Search This Blog

Monday 13 February 2012

What Is Cluster Computing?


In a nutshell, network clustering connects otherwise independent computers to work together in some coordinated fashion. Because clustering is a term used broadly, the hardware configuration of clusters varies substantially depending on the networking technologies chosen and the purpose (the so-called "computational mission") of the system. Clustering hardware comes in three basic flavors: so-called "shared disk," "mirrored disk," and "shared nothing" configurations.

Shared Disk Clusters

One approach to clustering utilizes central I/O devices accessible to all computers ("nodes") within the cluster. We call these systems shared-disk clusters as the I/O involved is typically disk storage for normal files and/or databases. Shared-disk cluster technologies include Oracle Parallel Server (OPS)and IBM's HACMP.
Shared-disk clusters rely on a common I/O bus for disk access but do not require shared memory. Because all nodes may concurrently write to or cache data from the central disks, a synchronization mechanism must be used to preserve coherence of the system. An independent piece of cluster software called the "distributed lock manager" assumes this role.
Shared-disk clusters support higher levels of system availability: if one node fails, other nodes need not be affected. However, higher availability comes at a cost of somewhat reduced performance in these systems because of overhead in using a lock manager and the potential bottlenecks of shared hardware generally. Shared-disk clusters make up for this shortcoming with relatively good scaling properties: OPS and HACMP support eight-node systems, for example.

Shared Nothing Clusters

A second approach to clustering is dubbed shared-nothing because it does not involve concurrent disk accesses from multiple nodes. (In other words, these clusters do not require a distributed lock manager.) Shared-nothing cluster solutions include Microsoft Cluster Server (MSCS).
MSCS is an atypical example of a shared nothing cluster in several ways. MSCS clusters use a shared SCSI connection between the nodes, that naturally leads some people to believe this is a shared-disk solution. But only one server (the one that owns the quorum resource) needs the disks at any given time, so no concurrent data access occurs. MSCS clusters also typically include only two nodes, whereas shared nothing clusters in general can scale to hundreds of nodes.

Mirrored Disk Clusters

Mirrored-disk cluster solutions include Legato's Vinca. Mirroring involves replicating all application data from primary storage to a secondary backup (perhaps at a remote location) for availability purposes. Replication occurs while the primary system is active, although the mirrored backup system -- as in the case of Vinca -- typically does not perform any work outside of its role as a passive standby. If a failure occurs in the primary system, a failover process transfers control to the secondary system. Failover can take some time, and applications can lose state information when they are reset, but mirroring enables a fairly fast recovery scheme requiring little operator intervention. Mirrored-disk clusters typically include just two nodes.

Conclusion

Network clusters offer a high-performance computing alternative to SMP and massively parallel computing systems. Aggregate system performance aside, cluster architectures also can lead to more reliable computer systems through redundancy. Choosing a hardware architecture is just the beginning step in building a useful cluster: applications, performance optimization, and system management issues must also be handled.

Wednesday 8 February 2012

Mig 33



Singapore-based mobile social network mig33 has launched a new Twitter-like microblogging service called Mig33 miniblog. The new microblog allows users to send 140-character messages and provides them with additional features like badges, virtual gifts, avatars, and games.

Mig33 miniblog which was inspired by sites like Twitter, Sina’s Weibo and Tumblr is currently in beta and will be integrated with mig33′s third-party games, chat, profiles and avatars over the next four months.

Steven Goh, chief executive of Mig33, claims that the new microblog has already garnered 300,000 daily active users and will be available to all of Mig33′s 55 million registered members in the coming months.

“We believe that the proposition posed by Sina’s Weibo is applicable to other emerging markets. Users want to escape the restrictions of the ‘real world identity’ orientation of Facebook and want a far more flexible identity model, and frankly, a more fun and playful service,” said Steven Goh, mig33 co-founder and CEO.

Mig33 is popular in South and South East Asia, and has a substantial presence across the Middle East and Eastern Europe. The Mig33 miniblog will debut in Indonesia first and will later be expanded to South and Southeast Asia.

Tuesday 7 February 2012

IP v6



What is IPv6?

IPv6 or Internet Protocol Version 6 is the next generation protocol for the Internet. It's designed to provide several advantages over current Internet Protocol Version 4 (or IPv4).

Both IPv6 and IPv4 define network layer protocol i.e., how data is sent from one computer to another computer over packet-switched networks such as the Internet.

