to some of the data he claimed he could."

Meanwhile, contrary to the hacker's story, Kaspersky researchers said that after checking their e-mail logs, the hacker went public with the vulnerability only one hour after e-mailing the company to alert them to the breach.

"While we do monitor those e-mail addresses, we do not monitor them 24x7," Schouwenberg said.

The hack was conducted when almost all of the security company's executive team and several of its high-level security researchers were out of town during the Kaspersky Lab's 2009 Partner Conference, held in Fajardo, Puerto Rico, Feb. 5-8.

Cloud computing


Cloud computing is Internet ("cloud") based development and use of computer technology ("computing"), whereby dynamically scalable virtualised resources are provided “as a service” over the Internet. Users need not have knowledge of, expertise in, or control over the technology infrastructure ("in the cloud") that supports them.

The concept incorporates software as a service (SaaS), Web 2.0 and other recent, well-known technology trends, in which the common theme is reliance on the Internet for satisfying the computing needs of the users. An often-quoted example is Google Apps, which provides common business applications online that are accessed from a web browser, while the software and data are stored on Google servers.


The cloud is a metaphor for the Internet, based on how it is depicted in computer network diagrams, and is an abstraction for the complex infrastructure it conceals.


Comparisons


A formal definition appeared in ACM Computer Communication Review . There, the Cloud is defined as "Clouds are a large pool of easily usable and accessible virtualized resources (such as hardware, development platforms and/or services). These resources can be dynamically reconfigured to adjust to a variable load (scale), allowing also for an optimum resource utilization. This pool of resources is typically exploited by a pay-per-use model in which guarantees are offered by the Infrastructure Provider by means of customized SLAs.". The authors also provide a detailed comparison of Clouds and Grids in several aspects.


Cloud computing is often confused with grid computing ("a form of distributed computing whereby a 'super and virtual computer' is composed of a cluster of networked, loosely-coupled computers, acting in concert to perform very large tasks"), utility computing (the "packaging of computing resources, such as computation and storage, as a metered service similar to a traditional public utility such as electricity") and autonomic computing ("computer systems capable of self-management").


Indeed many cloud computing deployments as of 2009[update] depend on grids, have autonomic characteristics and bill like utilities — but cloud computing can be seen as a natural next step from the grid-utility model.Some successful cloud architectures have little or no centralised infrastructure or billing systems whatsoever, including peer-to-peer networks like BitTorrent and Skype and volunteer computing like SETI@home.


Architecture


The majority of cloud computing infrastructure as of 2009[update] consists of reliable services delivered through data centers and built on servers with different levels of virtualization technologies. The services are accessible anywhere in the world, with The Cloud appearing as a single point of access for all the computing needs of consumers. Commercial offerings need to meet the quality of service requirements of customers and typically offer service level agreements. Open standards and open source software are also critical to the growth of cloud computing.


Characteristics


As customers generally do not own the infrastructure, they merely access or rent, they can avoid capital expenditure and consume resources as a service, paying instead for what they use. Many cloud-computing offerings have adopted the utility computing model, which is analogous to how traditional utilities like electricity are consumed, while others are billed on a subscription basis. Sharing "perishable and intangible" computing power among multiple tenants can improve utilization rates, as servers are not left idle, which can reduce costs significantly while increasing the speed of application development. A side effect of this approach is that "computer capacity rises dramatically" as customers do not have to engineer for peak loads. Adoption has been enabled by "increased high-speed bandwidth" which makes it possible to receive the same response times from centralized infrastructure at other sites.


Companies


Providers including Amazon, Google and Yahoo exemplify the use of cloud computing. It is being adopted by individual users through large enterprises including General Electric, L’Oreal, and Procter & Gamble. Recently, Microsoft has introduced its new Cloud Computing service as a part of Windows Azure. These services can be accessed through Microsoft Visual Studio by installing the Windows Azure SDK and Windows Azure Tools for Visual Studio.


History


The Cloud is a term with a long history in telephony, which has in the past decade, been adopted as a metaphor for internet based services, with a common depiction in network diagrams as a cloud outline.

The underlying concept dates back to 1960 when John McCarthy opined that "computation may someday be organized as a public utility"; indeed it shares characteristics with service bureaus which date back to the 1960s. The term cloud had already come into commercial use in the early 1990s to refer to large ATM networks. By the turn of the 21st century, the term "cloud computing" had started to appear, although most of the focus at this time was on Software as a service.


Amazon.com played a key role in the development of cloud computing by modernizing their data centre’s after the dot-com bubble and, having found that the new cloud architecture resulted in significant internal efficiency improvements, providing access to their systems by way of Amazon Web Services in 2002 on a utility computing basis.


2007 saw increased activity, with Google, IBM, and a number of universities embarking on a large scale cloud computing research project, around the time the term started gaining popularity in the mainstream press. It was a hot topic by mid-2008 and numerous cloud computing events had been scheduled.


In August 2008, Gartner observed that "organizations are switching from company-owned hardware and software assets to per-use service-based models" and that the "projected shift to cloud computing will result in dramatic growth in IT products in some areas and in significant reductions in other areas."

