Saturday, November 29, 2008

Book Review : Home Wireless Networking in a Snap



ISBN: 0672327023 | 408 pages | March 15, 2006 | Sams Teach Your Self


Book Description :
These days, nobody really wants to learn everything there is about their hardware and software. And even if you did, who has the time to endlessly tinker and play with it until you figure everything out? You just want a book that will quickly show you how to set up your home wireless network. Home Wireless Networking in a Snap is designed specifically for busy people like you. You can have it in versi chm or want to buy this book.

This book covers the things that aren't already covered in the documentation that came with your equipment and the things you can't just figure out on your own. It is organized into a series of well-organized, bite-sized, quickly accomplished tasks, that lets you zero right in on particular tasks you want to accomplish. This hands-on approach to setting-up a secure home wireless network will have your network up and running in no time.

Book Review : Electrical Engineering Standard Handbook


By : Donald G. Fink, H. Wayne Beaty
Format : eBook, 2000 pages
ISBN : 007149149X / 9780071491495

The Standard Handbook for Electrical Engineers has served the EE field for nearly a century. Originally published in 1907, through 14 previous editions it has been a required resource for students and professionals. This new 15th edition features new material focusing on power generation and power systems operation – two longstanding strengths of the handbook that have recently become front-burner technology issues. At the same time, the entire format of the handbook will be streamlined, removing archaic sections and providing a quick, easy look-up experience.


Table Of Contents:
Section 1: Units, Symbols, Definitions, and Conversion Factors
Section 2: Electric and Magnetic Circuits
Section 3: Measurements and Instruments
Section 4: Properties of Materials
Section 5: Generation
Section 6: Prime Movers
Section 7: Alternating-Current Generators
Section 8: Direct-Current Generators
Section 9: Hydroelectric Power Generation
Section 10: Power System Components
Section 11: Alternate Sources of Power
Section 12: Electric Power System Economics
Section 13: Project Economics
Section 14: Transmission Systems
Section 15: Direct Current Power Transmission
Section 16: Power-System Operation
Section 17: Substations
Section 18: Power Distribution
Section 19: Wiring Design for Commercial and Industrial Buildings
Section 20: Motors and Drives
Section 21: Industrial and Commercial Applications of Electric Power
Section 22: Power Electronics
Section 23: Power Quality and Reliability
Section 24: Grounding Systems
Section 25: Computer Applications in the Electric Power Industry
Section 26: Illumination
Section 27: Lightning and Overvoltage protection
Section 28: Standards in Electrotechnology, Telecommunications, and Information Technology

Biographical note:
H. Wayne Beaty is former senior editor of Electrical World magazine and former managing editor of Electric Light & Power magazine. He is also the author of the Handbook of Electric Power Calculations, now it its Third Edition, and the co-author of Electrical Power Systems Quality, now in its Second Edition. Mr. Beaty received the 2006 IEEE Power Engineering Society Award for Excellence in Power Distribution Engineering.
Donald G. Fink (deceased) was director emeritus of the Institute of Electrical and Electronic Engineers (IEEE). The Fourteenth Edition of this Handbook was dedicated to his memory and accomplishments. The reader is referred to that dedication to appreciate the outstanding contributions Mr. Fink made to the field of electrical engineering.

Book Review : Smart Antennas - State of Art


Smart Antennas—State of the Art
EURASIP Book Series on Signal Processing and Communications
Volume 3, ISBN (Hardcover): 978-977-594-509-9,
ISBN (PDF): 978-977-454-055-4
doi:10.1155/9789775945099

Smart Antennas—State of the Art brings together the broad expertise of 41European experts in smart antennas. They provide a comprehensive review and anextensive analysis of the recent progress and new results generated duringthe last years in almost all fields of smart antennas and MIMO (multiple-inputmultiple-output) transmission.