Specifically, IPv6 contains addressing and control information to route packets for the next generation Internet.We believe that the expansion of the Internet is important and upgrades are sometimes warranted.

Gathering information concering every aspects of IPv6 we would hope to provide knowledge about this technology so everyone can benefit. It is therefore also called the Next Generation Internet Protocol or  IPng  .


IPv6 is documented in several RFCs (or request for comments) starting from RFC 2460. Although IPv6 is the successor of IPv4, both protocol versions will continue to be data-oriented protocols for the Internet in the coming years.

Why IPv6?

IPv6 addresses the main problem of IPv4, that is, the exhaustion of addresses to connect computers or host in a packet-switched network. IPv6 has a very large address space and consists of 128 bits as compared to 32 bits in IPv4.

Therefore, it is now possible to support 2^128 unique
IP addresses, a substantial increase in number of computers that can be addressed with the help of
IPv6 addressing scheme.

In addition, this addressing scheme will also eliminate the need of NAT (network address translation) that causes several networking problems (such as
hiding multiple hosts behind pool of IP addresses)
in end-to-end nature of the Internet.

Qos

IPV6 brings quality of service that is required for several new applications such as IP telephony, video/audio, interactive games or ecommerce. Whereas IPv4 is a best effort service, IPv6 ensures QoS, a set of service requirements to deliver performance guarantee while transporting traffic over the network.

For networking traffic, the quality refers to data loss, latency (jitter) or bandwidth. In order to implement QOS marking, IPv6 provides a traffic-class field (8 bits) in the IPv6 header. It also has a 20-bit flow label.

Mobile IPv6

This feature ensures transport layer connection survivability and allows a computer or a host to remain reachable regardless of its location in an IPv6 network and, in effect, ensures transport layer connection survivability.

With the help of Mobile IPv6, even though the mobile node changes locations and addresses, the existing connections through which the mobile node is communicating are maintained.


To accomplish this, connections to mobile nodes are made with a specific address that is always assigned to the mobile node, and through which the mobile node is always reachable. This feature is documented in RFC 3775.

Other important features of IPv6:

Stateless Auto-reconfiguration of Hosts
This feature allows IPv6 host to configure automatically when connected to a routed IPv6 network.

Network-layer security
Pv6 implements network-layer encryption and authentication via IPsec.

Summary of Benefits in a nutshell:

1) Increased address space
2) More efficient routing
3) Reduced management requirement
4) Improved methods to change ISP
5) Better mobility support
6) Multi-homing
7) Security
8) Scoped address: link-local, site-local and global-address space

Further reading:

The other two important RFCs are: RFC 2117 (documents router alert option) and RFC 2676 (documents QoS routing mechanisms).


Hard Drives



General Information

Hard drives are mechanical devices that are used by computers to hold information (data). The data is magnetically recorded on specially coated disks called platters. The platters are divided into cylinders that start from the outside of the platter and go towards the inside (imagine the platter's rim being the first cylinder, then all the other cylinders are are just smaller circles one inside the other traveling towards the center of the platter). More than one platter are usually stacked with a small spacing between them so that a mechanical read/write head can move between them. Each Cylinder is broken down into sectors which are like pie wedges going across the circular path of the cylinder.

A head is swiveled in such a way that it can move back and forth across the platter(s). The time is takes for the head to find a cylinder (track) is usually reported as the access time in milliseconds.

The rotation of the platter is measured in revolutions per minute (rpm) and a higher value usually translates to better performance. Typical speeds range from 3600 rpm to 10000 rpm.

There are several different type of interfaces that can be used including IDE, EIDE and SCSI.

IDE (Integrated Drive Electronics) is the most common hard drive standard. It is also known as ATA.

IDE and EIDE ( Enhanced IDE) interfaces come in standard, ATA, Fast ATA-2, ATA-3 Ultra DMA, ATA66.

Hard drives can and also have a built-in memory cache buffer usually between 128k and 512k bytes.

IDE or EIDE interfaces can use the Processor Input/Output (PIO) mode or the Direct Memory Access (DMA) mode which are defined in the ATA-2 specification as follows:

ATA-2 is Fast-ATA, EIDE
Ultra-ATA is DMA/33
Mode 1 DMA 13.3 MB/sec
Mode 2 DMA 16.6 MB/sec
Mode 3 PIO 11.1 MB/sec
Mode 4 PIO 16.6 MB/sec
IDE and EIDE style hard drives connect to the computer usually to a built-in connector on the motherboard. As many as 2 drives can be connected to a single 2 headed cable. The hard drives have to be designated as either Master or Slave. Small jumper pins on the drive are used for that purpose.

