Saturday, May 3, 2008

Toshiba Libertto U100, smaller yet better than you might imagine!

So far, the laptop is how small it? Well, today& 39;s technology Toshiba is a perfect job to demonstrate that a single libertto u100, very few laptop is such a rich feature set to complete such a small space Compatibility. Of course, if you believe that a fingerprint authentication system is too much for such a small device, and then you are wrong; However, if you think you can protect your hard drive is the only major laptop you Then it is wrong again! Toshiba laptop manufacturing
this small miracle in many different ways that will surprise you. First of all, Japan is again the magic of the motherboard to reduce the size of the initial size of nearly one-third. Apart, minimize, or, 802.11 b / g wireless PCI card, the size of a half! Of course, these spaces improve enough space left in the 1.20 ghz Intel Pentium M microprocessor (of 2 megabytes of L2 cache and 400 MHz FSB) u100.
regarding to find the connections in the home, u100 is Two USB slot, 1 IEEE -1 394, as well as wireless LAN ports, modem ports. I think that& 39;s enough? Well, sorry, but, u100 also equipped with connectors, mini RGB as well as a docking connector. Now, meat! Toshiba, equipment u100 is very own hard drive protection system. This system uses three-dimensional sudden change in velocity and acceleration sensors to detect them (in this case might occur for several reasons laptop waterfalls and bounce). These accelerometers to detect if then, the hard drive (this is, you have the space and 60 GB) head will stop any motion until things return to normal. This feature really helpful to leave, u100 with a fingerprint identification system. Laptop will only work if the user& 39;s fingerprint recognition. Now might wonder & quot; Okay, this laptop is really a lot of features; may consider must be really heavy Dimensions! " Well, even if the surprise is, u100 read only minimal weight to 2.16 pounds!
one u100 attention to the last one about the Toshiba is an updated display; At this point, which is 7.2 " a wide-screen LCD wxga (1280x768pixels) is further illuminated, all of the above LED backlight.
with said, there& 39;s just one more Say, did not know until it: your choice is completely! JONGIBU, a Toshiba laptop& 39;s owner toshoba more about the resources to check out a laptop http://www.toshiba-laptops-sources1k.info



Bookmark it: del.icio.usdigg.comreddit.comnetvouz.comgoogle.comyahoo.comtechnorati.comfurl.netbloglines.comsocialdust.comma.gnolia.comnewsvine.comslashdot.orgsimpy.com

Do The World s Poor Children Really Need A $100 Laptop?

The chairman and founder of the Massachusetts Institute of Technology Media Lab has recently launched & 39; $ 100 laptop in the world media. Is it necessary?
MIT established a non-profit association called One Laptop Per Child, design, manufacture and distribute laptop computers to be provided to governments at various costs and issued to children by participating schools on the basis d & 39; one laptop per child. These machines will be robust, based on Linux and & 39; energy-efficiently as part of the engine alone can generate sufficient power for operation & 39;.
The Internet connectivity issue is addressed in several ways, including the & 39; use of Wi-Fi, WiMax, 3G and satellites and fibre, coaxial cable and plain old telephone. Competition, deregulation and the fact that the developing world is now the only new telecommunications market, all perhaps contribute to the availability of greater scope, greater bandwidth and more importantly in these countries, the decline in connection costs.
The proposed solution is a $ 100 laptop: a durable, versatile machine at a price that the developing world can afford. The fact that this objective has been achieved is indeed a remarkable achievement, the very notion of what & 39; until very recently was avoided by leaders of industry & 39; impossible.
The strongest argument in favour of this idea cheap laptop rests on the laurel that the greatest assets d & 39; people are his children, and so the highest priority on social east & 39; education these children. Throughout the illness, natural disasters, war and poverty, education & 39; characteristics as the first solution to the problem.
Most educators argue that & 39; effectiveness of learning & 39; d & 39; follows a basic level of personal curiosity about a subject, and in a sense, the ability & 39; self-education. The essential point here & 39; n is not so much that every child knows to this day, c & 39; is rather the prospect that & 39; they can bring to bear on a problem. It is well known case studies of this network & 39; learning, increased by technology, computers and Internet connectivity, bears fruit in heavy academia.
The saving of $ 100 a laptop based on the following issues: Nearly half the purchase price & 39; d & 39; a new laptop is taken up by the cost of sales, marketing, distribution and of course always shamelessly profit margin. By sidestepping the & 39; entire retail and distribution directly to governments in the & 39; absence of profit-driven targets a huge part of the price per model is evaporated.
Physically the most expensive aspect is the & 39; screen. L & 39; d & 39; use a technology called E-Ink MIT, which offers the potential d & 39; be as low as 10 cents per square inch and daylight readable offers clear resolution is promising. The processor, memory and power can be stripped down, as the functionality of the machine n & 39; not need & 39; be advanced beyond surfing, e-mail and word processing like all open-source software reduces that takes few resources.
It is now no doubt that the $ 100 laptop-t-il. Whether c & 39; is a good idea? Everything about " said yes ", though sociologists have yet to collect their argument on it seems.