The following represents a summarizedtable of content:
  • Receiver: space-time processing, antenna combining, reduced rank processing, robust beamforming, subspace methods, synchronization, equalization, multiuser detection, iterative methods.
  • Channel: propagation, measurements and sounding, modelling, channel estimation, direction-of-arrival estimation, subscriber location estimation.
  • Transmitter: space-time block coding, channel side information, unified design of linear transceivers, ill-conditioned channels, MIMO-MAC strategies.
  • Network Theory: channel capacity, network capacity, multihop networks.
  • Technology: antenna design, transceivers, demonstrators and testbeds, future air interfaces.
  • Applications and Systems: 3G system and link level aspects, MIMO HSDPA, MIMO-WLAN/UMTS implementation issues.
This book serves as a reference for scientists and engineers who need to beaware of the leading edge research in multiple-antenna communications, an essential technology for emerging broadband wireless systems.

This book was edited by Thomas Kaiser, André Bourdoux, Holger Boche, Javier Rodríguez Fonollosa, Jørgen Bach Andersen, and Wolfgang Utschi. And published by : Hindawi Publishing Corporation

Friday, November 21, 2008

Book Review : Fundamentals of Wireless Communication

Book Description


The past decade has seen many advances in physical-layer wireless communication theory and their implementation in wireless systems. This textbook takes a unified view of the fundamentals of wireless communication and explains the web of concepts underpinning these advances at a level accessible to an audience with a basic background in probability and digital communication. Topics covered include MIMO (multiple input multiple output) communication, space-time coding, opportunistic communication, OFDM and CDMA. The concepts are illustrated using many examples from wireless systems such as GSM, IS-95 (CDMA), IS-856(1xEV-DO), Flash OFDM and ArrayComm SDMA systems. Particular emphasis is placed on the interplay between concepts and their implementation in systems. An abundant supply of exercises and figures reinforce the material in the text. This book is intended for use on graduate courses in electrical and computer engineering and will also be of great interest to practicing engineers.


Copyright notice :
The book is copyright (c) Cambridge University Press. The online version of this book (available on this website without the exercises) is subject to the same copyright rules as traditional books (eg. copying the book onto paper (ie. printing) is not permitted).

Monday, November 17, 2008

Mobile IP (Internet Protocol)

Mobile IP is an Internet Engineering Task Force (IETF) standard, outlined in RFC 2002. A number of other IETF standards also address Mobile IP, including RFC 2003, RFC 2004, RFC 2005, and RFC 2006.

This is an industry standard—not technology that's proprietary to Cisco. This means that, in theory, there should be interoperability between Mobile IP devices (no matter the brand), assuming they support the standard. Cisco Mobile IP is a suite of software that runs on different devices, including Mobile IP that runs on IOS routers and the Cisco Mobile Client for Windows.

One Mobile IP feature that you should be familiar with is Local-Area Mobility (LAM). This features allows a device to roam from a local IP subnet to another local IP subnet, all while keeping the same IP address. This means you could walk from network to network between buildings on a large campus while using your device.

To determine whether your router supports Mobile IP, go to the Global Configuration Mode prompt of your router, and enter the following:

ip mobile ?

Here's an example:

Router(config)#ip mobile ?
foreign-agent Foreign Agent services
home-agent Home Agent services
host Grouping of one or more mobile hosts
secure Security association
tunnel Mobile IP tunnel settings
virtual-network IP address of virtual network
containing mobile hosts

Router(config)#ip mobile

You can accomplish most Mobile IP configuration using the ip mobile command. You also use this command to enable Mobile IP routing. Here's an example:

Router(config)# router mobile

Space constraints prevent me from discussing how to configure Mobile IP in this article. For more information on how Mobile IP works and to learn how to configure it, check out in Cisco's Mobile IP IOS Configuration Guide (need cisco name and password to access this resource). configuring Mobile IP and preventing users from experiencing any interruptions when roaming from LAN to WLAN to DSL to coffee shop can still be somewhat problematic.