A computer can have a total of 2 IDE/EIDE hard drive cables connected. The first cable, motherboard connector, and associated hard drives are referred to as primary. The second set is called the secondary. Each of the cables has its own designation of Master and Slave. In the case of 4 drives the connections would be

1) Primary channel has a Master drive and a Slave Drive
2) Secondary channel has a Master and a Slave Drive

The IDE/EIDE ATAPI interface also supports CD-ROM drives and allows them to be mixed with hard drives on the same cable. Most CD-ROM drives are now of this EIDE type design and share the hard drive cable.

The Small Computer Systems Interface (SCSI) interface can also be used to connect computer hard drives. More information on the SCSI interface will be added shortly.

Size Limitations -

IDE drives have BIOS and INT13 combined limitations. There is a limitation at the 504MB size, the 2GB size, the 4GB and 8.4GB sizes. This issue is discussed in detail at the firmware.com internet site.

Hard Drive Connectors -

Note : In AT type computers, the floppy and hard drive cables have different twists and should not be interchanged.

Practical Tip:
MFM and RLL hard drive cables have five twisted lines. Floppy cable has seven twisted lines.

Floppy cables have the twists in the lower pin numbers.

SCSI cables can have 25 or 50 pin connectors
The bus it is attached to must be terminated at two ends. Terminators are found close to the connector slot on the SCSI device.
Terminators can a set of three resistors or on newer devices the termination might be built-in and switched ON or OFF by using switches.

IDE uses a 40-pin cable with a maximum length of 18 inches. There are several designs including one or two connectors and the connector can be placed on one side of the ribbon cable or the other. The placement of the connector on the ribbon would obviously allow the cable to travel either upward from the connected drive or downward.
The distance between the connectors on a two-connector cab can also vary between designs making it at times too short to reach 2 drives simultaneously.

The older style RLL and MFM drives use two cables to connect to the controller .
The hard drive has a thinner control cable and a wider data cable . If you are using two drives, remove the terminator that is on the drive in the middle of the chain



Hard Drive : Type of Heads

Magneto Resistive
Thin Film
Placement of recording sectors

Standard Density Recording
Each track has 16 sectors
ZDR -
Method of calculating Megabyte Sizes

Manufacturer's Ratings = 1,000,000 is one Megabyte
Microsoft Chkdsk.exe = 1,048,576 is one Megabyte
Programs that allow you to break the 540MB hard drive limit on older computers

Micro House EZ Drive 8.01 (usually comes free with Western Digital drives)
OnTrack Disk Manager -
Method of low-level Formatting Older non-IDE Hard Drives ( Never low-level format IDE drives)

at a DOS prompt run DEBUG
then
G=C800:5
Hard Drive Glossary & Links

differences between MFM, RLL, IDE, EIDE, ATA, ESDI, SCSI discussion @ indiana.edu
ATA - Advanced Technology Attachment or AT Attachment.
ATA-66 -
DASP (Drive Active/Slave Present)
A connection signal used by ATA-2 Hard Drives on pin 39 which helps report to the Master drive the presence of the slave drive.
IDE - Integrated Drive Electronics
EIDE - Enhanced Integrated Drive Electronics
ZDR - Zone Density Recording -
A method of recording hard drive sectors, where the outer tracks have more sectors then the inside tracks.
UDMA - UltraATA also known as UltraDMA and Bus Mastering -

Monday 6 February 2012

Compuers : Some basic Knowledge




A computer is a machine which helps us to calculate, simulate and store different scenarios. For example, in order to write an e-mail, instead of paper and pen first we use a software (or program) called wordprocessor which helps us enter sentences through keyboard (Input), computer's screen (output) to read, and modem (output/input) to send it to a distant relative, friend, etc.

The mechanism to simulate a regular mail into an e-mail, gave us a very fast and much cheaper medium to communicate (not a simulation anymore). Same way, using computers we can simulate other things over which we do not have any control, for example weather, behaviour of atomic bomb, behaviour of a deadly virus, Earthquake, a innovative design for a new auto, airplane, machine, etc.

