Contents

Vintage Computer Add-in cards come in three basic flavors: 8-bit, 16-bit and 32-bit. These terms refer to the number of data bits the card sends out at one time. Ideally a 16-bit video card sends an image to the monitor in half the time it would take for an 8-bit version. It is important to know what kind of card your vintage computer accepts. The older PCs and XTs usually have an 8-bit or PC bus, which accepts the older PC bus, which accepts only the 8-bit cards. Vintage com...

Get On The Vintage Computer Bus

Get On The Vintage Computer BusVintage Computer Add-in cards come in three basic flavors: 8-bit, 16-bit and 32-bit. These terms refer to the number of data bits the card sends out at one time. Ideally a 16-bit video card sends an image to the monitor in half the time it would take for an 8-bit version. It is important to know what kind of card your vintage computer accepts. The older PCs and XTs usually have an 8-bit or PC bus, which accepts the older PC bus, which accepts only the 8-bit cards. Vintage computers which are of more recent vintage use a PCI bus combined with ISA (Industry Standard Architecture).The ISA bus was basically the original AT vintage computer bus. This expansion bus originated with the IBM PC at an 8-bit bandwidth. IBM improved on the design with the PC/AT raising the bandwidth to the 16-bit standard.In addition to the ISA bus, there is typically an auxiliary bus such as the VL-bus or the even more recent and now accepted standard the PCI bus both were designed for video cards so that they could operate at faster speeds. The PCI bus as we know went on to become the industry standard all purpose bus. Another bus called EISA was going to become the industry standard but instead went on to have a life almost exclusively in the server realm.What was the basis of the development of the PCI bus? When the Pentium chip was released Intel saw the need for a more general purpose local bus that would eventually supplant the ISA/EISA and VL-bus designs completely. So Intel invented the Personal Computer Interconnect bus now more commonly without the comprehension of the historical background the PCI bus.An important point to remember is that the EISA is backward compatible with 8-bit cards (8 bit cards fit into EISAand EISA slots) but MCA will not work with either of the other two standards. (Backward compatible means that the device works with all previous hardware technology, but will not necessarily work with newer configuration standards). In other words cards for an EISA bus computer the cards from an ISA bus computer will work in the EISA vintage computer. However if you try to use these cards in a newer IBM you are out of luck if you want to use your older cards.Many video cards manufactured later were available in AT-ISA, PCI and VL bus. What would be considered newer more recent vintage computers were equipped with either a couple of VL slots and / or some PCI slots? If the vintage computer supports PCI bus this is a wise choice for performance and should be utilized if at all possible.Vintage computer add-in cards can also be described in terms of length length, length and full size cards. This along with less common XT height refers to the physical size of the cards. However the terms were rather arbitrary and there were no actual industry standards.Basically what happened over the next time period for vintage computers there was a mixture of both the ISA and PCI buses on vintage computer motherboards until at some point the ISA standard eventually disappeared from view.