Sunday, November 16, 2008

ASUS N10JC ... seen at Bandung Comtech 2008


I saw ASUS N10JC in the last day of Bandung Comtech 2008 at Be-Mall.The N10 is designed a step above other netbooks, with a better paint scheme and chrome accents. The N10 offers similar features to standard netbooks, including an Intel Atom platform and WSVGA screen, but with the addition of optional switchable dedicated graphics and a fancy design.

There are several different configurations of the N10 series available at various online stores. Some configurations offer Windows Vista, others include a different hard drive or use integrated graphics rather than dedicated. The only reason we mention this is so that consumers are aware that there are different configurations on the market to meet the needs of different people.

ASUS N10JC-A1 Specifications:

  • Intel Atom 1.6GHz processor.
  • 160GB 5400 RPM Hard Drive (Seagate 5400.4).
  • NVIDIA 9300M GS with 256MB DDR2 memory and Intel GMA950.
  • 1GB of DDR2 RAM (667MHz).
  • 10.2” WSVGA Glossy LED-Backlit 1024 x 600 LCD.
  • Ports: 3 USB 2.0, HDMI,VGA monitor out, headphone jack, microphone input, 8 in 1 SD card reader (SDHC compatible), Kensington lock slot, Ethernet 10/100, ExpressCard/34.
  • Webcam (1.3 MP).
  • Battery: 11.1v 4800mAh 53Wh 6-cell battery.
  • Wireless: 802.11b/g.
  • Two-year Limited Global Warranty.
  • Size: 10.8 (W) x 8.25 (D) x 1.46 (H).
  • Weight: 3lbs 8.5oz, 4lbs 2.1oz with AC adapter.



Wednesday, November 12, 2008

Ebook Review : Illustrated TCP/IP


Publisher : John Wiley & Sons
Language : English
ISBN : 0471196568
Paperback: 499 pages
Data : November 5, 1998
Format : PDF



Now its already born new ip version which is IPv6, its more complicated than the previous one (IPv4).

Whether you’re adding new TCP/IP applications to your office suite or migrating from IPv4 to IPv6, Illustrated TCP/IP gives you instant access to the detailed information you need-in a unique quick-reference format. Each topic is concisely explained on a large-format page, with a PowerPoint slide graphic to illustrate key concepts. Matt Naugle covers all the bases, including:
  • A concise, easy-to-read discussion of the TCP/IP protocol.
  • IPv4 and IPv6 addressing
  • FTP, DNS, SMTP, SNMP, BOOTP, DHCP, RSVP, RTP, RTCP, and other major applications protocols.
  • Routing protocols RIP, RIPv2, and OSPF.
  • IP multicast.
  • The impact of IPv6 on existing networks.
  • Migrating from IPv4 to IPv6.
  • RFCs and where to find them.

Ebook Review : The Ultimate HTML Reference


by Ian Lloyd (Author)
SitePoint (May 19, 2008) | PDF | 552 pages | 11.5mb (rar)




Sitting at the foundation of every site is HTML. It's the only language that's essential to a web site's very existence. On the surface HTML may seem simple but there's much more to it that meets the eye. With different versions, many infrequently used elements and attributes, and varying ways that browsers interpret the language, only a comprehensive and up-to-date reference, like this book, has it completely covered.

The Ultimate HTML Reference is your definitive resource for mastering HTML. The entire language is clearly and concisely covered, along with browser compatibility details, working examples, and easy-to-read descriptions. Authored by one of the world's most renowned HTML experts, this is a comprehensive reference that you'll come back to time and time again.

This cross-referenced, easy-to-use book covers:
  • Every element and attribute in the HTML and XHTML Specifications, including an example of its correct use.
  • Coverage of deprecated and proprietary elements.
  • Detailed browser compatibility information will save you hours of painful debugging and frustration.