Any computer has five parts Input, Output, CPU, Memory, disk (storage) . Input is things like mouse, keyboard, modem. Output is computer screen, printer. CPU or central processing is brain of the computer which controls and execute all calculations, manipulations and output. Memory (RAM)is a temporary storage to be used by CPU when doing calculations, etc. Think of it as a scratch pad for CPU. Disk is permanent storage, on which all the software and data is stored.

When you turn on your computer, BIOS (or basic input output system) which resides on CMOS (complimentary Metal Oxide semiconductor,a type of chip) has small coded software written on it which tells CPU to read the next instruction from sector n of disk x. This next instruction loads the operating system.
A database is a software which lets user to organize their data in an orderly fashion. For example consider a company which sells cookies, they have a database of which has tables (or records) of customers, types of cookies and orders. So when customer x orders n number of x type of cookies his orders is placed in table orders. There are several type of databases. Some which are simply text files with records, others which are complex with tables of information. A table of information means "an array of one type of records", for example "an array of customer names, addresses, phone numbers". A Relational database is in which there are relations among the tables, for example consider three tables with customer info, inventory info and orders info. The relations between these three tables define the relational database. So when a customer X from customer table orders Item Y from Inventory info it is put in Orders table, there are links in these tables (through primary keys, secondary and foreign keys such Social Security number, product number, order number, etc) which lets us do that and thus making it a relational database. Popular type of relational databases are Access for PCs on windows 95, Oracle, Sybase, Informix, for huge business environment (running Unix operating systems).
Internet is a bunch of computers connected to each other. It started out when about 10 computers running Unix operating systems serving US military were connected to each other and named ARPANET. Initially, users could only send an e-mail to each other, deploying UUCP (unix to unix copy using modems) method. Then more computers from universities were added to ARPANET and research individuals started sharing their notes over e-mail. Later came Usenet which was more or less a discussion forum. Then after tremendous innovations in hardware (networking), in 1992 came Web, or the software called web browser which could display pictures and text. REST is history. Some terms

HTML : is Hypertext markup language. All pages in Internet use HTML.
Browser is piece of software to browse internet, i.e Netscape, Internet explorer.
Router is a piece of hardware which connects LAN to Internet.
Bridge is a piece of hardware which connects two LANs.
Programming languages are designed to aid humans to write code for computers. Since computers only understand the language of o's and 1's, and we humans a common english like languages, several computer languages were developed which translate code to computer language. Programming languages like C/C++,Visual Basic, Java using these a person writes a code and then compiles it and creates an executable file which is understood by machine. All .exe and .class files are executable files translated into language understood by computer.

Networking constitutes of connecting PCs and other machines with each other. If you have bunch of computers in same building connected to servers through several hubs it is a Local Area Network, like in an office building. If you have many buildings with many computers connected to each other it is a WAN or wide area network, like Universities. Going by same terminology Internet is probably Global Area Network. Servers are those computers which control user access to files, and are running all the time. All of the computers which are connected to Internet are servers since Internet demands access to information round the clock. When you use modem to connect to Internet on your Personal computer, you are connecting to a computer which is connected to Internet.

Operating systems are that piece of software which communicate with computer and converts all user commands back and forth. Operating systems have four parts which are Process manager, Memory manager, I/O manager and . Popular operating systems are Windows 95, Windows 98, Windows NT, Mac, SunOs, Digital, HP-UX, Solaris, Aix, etc.
Applications are the end user products which user run on a computer. i.e. Games, Word processing, excel, word, are all applications.

Personal computers are those machines that sit on your desk at home or at office, usually running Windows 95, MacOs, windows 3.1, windows 98, windows NT workstation, and other operating systems designed for PCs. Servers usually run more robust Operating systems like Unix, Windows NT, etc.