Cell Phones Are Now PDAs And Cameras

Cell Phones Are Now PDAs And Cameras

What does it mean when you combine the power of a PDA with a mobile phone? If you need to you are able to conduct business when ever you want it doesnt matter what time of the night or day it is you will always have the ability to communicate. For women there are so many accessories and cases to put their cell phone, many cases come in leather and many different colors. As "mobile phone" s gain popularity they are fast replacing landlines in many homes, many children are receiving "cell phone" s from their parents where the children do not need to use the landlines anymore since they have their own personal phone and number.Well its going to get better; you are going to have a true video camera built into your phone, which will be good for 10 to 20 minutes of record time.Such customers can go in for prepaid, as it makes more sense to them. For many consumers who dont have a good credit rating and dont want to go thru the hassles prepaid cell phones is the perfect choice. Many people now are looking for free prepaid cell phones using the internet, many companies are doing this for promotional purposes. Many people are opting to use prepaid wireless plans because this is a way of putting a limit or budgeting how much you spend on phone calls. In cases such as those, prepaid cell phones can be the proverbial lifesaver. Prepaid cell phones are a good idea to keep the expense down, the calls are more expensive to make on these phones but you can only make the calls once the credit is there.As cell phones become more advanced and they started to features like video capabilities there has been a new group who created a movement called cell phone filming. Many have hailed the smart cell phone with video or digital picture ability as a great crime stopper.You can buy so many minutes for a certain amount of money. Prepaid mobile phone enable you to pay for the minutes that you need, basically pay as you go, remember the more you talk on the phone the more you will pay unless you put a budget guard on the phone. Think it over for a few minutes before you sign on the dotted line.When mobile phones first came out all you could do is dial a number and make the call, but now you can access the Internet, take pictures, and download music and video. These new Cell phones are going to be a multimedia center, a mobile office, a navigation device Global Positioning system, a computer with fast Internet access, a text messenger, a high resolution camera and video, a watch, a calculator, a PDA, an MP3 music player, TV and a Wallet.Accessories do not add to the performance of your mobile phone but it certainly dresses it up. You should purchase manufacturer or carrier recommended products and accessories wherever possible. Find ways to reuse or recycle your phone and accessories when youre finished with them.

Wireless Security Camera: A Smart Ally

Wireless Security Camera: A Smart Ally

With the high success rate of wireless security cameras in preventing crimes, do not be surprised if these babies of technology will be here for a long time. In fact, as you read this, it's highly possible new security camera models are being installed in at least 50 business establishments and 15 offices around the country. It's just as possible that in the time it takes you to learn how to operate your new "wireless security camera" , a better and more advanced model is being made.Wireless security camera technology typically involves a battery-operated camera. It does not store recorded images in its internal memory. What it does, instead, is transmit signals to a receiving device that may be located as far as up to 500 meters away. Remote monitoring can then be done by hooking up the receiver to a television. At present, there is a wide choice of models available for wireless security cameras. So, you have an option between a battery-operated and an AC-powered one.Your Friendly Neighborhood Wireless Security Camera Wireless security cameras have gained popularity in home use as a means for monitoring caregivers. These cameras, also known as nanny cams, are placed in discreet locations around the house. They record the interaction between the caregiver and the child, usually without the caregiver's knowledge. The purpose of the recording is to catch any signs of maltreatment in the part the nanny, especially while the child's parents are away from the home.Wireless security cameras installed in stores, public places, and crime-prone neighborhoods have been very effective in identifying robbers, catching speeding drivers, and significantly reducing the rate of crime in certain areas. Wireless Security Camera of the Future Software developers are now hard at work to come up with security models that are more than just passive recorders of goings-on in their line of focus. These developers promise a newly evolved security camera that can actually stop crimes before they occur.The wireless security camera of the future will be able to:1. Identify faces. A wireless security camera can quickly match key points in a person's face and compare it with the information in a database of recorded mug shots or photographs of individuals associated with criminal activities. This is very useful in screening people entering a country.2. Detect concealed weapon under an individual's cloak or clothing. The premise for this technology is that people who are concealing some form of firearms will walk differently compared to people who are unencumbered.3. Estimate an individual's height and weight. Again, this is a feature that will come in handy in case a person may be hiding firearms or a bomb beneath his or her clothing.4. Detect unattended packages or luggage. Most bombs are disguised as luggage. It is known modus operandi for terrorists to leave suitcases or other similar luggage in busy public transport terminals. A type of wireless security camera is now being developed to identify such unattended packages in any public area. These wireless security cameras will be designed to alert authorities who can then secure the area. No Compromises to Safety Although there is still much controversy surrounding the ethics of surveillance systems, the scales are still tipped in favor of putting civilians' safety first. Some states in the United States reached a compromise with critics of wireless security cameras by decreeing that surveillance systems installed in public areas should be prominently displayed and visible to all passersby.