McGraw-Hill Dictionary of Engineering


McGraw-Hill Dictionary of Engineering
Sixth Edition
Digital Edition,Software Application
ISBN: 0071462708
March 13, 2006
From McGraw-Hill



Derived from the world-renowned McGraw-Hill Dictionary of Scientific and Technical Terms, Sixth Edition, this vital reference offers a wealth of essential information in a convenient, quick-find format.

Whether you're a professional, a student, a writer, or a general reader with an interest in science, there is no better or more authoritative way to stay up-to-speed with the current language of the various branches of engineering or gain an understanding of their key ideas and concepts.

Thousands of technical terms from the various engineering disciplines-from construction, to chemical engineering, to telecommunications-are included in the Dictionary. Just key in the word or phrase you're looking for, click on the "search" button, and every entry containing the term is displayed. Click on each displayed item for the definition. There's even a "quick index" feature that searches for your entry while you're typing it. Whether you're looking for "Abram's law" or "sulfuric acid alkylation," you'll find the answers right here.

There's no better way to find the definitions you need - in an instant!

  • Has been extensively revised, with 17,500 entries encompassing the language of engineering.
  • Includes synonyms, acronyms, and abbreviations.
  • Provides pronunciations for all terms.
  • Covers such topics as building construction, chemical engineering, civil engineering, control systems, design engineering, engineering acoustics, industrial engineering, information technology and computing, mechanical engineering, systems engineering, telecommunications, and thermodynamics.
  • Includes an appendix containing tables of useful data and information.

System Requirements:
Windows? 2000 or higher
512 MB or Ram or higher
20 MB of hard drive space or more

*NOTE: Not avalaible for A Mac version at this time.

Download: here
Size 2.57 MB

Tuesday, November 11, 2008

Ebook Review : Career Satisfaction From Within



This book takes a spiritual approach to creating lasting career satisfaction by helping readers cultivate an inner sense of wholeness.
This feeling of completeness helps people transcend the anxieties that prevent them from finding focus and passion in their work.
The exercises in the book, which largely involve visualization, meditation and conscious breathing, help readers realize that they are complete and worthwhile beings, no matter what their career situations.

A Methode to Look up Gmail Address

After know how to look up yahoo address online or offline, now i'm trying to search using google seacrh engine a methode to look up Gmail address. Finally i found this article :

If you have a GMail, you have gotten an address through Google. Though there are always exceptions, and it depends on how you treat your address, this is one account that should have considerably less spam than others that you may use. Because it appears that Google is very careful with it's customers email addresses, finding a directory of these through which you can search is hard, if not impossible. You have to think of different ways to search.

Though you may not find any place where Google has listed your GMail account, or anyone else's address, these can be found if someone is loose with their account. What this means is that they have posted their GMail address in full somewhere online. If that is the case, you can search it out. You may also find it listed in places that may not show up if you use the search engines.

If you choose to use the search engines first, there is a simple formula that you can use to get what you want to come up at the top of the pile. You can search by name, but that may not get you far. Instead, add a tag that brings up email. You can use name + email or name + GMail. If you are searching in reverse, just enter the address into the search to see if a name comes up in association with that GMail address.

You should consider a search through Orkut. This is a professional/social network that is run by Google. There people use their GMail to sign up and use the service. The GMail is only going to come up if the user has opted to have it so. This and other professional networks are good places to find a lot of different types of contact information in forward or reverse searches, as those networking for career reasons want others to find the information to contact them.

If you are coming up blank, you are not alone. Google tries to hide the IP address on email headers, making them harder to trace. You may have to try the services of reverse email search sites. These may find you more than you can ever hope to find on your own.

Methode to know Yahoo ID online

Want to know how to see your buddy online or offline while chatting using YM ?? maybe you can try this methode :

One of the most common internet service providers today is Yahoo! From the very introduction of web-based email messages, Yahoo! has been around, but they are only now becoming more popular. The extreme commonality of these email addresses means that you may very likely find yourself needing to learn more about such an address. Luckily, a reverse email lookup can very often help you learn more.