Sunday 5 February 2012

Creating groups in Windows Server 2008 & advantage of groups


When you create a new group in Windows 2008, you need to follow these steps:
From the Server Manager Console tree, with configuration and Local Users and Groups open, you click Groups, and then create a new group by right-clicking groups in the left side and by choosing New Group. A New Group dialogue box will open.
1.       When dialogue box appears, you need to enter the group name and a description, which should list the permission the group has.
2.       Click on Add, and the select Users dialog box will open. Type the user names you want to add in the text box, clicking Check Names after each entry, or you can click Advanced, and then click find. You then select a name from the list, and click OK to transfer it to the list of names.
3.       When you are done with steps one and two, click Ok. Click Create to create the new group, and then click close to close the New Group dialog box.
Add Users to Groups-
When you create the groups you can then add users to groups.
 First you need to open the Server Manager Window and then Configuration, Local users and Groups open in the console tree on the left side. You then follow these steps:
  1. Open Users by clicking it in the left side, Locate and right click a user in the right pane whose group memberships you would like to change, and then click on properties. The user’s Properties dialog box will then appear.
  2. Click the Member of tab, and then click Add. The select Groups dialog box will open.
  3. Type the groups you would like to add in the text box by selecting Check Names after each entry or you can click on Advanced. Click on Find Now, and then select a name from the list.
  4. Click Ok to transfer it to the list of name. After selecting the groups you would like to add, click on Ok.
  5.  When you are done with the user account, click OK to close the Properties dialog box
The Benefits of creating groups in Window 2008:-
The Groups are created because you can share files and folder with other groups. You can give access to the other users who are members of the group by giving them full access permission or limited access permission.  You can also modify your group and also other groups. The other users can do the same work at the time when you are doing it. It can help to manage both users’ data at the same time and it work easily for both users. Both the users can see each other’s data in their system


Group is used in the Windows 2008 Networking environment-
Windows server 2008 is a network operating system and it exists because of its networking ability. This allows it to connect with other groups for the purpose of performing the following functions:
  1. Exchanging information. An example of this is sending files and folders to another group.
  2. Sharing information by having common files accessed by users.
  3. Sharing resources on the network.
  4. Networking is important to almost every organization of two or more people who communicate and share information.
  5. A networking scheme handles the transfer.
  6. A networking hardware also handles the physical connection.

Saturday 4 February 2012

Customization of the desktops for the users is very important in order to retain the setting for each user. Outline how you can retain these setting using both Local and Roaming profiles.


To personalize Desktop, follow the steps below:
  1. Right click on desktop
  2. Click on personalize
  3. Select the option you want to personalize
  4. Change the contain
  5. Save it
On your file server, create the fowling permissions:
  1. Right Click on you user profile folder/shared folder choose and sharing and security and then permissions
  2. Add Authenticated user and domain
  3. Give domain Full Control for all files and folder
  4. Remove every one
  5. Click Ok and choose  Security Tap Advanced
  6. Remove them from Allow permissions, when you have got the Security window choose copy and then click on Ok.
  7. On Active Directory user profile properties \\fileserver\sharedfolder\%Dean Baker%
    click on Ok.

How to install adapter card (network card) ??



Safety Precautions:
To prevent static electricity from damaging vital components of your computer, remember to always attach an anti-static strip bracelet from your wrist to your computer case. Never remove a component or open a computer case while the power cable attached. Always remove all connecting cables before opening your case.
Opening the Case:
Shut off the system
Remove all cables connecting to the computer.
Remove the screws
Locating the Expansion Slots:
Place the open computer frame on its side with the motherboard facing up. It usually covers an entire side and has other smaller boards sticking up from it. Looking at the motherboard try to locate the expansion slots. Expansion slots are either long black strips or short white strips. ISA slots are black and PCI slots are white.
Installing the New Card:
Determine which interface ISA OR PCI your card uses. ISA is long and the gold contacts are large. PCI is much shorter and smaller. Next, check that expansion slot opening next to the slot is covered. If it is, remove the cover by unscrewing it from the frame. When the slot cover has been removed insert your card into the expansion slot on the motherboard. Press firmly so the entire part of the card that has the gold contacts goes completely into the expansion slot on the motherboard. Screw the card into place with the screw you removed from the expansion slot cover. After the proper placement of the card replace the case and screw it back in place. Reconnect all the cables to their proper places. Turn on the power and refer to your user manual to install the proper drivers from the disk that came with the card.

How to install RAM ??