Political issues


The Cloud spans many borders and "may be the ultimate form of globalization." As such it becomes subject to complex geopolitical issues: providers must satisfy a myriad of regulatory environments in order to deliver service to a global market. This dates back to the early days of the Internet, where libertarian thinkers felt that "cyberspace was a distinct place calling for laws and legal institutions of its own"; author Neal Stephenson envisaged this as a tiny island data haven called Kinakuta in his classic science-fiction novel Cryptonomicon.

Despite efforts (such as US-EU Safe Harbor) to harmonise the legal environment, providers like Amazon Web Services cater as of 2009[update] to the major markets (typically the United States and the European Union) by deploying local infrastructure and allowing customers to select "availability zones." Nonetheless, there are still concerns about security and privacy from individual through governmental level, e.g., the USA PATRIOT Act and use of national security letters and the Electronic Communications Privacy Act's Stored Communications Act.


Legal issues


In March 2007, Dell applied to trademark the term "cloud computing" (U.S. Trademark 77,139,082) in the United States. The "Notice of Allowance" it received in July 2008 got canceled on August 6, resulting in a formal rejection of the trademark application less than a week later.

Richard Stallman, founder of the Free Software Foundation, believes that cloud computing endangers liberties because users sacrifice their privacy and personal data to a third party. In November 2007, the Free Software Foundation released the Affero General Public License, a version of GPLv3 designed to close a perceived legal loophole associated with Free software designed to be run over a network, particularly software as a service. An application service provider is required to release any changes they make to Affero GPL open source code.


Risk mitigation


Corporations or end-users wishing to avoid losing or not being able to access their data should research vendors' policies on data security before using vendor services. The technology analyst and consulting firm, Gartner, lists seven security issues which one should discuss with a cloud-computing vendor:


Privileged user access—inquire about who has specialized access to data and about the hiring and management of such administrators


Regulatory compliance—make sure a vendor is willing to undergo external audits and/or security certifications


Data location—ask if a provider allows for any control over the location of data


Data segregation—make sure that encryption is available at all stages and that these "encryption schemes were designed and tested by experienced professionals"


Recovery—find out what will happen to data in the case of a disaster; do they offer complete restoration and, if so, how long that would take


Investigative Support—inquire as to whether a vendor has the ability to investigate any inappropriate or illegal activity


Long-term viability—ask what will happen to data if the company goes out of business; how will data be returned and in what format.


In practice, one can best determine data-recovery capabilities by experiment: asking to get back old data, seeing how long it takes, and verifying that the checksums match the original data. Determining data security is harder. A tactic not covered by Gartner is to encrypt the data yourself. If you encrypt the data using a trusted algorithm, then regardless of the service provider's security and encryption policies, the data will only be accessible with the decryption keys. This leads to a follow-on problem: managing private keys in a pay-on-demand computing infrastructure.

SSD - Solid State Drives


One of the big items in the world of computers from the 2007 CES show in Las Vegas is the SSD or Solid State Drive. This is actually technology that has been around for many years, but only now is it actually set to become something that consumer may actually get to use within the next year. This article takes a look at exactly what is a solid state drive and how it may benefit consumers, especially with their portable computing.

What is a Solid State Drive?

Solid state is an electrical term that refers to electronic circuitry that is built entirely out of semiconductors. The term was originally used to define those electronics such as a transistor radio that used semiconductors rather than vacuum tubes in its construction. Most all electronics that we have today are built around semiconductors and chips. In terms of a SSD, it refers to the fact that the primary storage medium is through semiconductors rather than a magnetic media such as a hard drive. Now, you might say that this type of storage already exists in the form of flash memory drives that plug into the USB port. This is partially true as solid state drives and USB flash drives both use the same type of non-volatile memory chips that retain their information even when they have no power. The difference is in the form factor and capacity of the drives. While a flash drive is designed to be external to the computer system, an SSD is designed to reside inside the computer in place of a more traditional hard drive. So how exactly do they do this? Well, an SSD on the outside looks almost no different than a traditional hard drive. This design is to allow the SSD drive to put in a notebook or desktop computer in place of a hard drive. To do this, it needs to have the standard dimension as a 1.8, 2.5 or 3.5-inch hard drive. It also will use either the ATA or SATA drive interfaces so that there is a compatible interface.

Why Use a Solid State Drive?

Solid state drives have several advantages over the magnetic hard drives. The majority of this comes from the fact that the drive does not have any moving parts. While a traditional drive has drive motors to spin up the magnetic platters and the drive heads, all the storage on a solid state drive is handled by flash memory chips. This provides three distinct advantages: * Less Power Usage * Faster Data Access * Higher Reliability The power usage is a key role for the use of solid state drives in portable computers. Because there is no power draw for the motors, the drive uses far less energy than the regular hard drive. Now, the industry has taken steps to address this with drive spin downs and the development of hybrid hard drives, but both of these still use more power. The solid state drive will consistently draw less power then the traditional and hybrid hard drive. Faster data access will make a number of people happy. Since the drive doesn't have to spin up the drive platter or move drive heads, the data can be read from the drive near instantly. In a recent demo of two similar equipped notebook computers, Fujitsu was able to demonstrate a roughly 20% speed increase in the booting of Windows XP on a SSD over a standard hard drive. Reliability is also a key factor for portable drives. Hard drive platters are very fragile and sensitive materials. Even small jarring movements from an impact can cause the drive to be completely unreadable. Since the SSD stores all its data in memory chips, there are fewer moving parts to be damaged in any sort of impact.