The first step to using a reverse email lookup is to turn on your computer and make sure your internet connection is working correctly. Although there is no central directory of email accounts, you should still be able to find everything you need in one place. Reverse email lookups can access both public and private server databases, so whether you are looking up a Yahoo! address or even a small business server, the owner of the email address should not remain a mystery for long.

Learning how to access and use a reverse email lookup is one of the most important things you can do with your computer and internet. After all, there are lots of spammers out there, not to mention scam artists and hackers sending viruses. You never know what could lie behind even a seemingly innocent Yahoo! email unless you look it up online, and this is the best way to do so.

cheers.. :)

Modify Your Existing Blogspot Template

Blogger's Layout feature is an easy-to-use template editing feature that allows you to edit and customize your Blogger template without any knowledge of HTML or CSS. You can easily edit and customize the colors, fonts, header and sidebar of your blog with a few clicks of the mouse.

If you looking for blogspot template that is good in design and simple at layout, maybe you can ask help to search using google.com with keyword " free blogspot template". Maybe you can try this site : bloggertemplates.itma.org , various template and layout are available and free to download. For example :
But first you have to backup your template before you change to new layout.

Dell Mini 12. Atom + Vista. Why?

Where would netbooks be without Windows XP? Probably nowhere, so why have Dell decided to combine the low-power Atom Z-series with Windows Vista on their new 12" laptop? There’s two reasons.

1 - To save a few watts/degrees/mm

2 - To enable a high-end video experience

mini12-2

The one thing that hasn’t been tested yet is video. The Poulsbo chipset offers hardware decoding for a number of video encoding formats and maybe Dell want to use this as the main feature but from what I can see, there’s no HDMI or composite output so they are obviously not aiming the device at media fans, especially with that relatively slow and small 60GB, 1.8" 4200 RPM drive they’ve put inside. No, it looks like they wanted to go for the smallest, quietest and lowest power build and Menlow/Vista was probably the only choice. Many people are aware that XP drivers just don’t seem to be materialising for the Menlow platform so it looks like Dell made the choice to push out a Vista version rather than wait.

The problem they have now is that the first reviews will stick in the Internet search results and poison any future release of the same model. They also poison the Menlow platform. The Dell Mini 12 is a big mistake. They really should have waited until Windows 7 was available.

Windows 7 worrying by Linux but Hope For UMPC

Smaller memory footprint, faster boot, better UI and longer battery life. Windows 7 is not only going to be interesting for the laptop and desktop, it’s shaping up well for Netbooks and UMPCs too. Vista always offered better touch and natural input mechanisms but it was a struggle to run it on Ghz-class devices. The reports coming back from Windows 7 pre-beta testers point towards a much more usable system on these devices.

t really looks like Microsoft will put a lot of effort into making it work well on Netbooks where Linux is obviously taking sales but if it carries a standard licensing price and XP for ULCPCs goes away, there’s still a chance for Linux on the really cheap devices. Unless of course Microsoft surprise us with an X86-build of Windows Mobile 7 which would close off one of the last great hopes for consumer Linux.

Lets assume that there won’t be an X86-build of Windows Mobile though. I wanted to highlight some thoughts about why Windows 7 might be good for low-end PCs it might not be a solution for MIDs. Linux has a great opportunity here, as does a re-worked XP.

  • 10gb of install requires either an expensive flash drive.
  • Boot times on W7 are still not as fast as XP or a slim Linux.
  • Battery life might be improved over Vista but is it improved over XP? I doubt it.
  • Why run using 512MB when it can run in under 200MB (XP Home requires much less memory)
  • Your, likely, most-used applications look the same on any operating system.
  • XP or Linux is likely to cost less. (testing, license, deployment and support.)
  • User interface changes could be added to XP using overlays (Origami was a good start, work seems to have stopped now.)
  • Why carry support (drivers) for hardware you will never have on your device.
  • Why carry programs (Gallery, Media Player, Email client) that you may never use.