Step 1: Prepare your computer
To get your computer ready, you need to make it safe. That means turning off the switch on the back of the power supply unit. After turning off the power supply, wait at least 10 seconds before cracking open your case to allow the motherboard's capacitors to discharge. Now open up your case, this process varies from case to case and usually involves the removal of a couple of screws. This should give you easy access and plenty of room to install your RAM.
Step 2: Find and prepare an empty RAM socket
The DIMM's slots are the 4 black slots circled in blue in the lower right-hand portion of the motherboard. Just locate the RAM sockets on your motherboard and find an empty one. If you've never installed RAM in your computer, you should have at least one or two empty slots. When you're choosing the socket in which to install your RAM, again you should consult your manual to fill the sockets in a particular order. Next, the RAM retaining clips need to be opened up in order for RAM to be installed. All you need to do is press the retaining clips outward, opening the socket for installation.
Step 3: Install your RAM
Now pick up your stick of RAM by the edges but not to get your Finger all over the working parts of the memory itself. The RAM should be slotted so that it can fit in the socket only one way, so just line up the slotted RAM with your motherboard’s RAM socket. Press the RAM until it is seated securely in the socket. If your socket has retaining clips, press down until the clips snap back into place. After this your RAM should be properly seated and installed. 


Electrical Saftey



Precautions with electric equioment:
We have many Electrically powered equipment, such as Computer, stirrers,
 vacuum pumps, photocopy machine,lasers and power supplies is essential 
element for these things.These devices can cause a significant hazard to us,
particularly when mishandled or not maintained.Many electrical devices have 
high voltage or high power requirements and they also carry more risk,that 
is the reason  Large capacitors can be seen in many laser lambs so that 
serious danger also can be protected.


Electrical Hazards
The main hazard concerned with electricity are fire and electric fire. We can feel the electrical shock occurs when the body parts comes in contact of the electric circuit,also when an individual comes in contact with both wires of an electrical circuit, one wire of an energized circuit and the ground.



Preventing Electrical Hazards
There are various ways of protecting our self from the hazards caused by electricity. We can significantly also reduce electrical hazards by following some basic precautions:
http://web.princeton.edu/sites/ehs/hazardcommguide/sumbul1a.gif
Check wiring of equipment before each use. Replace damaged or unravelled electrical wire immediately.
http://web.princeton.edu/sites/ehs/hazardcommguide/sumbul1a.gif
Use safe work practices every time electrical equipment is used.
http://web.princeton.edu/sites/ehs/hazardcommguide/sumbul1a.gif
Know the location and how to operate shut-off switches and/or circuit breaker panels.
http://web.princeton.edu/sites/ehs/hazardcommguide/sumbul1a.gif
Limit the use of extra wires. Use only for temporary operations.
http://web.princeton.edu/sites/ehs/hazardcommguide/sumbul1a.gif
Use only multi-plug adapters equipped with circuit breakers or fuses.
http://web.princeton.edu/sites/ehs/hazardcommguide/sumbul1a.gif
Place exposed electrical conductors (such as those sometimes used with electrophoresis devices) behind Plexiglas wires.
http://web.princeton.edu/sites/ehs/hazardcommguide/sumbul1a.gif
Minimize the potential for water or chemical spills on or near electrical equipment.



Insulation
All electrical cords should have sufficient wadding to prevent direct contact with wires. It is important to check all wires before each use, since acidic chemicals or solvent vapours’ may grind down the insulation.
Damaged wires should be repaired or taken out of service immediately, especially in wet environments such as cold rooms and near water baths.

Guarding
Live parts of electric equipment operating at high volts must be guarded against accidental contact. Plexiglas shields may be used to protect against exposed live parts.

Grounding
Equipment with three-prong plugs should be used. The third prong provides a path to ground that helps to prevent the build-up of voltages that may result in an electrical shock or spark but This is not 100 % sure that no one will receive a shock, be injured, or be killed. It will, however reduce the possibility of such accidents, especially when used in combination with other safety measures.



Circuit Protection Devices
Circuit protection devices are designed to automatically limit or shut off the flow of electricity in the event of a ground-fault, overload, or short circuit in the wiring system. Fuses, circuit breakers, and ground-fault circuit interrupters are three well-known examples of such devices.
Fuses and circuit breakers prevent over-heating of wires and components that might otherwise create hazards for operators. They disconnect the circuit when it becomes overloaded. This overload protection is very useful for equipment that is left on for extended periods of time, such as stirrers, vacuum pumps, drying ovens, Variacs and other electrical equipment.
The ground-fault circuit interrupter, is designed to shutoff electric power if a ground fault is detected. The GFCI is particularly useful near sinks and wet locations. Since GFCIs can cause equipment to shutdown unexpectedly, they may not be appropriate for certain apparatus. Portable GFCI adapters may be used with a non-GFCI outlet.