Bookmark it: del.icio.usdigg.comreddit.comnetvouz.comgoogle.comyahoo.comtechnorati.comfurl.netbloglines.comsocialdust.comma.gnolia.comnewsvine.comslashdot.orgsimpy.com

Information Security Policy

Qu & 39; is the security of & 39; information? The security policy of & 39; information, a number of suggestions (laws) of companies led to write, for their information system & 39; safe and immune against malicious attacks! Typically, this type of policy is to varying degrees collaborators, but the & 39; element common to all these measures - target! Policy can conjuct number of rules on all matters relating to security of information and & 39; l & 39; use of & 39; computer or separate rules on different themes, for example, e-mail, network security.Why physical or company needs the security policy of & 39; information? many computer systems can not, to be sure, but without these systems bussines life is difficult to imagine. Increasingly, companies and their computer systems and security networks are facing threats from d & 39; a wide range of sources, including support to the fraud, & 39; espionage, sabotage, vandalism, d & 39; d & 39; fire or flood. Sources of damage such as viruses, hackers and denail-of-service attacks have become more frequent, more and more ambitious and complex. And companies to make information system & 39; n & 39; is not secure enough, with modern technologies and software, but also all members of this company must cover a portion of the security policy process modeling System.Security Systems point to low and give advice, how to avoid, c & 39; is a policy them.How? There are several possibilities for the creation of & 39; a security policy, but the basic idea & 39; is the same. There are a number of issues on business, employees and to respond as specific information security awareness companies deal with these answers and & 39; write your own (business) policy & 39; security of information. Another way to implement this policy is the & 39; d & 39; use special software that automatically processes the answers, d & 39; assess risks and a policy. This track is easier and earlier is also less political has yet to be written in a form that is relevant, accessible and understandable to & 39; for readers! Is a political society. Qu & 39; east-what comes next? Now, is a director of the company & 39; appoint a person to the policy of & 39; observation of written rules. This person has the introduction of all personnel of these rules and also published and make this policy are at your disposal. Now, this person must d & 39; review and monitor how those rules are implemented in life. This person was very close to directors and regularly inform & 39; s & 39; ago problems.Problems! Normally, the problems start whith impementing the rules of political life. People have led to a change in their daily work and try to abide by these rules of reference. It is always difficult, but there are many ways to stimulate, or even push them to do so. This process is more specific easly-E-Learning courses, provision of security of information & 39; awareness of enterprises, for example, Infosecuritylab. Likewise, managers can develop a kind of bonuss system employies the mention of these rules or ignore these warnning!
Article Source: Security of Information Awareness & 39;



Bookmark it: del.icio.usdigg.comreddit.comnetvouz.comgoogle.comyahoo.comtechnorati.comfurl.netbloglines.comsocialdust.comma.gnolia.comnewsvine.comslashdot.orgsimpy.com