Wouldn’t it be nice if we could just take a stripped-out XP with a nicer UI and touch integration so that we could run our programs efficiently on MIDs? If MS want to cut-off Linux in the netbook arena with low-cost XP then why don’t they do that? Maybe Intel got it right by putting serious investment into Linux area. If XP goes away, its currently the only hope for 2009/2010 MIDs.

Monday, November 10, 2008

Ebook : IPv6 Core Protocols Implementation


IPv6 was introduced in 1994 and has been in development at the IETF for over 10 years. It has now reached the deployment stage. KAME, the de-facto open-source reference implementation of the IPv6 standards, played a significant role in the acceptance and the adoption of the IPv6 technology. The adoption of KAME by key companies in a wide spectrum of commercial products is a testimonial to the success of the KAME project, which concluded not long ago.

This book is the first and the only one of its kind, which reveals all of the details of the KAME IPv6 protocol stack, explaining exactly what every line of code does and why it was designed that way. Through the dissection of both the code and its design, the authors illustrate how IPv6 and its related protocols have been interpreted and implemented from the specifications. This reference will demystify those ambiguous areas in the standards, which are open to interpretation and problematic in deployment, and presents solutions offered by KAME in dealing with these implementation challenges.

Are you interesting with this ebook?? please click this link

E-book : Routing First-Step

Your first step into the world of routing

No routing experience required
Includes clear and easily understood explanations
Makes learning easy
Your first step to understanding routing begins here!

Learn routing basics simply and easily
Explore how network traffic gets from here to there
Understand routing tools and technologies
Reinforce your understanding with chapter review questions
Welcome to the world of routing!

Routing is the technology that enables worldwide Internet communication. Many people involved with networking technologies or companies need to know how routing works. But learning about routing tends to involve a complex web of terms and acronyms-a language that can be difficult and unfamiliar.

Routing First-Step explains the basics of Internet routing in language all of us can understand. This book takes you on a guided tour of routing, starting with systems you are familiar with: the postal system, the telephone system, and the interstate highway system. From there, you'll learn routing simply and easily. Whether you are looking to take your first step into a career in networking or are interested only in gaining knowledge of the technology

download : follow this link

Watch Out For The Big Skim in ATM

For those of you nervous about doing your banking online, here are some comforting words: It may be just as dangerous to do it at an ATM machine.

That's because scammers have figured out how to steal your account details and PIN number straight from the machine. They've been doing it for a while. And they're getting better at it: Think of it as an industry with its own standards, supply chain and, well, ethics.

Here's, roughly, how it works. A scammer walks up to an ATM machine. He chooses one in a place that's not too busy, where there aren't too many surveillance cameras, and where there are lots of tourists or rich people. He reaches into a plastic shopping bag and pulls out what looks like the card slot of an ordinary ATM machine -- the bit on the panel where you slide in your ATM card.

Actually, it is the slot of an ATM machine, only it's got an extra card reader built in. He sticks this over the top of the existing slot; it fits so well that unless you look carefully you won't see anything odd.

The only thing is that now the magnetic strip on your card would be read twice as it goes in -- once by the bad guy's reader and once by the bank's machine.

The other part is the PIN reader. This can be done in a couple of ways: Either by laying an extra key pad over the existing one, in much the same way he's laid an extra card reader over the legitimate one. This will just capture your PIN number as you key it in.

Another way is to hide a little camera somewhere near the screen to record you tapping in your PIN number. This could be hidden in a fake speaker -- which is where an alert customer found one in Pennsylvania last year -- or a leaflet holder, or over the customer's head. (If you're interested, you can watch some alleged bad guys installing this gear in less than a minute here: http://is.gd/41XO).