Automatically Send E-mails To E-mail Heaven

Automatically Send E-mails To E-mail Heaven

If you remember last week at AME Computers weekly computer tips we talked about automatically backing up email messages that you consider important enough to back up, and how you can easily send those emails to removal media such as a CD or DVD.This week we will talked about those spam emails that you do not even want to read and waste time opening. Just the simple fact you open an email can tell the spammer that your email address is live and well and that is all they need to keep spamming you. And worst yet if you try to reply thru the unsubscribe link that even verifies you email address as active to even give the bad guys more of a reason to keep sending you spam.One surefire way to keep spammers at bay is to never reveal your real email address. Stop scratching your head and thinking how you not give your real email address. Well its very simple, unless it is your bank or and organization the your completely trust with your email address like for example AME Computers, give whoever is asking for the address a Yahoo or Hotmail address, and let Yahoo and MSN worry about the spam all you have to do is check once a month to keep it active and if you get spam, there is a lot less pain involved in having your real email address get on a spammers list.Ok so lets get back to the title of this weeks computer tip. There are two advantages to automatically deleting messages one they arrive in your inbox.1. Accidentally opening something that may cause your computer harm, and verify your email address.2. You spend a lot less filtering thru your email for messages that you want to read and messages you dont really care for.These instructions are for Outlook Express. We use Outlook Express because it comes free with Windows and right it is the most popular free email program.1. Start your Outlook Express email program2. Click Tools then Click on Message Rules.3. A window opens that is tile Message Rules, over in the right hand side click on New4. Select the conditions that meet the criteria for the message that you want to automatically delete. The first option Where the From line contains people usually works best.5. Click on contains people in the last box the Rules Descriptions field.6. A new window will open titled Select People. Enter the email address that you want to vanquish.7. The click Add over on the right side. Then click OK and that window will close.8. One more step, in the Select Action for your Rule filed click the box that says Delete it from server. Click Ok your done.Just remember how power full this rule is. Have Fun!

Anti Spam Anti Virus Solution

Computer and the related technologies are very much in use today. People and businesses depend on different soft wares and programs to work and to do many tasks which may be very important to them. The internet, e-mails and the computer and IT in general are very helpful in this regard but there are certain problems which reduce the efficiency of these technologies. Spam e-mails and computer viruses are two such problems. All the people who use computer in a routine and have a dependence on this machine know how problematic the viruses and the spam e-mails can be for you. Your precious time can be wasted due to these and along with that the viruses may also destroy the very important records or data. Anti spam anti virus solution is very important for making the computer and related technology dependable for you. There are many online companies which offer you the anti spam "anti virus" solution. Some of them are really good and can make your life much easier. Some such companies have their on line interface but they also work otherwise. Spam e-mails are those e-mails for which the sender has not taken permission form the recipient. The mails are generally mass e-mails but a personal e-mail for which the permission has not been taken from the recipient can be classified as spam. As spam e-mails are becoming more of a problem, "anti spam" anti virus solution has become more important in the recent past. Now lets see what the viruses are. Viruses generally come from the minds of the evil geniuses. Viruses are programs which have all the abilities to destroy or reduce the efficiency of other programs. As these programs are a problem, anti spam anti virus solution becomes very important for us. Both, the spam e-mails and the viruses, disturb the business environment in general. People are tired of these two problems and thus the anti spam anti virus solution is of importance to people. Anti spam anti virus solution makes your time more paying and more productive as the two major disturbances are no more there. Anti spam anti virus solutions are very important to us. They make our life easier. One of such solutions is the e-mail fire walls. These firewalls are capable of stopping the bombardment of e-mails in our e-mail boxes. By using these firewalls our e-mail addresses and the connection is completely hidden from the spammers and the viruses. This makes the intranet safe at least. There are many companies who offer different types of anti spam anti virus solutions. You can learn a lot about the anti spam anti virus solutions if you search for them online. Many companies offer their services in this regard. The online solutions are better in the sense that you can compare the prices of the available anti spam anti spam solutions before you go for the actual purchase. Many companies are providing the anti spam [*_*] solution to their clients but you have to know your own requirements before you go for one. It depends on the sensitivity of your data and the level of accuracy you want to retain in your data. The price you can afford is another factor. All these factors will help you decide what type of [*_*] [*_*] solution will suit you.

