Author Archive: Herbert Reich

rss feed

The Motherboard Explained

The Motherboard Explained

download 10 000 bc free If you talk about computers, you end up talking about motherboards. Just what is a motherboard? What does “Advanced TCA” mean? What do various motherboards do for your computer? Here are some of the answers to those questions to help you learn more about computers in general and make the […]

The Laptop Revolution

The Laptop Revolution

Our ever busy, ever transient society needs to be able to receive access to their computerized world at a moment’s notice. Traveling from place to place, meeting-to-meeting doesn’t allow you time to stop and sit at your desk to use your computer. People would much rather be able to take the computer with them. Laptop […]

The Innovative Twist of Dell

The Innovative Twist of Dell

Dell first came onto the computer scene, offering an innovative twist on the usual method of selling PCs. Instead of selling only out of the box PCs, like most manufacturers, Dell built its computers to order. One of the most popular was a desktop PC, the Dell Dimension. Unlike some previous models, it was specifically targeted to the home PC market. In the middle of 1997, the Dimension was replaced by the Dell Inspiron series. Its incarnations so far include the Dell Inspiron 530, 530s, 531 and 531s. The s after the name denotes that this computer model is a “slim” style, and has a small footprint ideal for computer setups in a relatively limited amount of space.

Information Security in the Digital Age

Information Security in the Digital Age

Information security has been getting an increased amount of attention lately. This term refers to protecting information systems and the data they contain from use, damage and disclosure by unauthorized people. Other terms you might see used for this behavior are digital security, computer security and information assurance. All of these fields have the common goal of protecting information availability, confidentiality and integrity. Since many bodies have amassed a lot of confidential information about products, employees, research, customers and other subjects, information security is important. Institutions as variable as private business, government bodies, corporations and the military all need to make use of this important means of protection. Much of this important information is now stored, collected and processed on computers. It’s also transmitted across networks, putting it in jeopardy more often. If financial information about the finances or customers of a business falls into a competitor’s hands or those of a criminal, a lot of damage could be done. Law suits, lost business, and even bankruptcy could be a result of failed informational security. That’s because protecting the confidential information of clients and others is a legal, ethical and business requirement. Information security can have a big effect on personal privacy, too.

Using Online File Storage

Using Online File Storage

Why would someone want online file hosting? It will allow you to do a lot of things with your files. You can store many different types of files online. It is a way to host files online and let certain people of your choosing to download them for their own use. You can have them do this via the internet or by file transfer protocol (FTP). There are many different uses for online file storage.

All About Advanced Mezzanine Cards

All About Advanced Mezzanine Cards

Advanced Mezzanine Cards are printed circuit boards following a particular specification of an entity known as the PICMG. The PICMG (PCI Industrial Computers Manufacturer’s Group) is made up of more than one hundred companies and has a significant effect on standards for electronics production. Advanced MC is targeted to the requirements of the next generation of carrier grade equipment for communications devices. These specifications have been designed to work with any of the available carrier cards and to plug into backplanes directly.