All this information is stored on a flash card or something inside the fake keypad or card slot. Now the scammer has all the information necessary to make a fake card, program it with your account, waltz up to an ATM machine and enter your PIN number.

(Oh, and before you ask, you can buy a machine that makes a credit or ATM card, complete with magnetic strip, online for a few hundred dollars. Legitimately.)

This may be news to you, but it's certainly not new. ATM skimming, as it's called, has been on the go for quite a few years -- at least since 2004, but probably earlier. And it's big business: Turkish police in September arrested a man who, they said, had sold skimming devices to 10 countries including in North America and Europe. The police footage of his house includes boxes of ATM slot covers, keypads, and what looks like either a sun-bed or an ATM card maker. (You can watch the raid here: http://is.gd/41Xz).

He also ran an online network which had details of at least 15,000 credit cards. Members bought gear, swapped stories, sold and bought credit card numbers, bitched about the neighbors and the FBI. The website was shut down earlier this month, but there's bound to be another one up soon.

Now you may think that your visit to an ATM should be safer than this. OK, you might say, I can understand that my bank can't be sending folk around to my house to check my computer is free of viruses, trojans and key-loggers, but surely they can have someone go around and periodically check that their ATM machines don't have dodgy bits stuck on them, like extra card readers or keypads?

And if that's too tricky, how about looking out for the more obvious stuff like speakers and brochure holders that weren't part of the original design? Surely if a customer can spot these things, an employee should be able to?

The thing is that banks do seem to be getting smarter. The problem for bad guys is that until recently they would have to go back to the ATM machine to pick up their gear and download the data. This is the risky bit, because the banks are beginning to wise up, figure out something is amiss and may be waiting for them.

So now they're getting smarter. (The bad guys, not the banks.) They are putting cell phones or wireless chips inside the card slots or keypads or speakers or brochure holders to transmit the data back to wherever they're waiting.

Now they don't need to pick up their gear. Skimmers, as these people are called, can now buy a complete device which can transmit more than 1,800 cards via SMS before needing a re-charge. The whole kaboosh for US$8,000.

Or they can dial into the device when they like and download the data. By then they've probably got enough ATM data to buy their own bank.

In other words, you've got to feel slightly sorry for the banks. This is sophisticated stuff. And it's getting more so; according to some security consultants, there are indications that the slot covers that these guys use so closely match the ATM machines in color, material and dimensions that they may well be made by the same manufacturer.

As the blurb to one skimmer's brochure put it: "Thus, we achieved the full and precise compliance of the paint's tone, gleam, hue at the different light angles, the paint's surface feelings to the touch etc. In the real situations the skimmers really look like an integral part of the ATM."

The scammers are clearly getting smarter -- either by being in cahoots with the employees of the companies that make these machines, or else by studying the material very carefully.

Either way, it looks like the banks are woefully out-gunned. They're trying a few things -- one is "jitter", which moves the card around while it's being read, confusing a scammer's reader-but this means replacing all the old ATM machines. I can't see that happening any time soon.

Bottom line? This may not happen everywhere, and it may not happen very often. But it makes sense to use ATM machines that are in your bank (i.e. not in a mall or the middle of a red light district), that you're familiar with, and that you've thoroughly inspected for oddities -- from extra card readers to brochure holders with little cameras coming out of them.

NetApp, another player in storage management

"Each time I mention storage, a lot of people will think of hard disks," said Steven Law, the country manager of NetApp for Indonesia. "The fact is, the disks are only a component in a storage solution."

It is easy to understand why to the majority of users storage means the spinning platters inside the metal housing. Every PC, every notebook and even some smartphones have a hard disk. It is where the operating system, the application software and the data are stored.

In reality, storage -- especially as the term is used in the corporate and enterprise environments -- is more than just a place to keep all the 0s and 1s. It is the management of the gamut of storage devices.