Safe Work Practices
The following practices may reduce risk of injury or fire when working with electrical equipment:
Avoid contact with high electrical circuits.
Disconnect the power source before servicing or repairing electrical equipment.
When it is necessary to handle equipment that is plugged in, be sure hands are dry and, if possible, wear nonconductive gloves and shoes with insulated soles.
If it is not unsafe to do so, work with only one hand, keeping the other hand at your side or in your pocket, away from all conductive material. This precaution reduces the likelihood of accidents that result in current passing through the chest cavity.
Minimize the use of electrical equipment in cold rooms or other areas where condensation is likely. If equipment must be used in such areas, mount the equipment on a wall or vertical panel.
If water or a chemical is spilled onto equipment, shut off power at the main switch or circuit breaker and unplug the equipment.
If an individual comes in contact with a live electrical conductor, do not touch the equipment, cord or person. Disconnect the power source from the circuit breaker or pull out the plug using a leather belt.














PC Troubleshooting Tips Why is My PC Crashing?


Nothing can put a damper on productivity quite like a computer that crashes on a regular basis. Sometimes, a crash is preceded by the dreaded “blue screen of death” or another warning; other times, a computer simply shuts off without any warning at all. In either case, the end result is a whole lot of frustration, aggravation and lost work. If your computer has been crashing frequently, you’d probably like to put an end to it. Unfortunately, getting to the bottom of things if often easier said than done. The following tips about improving your computer’s performance, though, are excellent places to begin.

Possibility #1: Corrupted System Registry Files

Every Windows-based PC has something called a Windows registry. The registry contains several files that are integral to the performance and operation of your computer. Over time, some of those files can become corrupted, be misplaced or get lost altogether. When that happens, the system registry becomes compromised – and frequent crashes are all-too-common symptoms. The best way to rule this possibility in or out is by running a Windows registry cleaning program. Such programs scan your Windows registry for problems then automatically make repairs. If you run a registry cleaner and the crashes persist, they are probably being caused by a different issue.

Possibility #2: Disorganized Files

Windows operating systems handle file organization in a way that isn’t very intuitive. Basically, they break files up and fit them into gaps in the computer’s memory. As time goes by, these disorganized files can prompt frequent crashes. Luckily, a great optimization solution is built right into Windows-based PCs: the disk defragmentation utility. Although its location on a computer varies, you can generally locate it within the System and Security section inside the Control Panel. By running a defrag once every few months, you may be able to keep those pesky computer crashes at bay.

Possibility #3: Malicious Software

Malicious software can take many different forms. Sometimes, it’s a virus that is accidentally unleashed after opening a strange email; other times, its adware that tags along with other information that is automatically downloaded from a website. Whatever type it is, there’s no question that malicious software can wreak havoc on a computer’s performance. Happily, there are many topnotch programs out there that regularly scan your computer for the presence of such problems – and that help guard against them, too. Buy one, install it and use it regularly; your crash issues may come to an end.

Possibility #4: Too Little Available Memory

When you buy a new computer, it feels like there’s no end to the amount of memory that it has. Of course, this isn’t true at all. As never-ending as the available memory on your PC may initially seem, the fact is that it can be depleted with incredible speed. You can find out for sure by checking the information within “My Computer.” If it appears that your available memory is low, you can use a PC cleanup program to remove unnecessary files; such programs remove things like temporary Internet files and other file debris that can suck away much-needed memory.

Possibility #5: Overheating

If you’ve run through all of the preceding possibilities and continue experiencing frequent crashes, a hardware issue could be to blame. An easy one to rule out is overheating. A computer’s CPU, or central processing unit, includes a fan that is designed to keep it running cool. Sometimes, the fan wears down and doesn’t work as efficiently; other times, it’s just not able to handle the work that your computer has to do. In either case, buying a bigger, better fan isn’t very expensive. If it puts an end to your PC crashing problem, it will have been more than worth it.

Don’t Put Up with Frequent Crashes!

As discussed, frequent computer crashes can be triggered by a wide variety of issues. Luckily, many of these issues are relatively easy to remedy. Work your way through the preceding list; chances are, you’ll be able to pinpoint the problem and put an effective cure to work. Nine times out of ten, a computer simply needs a little bit of routine maintenance to get it back on track again. In the future, keep these points in mind. Any time you buy a new computer, keep up with its basic maintenance right from the get-go. By doing that, you could avoid “blue screen of death” and crashing problems altogether – and that’s something that you’re bound to appreciate!