Why Aren't SSDs Used For All PCs?

As with most computer technologies, the primary limiting factor of using the solid state drives in notebook and desktop computers is cost. These drives have actually been available for some time now, but the cost of the drives is roughly the same as the entire notebook they could be installed into. This is gradually changing as the number of companies producing the drives and the capacity for producing the flash memory chips grows. Drives announced at the 2007 CES were priced at less than half of the drives of the same capacity from the previous year. The other problem affecting the adoption of the solid state drives is capacity. Current hard drive technology can allow for over 200GB of data in a small 2.5-inch notebook hard drive. Most SSD drives announced at the 2007 CES show are of the 64GB capacity. This means that not only are the drives much more expensive than a traditional hard drive, they only hold a fraction of the data. All of this is set to change soon though. Several companies that specialize in flash memory have announced upcoming products that look to push the capacities of the solid state drives to be closer to that of a normal hard drive but at even lower prices than the current SSDs. This will have a huge impact for notebook data storage.

Saturday, February 7, 2009

The Micro-Server Line



The Micro-Server line of compact server appliances is built around a powerful embedded, fanless computer system in a rugged extruded aluminum chassis. With a minimum of parts and a low power requirement, reliability is enhanced. Perfect for that Green IT application.

Sizes of the servers


A Micro-Server is just 6.7" W x 4.9" D x 2.3" H. Microservers come in two CPU / RAM configurations. The Basic Server is based on the 800 MHz. Via Eden Nano fanless CPU with 256 MB of RAM and the Enhanced Server is based on the 1.2 GHz Via Esther fanless CPU with 512 MB or 1 GB of RAM. Both systems can be ordered with one or two 10/100 MHz NICs. A COM port (on the single NIC model only), LPT (parallel) port, 2 USB ports, keyboard and mouse ports and VGA display and audio are standard. An optional Mini-PCI socket can be ordered on the single NIC versions. Either a COM port or a LPT port can be selected on the Enhanced Server two NIC models. Even though the system can be operated as a complete Linux or freeBSD server with a display and keyboard, those models with a COM port can run headless in an out of the way environment using the COM port as a serial console if an operator interface is needed, even over a modem. Standard servers can be ordered with your choice of 40 GB to 160 GB disk drives .

It helps to researches

A Micro-Server can provide you with a targeted solution for any dedicated server application at a reasonable price. A Micro-Server is perfect for the SOHO or research, development and test environment. They can be easily configured to be a dns or dns cache server, web server, nfs server, ftp server, database server, mail server, etc. Choose a server solution from the product selection menu at the left or if you don't see what you need, just fill out the contact page associated with any product or call us to discuss your custom needs.

Thursday, February 5, 2009

HTC MAX 4G


HTC MAX 4G - the world's first integrated GSM/WiMAX handset. Supported by a broad range of services based on Mobile WiMAX network, the HTC MAX 4G delivers a rich multimedia and high quality telephony experience in a sleek and powerful touch screen handset.

HTC MAX 4G: A New World of Entertainment


The Mobile WiMAX network offers high-speed wireless Internet access that opens a new realm of entertainment and communication possibilities. This will provide subscribers with instant access to online games, maps, messaging and file exchange applications while on the move. In addition, the high-capacity Mobile WiMAX network with traffic prioritisation algorithms, allows online films, video and TV programmes to be viewed on the large WVGA screen.

Thanks to mobile WiMAX, high-quality multimedia entertainment is no longer limited. A full video on demand (VOD) service, users can watch their favourite movies and videos from WiMax service providers anytime, anywhere.

The vibrant, 3.8 inch 800x480 screen of the HTC MAX 4G can display up to nine TV channels simultaneously, allowing quick and easy channel surfing and programme selection. Thanks to the device’s TV-out capability, users can also watch content on the big screen, putting the HTC MAX 4G at the very heart of the mobile entertainment experience.

For music-lovers, they can choose to either play the tracks direct from the online catalogue, or download them to the HTC MAX 4G's 8GB of onboard flash memory.

HTC MAX 4G: Unparalleled Performance With Intuitive Usability


The HTC MAX 4G was created to take full advantage of high-speed Mobile WiMAX network without compromising style or ease of use. The device is sleek and elegant and includes a vibrant, large 3.8 inch, 800x480 WVGA touch screen display. Running Windows Mobile 6.1, the HTC MAX 4G incorporates HTC’s proprietary Touch FLO 3D user interface, allowing swift and intuitive navigation to key applications such as dialling calls, listening to music, taking picture and more.

Images taken with the integrated 5MP camera can also be geo-tagged using coordinates from the integrated GPS.