These storage devices may be grouped into two types, namely, Network Attached Storage (NAS) and Storage Area Network (SAN). "They do not speak the same language," Steven said during a recent press briefing in Jakarta.

NetApp, his company, is just one of the very few companies that provide storage solutions to corporate and large enterprises. The others, of course, are Hitachi Data Systems (HDS), EMC, IBM and Hewlett Packard.

As I wrote here in the past, the relationships between these companies are quite complex. They may compete in a certain market segment, but use each other's products to address the needs for a different segment. Some vendors are strong on the server side, while others may need the servers to make their solution work.

We all know the digital revolution has created a volume of data that continues to grow exponentially. While the capacity of hard disks has also grown substantially, it will never be able to cope with the data explosion. Therefore, a solution is required to manage the data, where it is stored, backed up, archived and so on.

Today, enterprises talk about petabytes of data. If we consider that one petabyte is equal to a bit more than one million gigabytes, we will have some idea of how huge is the volume of data that has to be managed, compared with the capacity of the hard disk that exists in your desktop PC.

"Keep in mind that one KB of data produced requires around 10 KB of supporting data, including the backup and archive," said Steven.

The more common thinking is to buy additional disks as the volume of data grows. However, this will lead to a chaotic storage ecosystem. More storage devices means more electricity, space, maintenance costs and so on.

How to Enable Bluetooth in Windows Server 2008

Users who are using Windows Server 2008 64bit Standard Edition generally face a common problem on its Bluetooth part. All applications seem to work well except for the Bluetooth drivers. Users can search and add Bluetooth devices to their computer but these devices appear as unknown in the system. If users try to browse for the drivers, the system will indicate the drivers are not found. Even though Windows Server 2008 has built in Bluetooth service, but due to some reasons, Microsoft seems to have imposed some limitations to it and it can’t work properly without some additional settings.

To enable Bluetooth to work and install the Microsoft Bluetooth Stack on Windows Server 2008, Gil Kirkpatrick has come out with a solution to modify the INF files in the default Windows Server 2008 and subsequently install the Microsoft Bluetooth Stack in the OS. The process is detailed but tedious. Robert McLaws has simplified these detailed processes and they work more easily for non tech-savvy users:

a. Download a customized zip files
b. Unzip the file to C:\Bluetooth
c. Open up the Device Manager
d. right click any items that still say “Unknown Device” and select “Update Drivers”
e. Select the bottom menu option and browse to the C:\BT folder
f. “Lather, rinse, repeat” for any other Unknown Devices

With these steps, your Bluetooth devices will work fine with Windows Server 2008

welcome to Indocomtech 2008

INDOCOMTECH 2008 in Nov 12-16, will be occupying Hall A, Hall B, Cendrawasih and Plennary Hall at the Balai Sidang Jakarta Convention Center. This is our 16th show. Inconjuction to our show this year, the 1st IndogameShow and APICTA (Asia Pacific ICT Award), also A book fair will be held in conjunction with the Indocomtech. Many scholars, students, scientist and lecturers and many book enthusiast will have a chance to visit the Computer show at the same time.

Executives and Government Officers, from all over Indonesia are requested to register, for an official invitation and badge to be recognize by the exhibitors. Please provide us with a complete information and when your projects is due; It will help us in serving you with more information and arrange a meeting with the respective exhibitors.

Event Schedule
12 - 16 November 2008

Exhibition Hours
10.00 - 21.00 WIB

Venue

Hall A, Hall B, Cendrawasih Hall, and Lower Lobby Balai Sidang Jakarta Convention Center

Ticket
Rp. 5.000

Number of Exhibitors

300 Exhibitors will be occupying 20.000 sqm gross space

Product On Display
Notebook, PC Computer, Printer, PDA, Digital Camera, Projector / In Focus , Active Speaker, Etc

Hosted By
APKOMINDO Indonesia Foundation
Organized By
PT Dyandra Promosindo