3 Tips to Fix Unreliable Wireless Connections

Generally speaking, wireless computer connections are reliable. However, nothing is perfect, and sometimes you may lose your connection or experience a weak signal. There are many factors that impact the reliability of your wireless connection. For example, if your wireless adapter is too close to a 2.4 GHz wireless telephone, you may notice a decrease in your computer’s wireless single strength. Why? Because the phone and the computer reside on the same frequency and can interfere with each other’s performance.
Handy Repair Checklist for Wireless Interruptions
1. First check to see if your cable or DSL is actually working. Usually located in your basement, most modems have four lights. You have a live Internet connection if the “data” or “status” light is on. If it’s off, or flashing, your cable is out.
2. If your cable/DSL is working, then reboot your computer. Sometimes, if your cable/DSL goes out for even 10 seconds, your computer and the wireless router may no longer be able to talk to each other. By rebooting your computer, a new IP address is assigned, allowing them to once again communicate.
3. If your desktop is wireless and you’ve moved the wireless adapter [the box that sits next to the computer with antennas], then you may need to move the adapter until you find a stronger signal.


'Broadband' is the general term used to refer to high-speed information transmission over networks, and nowadays is used increasingly to mean a fast Internet connection. 
The term has more to do with the electrical waveform (‘signal’) being transmitted. The signal can come to you through a variety of physical arrangements: a DSL line, a T1 line, a TV cable, a wireless link and even your utility power line. 
Which physical arrangement is best for you depends a great deal on what is available in your geographical area and the price of each arrangement. You should do a comparison of speeds and costs and choose what is optimal for you. Just be sure you do not choose an ISDN line (because it is getting obsolete) or power line (because the technology is not mature, and it will be some years before the bugs are ironed out). 
Live in a large city and want free wireless broadband Internet? Your wish is or will be granted! Almighty Google is busy fixing antennae to lampposts in major cities so that your computer can access the Internet much in the same way your mobile phone accesses your cellular network: almost anywhere in any city. Not only will you get driving directions to that restaurant you are going to, the maitre d’ will appear on a small screen and take your order as you drive.
~ Broadband’s Bag of Goodies ~ 
Broadband has brought a slew of valuable capabilities to the Internet: 
1. Good Video 
First of all, you can download smooth, non-jerky video. Consequently an increasing number of sites are including rich graphics, Flash and video to enhance the appeal of their messages. You can now download feature films from over 200,000 Web TV stations and watch them as they stream into your computer (“stream them”). No more trips to the video library and no more renting DVDs! 
You can share your screen and talk with co-workers located at far-flung locations (or just relax and play Xbox or PS2 games with them). You can interact with them from the convenience of your home computer, and the need for a physical office can be dispensed with. This implies less travel in your car, less gasoline consumption and less pollution of the atmosphere by engine exhaust gases. 
You can search online video archives with specialized search engines. This means you can download video that matches your chosen phrases. Examples would be “Nick Lachey singing ‘My Everything’ to Jessica Simpson”, “Oprah visiting Katrina victims” or “how to toss a thin pizza shell”. There is no longer a need to wait for your subject to be broadcast. 
2. Cheap Long Distance 
Broadband has enabled miracle of low-cost long-distance Internet telephony. This application is based on the renowned technology, VoIP (Voice over Internet Protocol). You can now speak to your loved ones or business associates in most other parts of the world for 2 cents a minute! 
No more waiting for late nights or weekends to get those “free minutes”… you can afford to call anytime. Additionally, the sound clarity is several times better than that of a conventional phone call… voices are loud and clear with little or no background noise. 
This means you can stay in touch more often. You can get news faster and offer advice without delay. For instance, a timely observation about a certain medical treatment could very well save the life of the person at the other end! 
3. Always On 
With Broadband, you are always connected to the Internet. No more dialing up and waiting to connect. The dialing time is freed up for you to use for other things. 
In most cases, you get a telephone connection with the broadband connection, so you can simultaneously speak on the phone and surf the Internet. Your phone line will not be busy when you surf so that people can reach you even if you are online. 
One important user of this constant connectivity is security. You can have inexpensive webcams mounted in various locations of your home or office and connect them to the Internet. Since your broadband connection is always ‘live’, you can monitor your house from anywhere, anytime. No more worrying when away from your desk or living room! 
~ Conclusion ~ 
The day is not far when dial-up connections will be a rarity. If you have not yet upgraded to broadband, start working at doing so NOW. You will definitely not regret it.