Keeping Software Simple - Part 1 - Introduction / Installation

Install, Configure, Test, Use, Tune, MaintainWe get so mired in the details we tend to forget the big picture. software that has moved from the development phase to either alpha, beta, or general availability involves six things.1. Install2. Configure3. Test4. Use5. Tune6. MaintainThese items will certainly require iteration. For instance, we typically do not know how to tune something optimally until we begin using it in its intended environment. Then once we tune it for a particular environment we use it some more. And of course tuning usually requires going back and tweaking the configuration, which in turn requires us to re-test.We certainly need to drill down on each of these entities and provide more detail, but before doing so we need to come to consenus that these are the actions items involved in any piece of software.Without getting too wrapped up for the moment in the "how" let us try to answer the following questions.First up: Installing SoftwareQUESTIONIs there any software out there that you know of that does not need to be installed? Somehow it just magically appears and we can begin using it :-). Of course not.MISSION STATEMENTWith the exception of configuration, we cannot test, use, tune, or maintain software until we have figured out how to install it. So might it be a good idea to put together a procedure for installing the software?SOME NORMS* We should always strive to install software in a manner that can be fully automated. No, I did not fall off the turnip truck and realize that this is not achievable for all software. But, if this is not doable you better have some compelling (in writing) reasons why not.* If we cannot install software via a fully automated process then we should achieve to install software in manner that we could train a chimp to do. In other words the procedure should be so easy to understand that anyone could pick it up and accomplish it. Of course if we can achieve this then we are pretty much back to the first bullet.* Staffing a configuration management team costs money and resources. The more complex the software the more of this you need. The more complex and/or convoluted your software development methodology is the more of these people you need. Frankly, a good "software development" methodology should seeks to minimize this function. Sorry, I have nothing against configuration management. It certainly is a needed and vitial function. My point is that it largely exists to deal with the crap and kludge, and general mess the development staff has lobbed over the fence.* If your configuration management team is unable to move and manage files, directories, and do builds through an automated manner that can be accomplished by toolsets then it is likely that you have 1) hired a bunch of doofs to serve this role, or 2) are having some degree of crap being lobbed over the fence by your development staff. If you do not like these two choices you had better be prepared to defend in writing, in detail just what the problem is. The goal is reduce variance. By reducing variance we reduce installation complexity. As a trivial but common example to this point I work with a product that in each of last five releases the development staff have relocated the same set of files that make up our runtime application api. They have had absolutely no compelling reason for doing this. Does this causes our configuration management group to have to redo tool and redo deployment procedures and processes. I am not advocating that there is never a reason to do something like this, I am merely stating that if you do you need to have 1) a compelling and bone-fide written reason for doing this (as in an engineering order, or new design requirement); and 2) you had better articulate this up front so everyone can prepare for the impact this change is going to have downstream for everyone that will be accepting these changes.* For software installation that requires configuration during the installation process itself you will need to ensure that your procedure contains a pre installation requirements section. For example, oftentimes one is required to create a default directory, or set a default location, enter a url, select a communcation protocol, have a password and login, a license key etc, etc... . Make sure the person doing the install has all of this information before they begin. Seldom have I seen where an installation does not actually requires a decision point (a fork in the road). Generally you can provide the answers to these forks in the road up front. For example, installing SQL server askes you to select a communication protocol. This is a decision point that should be known up front and provided to the installer.* Installing software on different operating systems or different version of an operating system can be quite variant. As a general rule of thumb if the variance is more that 10% (collectively, no more than!!!) create a separate procedure.

Summary

Vintage Computer Add-in cards come in three basic flavors: 8-bit, 16-bit and 32-bit. These terms refer to the number of data bits the card sends out at one time. Ideally a 16-bit video card sends an image to the monitor in half the time it would take for an 8-bit version. It is important to know what kind of card your vintage computer accepts. The older PCs and XTs usually have an 8-bit or PC bus, which accepts the older PC bus, which accepts only the 8-bit cards. Vintage com...